<?xml version='1.0' encoding='utf-8'?>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.21 -->
<!DOCTYPE rfc SYSTEM "rfc2629-xhtml.ent">
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ace-extend-dtls-authorize-02" category="std" consensus="true" updates="draft-ietf-ace-dtls-authorize" tocDepth="2" tocInclude="true" sortRefs="true" symRefs="true" obsoletes="" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.7.0 -->
  <front>
    <title abbrev="CoAP-DTLS Extension">Extension of the CoAP-DTLS Profile for ACE to TLS</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ace-extend-dtls-authorize-02"/>
    <author initials="O." surname="Bergmann" fullname="Olaf Bergmann">
      <organization abbrev="TZI">Universität Bremen TZI</organization>
      <address>
        <postal>
          <street>Bremen, D-28359</street>
          <country>Germany</country>
        </postal>
        <email>bergmann@tzi.org</email>
      </address>
    </author>
    <author initials="J" surname="Preuß Mattsson" fullname="John Preuß Mattsson">
      <organization abbrev="Ericsson">Ericsson AB</organization>
      <address>
        <postal>
          <street>SE-164 80 Stockholm</street>
          <country>Sweden</country>
        </postal>
        <email>john.mattsson@ericsson.com</email>
      </address>
    </author>
    <author initials="G." surname="Selander" fullname="Göran Selander">
      <organization abbrev="Ericsson">Ericsson AB</organization>
      <address>
        <postal>
          <street>SE-164 80 Stockholm</street>
          <country>Sweden</country>
        </postal>
        <email>goran.selander@ericsson.com</email>
      </address>
    </author>
    <date year="2022" month="March" day="07"/>
    <workgroup>ACE Working Group</workgroup>
    <abstract>
      <t>This document updates the CoAP-DTLS profile for ACE <xref target="I-D.ietf-ace-dtls-authorize" format="default"/> by specifying that the profile applies to TLS as well as DTLS.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Authentication and Authorization for Constrained Environments Working Group mailing list (ace@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ace/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/ace-wg/ace-extend-dtls-authorize"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t><xref target="I-D.ietf-ace-dtls-authorize" format="default"/> only specifies the use of DTLS <xref target="RFC6347" format="default"/> but works equally well for TLS <xref target="RFC8446" format="default"/>. For many constrained implementations, CoAP over UDP <xref target="RFC7252" format="default"/> is the first choice, but when deploying ACE in networks controlled by other entities (such as the Internet), UDP might be blocked on the path between the client and the RS, and the client might have to fall back to CoAP over TCP <xref target="RFC8323" format="default"/> for NAT or firewall traversal. This feature is supported by the OSCORE profile <xref target="I-D.ietf-ace-oscore-profile" format="default"/> but is lacking in the DTLS profile.</t>
      <t>This document updates <xref target="I-D.ietf-ace-dtls-authorize" format="default"/> by specifying that the profile applies to TLS as well as DTLS. The same access rights are valid in case transport layer security is provided by either DTLS or TLS, and the same access token can be used.
Therefore, the value <tt>coap_dtls</tt> in the <tt>ace_profile</tt> parameter of an
AS-to-Client response or in the <tt>ace_profile</tt> claim of an access token
indicates that either DTLS or TLS can be used for transport layer
security.</t>
    </section>
    <section anchor="terminology" numbered="true" toc="default">
      <name>Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP&nbsp;14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <t>Readers are expected to be familiar with the terms and concepts
described in <xref target="I-D.ietf-ace-oauth-authz" format="default"/> and
<xref target="I-D.ietf-ace-dtls-authorize" format="default"/>.</t>
    </section>
    <section anchor="connection-establishment" numbered="true" toc="default">
      <name>Connection Establishment</name>
      <t>Following the procedures defined in <xref target="I-D.ietf-ace-dtls-authorize" format="default"/>, a
Client can retrieve an Access Token from an Authorization Server (AS)
in order to establish a security association with a specific Resource
Server. The <tt>ace_profile</tt> parameter in the Client-to-AS request and
AS-to-client response is used to determine the ACE profile that the
Client uses towards the Resource Server (RS).</t>
      <t>In case the <tt>ace_profile</tt> parameter indicates the use of the DTLS
profile for ACE as defined in <xref target="I-D.ietf-ace-dtls-authorize" format="default"/>, the
Client <bcp14>MAY</bcp14> try to connect to the Resource Server via TLS, or try TLS and
DTLS in parallel to accelerate the session setup.</t>
      <t>As resource-constrained devices are not expected to support both
transport layer security mechanisms, a Client that implements either
TLS or DTLS but not both might fail in establishing a secure
communication channel with the Resource Server altogether.
This error <bcp14>SHOULD</bcp14>
be handled by the Client in the same way as unsupported ACE profiles.
If the Client is modified
accordingly or it learns that the Resource Server has been, the Client
may try to connect to the Resource Server using the transport layer
security mechanism that was previously not mutually supported.</t>
      <t>Note that a communication setup with an a priori unknown Resource
Server typically employs an initial unauthorized resource request as
illustrated in Section 2 of <xref target="I-D.ietf-ace-dtls-authorize" format="default"/>. If this
message exchange succeeds, the Client <bcp14>SHOULD</bcp14> first use the same
underlying transport protocol for the establishment of the security
association as well (i.e., DTLS for UDP, and TLS for TCP).</t>
      <t>As a consequence, the selection of the transport protocol used for the
initial unauthorized resource request also depends on the transport
layer security mechanism supported by the Client.  Clients that
support either DTLS or TLS but not both <bcp14>SHOULD</bcp14> use the transport
protocol underlying the supported transport layer security mechanism
also for an initial unauthorized resource request.</t>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>The following updates have been done for the "ACE Profiles" registry
for the profile with Profile ID 1 and Profile name coap_dtls:</t>
      <t>Note to RFC Editor: Please replace all occurrences of "[RFC-XXXX]" with
the RFC number of this specification and delete this paragraph.</t>
      <t>Description: Profile for delegating client Authentication and
Authorization for Constrained Environments by establishing a Datagram
Transport Layer Security (DTLS) or Transport Layer Security (TLS)
channel between resource-constrained nodes.</t>
      <t>Change Controller:  IESG</t>
      <t>Reference:  [RFC-XXXX]</t>
    </section>
    <section anchor="security-considerations" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>The security consideration and requirements in TLS 1.3 <xref target="RFC8446" format="default"/> and BCP 195 <xref target="RFC7525" format="default"/> <xref target="RFC8996" format="default"/> also apply to this document.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC6347" target="https://www.rfc-editor.org/info/rfc6347" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6347.xml">
          <front>
            <title>Datagram Transport Layer Security Version 1.2</title>
            <author initials="E." surname="Rescorla" fullname="E. Rescorla">
              <organization/>
            </author>
            <author initials="N." surname="Modadugu" fullname="N. Modadugu">
              <organization/>
            </author>
            <date year="2012" month="January"/>
            <abstract>
              <t>This document specifies version 1.2 of the Datagram Transport Layer Security (DTLS) protocol.  The DTLS protocol provides communications privacy for datagram protocols.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees.  Datagram semantics of the underlying transport are preserved by the DTLS protocol.  This document updates DTLS 1.0 to work with TLS version 1.2.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6347"/>
          <seriesInfo name="DOI" value="10.17487/RFC6347"/>
        </reference>
        <reference anchor="RFC7252" target="https://www.rfc-editor.org/info/rfc7252" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7252.xml">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author initials="Z." surname="Shelby" fullname="Z. Shelby">
              <organization/>
            </author>
            <author initials="K." surname="Hartke" fullname="K. Hartke">
              <organization/>
            </author>
            <author initials="C." surname="Bormann" fullname="C. Bormann">
              <organization/>
            </author>
            <date year="2014" month="June"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks.  The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s.  The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types.  CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC8323" target="https://www.rfc-editor.org/info/rfc8323" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8323.xml">
          <front>
            <title>CoAP (Constrained Application Protocol) over TCP, TLS, and WebSockets</title>
            <author initials="C." surname="Bormann" fullname="C. Bormann">
              <organization/>
            </author>
            <author initials="S." surname="Lemay" fullname="S. Lemay">
              <organization/>
            </author>
            <author initials="H." surname="Tschofenig" fullname="H. Tschofenig">
              <organization/>
            </author>
            <author initials="K." surname="Hartke" fullname="K. Hartke">
              <organization/>
            </author>
            <author initials="B." surname="Silverajan" fullname="B. Silverajan">
              <organization/>
            </author>
            <author initials="B." surname="Raymor" fullname="B. Raymor" role="editor">
              <organization/>
            </author>
            <date year="2018" month="February"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP), although inspired by HTTP, was designed to use UDP instead of TCP.  The message layer of CoAP over UDP includes support for reliable delivery, simple congestion control, and flow control.</t>
              <t>Some environments benefit from the availability of CoAP carried over reliable transports such as TCP or Transport Layer Security (TLS). This document outlines the changes required to use CoAP over TCP, TLS, and WebSockets transports.  It also formally updates RFC 7641 for use with these transports and RFC 7959 to enable the use of larger messages over a reliable transport.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8323"/>
          <seriesInfo name="DOI" value="10.17487/RFC8323"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8446.xml">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author initials="E." surname="Rescorla" fullname="E. Rescorla">
              <organization/>
            </author>
            <date year="2018" month="August"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="I-D.ietf-ace-oauth-authz" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-ace-oauth-authz.xml" target="https://www.ietf.org/archive/id/draft-ietf-ace-oauth-authz-46.txt">
          <front>
            <title>Authentication and Authorization for Constrained Environments (ACE) using the OAuth 2.0 Framework (ACE-OAuth)</title>
            <author fullname="Ludwig Seitz">
              <organization>Combitech</organization>
            </author>
            <author fullname="Goeran Selander">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Erik Wahlstroem">
	 </author>
            <author fullname="Samuel Erdtman">
              <organization>Spotify AB</organization>
            </author>
            <author fullname="Hannes Tschofenig">
              <organization>Arm Ltd.</organization>
            </author>
            <date month="November" day="8" year="2021"/>
            <abstract>
              <t>   This specification defines a framework for authentication and
   authorization in Internet of Things (IoT) environments called ACE-
   OAuth.  The framework is based on a set of building blocks including
   OAuth 2.0 and the Constrained Application Protocol (CoAP), thus
   transforming a well-known and widely used authorization solution into
   a form suitable for IoT devices.  Existing specifications are used
   where possible, but extensions are added and profiles are defined to
   better serve the IoT use cases.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-oauth-authz-46"/>
        </reference>
        <reference anchor="I-D.ietf-ace-dtls-authorize" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-ace-dtls-authorize.xml" target="https://www.ietf.org/archive/id/draft-ietf-ace-dtls-authorize-18.txt">
          <front>
            <title>Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="Stefanie Gerdes">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Olaf Bergmann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Carsten Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Göran Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Ludwig Seitz">
              <organization>Combitech</organization>
            </author>
            <date month="June" day="4" year="2021"/>
            <abstract>
              <t>   This specification defines a profile of the ACE framework that allows
   constrained servers to delegate client authentication and
   authorization.  The protocol relies on DTLS version 1.2 for
   communication security between entities in a constrained network
   using either raw public keys or pre-shared keys.  A resource-
   constrained server can use this protocol to delegate management of
   authorization information to a trusted host with less severe
   limitations regarding processing power and memory.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-dtls-authorize-18"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author initials="S." surname="Bradner" fullname="S. Bradner">
              <organization/>
            </author>
            <date year="1997" month="March"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author initials="B." surname="Leiba" fullname="B. Leiba">
              <organization/>
            </author>
            <date year="2017" month="May"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC7525" target="https://www.rfc-editor.org/info/rfc7525" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7525.xml">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author initials="Y." surname="Sheffer" fullname="Y. Sheffer">
              <organization/>
            </author>
            <author initials="R." surname="Holz" fullname="R. Holz">
              <organization/>
            </author>
            <author initials="P." surname="Saint-Andre" fullname="P. Saint-Andre">
              <organization/>
            </author>
            <date year="2015" month="May"/>
            <abstract>
              <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are widely used to protect data exchanged over application protocols such as HTTP, SMTP, IMAP, POP, SIP, and XMPP.  Over the last few years, several serious attacks on TLS have emerged, including attacks on its most commonly used cipher suites and their modes of operation.  This document provides recommendations for improving the security of deployed services that use TLS and DTLS. The recommendations are applicable to the majority of use cases.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="7525"/>
          <seriesInfo name="DOI" value="10.17487/RFC7525"/>
        </reference>
        <reference anchor="RFC8996" target="https://www.rfc-editor.org/info/rfc8996" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8996.xml">
          <front>
            <title>Deprecating TLS 1.0 and TLS 1.1</title>
            <author initials="K." surname="Moriarty" fullname="K. Moriarty">
              <organization/>
            </author>
            <author initials="S." surname="Farrell" fullname="S. Farrell">
              <organization/>
            </author>
            <date year="2021" month="March"/>
            <abstract>
              <t>This document formally deprecates Transport Layer Security (TLS) versions 1.0 (RFC 2246) and 1.1 (RFC 4346). Accordingly, those documents have been moved to Historic status. These versions lack support for current and recommended cryptographic algorithms and mechanisms, and various government and industry profiles of applications using TLS now mandate avoiding these old TLS versions. TLS version 1.2 became the recommended version for IETF protocols in 2008 (subsequently being obsoleted by TLS version 1.3 in 2018), providing sufficient time to transition away from older versions. Removing support for older versions from implementations reduces the attack surface, reduces opportunity for misconfiguration, and streamlines library and product maintenance. </t>
              <t>This document also deprecates Datagram TLS (DTLS) version 1.0 (RFC 4347) but not DTLS version 1.2, and there is no DTLS version 1.1.</t>
              <t>This document updates many RFCs that normatively refer to TLS version 1.0 or TLS version 1.1, as described herein. This document also updates the best practices for TLS usage in RFC 7525; hence, it is part of BCP 195.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="8996"/>
          <seriesInfo name="DOI" value="10.17487/RFC8996"/>
        </reference>
        <reference anchor="I-D.ietf-ace-oscore-profile" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-ace-oscore-profile.xml" target="https://www.ietf.org/archive/id/draft-ietf-ace-oscore-profile-19.txt">
          <front>
            <title>OSCORE Profile of the Authentication and Authorization for Constrained Environments Framework</title>
            <author fullname="Francesca Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Ludwig Seitz">
              <organization>Combitech</organization>
            </author>
            <author fullname="Göran Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Martin Gunnarsson">
              <organization>RISE</organization>
            </author>
            <date month="May" day="6" year="2021"/>
            <abstract>
              <t>   This document specifies a profile for the Authentication and
   Authorization for Constrained Environments (ACE) framework.  It
   utilizes Object Security for Constrained RESTful Environments
   (OSCORE) to provide communication security and proof-of-possession
   for a key owned by the client and bound to an OAuth 2.0 access token.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-oscore-profile-19"/>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments" toc="default">
      <name>Acknowledgments</name>
      <t>The authors would like to thank Marco Tiloca for reviewing this
specification.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
