<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.14 (Ruby 3.1.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-amsuess-lake-edhoc-grease-01" category="info" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title>Applying Generate Random Extensions And Sustain Extensibility (GREASE) to EDHOC Extensibility</title>
    <seriesInfo name="Internet-Draft" value="draft-amsuess-lake-edhoc-grease-01"/>
    <author initials="C." surname="Amsüss" fullname="Christian Amsüss">
      <organization/>
      <address>
        <postal>
          <country>Austria</country>
        </postal>
        <email>christian@amsuess.com</email>
      </address>
    </author>
    <date year="2024" month="October" day="13"/>
    <workgroup>LAKE</workgroup>
    <abstract>
      <?line 20?>

<t>This document applies the extensibility mechanism GREASE (Generate Random Extensions And Sustain Extensibility),
which was pioneered for TLS,
to the EDHOC ecosystem.
It reserves a set of non-critical EAD labels and unusable cipher suites
that may be included in messages
to ensure peers correctly handle unknown values.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Constrained RESTful Environments Working Group mailing list (core@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/core/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://gitlab.com/chrysn/core-edhoc-grease"/>.</t>
    </note>
  </front>
  <middle>
    <?line 29?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document applies the extensibility mechanism GREASE (Generate Random Extensions And Sustain Extensibility),
which was pioneered for TLS in <xref target="RFC8701"/>,
to the EDHOC <xref target="RFC9528"/> ecosystem.</t>
      <t>The introduction of <xref target="RFC8701"/> and <xref section="3.3" sectionFormat="of" target="RFC9170"/> provide comprehensive motivation for adding such extensions;
<xref target="I-D.edm-protocol-greasing-02"/> provides additional background that influenced this document.</t>
      <t>The extension points of the EDHOC protocol (<xref target="RFC9528"/>) are
cipher suites,
methods,
EADs (External Authorization Data items)
and COSE headers.
This document utilizes the cipher suite and EAD extension points.</t>
      <t>Unlike in TLS GREASE <xref target="RFC8701"/>,
EDHOC is operating on tight bandwidth and message size budget,
with some messages just barely fitting within relevant networks' fragmentation limits.
Thus,
more than with TLS GREASE,
it is up to implementations to decide
whether in their particular use case
they can afford to send addtional data.</t>
      <section anchor="variability-in-other-extension-points">
        <name>Variability in other extension points</name>
        <t>If the selected method or the used COSE heades are unsupported by the peer,
EDHOC does not conclude successfully.
While values could be reserved for these for use as GREASE,
these failed attempts would not be verified between the EDHOC participants
without maintaining state between attempted EDHOC sessions.
Such an addition is considered impractical for constrained devices,
and thus out of scope for this document.</t>
        <t>Recommendations for GREASE <xref section="4" sectionFormat="of" target="I-D.edm-protocol-greasing-02"/>
also include varying other aspects of the protocol,
such as varying sequences of elements.
EDHOC has little known variability,
and intentionally limits choice at times
(for example, <xref section="3.3.2" sectionFormat="of" target="RFC9528"/> allows only the numeric identifier form where that is possible).
Where variation is allowed,
e.g. in padding or in the ordering of EAD options,
applications are encouraged to exercise it.</t>
      </section>
    </section>
    <section anchor="the-grease-ead-labels">
      <name>The GREASE EAD labels</name>
      <t>This document registers the following EAD labels as GREASE EADs:</t>
      <t>160, 41120, 43690, 44975</t>
      <t>These EADs are available in all EDHOC messages.
The EADs are only used in their positive (non-critical) form.</t>
      <t>It is expected that future documents register additional values with the same semantics.</t>
      <section anchor="use-of-grease-eads-by-message-senders">
        <name>Use of GREASE EADs by message senders</name>
        <t>A sender of an EDHOC message MAY send a GREASE EAD using the non-critical (positive) form at any time,
with any or no EAD value (that is, with or without a byte string of any usable length),
in any message.</t>
        <t>Senders SHOULD consider the properties of the network their messages are sent over,
and refrain from adding GREASE when its use would be detrimental to the network
(for example, when the added size causes fragmentation of the message).</t>
        <t>On networks where the data added by the grease EADs does not significantly impact the network,
senders SHOULD irregularly send arbitrary (possibly random) GREASE EADs with their messages
to ensure that errors resulting from the use of GREASE are detected.</t>
        <t>The GREASE EADs MAY be used as an alternative form of padding.</t>
        <section anchor="suggested-pattern">
          <name>Pattern for limited fingerprinting</name>
          <t>A method of deciding how to apply GREASE is suggested as follows:</t>
          <ul spacing="normal">
            <li>
              <t>For every message, use GREASE with a random probability of 1 in 64.</t>
            </li>
            <li>
              <t>Pick a random GREASE label out of the uniform distribution of available options.</t>
            </li>
            <li>
              <t>Pick a random length from the uniformly distributed interval 9 to 40 (inclusive).</t>
            </li>
            <li>
              <t>Add the selected GREASE label with a value of the selected length,
filled with random bytes.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="use-of-grease-eads-by-message-recipients">
        <name>Use of GREASE EADs by message recipients</name>
        <t>A party receiving a GREASE EAD MUST NOT alter its behavior
in any way that would allow random GREASE EADs
to alter the security context that gets established.</t>
        <t>It MAY alter its behavior in other ways;
in particular, it SHOULD randomly insert GREASE EADs
in later messages of an exchange in which unprocessed EADs (including GREASE EADs) were present.</t>
        <t>Implementations SHOULD NOT attempt to recognize GREASE EADs,
and apply the default processing rules.</t>
      </section>
    </section>
    <section anchor="grease-cipher-suites">
      <name>GREASE cipher suites</name>
      <t>This document registers the following cipher suites:</t>
      <t>160, 41120, -41121, 43690</t>
      <t>It is expected that future documents register additional values with the same semantics.</t>
      <t>An initiator may insert a GREASE cipher suite
at any position in its sequence of preferred cipher suites.</t>
      <t>A responder MUST NOT support any of these cipher suites,
and MUST treat them like any other cipher suite it does not support.</t>
      <t>Thus, these cipher suites never occur as the selected cipher suite.
An initiator whose choice of a GREASE cipher suite is accepted
needs to discontinue the protocol.</t>
    </section>
    <section anchor="processing-of-grease-related-failures">
      <name>Processing of GREASE related failures</name>
      <t>It is RECOMMENDED that any counters or statistics about successful and failed connections
distinguish between connections in which GREASE was applied and those in which it was not applied.
Any operator feedback channel, be it immediately to the user or through network monitoring,
SHOULD warn the operator if there are errors that were determined to originate from the use of GREASE
or that are significantly likely to originate from there.
This provides a feedback path as described in <xref section="4.4" sectionFormat="of" target="RFC9170"/>.</t>
      <t>Whether logging of GREASE related failed connection details is appropriate
depends on the privacy policies of the application.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy considerations</name>
      <t>The way in which GREASE is applied
can contribute to identifying which implementation of EDHOC
is being used.
Implementers of EDHOC are encouraged to use the algorithm described in <xref target="suggested-pattern"/>,
both to reduce the likelihood of their implementation to be identified through the use of GREASE
and to increase the anonymity set of other users of the same algorithm.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The use of the GREASE option has no impact on security
in a correct EDHOC implementation.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA considerations</name>
      <section anchor="edhoc-eads">
        <name>EDHOC EADs</name>
        <t>IANA is requested to register
four new entries into the EDHOC External Authorization Data Registry
established in <xref target="RFC9528"/>:</t>
        <t>160, 41120, 43690, 44975</t>
        <t>All share the name "GREASE",
the description "Arbitrary data to ensure extensibility",
and this document as a reference.</t>
      </section>
      <section anchor="edhoc-cipher-suites">
        <name>EDHOC cipher suites</name>
        <t>IANA is requested to register
four new values into the EDHOC Cipher Suites Registry
established in <xref target="RFC9528"/>:</t>
        <t>160, 41120, -41121, 43690</t>
        <t>All share the name "GREASE",
the array N/A,
the description "Unimplementable cipher suite to ensure extensibility",
and this document as a reference.</t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9528">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a very compact and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys. EDHOC provides mutual authentication, forward secrecy, and identity protection. EDHOC is intended for usage in constrained scenarios, and a main use case is to establish an Object Security for Constrained RESTful Environments (OSCORE) security context. By reusing CBOR Object Signing and Encryption (COSE) for cryptography, Concise Binary Object Representation (CBOR) for encoding, and Constrained Application Protocol (CoAP) for transport, the additional code size can be kept very low.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9528"/>
          <seriesInfo name="DOI" value="10.17487/RFC9528"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8701">
          <front>
            <title>Applying Generate Random Extensions And Sustain Extensibility (GREASE) to TLS Extensibility</title>
            <author fullname="D. Benjamin" initials="D." surname="Benjamin"/>
            <date month="January" year="2020"/>
            <abstract>
              <t>This document describes GREASE (Generate Random Extensions And Sustain Extensibility), a mechanism to prevent extensibility failures in the TLS ecosystem. It reserves a set of TLS protocol values that may be advertised to ensure peers correctly handle unknown values.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8701"/>
          <seriesInfo name="DOI" value="10.17487/RFC8701"/>
        </reference>
        <reference anchor="RFC9170">
          <front>
            <title>Long-Term Viability of Protocol Extension Mechanisms</title>
            <author fullname="M. Thomson" initials="M." surname="Thomson"/>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>The ability to change protocols depends on exercising the extension and version-negotiation mechanisms that support change. This document explores how regular use of new protocol features can ensure that it remains possible to deploy changes to a protocol. Examples are given where lack of use caused changes to be more difficult or costly.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9170"/>
          <seriesInfo name="DOI" value="10.17487/RFC9170"/>
        </reference>
        <reference anchor="I-D.edm-protocol-greasing-02">
          <front>
            <title>Maintaining Protocols Using Grease and Variability</title>
            <author fullname="Lucas Pardue" initials="L." surname="Pardue">
              <organization>Cloudflare</organization>
            </author>
            <date day="10" month="July" year="2023"/>
            <abstract>
              <t>   Long-term interoperability of protocols is an important goal of the
   network standards process.  Part of realizing long-term protocol
   deployment success is the ability to support change.  Change can
   require adjustments such as extension to the protocol, modifying
   usage patterns within the current protocol constraints, or a
   replacement protocol.  This document present considerations for
   protocol designers and implementers about applying techniques such as
   greasing or protocol variability as a means to exercise maintenance
   concepts.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-edm-protocol-greasing-02"/>
        </reference>
      </references>
    </references>
    <?line 197?>

<section anchor="open-questions">
      <name>Open questions</name>
      <t>Do the GREASE EADs add any value that padding does not already add?</t>
      <t>Probably yes, because padding is "special enough" that it could be handled in a hard-coded fashion.
(Then again, there's nothing but the effort stopping anyone else from doing the same with the GREASE EADs, right?)</t>
      <t>Can anything be done about extra methods and COSE headers?</t>
      <t>They would not result in successful operations,
but maybe there is still some value in registering one or two --
using them would mean sacrificing the full connection,
but it may still be possible to conclude that the extension points are in order
from watching the EDHOC exchange fail in the predicted way.</t>
    </section>
    <section anchor="change-log">
      <name>Change log</name>
      <t>Since draft-amsuess-lake-edhoc-grease-00:</t>
      <ul spacing="normal">
        <li>
          <t>Expanded introduction section to just point to the abstract any more.</t>
        </li>
      </ul>
      <t>Since draft-amsuess-core-edhoc-grease-01:</t>
      <ul spacing="normal">
        <li>
          <t>Update references to RFC9528 🎉</t>
        </li>
        <li>
          <t>Change target WG to LAKE, renaming to draft-amsuess-lake-edhoc-grease</t>
        </li>
        <li>
          <t>Process RFC9170
          </t>
          <ul spacing="normal">
            <li>
              <t>Add a section on failure processing</t>
            </li>
            <li>
              <t>Reference where appropriate</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Process draft-edm-protocol-greasing-02
          </t>
          <ul spacing="normal">
            <li>
              <t>Variability outside of extension points</t>
            </li>
            <li>
              <t>Be firmer against recognizing GREASE values</t>
            </li>
            <li>
              <t>Point out that future options may be registered (instead of the suggested algorithmic registrations)</t>
            </li>
          </ul>
        </li>
      </ul>
      <t>Since -00:</t>
      <ul spacing="normal">
        <li>
          <t>Fixed a mix-up between positivity and criticality of options.</t>
        </li>
        <li>
          <t>Adjusted numbers accordingly to once more fit in the <tt>0xa.</tt> pattern
(actually they're using <tt>0x.a</tt>, but that doesn't work the same way with CBOR).</t>
        </li>
        <li>
          <t>Text improvements around recipient side processing.</t>
        </li>
      </ul>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Marco Tiloca pointed out a critical error in the numeric constructions.
Göran Selander provided input to reduce mistakable text.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
