<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.6 -->
<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ace-key-groupcomm-oscore-13" category="std" obsoletes="" updates="" submissionType="IETF" xml:lang="en" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.9.1 -->
  <front>
    <title abbrev="Key Management for OSCORE Groups in ACE">Key Management for OSCORE Groups in ACE</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ace-key-groupcomm-oscore-13"/>
    <author initials="M." surname="Tiloca" fullname="Marco Tiloca">
      <organization>RISE AB</organization>
      <address>
        <postal>
          <street>Isafjordsgatan 22</street>
          <city>Kista</city>
          <code>164 29 Stockholm</code>
          <country>Sweden</country>
        </postal>
        <email>marco.tiloca@ri.se</email>
      </address>
    </author>
    <author initials="J." surname="Park" fullname="Jiye Park">
      <organization>Universitaet Duisburg-Essen</organization>
      <address>
        <postal>
          <street>Schuetzenbahn 70</street>
          <city>Essen</city>
          <code>45127</code>
          <country>Germany</country>
        </postal>
        <email>ji-ye.park@uni-due.de</email>
      </address>
    </author>
    <author initials="F." surname="Palombini" fullname="Francesca Palombini">
      <organization>Ericsson AB</organization>
      <address>
        <postal>
          <street>Torshamnsgatan 23</street>
          <city>Kista</city>
          <code>16440 Stockholm</code>
          <country>Sweden</country>
        </postal>
        <email>francesca.palombini@ericsson.com</email>
      </address>
    </author>
    <date year="2022" month="March" day="07"/>
    <area>Security</area>
    <workgroup>ACE Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document defines an application profile of the ACE framework for Authentication and Authorization, to request and provision keying material in group communication scenarios that are based on CoAP and secured with Group Object Security for Constrained RESTful Environments (OSCORE). This application profile delegates the authentication and authorization of Clients that join an OSCORE group through a Resource Server acting as Group Manager for that group. This application profile leverages protocol-specific transport profiles of ACE to achieve communication security, server authentication and proof-of-possession for a key owned by the Client and bound to an OAuth 2.0 Access Token.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="sec-introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>Object Security for Constrained RESTful Environments (OSCORE) <xref target="RFC8613" format="default"/> is a method for application-layer protection of the Constrained Application Protocol (CoAP) <xref target="RFC7252" format="default"/>, using CBOR Object Signing and Encryption (COSE) <xref target="I-D.ietf-cose-rfc8152bis-struct" format="default"/><xref target="I-D.ietf-cose-rfc8152bis-algs" format="default"/> and enabling end-to-end security of CoAP payload and options.</t>
      <t>As described in <xref target="I-D.ietf-core-oscore-groupcomm" format="default"/>, Group OSCORE is used to protect CoAP group communication over IP multicast <xref target="I-D.ietf-core-groupcomm-bis" format="default"/>. This relies on a Group Manager, which is responsible for managing an OSCORE group and enables the group members to exchange CoAP messages secured with Group OSCORE. The Group Manager can be responsible for multiple groups, coordinates the joining process of new group members, and is entrusted with the distribution and renewal of group keying material.</t>
      <t>This document is an application profile of <xref target="I-D.ietf-ace-key-groupcomm" format="default"/>, which itself builds on the ACE framework for Authentication and Authorization <xref target="I-D.ietf-ace-oauth-authz" format="default"/>. Message exchanges among the participants as well as message formats and processing follow what specified in <xref target="I-D.ietf-ace-key-groupcomm" format="default"/> for provisioning and renewing keying material in group communication scenarios, where Group OSCORE is used to protect CoAP group communication over IP multicast.</t>
      <section anchor="ssec-terminology" numbered="true" toc="default">
        <name>Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119" format="default"/><xref target="RFC8174" format="default"/> when, and only when, they appear in all capitals, as shown here.</t>
        <t>Readers are expected to be familiar with:</t>
        <ul spacing="normal">
          <li>The terms and concepts described in the ACE framework for authentication and authorization <xref target="I-D.ietf-ace-oauth-authz" format="default"/> and in the Authorization Information Format (AIF) <xref target="I-D.ietf-ace-aif" format="default"/> to express authorization information. The terminology for entities in the considered architecture is defined in OAuth 2.0 <xref target="RFC6749" format="default"/>. In particular, this includes Client (C), Resource Server (RS), and Authorization Server (AS).</li>
          <li>The terms and concept related to the message formats and processing specified in <xref target="I-D.ietf-ace-key-groupcomm" format="default"/>, for provisioning and renewing keying material in group communication scenarios.</li>
          <li>The terms and concepts described in CBOR <xref target="RFC8949" format="default"/> and COSE <xref target="I-D.ietf-cose-rfc8152bis-struct" format="default"/><xref target="I-D.ietf-cose-rfc8152bis-algs" format="default"/>.</li>
          <li>The terms and concepts described in CoAP <xref target="RFC7252" format="default"/> and group communication for CoAP <xref target="I-D.ietf-core-groupcomm-bis" format="default"/>. Unless otherwise indicated, the term "endpoint" is used here following its OAuth definition, aimed at denoting resources such as /token and /introspect at the AS, and /authz-info at the RS. This document does not use the CoAP definition of "endpoint", which is "An entity participating in the CoAP protocol".</li>
          <li>
            <t>The terms and concepts for protection and processing of CoAP messages through OSCORE <xref target="RFC8613" format="default"/> and through Group OSCORE <xref target="I-D.ietf-core-oscore-groupcomm" format="default"/> in group communication scenarios. These especially include:  </t>
            <ul spacing="normal">
              <li>Group Manager, as the entity responsible for a set of groups where communications are secured with Group OSCORE. In this document, the Group Manager acts as Resource Server.</li>
              <li>Authentication credential, as the set of information associated with an entity, including that entity's public key and parameters associated with the public key. Examples of authentication credentials are CBOR Web Tokens (CWTs) and CWT Claims Sets (CCSs) <xref target="RFC8392" format="default"/>, X.509 certificates <xref target="RFC7925" format="default"/> and C509 certificates <xref target="I-D.ietf-cose-cbor-encoded-cert" format="default"/>.</li>
            </ul>
          </li>
        </ul>
        <t>Additionally, this document makes use of the following terminology.</t>
        <ul spacing="normal">
          <li>Requester: member of an OSCORE group that sends request messages to other members of the group.</li>
          <li>Responder: member of an OSCORE group that receives request messages from other members of the group. A responder may reply back, by sending a response message to the requester which has sent the request message.</li>
          <li>Monitor: member of an OSCORE group that is configured as responder and never replies back to requesters after receiving request messages. This corresponds to the term "silent server" used in <xref target="I-D.ietf-core-oscore-groupcomm" format="default"/>.</li>
          <li>Signature verifier: entity external to the OSCORE group and intended to verify the signature of messages exchanged in the group (see Sections <xref target="I-D.ietf-core-oscore-groupcomm" section="3.1" sectionFormat="bare" format="default"/> and <xref target="I-D.ietf-core-oscore-groupcomm" section="8.5" sectionFormat="bare" format="default"/> of <xref target="I-D.ietf-core-oscore-groupcomm" format="default"/>). An authorized signature verifier does not join the OSCORE group as an actual member, yet it can retrieve the authentication credentials of the current group members from the Group Manager.</li>
          <li>Signature-only group: an OSCORE group that uses only the group mode (see <xref section="8" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm" format="default"/>).</li>
          <li>Pairwise-only group: an OSCORE group that uses only the pairwise mode (see <xref section="9" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm" format="default"/>).</li>
        </ul>
      </section>
    </section>
    <section anchor="sec-protocol-overview" numbered="true" toc="default">
      <name>Protocol Overview</name>
      <t>Group communication for CoAP over IP multicast has been enabled in <xref target="I-D.ietf-core-groupcomm-bis" format="default"/> and can be secured with Group Object Security for Constrained RESTful Environments (OSCORE) <xref target="RFC8613" format="default"/> as described in <xref target="I-D.ietf-core-oscore-groupcomm" format="default"/>. A network node joins an OSCORE group by interacting with the responsible Group Manager. Once registered in the group, the new node can securely exchange messages with other group members.</t>
      <t>This document describes how to use <xref target="I-D.ietf-ace-key-groupcomm" format="default"/> and <xref target="I-D.ietf-ace-oauth-authz" format="default"/> to perform a number of authentication, authorization and key distribution actions, as overviewed in <xref section="2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>, when the considered group is specifically an OSCORE group.</t>
      <t>With reference to <xref target="I-D.ietf-ace-key-groupcomm" format="default"/>:</t>
      <ul spacing="normal">
        <li>The node wishing to join the OSCORE group, i.e., the joining node, is the Client.</li>
        <li>The Group Manager is the Key Distribution Center (KDC), acting as a Resource Server.</li>
        <li>The Authorization Server associated with the Group Manager is the AS.</li>
      </ul>
      <t>All communications between the involved entities MUST be secured.</t>
      <t>In particular, communications between the Client and the Group Manager leverage protocol-specific transport profiles of ACE to achieve communication security, proof-of-possession and server authentication. It is expected that, in the commonly referred base-case of this document, the transport profile to use is pre-configured and well-known to nodes participating in constrained applications.</t>
      <t><xref target="profile-req" format="default"/> lists the specifications on this application profile of ACE, based on the requirements defined in Appendix A of <xref target="I-D.ietf-ace-key-groupcomm" format="default"/>.</t>
      <section anchor="ssec-overview-join-process" numbered="true" toc="default">
        <name>Overview of the Joining Process</name>
        <t>A node performs the steps described in <xref section="4.3.1.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/> in order to join an OSCORE group. The format and processing of messages exchanged among the participants are further specified in <xref target="sec-joining-node-to-AS" format="default"/> and <xref target="sec-joining-node-to-GM" format="default"/> of this document.</t>
      </section>
      <section anchor="ssec-overview-group-rekeying-process" numbered="true" toc="default">
        <name>Overview of the Group Rekeying Process</name>
        <t>In a number of cases, the Group Manager has to generate new keying material and distribute it to the group (rekeying), as also discussed in <xref section="3.2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm" format="default"/>.</t>
        <t>To this end the Group Manager MUST support the Group Rekeying Process described in <xref target="sec-group-rekeying-process" format="default"/> of this document, as an instance of the "Point-to-Point" rekeying scheme defined in <xref section="6.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/> and registered in <xref section="11.14" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>. Future documents may define the use of alternative group rekeying schemes for this application profile, together with the corresponding rekeying message formats. The resulting group rekeying process MUST comply with the functional steps defined in <xref section="3.2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm" format="default"/>.</t>
        <t>Upon generating the new group keying material and before starting its distribution, the Group Manager MUST increment the version number of the group keying material. When rekeying a group, the Group Manager MUST preserve the current value of the OSCORE Sender ID of each member in that group.</t>
        <t>The data distributed to a group through a rekeying MUST include:</t>
        <ul spacing="normal">
          <li>The new version number of the group keying material for the group.</li>
          <li>
            <t>A new Group Identifier (Gid) for the group as introduced in <xref target="I-D.ietf-ace-key-groupcomm" format="default"/>, used as ID Context parameter of the Group OSCORE Common Security Context of that group (see <xref section="2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm" format="default"/>).  </t>
            <t>
Note that the Gid differs from the group name also introduced in <xref target="I-D.ietf-ace-key-groupcomm" format="default"/>, which is a plain, stable and invariant identifier, with no cryptographic relevance and meaning.</t>
          </li>
          <li>A new value for the Master Secret parameter of the Group OSCORE Common Security Context of the group (see <xref section="2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm" format="default"/>).</li>
          <li>A set of stale Sender IDs, which allows each rekeyed node to purge authentication credentials and Recipient Contexts used in the group and associated with those Sender IDs. This in turn allows every group member to rely on stored authentication credentials to confidently assert the group membership of other sender nodes, when receiving protected messages in the group (see <xref section="3.2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm" format="default"/>). More details on the maintenance of stale Sender IDs are provided in <xref target="sssec-stale-sender-ids" format="default"/>.</li>
        </ul>
        <t>Also, the data distributed through a group rekeying MAY include a new value for the Master Salt parameter of the Group OSCORE Common Security Context of that group.</t>
        <t>The Group Manager MUST rekeying the group in the following cases.</t>
        <ul spacing="normal">
          <li>The application requires backward security - In this case, the group is rekeyed when a node joins the group as a new member. Therefore, a joining node cannot access communications in the group prior its joining.</li>
          <li>
            <t>One or more nodes leave the group - That is, the group is rekeyed when one or more current members spontaneously request to leave the group (see <xref target="sec-leave-req" format="default"/>), or when the Group Manager forcibly evicts them from the group, e.g., due to expired or revoked authorization (see <xref target="sec-leaving" format="default"/>). Therefore, a leaving node cannot access communications in the group after its leaving, thus ensuring forward security in the group.  </t>
            <t>
Due to the set of stale Sender IDs distributed through the rekeying, this ensures that a node owning the latest group keying material does not store the authentication credentials of former group members (see Sections <xref target="I-D.ietf-core-oscore-groupcomm" section="3.2" sectionFormat="bare" format="default"/> and <xref target="I-D.ietf-core-oscore-groupcomm" section="12.1" sectionFormat="bare" format="default"/> of <xref target="I-D.ietf-core-oscore-groupcomm" format="default"/>).</t>
          </li>
          <li>Extension of group lifetime - That is, the group is rekeyed when the expiration time for the group keying material approaches or has passed, if it is appropriate to extend the group operation beyond that.</li>
        </ul>
        <t>The Group Manager MAY rekey the group for other reasons, e.g., according to an application-dependent rekeying period or scheduling.</t>
        <section anchor="sssec-stale-sender-ids" numbered="true" toc="default">
          <name>Stale OSCORE Sender IDs</name>
          <t>Throughout the lifetime of every group, the Group Manager MUST maintain a collection of stale Sender IDs for that group.</t>
          <t>The collection associated with a group MUST include up to N &gt; 1 ordered sets of stale OSCORE Sender IDs. It is up to the application to specify the value of N, possibly on a per-group basis.</t>
          <t>The N-th set includes the Sender IDs that have become "stale" under the current version V of the group keying material. The (N-1)-th set refers to the immediately previous version (V - 1) of the group keying material, and so on.</t>
          <t>In the following cases, the Group Manager MUST add a new element to the most recent set X, i.e., the set associated with the current version V of the group keying material.</t>
          <ul spacing="normal">
            <li>When a current group member obtains a new Sender ID, its old Sender ID is added to X. This happens when the Group Manager assigns a new Sender ID upon request from the group member (see <xref target="sec-new-key" format="default"/>), or in case the group member re-joins the group (see <xref target="ssec-join-req-sending" format="default"/> and <xref target="ssec-join-resp" format="default"/>), thus also obtaining a new Sender ID.</li>
            <li>When a current group member leaves the group, its current Sender ID is added to X. This happens when a group member requests to leave the group (see <xref target="sec-leave-req" format="default"/>) or is forcibly evicted from the group (see <xref target="sec-leaving" format="default"/>).</li>
          </ul>
          <t>The value of N can change throughout the lifetime of the group. If the new value N' is smaller than N, the Group Manager MUST preserve the (up to) N' most recent sets in the collection and MUST delete any possible older set from the collection.</t>
          <t>Finally, the Group Manager MUST perform the following actions, when the group is rekeyed and the group shifts to the next version V' = (V + 1) of the group keying material.</t>
          <ol spacing="normal" type="1"><li>The Group Manager rekeys the group. This includes also distributing the set of stale Sender IDs X associated with the old group keying material with version V (see <xref target="ssec-overview-group-rekeying-process" format="default"/>).</li>
            <li>After completing the group rekeying, the Group Manager creates a new empty set X' associated with the new version V' of the newly established group keying material, i.e., V' = (V + 1).</li>
            <li>If the current collection of stale Sender IDs has size N, the Group Manager deletes the oldest set in the collection.</li>
            <li>The Group Manager adds the new set X' to the collection of stale Sender IDs, as the most recent set.</li>
          </ol>
        </section>
      </section>
    </section>
    <section anchor="sec-format-scope" numbered="true" toc="default">
      <name>Format of Scope</name>
      <t>Building on <xref section="3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>, this section defines the exact format and encoding of scope to use.</t>
      <t>To this end, this profile uses the Authorization Information Format (AIF) <xref target="I-D.ietf-ace-aif" format="default"/>, and defines the following AIF specific data model AIF-OSCORE-GROUPCOMM.</t>
      <t>With reference to the generic AIF model</t>
      <artwork name="" type="" align="left" alt=""><![CDATA[
   AIF-Generic<Toid, Tperm> = [* [Toid, Tperm]]
]]></artwork>
      <t>the value of the CBOR byte string used as scope encodes the CBOR array [* [Toid, Tperm]], where each [Toid, Tperm] element corresponds to one scope entry.</t>
      <t>Then, for each scope entry:</t>
      <ul spacing="normal">
        <li>the object identifier ("Toid") is specialized as a CBOR text string, specifying the group name for the scope entry;</li>
        <li>
          <t>the permission set ("Tperm") is specialized as a CBOR unsigned integer with value R, specifying the role(s) that the client wishes to take in the group (REQ1). The value R is computed as follows:  </t>
          <ul spacing="normal">
            <li>each role in the permission set is converted into the corresponding numeric identifier X from the "Value" column of the "Group OSCORE Roles" registry, for which this document defines the entries in <xref target="fig-role-values" format="default"/>.</li>
            <li>the set of N numbers is converted into the single value R, by taking each numeric identifier X_1, X_2, ..., X_N to the power of two, and then computing the inclusive OR of the binary representations of all the power values.</li>
          </ul>
        </li>
      </ul>
      <figure anchor="fig-role-values">
        <name>Numeric identifier of roles in the OSCORE group</name>
        <artwork align="center" name="" type="" alt=""><![CDATA[
+-----------+-------+-------------------------------------------------+
| Name      | Value | Description                                     |
+===========+=======+=================================================+
| Reserved  | 0     | This value is reserved                          |
|-----------+-------+-------------------------------------------------+
| Requester | 1     | Send requests; receive responses                |
|-----------+-------+-------------------------------------------------+
| Responder | 2     | Send responses; receive requests                |
+-----------+-------+-------------------------------------------------+
| Monitor   | 3     | Receive requests; never send requests/responses |
|-----------+-------+-------------------------------------------------|
| Verifier  | 4     | Verify signature of intercepted messages        |
+-----------+-------+-------------------------------------------------+
]]></artwork>
      </figure>
      <t>The CDDL <xref target="RFC8610" format="default"/> definition of the AIF-OSCORE-GROUPCOMM data model is as follows:</t>
      <artwork name="" type="" align="left" alt=""><![CDATA[
   AIF-OSCORE-GROUPCOMM = AIF-Generic<gname, permissions>

   gname = tstr  ; Group name
   permissions = uint . bits roles
   roles = &(
      Requester: 1,
      Responder: 2,
      Monitor: 3,
      Verifier: 4
   )
]]></artwork>
      <t>Future specifications that define new roles MUST register a corresponding numeric identifier in the "Group OSCORE Roles" registry defined in <xref target="ssec-iana-group-oscore-roles-registry" format="default"/> of this document.</t>
    </section>
    <section anchor="sec-joining-node-to-AS" numbered="true" toc="default">
      <name>Joining Node to Authorization Server</name>
      <t>This section describes how the joining node interacts with the AS in order to be authorized to join an OSCORE group under a given Group Manager. In particular, it considers a joining node that intends to contact that Group Manager for the first time.</t>
      <t>The message exchange between the joining node and the AS consists of the messages Authorization Request and Authorization Response defined in Sections <xref target="I-D.ietf-ace-key-groupcomm" section="3.1" sectionFormat="bare" format="default"/> and <xref target="I-D.ietf-ace-key-groupcomm" section="3.2" sectionFormat="bare" format="default"/> of <xref target="I-D.ietf-ace-key-groupcomm" format="default"/>. Note that what is defined in <xref target="I-D.ietf-ace-key-groupcomm" format="default"/> applies, and only additions or modifications to that specification are defined here.</t>
      <section anchor="ssec-auth-req" numbered="true" toc="default">
        <name>Authorization Request</name>
        <t>The Authorization Request message is as defined in <xref section="3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>, with the following additions.</t>
        <ul spacing="normal">
          <li>
            <t>If the 'scope' parameter is present:  </t>
            <ul spacing="normal">
              <li>
                <t>The value of the CBOR byte string encodes a CBOR array, whose format MUST follow the data model AIF-OSCORE-GROUPCOMM defined in <xref target="sec-format-scope" format="default"/>. In particular, for each OSCORE group to join:      </t>
                <ul spacing="normal">
                  <li>The group name is encoded as a CBOR text string.</li>
                  <li>The set of requested roles is expressed as a single CBOR unsigned integer. This is computed as defined in <xref target="sec-format-scope" format="default"/>, from the numerical abbreviations of each requested role defined in the "Group OSCORE Roles" registry, for which this document defines the entry in <xref target="fig-role-values" format="default"/> (REQ1).</li>
                </ul>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="ssec-auth-resp" numbered="true" toc="default">
        <name>Authorization Response</name>
        <t>The Authorization Response message is as defined in <xref section="3.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>, with the following additions:</t>
        <ul spacing="normal">
          <li>The AS MUST include the 'expires_in' parameter. Other means for the AS to specify the lifetime of Access Tokens are out of the scope of this document.</li>
          <li>The AS MUST include the 'scope' parameter, when the value included in the Access Token differs from the one specified by the joining node in the request. In such a case, the second element of each scope entry MUST be present, and specifies the set of roles that the joining node is actually authorized to take in the OSCORE group for that scope entry, encoded as specified in <xref target="ssec-auth-req" format="default"/>.</li>
        </ul>
        <t>Furthermore, if the AS uses the extended format of scope defined in <xref section="7" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/> for the 'scope' claim of the Access Token, the first element of the CBOR sequence <xref target="RFC8742" format="default"/> MUST be the CBOR integer with value SEM_ID_TBD, defined in <xref target="iana-scope-semantics" format="default"/> of this document (REQ28). This indicates that the second element of the CBOR sequence, as conveying the actual access control information, follows the scope semantics defined for this application profile in <xref target="sec-format-scope" format="default"/> of this document.</t>
      </section>
    </section>
    <section anchor="sec-interface-GM" numbered="true" toc="default">
      <name>Interface at the Group Manager</name>
      <t>The Group Manager provides the interface defined in <xref section="4.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>, with the additional sub-resources defined from <xref target="ssec-resource-active" format="default"/> to <xref target="ssec-resource-stale-sids" format="default"/> of this document.</t>
      <t>Furthermore, <xref target="ssec-admitted-methods" format="default"/> provides a summary of the CoAP methods admitted to access different resources at the Group Manager, for nodes with different roles in the group or as non members (REQ11).</t>
      <t>The GROUPNAME segment of the URI path MUST match with the group name specified in the scope entry of the Access Token scope (i.e., 'gname' in <xref section="3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>) (REQ7).</t>
      <t>The Resource Type (rt=) Link Target Attribute value "core.osc.gm" is registered in <xref target="iana-rt" format="default"/> (REQ10), and can be used to describe group-membership resources and its sub-resources at a Group Manager, e.g., by using a link-format document <xref target="RFC6690" format="default"/>.</t>
      <t>Applications can use this common resource type to discover links to group-membership resources for joining OSCORE groups, e.g., by using the approach described in <xref target="I-D.tiloca-core-oscore-discovery" format="default"/>.</t>
      <section anchor="ssec-resource-active" numbered="true" toc="default">
        <name>ace-group/GROUPNAME/active</name>
        <t>This resource implements a GET handler.</t>
        <section anchor="active-get" numbered="true" toc="default">
          <name>GET Handler</name>
          <t>The handler expects a GET request.</t>
          <t>In addition to what is defined in <xref section="4.1.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>, the handler verifies that the requesting client is a current member of the group. If the verification fails, the KDC MUST reply with a 4.03 (Forbidden) error response. The response MUST have Content-Format set to application/ace-groupcomm+cbor and is formatted as defined in <xref section="4.1.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>. The value of the 'error' field MUST be set to 0 ("Operation permitted only to group members").</t>
          <t>If all verifications succeed, the handler replies with a 2.05 (Content) response, specifying the current status of the group, i.e., active or inactive. The payload of the response is formatted as defined in <xref target="sec-status" format="default"/>.</t>
          <t>The method to set the current group status is out of the scope of this document, and is defined for the administrator interface of the Group Manager specified in <xref target="I-D.ietf-ace-oscore-gm-admin" format="default"/>.</t>
        </section>
      </section>
      <section anchor="ssec-resource-verif-data" numbered="true" toc="default">
        <name>ace-group/GROUPNAME/verif-data</name>
        <t>This resource implements a GET handler.</t>
        <section anchor="verif-data-get" numbered="true" toc="default">
          <name>GET Handler</name>
          <t>The handler expects a GET request.</t>
          <t>In addition to what is defined in <xref section="4.1.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>, the Group Manager performs the following checks.</t>
          <t>If the requesting client is a current group member, the Group Manager MUST reply with a 4.03 (Forbidden) error response. The response MUST have Content-Format set to application/ace-groupcomm+cbor and is formatted as defined in <xref section="4.1.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>. The value of the 'error' field MUST be set to 8 ("Operation permitted only to signature verifiers").</t>
          <t>If GROUPNAME denotes a pairwise-only group, the Group Manager MUST reply with a 4.00 (Bad Request) error response. The response MUST have Content-Format set to application/ace-groupcomm+cbor and is formatted as defined in <xref section="4.1.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>. The value of the 'error' field MUST be set to 7 ("Signatures not used in the group").</t>
          <t>If all verifications succeed, the handler replies with a 2.05 (Content) response, specifying data that allows also a signature verifier to verify signatures of messages protected with the group mode and sent to the group (see Sections <xref target="I-D.ietf-core-oscore-groupcomm" section="3.1" sectionFormat="bare" format="default"/> and <xref target="I-D.ietf-core-oscore-groupcomm" section="8.5" sectionFormat="bare" format="default"/> of <xref target="I-D.ietf-core-oscore-groupcomm" format="default"/>). The response MUST have Content-Format set to application/ace-groupcomm+cbor. The payload of the response is a CBOR map, which is formatted as defined in <xref target="sec-verif-data" format="default"/>.</t>
        </section>
      </section>
      <section anchor="ssec-resource-stale-sids" numbered="true" toc="default">
        <name>ace-group/GROUPNAME/stale-sids</name>
        <t>This resource implements a FETCH handler.</t>
        <section anchor="stale-sids-fetch" numbered="true" toc="default">
          <name>FETCH Handler</name>
          <t>The handler expects a FETCH request, whose payload specifies a version number of the group keying material, encoded as an unsigned CBOR integer.</t>
          <t>In addition to what is defined in <xref section="4.1.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>, the handler verifies that the requesting client is a current member of the group. If the verification fails, the Group Manager MUST reply with a 4.03 (Forbidden) error response. The response MUST have Content-Format set to application/ace-groupcomm+cbor and is formatted as defined in <xref section="4.1.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>. The value of the 'error' field MUST be set to 0 ("Operation permitted only to group members").</t>
          <t>If all verifications succeed, the handler replies with a 2.05 (Content) response, specifying data that allows the requesting client to delete the Recipient Contexts and authentication credentials associated with former members of the group (see <xref section="3.2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm" format="default"/>. The payload of the response is formatted as defined in <xref target="sec-retrieve-stale-sids" format="default"/>.</t>
        </section>
      </section>
      <section anchor="ssec-admitted-methods" numbered="true" toc="default">
        <name>Admitted Methods</name>
        <t>The table in <xref target="method-table" format="default"/> summarizes the CoAP methods admitted to access different resources at the Group Manager, for (non-)members of a group with group name GROUPNAME, and considering different roles. The last two rows of the table apply to a node with node name NODENAME.</t>
        <figure anchor="method-table">
          <name>Admitted CoAP Methods on the Group Manager Resources</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
+---------------------------------+--------+-------+-------+-------+
|   Resource                      | Type1  | Type2 | Type3 | Type4 |
+---------------------------------+--------+-------+-------+-------+
| ace-group/                      | F      | F     | F     | F     |
+---------------------------------+--------+-------+-------+-------+
| ace-group/GROUPNAME/            | G Po   | G Po  | Po *  | Po    |
+---------------------------------+--------+-------+-------+-------+
| ace-group/GROUPNAME/active      | G      | G     | -     | -     |
+---------------------------------+--------+-------+-------+-------+
| ace-group/GROUPNAME/verif-data  | -      | -     | G     | -     |
+---------------------------------+--------+-------+-------+-------+
| ace-group/GROUPNAME/pub-key     | G F    | G F   | G F   | -     |
+---------------------------------+--------+-------+-------+-------+
| ace-group/GROUPNAME/kdc-pub-key | G      | G     | G     | -     |
+---------------------------------+--------+-------+-------+-------+
| ace-group/GROUPNAME/stale-sids  | F      | F     | -     | -     |
+---------------------------------+--------+-------+-------+-------+
| ace-group/GROUPNAME/policies    | G      | G     | -     | -     |
+---------------------------------+--------+-------+-------+-------+
| ace-group/GROUPNAME/num         | G      | G     | -     | -     |
+---------------------------------+--------+-------+-------+-------+
| ace-group/GROUPNAME/nodes/      | G Pu D | G D   | -     | -     |
|           NODENAME              |        |       |       |       |
+---------------------------------+--------+-------+-------+-------+
| ace-group/GROUPNAME/nodes/      | Po     | -     | -     | -     |
|           NODENAME/pub-key      |        |       |       |       |
+---------------------------------+--------+-------+-------+-------+

Type1 = Member as Requester and/or Responder        |  G  = GET
Type2 = Member as Monitor                           |  F  = FETCH
Type3 = Non-member (authorized to be Verifier)      |  Po = POST
        (*) = cannot join the group as Verifier     |  Pu = PUT
Type4 = Non-member (not authorized to be Verifier)  |  D  = DELETE
]]></artwork>
        </figure>
      </section>
      <section anchor="client-operations" numbered="true" toc="default">
        <name>Operations Supported by Clients</name>
        <t>Building on what is defined in <xref section="4.1.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>, and with reference to the resources at the Group Manager newly defined earlier in <xref target="sec-interface-GM" format="default"/> of this document, it is expected that a Client minimally supports also the following set of operations and corresponding interactions with the Group (REQ12).</t>
        <ul spacing="normal">
          <li>GET request to ace-group/GROUPNAME/active , in order to check the current status of the group.</li>
          <li>GET request to ace-group/GROUPNAME/verif-data , in order for a signature verifier to retrieve data required to verify signatures of messages protected with the group mode of Group OSCORE and sent to a group (see Sections <xref target="I-D.ietf-core-oscore-groupcomm" section="3.1" sectionFormat="bare" format="default"/> and <xref target="I-D.ietf-core-oscore-groupcomm" section="8.5" sectionFormat="bare" format="default"/> of <xref target="I-D.ietf-core-oscore-groupcomm" format="default"/>). Note that this operation is relevant to support only to signature verifiers.</li>
          <li>FETCH request to ace-group/GROUPNAME/stale-sids , in order to retrieve from the Group Manager the data required to delete some of the stored group members' authentication credentials and Recipient Contexts (see <xref target="stale-sids-fetch" format="default"/>). This data is provided as an aggregated set of stale Sender IDs, which are used as specified in <xref target="missed-rekeying" format="default"/>.</li>
        </ul>
      </section>
    </section>
    <section anchor="sec-joining-node-to-GM" numbered="true" toc="default">
      <name>Token Transferring and Group Joining</name>
      <t>The rest of this section describes the interactions between the joining node and the Group Manager, i.e., the transferring of the Access Token to the Group Manager and the Request-Response exchange to join the OSCORE group. The message exchange between the joining node and the Group Manager consists of the messages defined in Sections <xref target="I-D.ietf-ace-key-groupcomm" section="3.3" sectionFormat="bare" format="default"/> and <xref target="I-D.ietf-ace-key-groupcomm" section="4.3.1.1" sectionFormat="bare" format="default"/> of <xref target="I-D.ietf-ace-key-groupcomm" format="default"/>. Note that what is defined in <xref target="I-D.ietf-ace-key-groupcomm" format="default"/> applies, and only additions or modifications to that specification are defined here.</t>
      <t>Just like any candidate group member, a signature verifier provides the Group Manager with an Access Token, as described in <xref target="ssec-token-post" format="default"/>. However, unlike candidate group members, it does not join any OSCORE group, i.e., it does not perform the joining process defined in <xref target="ssec-join-req-sending" format="default"/>.</t>
      <t>After successfully transferring an Access Token to the Group Manager, a signature verifier is allowed to perform only some operations as non-member of a group, and only for the OSCORE groups specified in the validated Access Token. These are the operations specified in <xref target="sec-pub-keys" format="default"/>, <xref target="sec-gm-pub-key" format="default"/>, <xref target="sec-verif-data" format="default"/> and <xref target="sec-retrieve-gnames" format="default"/>.</t>
      <t>Consistently, in case a node is non-member of the group with group name GROUPNAME and is authorized to be only signature verifier for that group, the Group Manager MUST reply with a 4.03 (Forbidden) error response if that node attempts to access any other endpoint than: /ace-group/GROUPNAME/pub-key; ace-group/GROUPNAME/gm-pub-key; ace-group/GROUPNAME/verif-data; and /ace-group.</t>
      <section anchor="ssec-token-post" numbered="true" toc="default">
        <name>Token Transferring</name>
        <t>The exchange of Token Transfer Request and Response is defined in <xref section="3.3" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>. In addition to that, the following applies.</t>
        <ul spacing="normal">
          <li>
            <t>The Token Transfer Request MAY additionally contain the following parameters, which, if included, MUST have the corresponding values (OPT2):  </t>
            <ul spacing="normal">
              <li>'ecdh_info' defined in <xref target="ecdh-info" format="default"/> of this document, with value the CBOR simple value "null" (0xf6) to request information about the ECDH algorithm, the ECDH algorithm parameters, the ECDH key parameters and about the exact format of authentication credentials used in the groups that the client has been authorized to join. This is relevant in case the joining node supports the pairwise mode of Group OSCORE <xref target="I-D.ietf-core-oscore-groupcomm" format="default"/>.</li>
              <li>'kdc_dh_creds' defined in <xref target="gm-dh-info" format="default"/> of this document, with value the CBOR simple value "null" (0xf6) to request the Diffie-Hellman authentication credentials of the Group Manager for the groups that the client has been authorized to join. That is, each of such authentication credentials includes a Diffie-Hellman public key of the Group Manager. This is relevant in case the joining node supports the pairwise mode of Group OSCORE <xref target="I-D.ietf-core-oscore-groupcomm" format="default"/>.</li>
            </ul>
            <t>
Alternatively, the joining node may retrieve this information by other means.</t>
          </li>
          <li>
            <t>The 'kdcchallenge' parameter contains a dedicated nonce N_S generated by the Group Manager. For the N_S value, it is RECOMMENDED to use a 8-byte long random nonce. The joining node can use this nonce in order to prove the possession of its own private key, upon joining the group (see <xref target="ssec-join-req-sending" format="default"/>).  </t>
            <t>
The 'kdcchallenge' parameter MAY be omitted from the Token Transfer Response, if the 'scope' of the Access Token specifies only the role "monitor" or only the role "verifier" or only a combination of the two, for each and every of the specified groups.</t>
          </li>
          <li>
            <t>If the 'sign_info' parameter is present in the response, the following applies for each element 'sign_info_entry'.  </t>
            <ul spacing="normal">
              <li>'id' MUST NOT refer to OSCORE groups that are pairwise-only groups.</li>
              <li>'sign_alg' takes value from the "Value" column of the "COSE Algorithms" registry <xref target="COSE.Algorithms" format="default"/>.</li>
              <li>'sign_parameters' is a CBOR array. Its format and value are the same of the COSE capabilities array for the algorithm indicated in 'sign_alg', as specified for that algorithm in the "Capabilities" column of the "COSE Algorithms" registry <xref target="COSE.Algorithms" format="default"/> (REQ4).</li>
              <li>'sign_key_parameters' is a CBOR array. Its format and value are the same of the COSE capabilities array for the COSE key type of the keys used with the algorithm indicated in 'sign_alg', as specified for that key type in the "Capabilities" column of the "COSE Key Types" registry <xref target="COSE.Key.Types" format="default"/> (REQ5).</li>
              <li>
                <t>'pub_key_enc' takes value from the "Label" column of the "COSE Header Parameters" registry <xref target="COSE.Header.Parameters" format="default"/> (REQ6). Consistently with <xref section="2.3" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm" format="default"/>, acceptable values denote a format of authentication credential that MUST explicitly provide the public key as well as the comprehensive set of information related to the public key algorithm, including, e.g., the used elliptic curve (when applicable).      </t>
                <t>
At the time of writing this specification, acceptable formats of authentication credentials are CBOR Web Tokens (CWTs) and CWT Claims Sets (CCSs) <xref target="RFC8392" format="default"/>, X.509 certificates <xref target="RFC7925" format="default"/> and C509 certificates <xref target="I-D.ietf-cose-cbor-encoded-cert" format="default"/>. Further formats may be available in the future, and would be acceptable to use as long as they comply with the criteria defined above.      </t>
                <t>
[ As to CWTs and CCSs, the COSE Header Parameters 'kcwt' and 'kccs' are under pending registration requested by draft-ietf-lake-edhoc. ]      </t>
                <t>
[ As to C509 certificates, the COSE Header Parameters 'c5b' and 'c5c' are under pending registration requested by draft-ietf-cose-cbor-encoded-cert. ]</t>
              </li>
            </ul>
            <t>
This format is consistent with every signature algorithm currently considered in <xref target="I-D.ietf-cose-rfc8152bis-algs" format="default"/>, i.e., with algorithms that have only the COSE key type as their COSE capability. Appendix B of <xref target="I-D.ietf-ace-key-groupcomm" format="default"/> describes how the format of each 'sign_info_entry' can be generalized for possible future registered algorithms having a different set of COSE capabilities.</t>
          </li>
          <li>
            <t>If 'ecdh_info' is included in the Token Transfer Request, the Group Manager SHOULD include the 'ecdh_info' parameter in the Token Transfer Response, as per the format defined in <xref target="ecdh-info" format="default"/>. Note that the field 'id' of each 'ecdh_info_entry' specifies the name, or array of group names, for which that 'ecdh_info_entry' applies to.  </t>
            <t>
As an exception, the KDC MAY omit the 'ecdh_info' parameter in the Token Transfer Response even if 'ecdh_info' is included in the Token Transfer Request, in case all the groups that the Client is authorized to join are signature-only groups.</t>
          </li>
          <li>If 'kdc_dh_creds' is included in the Token Transfer Request and any of the groups that the client has been authorized to join is a pairwise-only group, then the Group Manager MUST include the 'kdc_dh_creds' parameter in the Token Transfer Response, as per the format defined in <xref target="gm-dh-info" format="default"/>. Otherwise, if 'kdc_dh_creds' is included in the Token Transfer Request, the Group Manager MAY include the 'kdc_dh_creds' parameter in the Token Transfer Response. Note that the field 'id' specifies the group name, or array of group names, for which the corresponding 'kdc_dh_creds' applies to.</li>
        </ul>
        <t>Note that, other than through the above parameters as defined in <xref section="3.3" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>, the joining node may have obtained such information by alternative means. For example, information conveyed in the 'sign_info' and 'ecdh_info' parameters may have been pre-configured, or the joining node MAY early retrieve it by using the approach described in <xref target="I-D.tiloca-core-oscore-discovery" format="default"/>, to discover the OSCORE group and the link to the associated group-membership resource at the Group Manager (OPT3).</t>
        <section anchor="ecdh-info" numbered="true" toc="default">
          <name>'ecdh_info' Parameter</name>
          <t>The 'ecdh_info' parameter is an OPTIONAL parameter of the request and response messages exchanged between the client and the authz-info endpoint at the RS (see <xref section="5.10.1." sectionFormat="of" target="I-D.ietf-ace-oauth-authz" format="default"/>).</t>
          <t>This parameter allows the client and the RS to exchange information about an ECDH algorithm as well as about the authentication credentials and public keys to accordingly use for deriving Diffie-Hellman secrets. Its exact semantics and content are application specific.</t>
          <t>In this application profile, this parameter is used to exchange information about the ECDH algorithm as well as about the authentication credentials and public keys to be used with it, in the groups indicated by the transferred Acces Token as per its 'scope' claim (see <xref section="3.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>).</t>
          <t>When used in the Token Transfer Request sent to the Group Manager, the 'ecdh_info' parameter has value the CBOR simple value "null" (0xf6). This is done to ask for information about the ECDH algorithm as well as about the authentication credentials and public keys to be used to compute static-static Diffie-Hellman shared secrets <xref target="NIST-800-56A" format="default"/>, in the OSCORE groups that the client has been authorized to join and that use the pairwise mode of Group OSCORE <xref target="I-D.ietf-core-oscore-groupcomm" format="default"/>.</t>
          <t>When used in the following Token Transfer Response from the Group Manager, the 'ecdh_info' parameter is a CBOR array of one or more elements. The number of elements is at most the number of OSCORE groups that the client has been authorized to join.</t>
          <t>Each element contains information about ECDH parameters as well as about authentication credentials and public keys, for one or more OSCORE groups that use the pairwise mode of Group OSCORE and that the client has been authorized to join. Each element is formatted as follows.</t>
          <ul spacing="normal">
            <li>The first element 'id' is the group name of the OSCORE group or an array of group names for the OSCORE groups for which the specified information applies. In particular 'id' MUST NOT refer to OSCORE groups that are signature-only groups.</li>
            <li>The second element 'ecdh_alg' is a CBOR integer or a CBOR text string indicating the ECDH algorithm used in the OSCORE group identified by 'gname'. Values are taken from the "Value" column of the "COSE Algorithms" registry <xref target="COSE.Algorithms" format="default"/>.</li>
            <li>The third element 'ecdh_parameters' is a CBOR array indicating the parameters of the ECDH algorithm used in the OSCORE group identified by 'gname'. Its format and value are the same of the COSE capabilities array for the algorithm indicated in 'ecdh_alg', as specified for that algorithm in the "Capabilities" column of the "COSE Algorithms" registry <xref target="COSE.Algorithms" format="default"/>.</li>
            <li>The fourth element 'ecdh_key_parameters' is a CBOR array indicating the parameters of the keys used with the ECDH algorithm in the OSCORE group identified by 'gname'. Its content depends on the value of 'ecdh_alg'. In particular, its format and value are the same of the COSE capabilities array for the COSE key type of the keys used with the algorithm indicated in 'ecdh_alg', as specified for that key type in the "Capabilities" column of the "COSE Key Types" registry <xref target="COSE.Key.Types" format="default"/>.</li>
            <li>The fifth element 'cred_fmt' is a CBOR integer indicating the format of authentication credentials used in the OSCORE group identified by 'gname'. It takes value from the "Label" column of the "COSE Header Parameters" registry <xref target="COSE.Header.Parameters" format="default"/> (REQ6). Acceptable values denote a format that MUST  provide the public key as well as the comprehensive set of information related to the public key algorithm, including, e.g., the used elliptic curve (when applicable). The same considerations and guidelines for the 'pub_key_enc' element of 'sign_info' (see <xref target="ssec-token-post" format="default"/>) apply.</li>
          </ul>
          <t>The CDDL notation <xref target="RFC8610" format="default"/> of the 'ecdh_info' parameter is given below.</t>
          <sourcecode type="CDDL"><![CDATA[
ecdh_info = ecdh_info_req / ecdh_info_resp
   
ecdh_info_req = null                  ; in the Token Transfer
                                      ; Request to the KDC
                                         
ecdh_info_res = [ + ecdh_info_entry ] ; in the Token Transfer
                                      ; Response from the KDC
   
ecdh_info_entry =
[
  id : gname / [ + gname ],
  ecdh_alg : int / tstr,
  ecdh_parameters : [ any ],
  ecdh_key_parameters : [ any ],
  cred_fmt = int
]

gname = tstr
]]></sourcecode>
          <t>This format is consistent with every ECDH algorithm currently defined in <xref target="I-D.ietf-cose-rfc8152bis-algs" format="default"/>, i.e., with algorithms that have only the COSE key type as their COSE capability. <xref target="sec-future-cose-algs" format="default"/> of this document describes how the format of each 'ecdh_info_entry' can be generalized for possible future registered algorithms having a different set of COSE capabilities.</t>
        </section>
        <section anchor="gm-dh-info" numbered="true" toc="default">
          <name>'kdc_dh_creds' Parameter</name>
          <t>The 'kdc_dh_creds' parameter is an OPTIONAL parameter of the request and response messages exchanged between the Client and the authz-info endpoint at the RS (see <xref section="5.10.1." sectionFormat="of" target="I-D.ietf-ace-oauth-authz" format="default"/>).</t>
          <t>This parameter allows the client to request and retrieve the Diffie-Hellman authentication credentials of the RS, i.e., authentication credentials including a Diffie-Hellman public key of the RS.</t>
          <t>In this application profile, this parameter is used to request and retrieve from the Group Manager its Diffie-Hellman authentication credentials to use, in the OSCORE groups that the client has been authorized to join. The Group Manager has specifically a Diffie-Hellman authentication credential in an OSCORE group, and thus a Diffie-Hellman public key in that group, if and only if the group is a pairwise-only group. In this case, the early retrieval of the Group Manager's authentication credential is necessary in order for the joining node to prove the possession of its own private key, upon joining the group (see <xref target="ssec-join-req-sending" format="default"/>).</t>
          <t>When used in the Token Transfer Request sent to the Group Manager, the 'kdc_dh_creds' parameter has value the CBOR simple value "null" (0xf6). This is done to ask for the Diffie-Hellman authentication credentials that the Group Manager uses in the OSCORE groups that the client has been authorized to join.</t>
          <t>When used in the following Token Transfer Response from the Group Manager, the 'kdc_dh_creds' parameter is a CBOR array of one or more elements. The number of elements is at most the number of OSCORE groups that the client has been authorized to join.</t>
          <t>Each element 'kdc_dh_creds_entry' contains information about the Group Manager's Diffie-Hellman authentication credentials, for one or more OSCORE groups that are pairwise-only groups and that the client has been authorized to join. Each element is formatted as follows.</t>
          <ul spacing="normal">
            <li>The first element 'id' is the group name of the OSCORE group or an array of group names for the OSCORE groups for which the specified information applies. In particular 'id' MUST refer exclusively to OSCORE groups that are pairwise-only groups.</li>
            <li>The second element 'cred_fmt' is a CBOR integer indicating the format of authentication credentials used in the OSCORE group identified by 'gname'. It takes value from the "Label" column of the "COSE Header Parameters" registry <xref target="COSE.Header.Parameters" format="default"/> (REQ6). Acceptable values denote a format that MUST explicitly provide the public key as well as comprehensive set of information related to the public key algorithm, including, e.g., the used elliptic curve (when applicable). The same considerations and guidelines for the 'pub_key_enc' element of 'sign_info' (see <xref target="ssec-token-post" format="default"/>) apply.</li>
            <li>The third element 'cred' is a CBOR byte string, which encodes the Group Manager's Diffie-Hellman authentication credential in its original binary representation made available to other endpoints in the group. In particular, the original binary representation complies with the format specified by the 'cred_fmt' element. Note that the authentication credential provides the comprehensive set of information related to its public key algorithm, i.e., the ECDH algorithm used in the OSCORE group as pairwise key agreement algorithm.</li>
          </ul>
          <t>The CDDL notation <xref target="RFC8610" format="default"/> of the 'kdc_dh_creds' parameter is given below.</t>
          <sourcecode type="CDDL"><![CDATA[
kdc_dh_creds = kdc_dh_creds_req / kdc_dh_creds_resp

kdc_dh_creds_req = null                     ; in the Token Transfer
                                            ; Request to the
                                            ; Group Manager

kdc_dh_creds_res = [ + kdc_dh_creds_entry ] ; in the Token Transfer
                                            ; Response from the
                                            ; Group Manager
   
kdc_dh_creds_entry =
[
  id : gname / [ + gname ],
  cred_fmt = int,
  cred = bstr
]

gname = tstr
]]></sourcecode>
        </section>
      </section>
      <section anchor="ssec-join-req-sending" numbered="true" toc="default">
        <name>Send the Joining Request</name>
        <t>The joining node requests to join the OSCORE group by sending a Joining Request message to the related group-membership resource at the Group Manager, as per <xref section="4.3.1.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>.</t>
        <t>Additionally to what defined in <xref section="4.3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>, the following applies.</t>
        <ul spacing="normal">
          <li>The 'scope' parameter MUST be included. Its value encodes one scope entry with the format defined in <xref target="sec-format-scope" format="default"/>, indicating the group name and the role(s) that the joining node wants to take in the group.</li>
          <li>
            <t>The 'get_pub_keys' parameter is present only if the joining node wants to retrieve the authentication credentials of the group members from the Group Manager during the joining process (see <xref target="sec-public-keys-of-joining-nodes" format="default"/>). Otherwise, this parameter MUST NOT be present.  </t>
            <t>
If this parameter is present and its value is not the CBOR simple value "null" (0xf6), each element of the inner CBOR array 'role_filter' is encoded as a CBOR unsigned integer, with the same value of a permission set ("Tperm") indicating that role or combination of roles in a scope entry, as defined in <xref target="sec-format-scope" format="default"/>.</t>
          </li>
          <li>'cnonce' contains a dedicated nonce N_C generated by the joining node. For the N_C value, it is RECOMMENDED to use a 8-byte long random nonce.</li>
          <li>
            <t>The proof-of-possession (PoP) evidence included in 'client_cred_verify' is computed as defined below (REQ14). In either case, the N_S used to build the PoP input is as defined in <xref target="sssec-challenge-value" format="default"/>.  </t>
            <ul spacing="normal">
              <li>If the group is not a pairwise-only group, the PoP evidence MUST be a signature. The joining node computes the signature by using the same private key and signature algorithm it intends to use for signing messages in the OSCORE group.</li>
              <li>
                <t>If the group is a pairwise-only group, the PoP evidence MUST be a MAC computed as follows, by using the HKDF Algorithm HKDF SHA-256, which consists of composing the HKDF-Extract and HKDF-Expand steps <xref target="RFC5869" format="default"/>.      </t>
                <t>
MAC = HKDF(salt, IKM, info, L)      </t>
                <t>
The input parameters of HKDF are as follows.      </t>
                <ul spacing="normal">
                  <li>salt takes as value the empty byte string.</li>
                  <li>IKM is computed as a cofactor Diffie-Hellman shared secret, see Section 5.7.1.2 of <xref target="NIST-800-56A" format="default"/>, using the ECDH algorithm used in the OSCORE group. The joining node uses its own Diffie-Hellman private key and the Diffie-Hellman public key of the Group Manager. For X25519 and X448, the procedure is described in <xref section="5" sectionFormat="of" target="RFC7748" format="default"/>.</li>
                  <li>info takes as value the PoP input.</li>
                  <li>L is equal to 8, i.e., the size of the MAC, in bytes.</li>
                </ul>
              </li>
            </ul>
          </li>
        </ul>
        <section anchor="sssec-challenge-value" numbered="true" toc="default">
          <name>Value of the N_S Challenge</name>
          <t>The value of the N_S challenge is determined as follows.</t>
          <ol spacing="normal" type="1"><li>If the joining node has provided the Access Token to the Group Manager by means of a Token Transfer Request to the /authz-info endpoint as in <xref target="ssec-token-post" format="default"/>, then N_S takes the same value of the most recent 'kdcchallenge' parameter received by the joining node from the Group Manager. This can be either the one specified in the Token Transfer Response, or the one possibly specified in a 4.00 (Bad Request) error response to a following Joining Request (see <xref target="ssec-join-req-processing" format="default"/>).</li>
            <li>If the provisioning of the Access Token to the Group Manager has relied on the DTLS profile of ACE <xref target="I-D.ietf-ace-dtls-authorize" format="default"/> with the Access Token as content of the "psk_identity" field of the ClientKeyExchange message <xref target="RFC6347" format="default"/>, N_S is an exporter value computed as defined in <xref section="7.5" sectionFormat="of" target="RFC8446" format="default"/>. Specifically, N_S is exported from the DTLS session between the joining node and the Group Manager, using an empty 'context_value', 32 bytes as 'key_length', and the exporter label "EXPORTER-ACE-Sign-Challenge-coap-group-oscore-app" defined in <xref target="ssec-iana-tls-esporter-label-registry" format="default"/> of this document.</li>
          </ol>
          <t>It is up to applications to define how N_S is computed in further alternative settings.</t>
          <t><xref target="ssec-security-considerations-reusage-nonces" format="default"/> provides security considerations on the reusage of the N_S challenge.</t>
        </section>
      </section>
      <section anchor="ssec-join-req-processing" numbered="true" toc="default">
        <name>Receive the Joining Request</name>
        <t>The Group Manager processes the Joining Request as defined in <xref section="4.3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>, with the following additions.</t>
        <ul spacing="normal">
          <li>The Group Manager MUST return a 5.03 (Service Unavailable) response in case the OSCORE group that the joining node has been trying to join is currently inactive (see <xref target="ssec-resource-active" format="default"/>). The response MUST have Content-Format set to application/ace-groupcomm+cbor and is formatted as defined in <xref section="4.1.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>. The value of the 'error' field MUST be set to 9 ("Group currently not active").</li>
          <li>In case the joining node is not going to join the group exclusively as monitor, the Group Manager MUST return a 5.03 (Service Unavailable) response if there are currently no OSCORE Sender IDs available to assign in the OSCORE group. The response MUST have Content-Format set to application/ace-groupcomm+cbor and is formatted as defined in <xref section="4.1.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>. The value of the 'error' field MUST be set to 4 ("No available node identifiers").</li>
          <li>In case the joining node is not going to join the group exclusively as monitor and the Joining Request does not include the 'client_cred' parameter, the joining process fails if the Group Manager either: i) does not store an authentication credential with an accepted format for the joining node; or ii) stores multiple authentication credentials with an accepted format for the joining node.</li>
          <li>
            <t>In order to verify the PoP evidence contained in 'client_cred_verify', the Group Manager proceeds as follows.  </t>
            <ul spacing="normal">
              <li>As PoP input, the Group Manager uses the value of the 'scope' parameter from the Joining Request as a CBOR byte string, concatenated with N_S encoded as a CBOR byte string, concatenated with N_C encoded as a CBOR byte string. In particular, N_S is determined as described in <xref target="sssec-challenge-value" format="default"/>, while N_C is the nonce provided in the 'cnonce' parameter of the Joining Request;</li>
              <li>As public key of the joining node, the Group Manager uses either the one included in the authentication credential retrieved from the 'client_cred' parameter of the Joining Request, or the one from the already stored authentication credential as acquired from previous interactions with the joining node.</li>
              <li>
                <t>The Group Manager verifies the PoP evidence as defined below.      </t>
                <ul spacing="normal">
                  <li>If the group is not a pairwise-only group, the PoP evidence is a signature. The Group Manager verifies it by using the public key of the joining node, as well as the signature algorithm used in the OSCORE group and possible corresponding parameters.</li>
                  <li>If the group is a pairwise-only group, the PoP evidence is a MAC. The Group Manager recomputes the MAC through the same process taken by the joining node when preparing the value of the 'client_cred_verify' parameter for the Joining Request (see <xref target="ssec-join-req-sending" format="default"/>), with the difference that the Group Manager uses its own Diffie-Hellman private key and the Diffie-Hellman public key of the joining node. The verification succeeds if and only if the recomputed MAC is equal to the MAC conveyed as PoP evidence in the Joining Request.</li>
                </ul>
              </li>
            </ul>
          </li>
          <li>
            <t>A 4.00 (Bad Request) error response from the Group Manager to the joining node MUST have content format application/ace-groupcomm+cbor. The response payload is a CBOR map formatted as follows.  </t>
            <ul spacing="normal">
              <li>If the group uses (also) the group mode of Group OSCORE, the CBOR map MUST contain the 'sign_info' parameter, whose CBOR label is defined in <xref section="8" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>. This parameter has the same format of 'sign_info_res' defined in <xref section="3.3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>. In particular, it includes a single element 'sign_info_entry' pertaining to the OSCORE group that the joining node has tried to join with the Joining Request.</li>
              <li>If the group uses (also) the pairwise mode of Group OSCORE, the CBOR map MUST contain the 'ecdh_info' parameter, whose CBOR label is defined in <xref target="ssec-iana-ace-groupcomm-parameters-registry" format="default"/>. This parameter has the same format of 'ecdh_info_res' defined in <xref target="ecdh-info" format="default"/>. In particular, it includes a single element 'ecdh_info_entry' pertaining to the OSCORE group that the joining node has tried to join with the Joining Request.</li>
              <li>If the group is a pairwise-only group, the CBOR map MUST contain the 'kdc_dh_creds' parameter, whose CBOR label is defined in <xref target="ssec-iana-ace-groupcomm-parameters-registry" format="default"/>. This parameter has the same format of 'kdc_dh_creds_res' defined in <xref target="gm-dh-info" format="default"/>. In particular, it includes a single element 'kdc_dh_creds_entry' pertaining to the OSCORE group that the joining node has tried to join with the Joining Request.</li>
              <li>The CBOR map MAY include the 'kdcchallenge' parameter, whose CBOR label is defined in <xref section="8" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>. If present, this parameter is a CBOR byte string, which encodes a newly generated 'kdcchallenge' value that the Client can use when preparing a Joining Request (see <xref target="ssec-join-req-sending" format="default"/>). In such a case the Group Manager MUST store the newly generated value as the 'kdcchallenge' value associated with the joining node, possibly replacing the currently stored value.</li>
            </ul>
          </li>
          <li>The Group Manager MUST reply with a 4.00 (Bad Request) error response in case the 'scope' parameter is not present in the Joining Request, or if it is present and specifies any set of roles not included in the following list: "requester", "responder", "monitor", ("requester", "responder"). Future specifications that define a new role MUST define possible sets of roles including the new one and existing ones, that are acceptable to specify in the 'scope' parameter of a Joining Request.</li>
          <li>The Group Manager MUST reply with a 4.00 (Bad Request) error response in case the Joining Request includes the 'client_cred' parameter but does not include both the 'cnonce' and 'client_cred_verify' parameters.</li>
          <li>The Group Manager MUST reply with a 4.00 (Bad Request) error response in case an eligible authentication credential for the joining node is neither present in the 'client_cred' parameter nor already stored.</li>
          <li>
            <t>The Group Manager MAY reply with a 4.00 (Bad Request) error response in case all the following conditions hold.  </t>
            <ul spacing="normal">
              <li>The OSCORE group uses the pairwise mode of Group OSCORE.</li>
              <li>The OSCORE group uses EdDSA public keys <xref target="RFC8032" format="default"/>.</li>
              <li>
                <t>The authentication credential of the joining node from the 'client_cred' parameter includes a public key which:      </t>
                <ul spacing="normal">
                  <li>Is for the elliptic curve Ed25519 and has its Y coordinate equal to -1 or 1 (mod p), with p = (2^255 - 19), see <xref section="4.1" sectionFormat="of" target="RFC7748" format="default"/>; or</li>
                  <li>Is for the elliptic curve Ed448 and has its Y coordinate equal to -1 or 1 (mod p), with p =  (2^448 - 2^224 - 1), see <xref section="4.2" sectionFormat="of" target="RFC7748" format="default"/>.</li>
                </ul>
              </li>
            </ul>
            <t>
This prevents the acceptance of Ed25519 and Ed448 public keys that cannot be successfully converted to Montgomery coordinates, and thus cannot be used for the derivation of pairwise keys (see <xref section="2.4.1" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm" format="default"/>).</t>
          </li>
          <li>
            <t>When receiving a 4.00 (Bad Request) error response, the joining node SHOULD send a new Joining Request to the Group Manager, where:  </t>
            <ul spacing="normal">
              <li>The 'cnonce' parameter MUST include a new dedicated nonce N_C generated by the joining node.</li>
              <li>The 'client_cred' parameter MUST include an authentication credential in the format indicated by the Group Manager. Also, the authentication credential as well as the included public key MUST be compatible with the signature or ECDH algorithm, and possible associated parameters.</li>
              <li>The 'client_cred_verify' parameter MUST include a PoP evidence computed as described in <xref target="ssec-join-req-sending" format="default"/>, by using the private key associated with the authentication credential specified in the current 'client_cred' parameter, with the signature or ECDH algorithm, and possible associated parameters indicated by the Group Manager. If the error response from the Group Manager includes the 'kdcchallenge' parameter, the joining node MUST use its content as new N_S challenge to compute the PoP evidence.</li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="ssec-join-resp" numbered="true" toc="default">
        <name>Send the Joining Response</name>
        <t>If the processing of the Joining Request described in <xref target="ssec-join-req-processing" format="default"/> is successful, the Group Manager updates the group membership by registering the joining node NODENAME as a new member of the OSCORE group GROUPNAME, as described in <xref section="4.3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>.</t>
        <t>If the joining node has not taken exclusively the role of monitor, the Group Manager performs also the following actions.</t>
        <ul spacing="normal">
          <li>
            <t>The Group Manager selects an available OSCORE Sender ID in the OSCORE group, and exclusively assigns it to the joining node. The Group Manager MUST NOT assign an OSCORE Sender ID to the joining node if this joins the group exclusively with the role of monitor, according to what specified in the Access Token (see <xref target="ssec-auth-resp" format="default"/>).  </t>
            <t>
Consistently with <xref section="3.2.1" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm" format="default"/>, the Group Manager MUST assign an OSCORE Sender ID that has not been used in the OSCORE group since the latest time when the current Gid value was assigned to the group.  </t>
            <t>
If the joining node is recognized as a current group member, e.g., through the ongoing secure communication association, the following also applies.  </t>
            <ul spacing="normal">
              <li>The Group Manager MUST assign a new OSCORE Sender ID different than the one currently used by the joining node in the OSCORE group.</li>
              <li>The Group Manager MUST add the old, relinquished OSCORE Sender ID of the joining node to the most recent set of stale Sender IDs, in the collection associated with the group (see <xref target="sssec-stale-sender-ids" format="default"/>).</li>
            </ul>
          </li>
          <li>The Group Manager stores the association between i) the authentication credential of the joining node; and ii) the Group Identifier (Gid), i.e., the OSCORE ID Context, associated with the OSCORE group together with the OSCORE Sender ID assigned to the joining node in the group. The Group Manager MUST keep this association updated over time.</li>
        </ul>
        <t>Then, the Group Manager replies to the joining node, providing the updated security parameters and keying meterial necessary to participate in the group communication. This success Joining Response is formatted as defined in <xref section="4.3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>, with the following additions:</t>
        <ul spacing="normal">
          <li>The 'gkty' parameter identifies a key of type "Group_OSCORE_Input_Material object", defined in <xref target="ssec-iana-groupcomm-keys-registry" format="default"/> of this document.</li>
          <li>
            <t>The 'key' parameter includes what the joining node needs in order to set up the Group OSCORE Security Context as per <xref section="2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm" format="default"/>.  </t>
            <t>
This parameter has as value a Group_OSCORE_Input_Material object, which is defined in this document and extends the OSCORE_Input_Material object encoded in CBOR as defined in <xref section="3.2.1" sectionFormat="of" target="I-D.ietf-ace-oscore-profile" format="default"/>. In particular, it contains the additional parameters 'group_senderId', 'cred_fmt', 'sign_enc_alg', 'sign_alg', 'sign_params', 'ecdh_alg' and 'ecdh_params' defined in <xref target="ssec-iana-security-context-parameter-registry" format="default"/> of this document.  </t>
            <t>
More specifically, the 'key' parameter is composed as follows.  </t>
            <ul spacing="normal">
              <li>The 'hkdf' parameter, if present, has as value the HKDF Algorithm used in the OSCORE group. This parameter MAY be omitted, if the HKDF Algorithm used in the group is HKDF SHA-256. Otherwise, this parameter MUST be present.</li>
              <li>The 'salt' parameter, if present, has as value the OSCORE Master Salt used in the OSCORE group. This parameter MAY be omitted, if the Master Salt used in the group is the empty byte string. Otherwise, this parameter MUST be present.</li>
              <li>The 'ms' parameter includes the OSCORE Master Secret value used in the OSCORE group. This parameter MUST be present.</li>
              <li>The 'contextId' parameter MUST be present and has as value the Group Identifier (Gid), i.e., the OSCORE ID Context of the OSCORE group. This parameter MUST be present.</li>
              <li>The 'group_senderId' parameter, if present, has as value the OSCORE Sender ID assigned to the joining node by the Group Manager, as described above. This parameter MUST NOT be present if the node joins the OSCORE group exclusively with the role of monitor, according to what specified in the Access Token (see <xref target="ssec-auth-resp" format="default"/>). In any other case, this parameter MUST be present.</li>
              <li>
                <t>The 'cred_fmt' parameter MUST be present and specifies the format of authentication credentials used in the OSCORE group. It takes value from the "Label" column of the "COSE Header Parameters" registry <xref target="COSE.Header.Parameters" format="default"/> (REQ6). Consistently with <xref section="2.3" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm" format="default"/>, acceptable values denote a format that MUST explicitly provide the public key as well as the comprehensive set of information related to the public key algorithm, including, e.g., the used elliptic curve (when applicable).      </t>
                <t>
At the time of writing this specification, acceptable formats of authentication credentials are CBOR Web Tokens (CWTs) and CWT Claims Sets (CCSs) <xref target="RFC8392" format="default"/>, X.509 certificates <xref target="RFC7925" format="default"/> and C509 certificates <xref target="I-D.ietf-cose-cbor-encoded-cert" format="default"/>. Further formats may be available in the future, and would be acceptable to use as long as they comply with the criteria defined above.      </t>
                <t>
[ As to CWTs and CCSs, the COSE Header Parameters 'kcwt' and 'kccs' are under pending registration requested by draft-ietf-lake-edhoc. ]      </t>
                <t>
[ As to C509 certificates, the COSE Header Parameters 'c5b' and 'c5c' are under pending registration requested by draft-ietf-cose-cbor-encoded-cert. ]</t>
              </li>
              <li>The 'sign_enc_alg' parameter MUST NOT be present if the OSCORE group is a pairwise-only group. Otherwise, it MUST be present and specifies the Signature Encryption Algorithm used in the OSCORE group to encrypt messages protected with the group mode. This parameter takes values from the "Value" column of the "COSE Algorithms" registry <xref target="COSE.Algorithms" format="default"/>.</li>
              <li>The 'sign_alg' parameter MUST NOT be present if the OSCORE group is a pairwise-only group. Otherwise, it MUST be present and specifies the Signature Algorithm used to sign messages in the OSCORE group. This parameter takes values from the "Value" column of the "COSE Algorithms" registry <xref target="COSE.Algorithms" format="default"/>.</li>
              <li>
                <t>The 'sign_params' parameter MUST NOT be present if the OSCORE group is a pairwise-only group. Otherwise, it MUST be present and specifies the parameters of the Signature Algorithm. This parameter is a CBOR array, which includes the following two elements:      </t>
                <ul spacing="normal">
                  <li>'sign_alg_capab': a CBOR array, with the same format and value of the COSE capabilities array for the Signature Algorithm indicated in 'sign_alg', as specified for that algorithm in the "Capabilities" column of the "COSE Algorithms" registry <xref target="COSE.Algorithms" format="default"/>.</li>
                  <li>'sign_key_type_capab': a CBOR array, with the same format and value of the COSE capabilities array for the COSE key type of the keys used with the Signature Algorithm indicated in 'sign_alg', as specified for that key type in the "Capabilities" column of the "COSE Key Types" registry <xref target="COSE.Key.Types" format="default"/>.</li>
                </ul>
              </li>
              <li>The 'alg' parameter MUST NOT be present if the OSCORE group is a signature-only group. Otherwise, it MUST be present and specifies the AEAD Algorithm used in the OSCORE group to encrypt messages protected with the pairwise mode.</li>
              <li>The 'ecdh_alg' parameter MUST NOT be present if the OSCORE group is a signature-only group. Otherwise, it MUST be present and specifies the Pairwise Key Agreement Algorithm used in the OSCORE group. This parameter takes values from the "Value" column of the "COSE Algorithms" registry <xref target="COSE.Algorithms" format="default"/>.</li>
              <li>
                <t>The 'ecdh_params' parameter MUST NOT be present if the OSCORE group is a signature-only group. Otherwise, it MUST be present and specifies the parameters of the Pairwise Key Agreement Algorithm. This parameter is a CBOR array, which includes the following two elements:      </t>
                <ul spacing="normal">
                  <li>'ecdh_alg_capab': a CBOR array, with the same format and value of the COSE capabilities array for the algorithm indicated in 'ecdh_alg', as specified for that algorithm in the "Capabilities" column of the "COSE Algorithms" registry <xref target="COSE.Algorithms" format="default"/>.</li>
                  <li>'ecdh_key_type_capab': a CBOR array, with the same format and value of the COSE capabilities array for the COSE key type of the keys used with the algorithm indicated in 'ecdh_alg', as specified for that key type in the "Capabilities" column of the "COSE Key Types" registry <xref target="COSE.Key.Types" format="default"/>.</li>
                </ul>
              </li>
            </ul>
            <t>
The format of 'key' defined above is consistent with every signature algorithm and ECDH algorithm currently considered in <xref target="I-D.ietf-cose-rfc8152bis-algs" format="default"/>, i.e., with algorithms that have only the COSE key type as their COSE capability. <xref target="sec-future-cose-algs" format="default"/> of this document describes how the format of the 'key' parameter can be generalized for possible future registered algorithms having a different set of COSE capabilities.</t>
          </li>
          <li>The 'exp' parameter MUST be present.</li>
          <li>The 'ace-groupcomm-profile' parameter MUST be present and has value coap_group_oscore_app (PROFILE_TBD), which is defined in <xref target="ssec-iana-groupcomm-profile-registry" format="default"/> of this document.</li>
          <li>
            <t>The 'pub_keys' parameter, if present, includes the authentication credentials requested by the joining node by means of the 'get_pub_keys' parameter in the Joining Request.  </t>
            <t>
If the joining node has asked for the authentication credentials of all the group members, i.e., 'get_pub_keys' had value the CBOR simple value "null" (0xf6) in the Joining Request, then the Group Manager provides only the authentication credentials of the group members that are relevant to the joining node. That is, in such a case, 'pub_keys' includes only: i) the authentication credentials of the responders currently in the OSCORE group, in case the joining node is configured (also) as requester; and ii) the authentication credentials of the requesters currently in the OSCORE group, in case the joining node is configured (also) as responder or monitor.</t>
          </li>
          <li>The 'peer_identifiers' parameter includes the OSCORE Sender ID of each group member whose authentication credential is specified in the 'pub_keys' parameter. That is, a group member's Sender ID is used as identifier for that group member (REQ25).</li>
          <li>
            <t>The 'group_policies' parameter SHOULD be present, and SHOULD include the following elements:  </t>
            <ul spacing="normal">
              <li>"Key Update Check Interval" defined in <xref section="4.3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>, with default value 3600;</li>
              <li>"Expiration Delta" defined in <xref section="4.3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>, with default value 0.</li>
            </ul>
          </li>
          <li>The 'kdc_cred' parameter MUST be present, specifying the Group Manager's authentication credential in its original binary representation (REQ8). The Group Manager's authentication credential MUST be in the format used in the OSCORE group. Also, the authentication credential as well as the included public key MUST be compatible with the signature or ECDH algorithm, and possible associated parameters used in the OSCORE group.</li>
          <li>The 'kdc_nonce' parameter MUST be present, specifying the dedicated nonce N_KDC generated by the Group Manager. For N_KDC, it is RECOMMENDED to use a 8-byte long random nonce.</li>
          <li>
            <t>The 'kdc_cred_verify' parameter MUST be present, specifying the proof-of-possession (PoP) evidence computed by the Group Manager. The PoP evidence is computed over the nonce N_KDC, which is specified in the 'kdc_nonce' parameter and taken as PoP input. The PoP evidence is computed as defined below (REQ21).  </t>
            <ul spacing="normal">
              <li>If the group is not a pairwise-only group, the PoP evidence MUST be a signature. The Group Manager computes the signature by using the signature algorithm used in the OSCORE group, as well as its own private key associated with the authentication credential specified in the 'kdc_cred' parameter.</li>
              <li>
                <t>If the group is a pairwise-only group, the PoP evidence MUST be a MAC computed as follows, by using the HKDF Algorithm HKDF SHA-256, which consists of composing the HKDF-Extract and HKDF-Expand steps <xref target="RFC5869" format="default"/>.      </t>
                <t>
MAC = HKDF(salt, IKM, info, L)      </t>
                <t>
The input parameters of HKDF are as follows.      </t>
                <ul spacing="normal">
                  <li>salt takes as value the empty byte string.</li>
                  <li>IKM is computed as a cofactor Diffie-Hellman shared secret, see Section 5.7.1.2 of <xref target="NIST-800-56A" format="default"/>, using the ECDH algorithm used in the OSCORE group. The Group Manager uses its own Diffie-Hellman private key and the Diffie-Hellman public key of the joining node. For X25519 and X448, the procedure is described in <xref section="5" sectionFormat="of" target="RFC7748" format="default"/>.</li>
                  <li>info takes as value the PoP input.</li>
                  <li>L is equal to 8, i.e., the size of the MAC, in bytes.</li>
                </ul>
              </li>
            </ul>
          </li>
          <li>The 'group_rekeying' parameter MAY be omitted, if the Group Manager uses the "Point-to-Point" group rekeying scheme registered in <xref section="11.14" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/> as rekeying scheme in the OSCORE group (OPT9). Its detailed use for this profile is defined in <xref target="sec-group-rekeying-process" format="default"/> of this document. In any other case, the 'group_rekeying' parameter MUST be included.</li>
        </ul>
        <t>As a last action, if the Group Manager reassigns Gid values during the group's lifetime (see <xref section="3.2.1.1" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm" format="default"/>), the Group Manager MUST store the Gid specified in the 'contextId' parameter of the 'key' parameter, as the Birth Gid of the joining node in the joined group (see <xref section="3" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm" format="default"/>). This applies also in case the node is in fact re-joining the group; in such a case, the newly determined Birth Gid overwrites the one currently stored.</t>
      </section>
      <section anchor="ssec-join-resp-processing" numbered="true" toc="default">
        <name>Receive the Joining Response</name>
        <t>Upon receiving the Joining Response, the joining node retrieves the Group Manager's authentication credential from the 'kdc_cred' parameter. The joining node MUST verify the proof-of-possession (PoP) evidence specified in the 'kdc_cred_verify' parameter of the Joining Response as defined below (REQ21).</t>
        <ul spacing="normal">
          <li>If the group is not a pairwise-only group, the PoP evidence is a signature. The joining node verifies it by using the public key of the Group Manager from the received authentication credential, as well as the signature algorithm used in the OSCORE group and possible corresponding parameters.</li>
          <li>If the group is a pairwise-only group, the PoP evidence is a MAC. The joining node recomputes the MAC through the same process taken by the Group Manager when computing the value of the 'kdc_cred_verify' parameter (see <xref target="ssec-join-resp" format="default"/>), with the difference that the joining node uses its own Diffie-Hellman private key and the Diffie-Hellman public key of the Group Manager from the received authentication credential. The verification succeeds if and only if the recomputed MAC is equal to the MAC conveyed as PoP evidence in the Joining Response.</li>
        </ul>
        <t>In case of failed verification of the PoP evidence, the joining node MUST stop processing the Joining Response and MAY send a new Joining Request to the Group Manager (see <xref target="ssec-join-req-sending" format="default"/>).</t>
        <t>In case of successful verification of the PoP evidence, the joining node uses the information received in the Joining Response to set up the Group OSCORE Security Context, as described in <xref section="2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm" format="default"/>. If the following parameters were not included in the 'key' parameter of the Joining Response, the joining node considers the following default values, consistently with <xref section="3.2" sectionFormat="of" target="RFC8613" format="default"/>.</t>
        <ul spacing="normal">
          <li>Absent the 'hkdf' parameter, the joining node considers HKDF SHA-256 as HKDF Algorithm to use in the OSCORE group.</li>
          <li>Absent the 'salt' parameter, the joining node considers the empty byte string as Master Salt to use in the OSCORE group.</li>
          <li>Absent the 'group_rekeying' parameter, the joining node considers the "Point-to-Point" group rekeying scheme registered in <xref section="11.14" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/> as the rekeying scheme used in the group (OPT9). Its detailed use for this profile is defined in <xref target="sec-group-rekeying-process" format="default"/> of this document.</li>
        </ul>
        <t>In addition, the joining node maintains an association between each authentication credential retrieved from the 'pub_keys' parameter and the role(s) that the corresponding group member has in the OSCORE group.</t>
        <t>From then on, the joining node can exchange group messages secured with Group OSCORE as described in <xref target="I-D.ietf-core-oscore-groupcomm" format="default"/>. When doing so:</t>
        <ul spacing="normal">
          <li>The joining node MUST NOT process an incoming request message, if protected by a group member whose authentication credential is not associated with the role "Requester".</li>
          <li>The joining node MUST NOT process an incoming response message, if protected by a group member whose authentication credential is not associated with the role "Responder".</li>
          <li>The joining node MUST NOT use the pairwise mode of Group OSCORE to process messages in the group, if the Joining Response did not include the 'ecdh_alg' parameter.</li>
        </ul>
        <t>If the application requires backward security, the Group Manager MUST generate updated security parameters and group keying material, and provide it to the current group members upon the new node's joining (see <xref target="sec-group-rekeying-process" format="default"/>). As a consequence, the joining node is not able to access secure communication in the OSCORE group occurred prior its joining.</t>
      </section>
    </section>
    <section anchor="sec-public-keys-of-joining-nodes" numbered="true" toc="default">
      <name>Public Keys of Joining Nodes</name>
      <t>Source authentication of a message sent within the group and protected with Group OSCORE is ensured by means of a digital signature embedded in the message (in group mode), or by integrity-protecting the message with pairwise keying material derived from the asymmetric keys of sender and recipient (in pairwise mode).</t>
      <t>Therefore, group members must be able to retrieve each other's authentication credential from a trusted repository, in order to verify source authenticity of incoming group messages.</t>
      <t>As also discussed in <xref target="I-D.ietf-core-oscore-groupcomm" format="default"/>, the Group Manager acts as trusted repository of the authentication credentials of the group members, and provides those authentication credentials to group members if requested to. Upon joining an OSCORE group, a joining node is thus expected to provide its own authentication credential to the Group Manager.</t>
      <t>In particular, one of the following four cases can occur when a new node joins an OSCORE group.</t>
      <ul spacing="normal">
        <li>The joining node is going to join the group exclusively as monitor, i.e., it is not going to send messages to the group. In this case, the joining node is not required to provide its own authentication credential to the Group Manager, which thus does not have to perform any check related to the format of the authentication credential, to a signature or ECDH algorithm, and to possible parameters associated with the algorithm and the public key. In case that joining node still provides an authentication credential in the 'client_cred' parameter of the Joining Request (see <xref target="ssec-join-req-sending" format="default"/>), the Group Manager silently ignores that parameter, as well as the related parameters 'cnonce' and 'client_cred_verify'.</li>
        <li>The Group Manager already acquired the authentication credential of the joining node during a past joining process. In this case, the joining node MAY choose not to provide again its own authentication credential to the Group Manager, in order to limit the size of the Joining Request. The joining node MUST provide its own authentication credential again if it has provided the Group Manager with multiple authentication credentials during past joining processes, intended for different OSCORE groups. If the joining node provides its own authentication credential, the Group Manager performs consistency checks as per <xref target="ssec-join-req-processing" format="default"/> and, in case of success, considers it as the authentication credential associated with the joining node in the OSCORE group.</li>
        <li>
          <t>The joining node and the Group Manager use an asymmetric proof-of-possession key to establish a secure communication association. Then, two cases can occur.  </t>
          <ol spacing="normal" type="1"><li>
              <t>When establishing the secure communication association, the Group Manager obtained from the joining node the joining node's authentication credential, in the format used in the OSCORE group and including the asymmetric proof-of-possession key as public key. Also, such authentication credential and the proof-of-possession key are compatible with the signature or ECDH algorithm, and possible associated parameters used in the OSCORE group.      </t>
              <t>
In this case, the Group Manager considers the authentication credential as the one associated with the joining node in the OSCORE group. If the joining node is aware that the authentication credential and the public key included thereof are also valid for the OSCORE group, then the joining node MAY choose to not provide again its own authentication credential to the Group Manager.      </t>
              <t>
The joining node MUST provide again its own authentication credential if it has provided the Group Manager with multiple authentication credentials during past joining processes, intended for different OSCORE groups. If the joining node provides its own authentication credential in the 'client_cred' parameter of the Joining Request (see <xref target="ssec-join-req-sending" format="default"/>), the Group Manager performs consistency checks as per <xref target="ssec-join-req-processing" format="default"/> and, in case of success, considers it as the authentication credential associated with the joining node in the OSCORE group.</t>
            </li>
            <li>
              <t>The authentication credential is not in the format used in the OSCORE group, or else the authentication credential and the proof-of-possession key included as public key are not compatible with the signature or ECDH algorithm, and possible associated parameters used in the OSCORE group.      </t>
              <t>
In this case, the joining node MUST provide a different compatible authentication credential and public key included thereof to the Group Manager in the 'client_cred' parameter of the Joining Request (see <xref target="ssec-join-req-sending" format="default"/>). Then, the Group Manager performs consistency checks on this latest provided authentication credential as per <xref target="ssec-join-req-processing" format="default"/> and, in case of success, considers it as the authentication credential associated with the joining node in the OSCORE group.</t>
            </li>
          </ol>
        </li>
        <li>The joining node and the Group Manager use a symmetric proof-of-possession key to establish a secure communication association. In this case, upon performing a joining process with that Group Manager for the first time, the joining node specifies its own authentication credential in the 'client_cred' parameter of the Joining Request targeting the group-membership endpoint (see <xref target="ssec-join-req-sending" format="default"/>).</li>
      </ul>
    </section>
    <section anchor="sec-updated-key" numbered="true" toc="default">
      <name>Retrieve of Updated Keying Material</name>
      <t>At some point, a group member considers the Group OSCORE Security Context invalid and to be renewed. This happens, for instance, after a number of unsuccessful security processing of incoming messages from other group members, or when the Security Context expires as specified by the 'exp' parameter of the Joining Response.</t>
      <t>When this happens, the group member retrieves updated security parameters and group keying material. This can occur in the two different ways described below.</t>
      <section anchor="ssec-updated-key-only" numbered="true" toc="default">
        <name>Retrieve of Group Keying Material</name>
        <t>If the group member wants to retrieve only the latest group keying material, it sends a Key Distribution Request to the Group Manager.</t>
        <t>In particular, it sends a CoAP GET request to the endpoint /ace-group/GROUPNAME at the Group Manager.</t>
        <t>The Group Manager processes the Key Distribution Request according to <xref section="4.3.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>. The Key Distribution Response is formatted as defined in <xref section="4.3.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>, with the following additions.</t>
        <ul spacing="normal">
          <li>The 'key' parameter is formatted as defined in <xref target="ssec-join-resp" format="default"/> of this document, with the difference that it does not include the 'group_SenderId' parameter.</li>
          <li>The 'exp' parameter MUST be present.</li>
          <li>The 'ace-groupcomm-profile' parameter MUST be present and has value coap_group_oscore_app.</li>
        </ul>
        <t>Upon receiving the Key Distribution Response, the group member retrieves the updated security parameters and group keying material, and, if they differ from the current ones, uses them to set up the new Group OSCORE Security Context as described in <xref section="2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm" format="default"/>.</t>
      </section>
      <section anchor="ssec-updated-and-individual-key" numbered="true" toc="default">
        <name>Retrieve of Group Keying Material and OSCORE Sender ID</name>
        <t>If the group member wants to retrieve the latest group keying material as well as the OSCORE Sender ID that it has in the OSCORE group, it sends a Key Distribution Request to the Group Manager.</t>
        <t>In particular, it sends a CoAP GET request to the endpoint /ace-group/GROUPNAME/nodes/NODENAME at the Group Manager.</t>
        <t>The Group Manager processes the Key Distribution Request according to <xref section="4.8.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>. The Key Distribution Response is formatted as defined in <xref section="4.8.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>, with the following additions.</t>
        <ul spacing="normal">
          <li>
            <t>The 'key' parameter is formatted as defined in <xref target="ssec-join-resp" format="default"/> of this document. In particular, if the requesting group member has exclusively the role of monitor, no 'group_SenderId' is specified within the 'key' parameter.  </t>
            <t>
Note that, in any other case, the current Sender ID of the group member is not specified as a separate parameter, but rather specified as 'group_SenderId' within the 'key' parameter.</t>
          </li>
          <li>The 'exp' parameter MUST be present.</li>
        </ul>
        <t>Upon receiving the Key Distribution Response, the group member retrieves the updated security parameters, group keying material and Sender ID, and, if they differ from the current ones, uses them to set up the new Group OSCORE Security Context as described in <xref section="2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm" format="default"/>.</t>
      </section>
    </section>
    <section anchor="sec-new-key" numbered="true" toc="default">
      <name>Request to Change Individual Keying Material</name>
      <t>As discussed in <xref section="2.5.2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm" format="default"/>, a group member may at some point exhaust its Sender Sequence Numbers in the OSCORE group.</t>
      <t>When this happens, the group member MUST send a Key Renewal Request message to the Group Manager, as per <xref section="4.8.2.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>. In particular, it sends a CoAP PUT request to the endpoint /ace-group/GROUPNAME/nodes/NODENAME at the Group Manager.</t>
      <t>Upon receiving the Key Renewal Request, the Group Manager processes it as defined in <xref section="4.8.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>, with the following additions.</t>
      <t>The Group Manager MUST return a 5.03 (Service Unavailable) response in case the OSCORE group identified by GROUPNAME is currently inactive (see <xref target="ssec-resource-active" format="default"/>). The response MUST have Content-Format set to application/ace-groupcomm+cbor and is formatted as defined in <xref section="4.1.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>. The value of the 'error' field MUST be set to 9 ("Group currently not active").</t>
      <t>Otherwise, the Group Manager performs one of the following actions.</t>
      <ol spacing="normal" type="1"><li>If the requesting group member has exclusively the role of monitor, the Group Manager replies with a 4.03 (Forbidden) error response. The response MUST have Content-Format set to application/ace-groupcomm+cbor and is formatted as defined in <xref section="4.1.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>. The value of the 'error' field MUST be set to 1 ("Request inconsistent with the current roles").</li>
        <li>
          <t>Otherwise, the Group Manager takes one of the following actions.  </t>
          <ul spacing="normal">
            <li>
              <t>The Group Manager rekeys the OSCORE group. That is, the Group Manager generates new group keying material for that group (see <xref target="sec-group-rekeying-process" format="default"/>), and replies to the group member with a group rekeying message as defined in <xref target="sec-group-rekeying-process" format="default"/>, providing the new group keying material. Then, the Group Manager rekeys the rest of the OSCORE group, as discussed in <xref target="sec-group-rekeying-process" format="default"/>.      </t>
              <t>
The Group Manager SHOULD perform a group rekeying only if already scheduled to  occur shortly, e.g., according to an application-dependent rekeying period or scheduling, or as a reaction to a recent change in the group membership. In any other case, the Group Manager SHOULD NOT rekey the OSCORE group when receiving a Key Renewal Request (OPT12).</t>
            </li>
            <li>
              <t>The Group Manager determines and assigns a new OSCORE Sender ID for that group member, and replies with a Key Renewal Response formatted as defined in <xref section="4.8.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>. In particular, the CBOR Map in the response payload includes a single parameter 'group_SenderId' defined in <xref target="ssec-iana-ace-groupcomm-parameters-registry" format="default"/> of this document, specifying the new Sender ID of the group member encoded as a CBOR byte string.      </t>
              <t>
Consistently with <xref section="2.5.3.1" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm" format="default"/>, the Group Manager MUST assign a new Sender ID that has not been used in the OSCORE group since the latest time when the current Gid value was assigned to the group.      </t>
              <t>
Furthermore, the Group Manager MUST add the old, relinquished Sender ID of the group member to the most recent set of stale Sender IDs, in the collection associated with the group (see <xref target="sssec-stale-sender-ids" format="default"/>).      </t>
              <t>
The Group Manager MUST return a 5.03 (Service Unavailable) response in case there are currently no Sender IDs available to assign in the OSCORE group. The response MUST have Content-Format set to application/ace-groupcomm+cbor and is formatted as defined in <xref section="4.1.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>. The value of the 'error' field MUST be set to 4 ("No available node identifiers").</t>
            </li>
          </ul>
        </li>
      </ol>
    </section>
    <section anchor="sec-pub-keys" numbered="true" toc="default">
      <name>Retrieve Authentication Credentials of Group Members</name>
      <t>A group member or a signature verifier may need to retrieve the authentication credentials of (other) group members. To this end, the group member or signature verifier sends a Public Key Request message to the Group Manager, as per Sections <xref target="I-D.ietf-ace-key-groupcomm" section="4.4.1.1" sectionFormat="bare" format="default"/> and <xref target="I-D.ietf-ace-key-groupcomm" section="4.4.2.1" sectionFormat="bare" format="default"/> of <xref target="I-D.ietf-ace-key-groupcomm" format="default"/>. In particular, it sends the request to the endpoint /ace-group/GROUPNAME/pub-key at the Group Manager.</t>
      <t>If the Public Key Request uses the method FETCH, the Public Key Request is formatted as defined in <xref section="4.4.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>. In particular:</t>
      <ul spacing="normal">
        <li>Each element (if any) of the inner CBOR array 'role_filter' is formatted as in the inner CBOR array 'role_filter' of the 'get_pub_keys' parameter of the Joining Request when the parameter value is not the CBOR simple value "null" (0xf6) (see <xref target="ssec-join-req-sending" format="default"/>).</li>
        <li>Each element (if any) of the inner CBOR array 'id_filter' is a CBOR byte string, which encodes the OSCORE Sender ID of the group member for which the associated authentication credential is requested (REQ25).</li>
      </ul>
      <t>Upon receiving the Public Key Request, the Group Manager processes it as per Section 4.4.1 or Section 4.4.2 of <xref target="I-D.ietf-ace-key-groupcomm" format="default"/>, depending on the request method being FETCH or GET, respectively. Additionally, if the Public Key Request uses the method FETCH, the Group Manager silently ignores node identifiers included in the 'get_pub_keys' parameter of the request that are not associated with any current group member (REQ26).</t>
      <t>The success Public Key Response is formatted as defined in Section 4.4.1 or Section 4.4.2 of <xref target="I-D.ietf-ace-key-groupcomm" format="default"/>, depending on the request method being FETCH or GET, respectively.</t>
    </section>
    <section anchor="sec-update-pub-key" numbered="true" toc="default">
      <name>Upload a New Authentication Credential</name>
      <t>A group member may need to provide the Group Manager with its new authentication credential to use in the group from then on, hence replacing the current one. This can be the case, for instance, if the signature or ECDH algorithm, and possible associated parameters used in the OSCORE group have been changed, and the current authentication credential is not compatible with them.</t>
      <t>To this end, the group member sends a Public Key Update Request message to the Group Manager, as per <xref section="4.9.1.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>, with the following addition.</t>
      <ul spacing="normal">
        <li>The group member computes the proof-of-possession (PoP) evidence included in 'client_cred_verify' in the same way taken when preparing a Joining Request for the OSCORE group in question, as defined in <xref target="ssec-join-req-sending" format="default"/> (REQ14).</li>
      </ul>
      <t>In particular, the group member sends a CoAP POST request to the endpoint /ace-group/GROUPNAME/nodes/NODENAME/pub-key at the Group Manager.</t>
      <t>Upon receiving the Public Key Update Request, the Group Manager processes it as per <xref section="4.9.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>, with the following additions.</t>
      <ul spacing="normal">
        <li>The N_S challenge used to build the proof-of-possession input is computed as per point (1) in <xref target="sssec-challenge-value" format="default"/> (REQ15).</li>
        <li>The Group Manager verifies the PoP challenge included in 'client_cred_verify' in the same way taken when processing a Joining Request for the OSCORE group in question, as defined in <xref target="ssec-join-req-processing" format="default"/> (REQ14).</li>
        <li>The Group Manager MUST return a 5.03 (Service Unavailable) response in case the OSCORE group identified by GROUPNAME is currently inactive (see <xref target="ssec-resource-active" format="default"/>). The response MUST have Content-Format set to application/ace-groupcomm+cbor and is formatted as defined in <xref section="4.1.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>. The value of the 'error' field MUST be set to 9 ("Group currently not active").</li>
        <li>If the requesting group member has exclusively the role of monitor, the Group Manager replies with a 4.00 (Bad request) error response. The response MUST have Content-Format set to application/ace-groupcomm+cbor and is formatted as defined in <xref section="4.1.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>. The value of the 'error' field MUST be set to 1 ("Request inconsistent with the current roles").</li>
        <li>If the request is successfully processed, the Group Manager stores the association between i) the new authentication credential of the group member; and ii) the Group Identifier (Gid), i.e., the OSCORE ID Context, associated with the OSCORE group together with the OSCORE Sender ID assigned to the group member in the group. The Group Manager MUST keep this association updated over time.</li>
      </ul>
    </section>
    <section anchor="sec-gm-pub-key" numbered="true" toc="default">
      <name>Retrieve the Group Manager's Authentication Credential</name>
      <t>A group member or a signature verifier may need to retrieve the authentication credential of the Group Manager. To this end, the requesting client sends a KDC Public Key Request message to the Group Manager.</t>
      <t>In particular, it sends a CoAP GET request to the endpoint /ace-group/GROUPNAME/kdc-pub-key at the Group Manager defined in <xref section="4.5.1.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>, where GROUPNAME is the name of the OSCORE group.</t>
      <t>In addition to what is defined in <xref section="4.5.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>, the Group Manager MUST respond with a 4.00 (Bad Request) error response, if the requesting client is not a current group member and GROUPNAME denotes a pairwise-only group. The response MUST have Content-Format set to application/ace-groupcomm+cbor and is formatted as defined in <xref section="4.1.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>. The value of the 'error' field MUST be set to 7 ("Signatures not used in the group").</t>
      <t>The payload of the 2.05 (Content) KDC Public Key Response is a CBOR map, which is formatted as defined in <xref section="4.5.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>. In particular, the Group Manager specifies the parameters 'kdc_cred', 'kdc_nonce' and 'kdc_challenge' as defined for the Joining Response in <xref target="ssec-join-resp" format="default"/> of this document. This especially applies to the computing of the proof-of-possession (PoP) evidence included in 'kdc_cred_verify' (REQ21).</t>
      <t>Upon receiving a 2.05 (Content) KDC Public Key Response, the requesting client retrieves the Group Manager's authentication credential from the 'kdc_cred' parameter, and proceeds as defined in <xref section="4.5.1.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>. In particular, the requesting client verifies the PoP evidence included in 'kdc_cred_verify' by means of the same method used when processing the Joining Response, as defined in <xref target="ssec-join-resp" format="default"/> of this document (REQ21).</t>
      <t>Note that a signature verifier would not receive a successful response from the Group Manager, in case GROUPNAME denotes a pairwise-only group.</t>
    </section>
    <section anchor="sec-verif-data" numbered="true" toc="default">
      <name>Retrieve Signature Verification Data</name>
      <t>A signature verifier may need to retrieve data required to verify signatures of messages protected with the group mode and sent to a group (see Sections <xref target="I-D.ietf-core-oscore-groupcomm" section="3.1" sectionFormat="bare" format="default"/> and <xref target="I-D.ietf-core-oscore-groupcomm" section="8.5" sectionFormat="bare" format="default"/> of <xref target="I-D.ietf-core-oscore-groupcomm" format="default"/>). To this end, the signature verifier sends a Signature Verification Data Request message to the Group Manager.</t>
      <t>In particular, it sends a CoAP GET request to the endpoint /ace-group/GROUPNAME/verif-data at the Group Manager defined in <xref target="ssec-resource-verif-data" format="default"/> of this document, where GROUPNAME is the name of the OSCORE group.</t>
      <t>The payload of the 2.05 (Content) Signature Verification Data Response is a CBOR map, which has the format used for the Joining Response message in <xref target="ssec-join-resp" format="default"/>, with the following differences.</t>
      <ul spacing="normal">
        <li>
          <t>From the Joining Response message, only the parameters 'gkty', 'key', 'num', 'exp' and 'ace-groupcomm-profile' are present. In particular, the 'key' parameter includes only the following data.  </t>
          <ul spacing="normal">
            <li>The parameters 'hkdf', 'contextId', 'cred_fmt', 'sign_enc_alg', 'sign_alg', 'sign_params'. These parameters MUST be present.</li>
            <li>The parameters 'alg' and 'ecdh_alg'. These parameter MUST NOT be present if the group is a signature-only group. Otherwise, they MUST be present.</li>
          </ul>
        </li>
        <li>The parameter 'group_enc_key' is also included, with CBOR label defined in <xref target="ssec-iana-ace-groupcomm-parameters-registry" format="default"/>. This parameter specifies the Group Encryption Key of the OSCORE Group, encoded as a CBOR byte string. The Group Manager derives the Group Encryption Key from the group keying material, as per <xref section="2.1.6" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm" format="default"/>. This parameter MUST be present.</li>
      </ul>
      <t>In order to verify signatures in the group (see <xref section="8.5" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm" format="default"/>), the signature verifier relies on: the data retrieved from the 2.05 (Content) Signature Verification Data Response; the public keys of the group members signing the messages to verify, retrieved from those members' authentication credentials that can be obtained as defined in <xref target="sec-pub-keys" format="default"/>; and the public key of the Group Manager, retrieved from the Group Manager's authentication credential that can be obtained as defined in <xref target="sec-gm-pub-key" format="default"/>.</t>
      <t><xref target="fig-verif-data-req-resp" format="default"/> gives an overview of the exchange described above,  while <xref target="fig-verif-data-req-resp-ex" format="default"/> shows an example.</t>
      <figure anchor="fig-verif-data-req-resp">
        <name>Message Flow of Signature Verification Data Request-Response</name>
        <artwork align="center" name="" type="" alt=""><![CDATA[
Signature                                                     Group
Verifier                                                     Manager
  |                                                             |
  |              Signature Verification Data Request            |
  |------------------------------------------------------------>|
  |              GET ace-group/GROUPNAME/verif-data             |
  |                                                             |
  |<--- Signature Verification Data Response: 2.05 (Content) ---|
  |                                                             |
]]></artwork>
      </figure>
      <figure anchor="fig-verif-data-req-resp-ex">
        <name>Example of Signature Verification Data Request-Response</name>
        <artwork name="" type="" align="left" alt=""><![CDATA[
   Request:

   Header: GET (Code=0.01)
   Uri-Host: "kdc.example.com"
   Uri-Path: "ace-group"
   Uri-Path: "g1"
   Uri-Path: "verif-data"
   Payload: -

   Response:

   Header: Content (Code=2.05)
   Content-Format: "application/ace-groupcomm+cbor"
   Payload (in CBOR diagnostic notation, with GROUPCOMM_KEY_TBD
            and PROFILE_TBD being CBOR integers, while GROUP_ENC_KEY
            being a CBOR byte string):
    {
      "gkty": GROUPCOMM_KEY_TBD,
      "key": {
        'hkdf': -10,                   ; HKDF SHA-256
        'contextId': h'37fc',
        'cred_fmt': 33,                ; x5chain
        'sign_enc_alg': 10,            ; AES-CCM-16-64-128
        'sign_alg': -8,                ; EdDSA
        'sign_params': [[1], [1, 6]]   ; [[OKP], [OKP, Ed25519]]
      },
      "num": 12,
      "exp": 1609459200,
      "ace_groupcomm_profile": PROFILE_TBD,
      "group_enc_key": GROUP_ENC_KEY
    }
]]></artwork>
      </figure>
    </section>
    <section anchor="sec-policies" numbered="true" toc="default">
      <name>Retrieve the Group Policies</name>
      <t>A group member may request the current policies used in the OSCORE group. To this end, the group member sends a Policies Request, as per <xref section="4.6.1.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>. In particular, it sends a CoAP GET request to the endpoint /ace-group/GROUPNAME/policies at the Group Manager, where GROUPNAME is the name of the OSCORE group.</t>
      <t>Upon receiving the Policies Request, the Group Manager processes it as per <xref section="4.6.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>. The success Policies Response is formatted as defined in <xref section="4.6.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>.</t>
    </section>
    <section anchor="sec-version" numbered="true" toc="default">
      <name>Retrieve the Keying Material Version</name>
      <t>A group member may request the current version of the keying material used in the OSCORE group. To this end, the group member sends a Version Request, as per <xref section="4.7.1.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>. In particular, it sends a CoAP GET request to the endpoint /ace-group/GROUPNAME/num at the Group Manager, where GROUPNAME is the name of the OSCORE group.</t>
      <t>Upon receiving the Version Request, the Group Manager processes it as per <xref section="4.7.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>. The success Version Response is formatted as defined in <xref section="4.7.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>.</t>
    </section>
    <section anchor="sec-status" numbered="true" toc="default">
      <name>Retrieve the Group Status</name>
      <t>A group member may request the current status of the the OSCORE group, i.e., active or inactive. To this end, the group member sends a Group Status Request to the Group Manager.</t>
      <t>In particular, the group member sends a CoAP GET request to the endpoint /ace-group/GROUPNAME/active at the Group Manager defined in <xref target="ssec-resource-active" format="default"/> of this document, where GROUPNAME is the name of the OSCORE group.</t>
      <t>The payload of the 2.05 (Content) Group Status Response includes the CBOR simple value "true" (0xf5) if the group is currently active, or the CBOR simple value "false" (0xf4) otherwise. The group is considered active if it is set to allow new members to join, and if communication within the group is fine to happen.</t>
      <t>Upon learning from a 2.05 (Content) response that the group is currently inactive, the group member SHOULD stop taking part in communications within the group, until it becomes active again.</t>
      <t>Upon learning from a 2.05 (Content) response that the group has become active again, the group member can resume taking part in communications within the group.</t>
      <t><xref target="fig-key-status-req-resp" format="default"/> gives an overview of the exchange described above, while <xref target="fig-key-status-req-resp-ex" format="default"/> shows an example.</t>
      <figure anchor="fig-key-status-req-resp">
        <name>Message Flow of Group Status Request-Response</name>
        <artwork align="center" name="" type="" alt=""><![CDATA[
Group                                                         Group
Member                                                       Manager
  |                                                             |
  |--- Group Status Request: GET ace-group/GROUPNAME/active --->|
  |                                                             |
  |<---------- Group Status Response: 2.05 (Content) -----------|
  |                                                             |
]]></artwork>
      </figure>
      <figure anchor="fig-key-status-req-resp-ex">
        <name>Example of Group Status Request-Response</name>
        <artwork name="" type="" align="left" alt=""><![CDATA[
   Request:

   Header: GET (Code=0.01)
   Uri-Host: "kdc.example.com"
   Uri-Path: "ace-group"
   Uri-Path: "g1"
   Uri-Path: "active"
   Payload: -

   Response:

   Header: Content (Code=2.05)
   Payload (in CBOR diagnostic notation):
     true
]]></artwork>
      </figure>
    </section>
    <section anchor="sec-retrieve-gnames" numbered="true" toc="default">
      <name>Retrieve Group Names</name>
      <t>A node may want to retrieve from the Group Manager the group name and the URI of the group-membership resource of a group. This is relevant in the following cases.</t>
      <ul spacing="normal">
        <li>Before joining a group, a joining node may know only the current Group Identifier (Gid) of that group, but not the group name and the URI to the group-membership resource.</li>
        <li>
          <t>As current group member in several groups, the node has missed a previous group rekeying in one of them (see <xref target="sec-group-rekeying-process" format="default"/>). Hence, it retains stale keying material and fails to decrypt received messages exchanged in that group.  </t>
          <t>
Such messages do not provide a direct hint to the correct group name, that the node would need in order to retrieve the latest keying material and authentication credentials from the Group Manager (see <xref target="ssec-updated-key-only" format="default"/>, <xref target="ssec-updated-and-individual-key" format="default"/> and <xref target="sec-pub-keys" format="default"/>). However, such messages may specify the current Gid of the group, as value of the 'kid_context' field of the OSCORE CoAP option (see <xref section="6.1" sectionFormat="of" target="RFC8613" format="default"/> and <xref section="4.2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm" format="default"/>).</t>
        </li>
        <li>
          <t>As signature verifier, the node also refers to a group name for retrieving the required authentication credentials from the Group Manager (see <xref target="sec-pub-keys" format="default"/>). As discussed above, intercepted messages do not provide a direct hint to the correct group name, while they may specify the current Gid of the group, as value of the 'kid_context' field of the OSCORE CoAP option. In such a case, upon intercepting a message in the group, the node requires to correctly map the Gid currently used in the group with the invariant group name.  </t>
          <t>
Furthermore, since it is not a group member, the node does not take part to a possible group rekeying. Thus, following a group rekeying and the consequent change of Gid in a group, the node would retain the old Gid value and cannot correctly associate intercepted messages to the right group, especially if acting as signature verifier in several groups. This in turn prevents the efficient verification of signatures, and especially the retrieval of required, new authentication credentials from the Group Manager.</t>
        </li>
      </ul>
      <t>In either case, the node only knows the current Gid of the group, as learned from received or intercepted messages exchanged in the group. As detailed below, the node can contact the Group Manager, and request the group name and URI to the group-membership resource corresponding to that Gid. Then, it can use that information to either join the group as a candidate group member, get the latest keying material as a current group member, or retrieve authentication credentials used in the group as a signature verifier. To this end, the node sends a Group Name and URI Retrieval Request, as per <xref section="4.2.1.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>.</t>
      <t>In particular, the node sends a CoAP FETCH request to the endpoint /ace-group at the Group Manager formatted as defined in <xref section="4.2.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>. Each element of the CBOR array 'gid' is a CBOR byte string (REQ13), which encodes the Gid of the group for which the group name and the URI to the group-membership resource are requested.</t>
      <t>Upon receiving the Group Name and URI Retrieval Request, the Group Manager processes it as per <xref section="4.2.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>. The success Group Name and URI Retrieval Response is formatted as defined in <xref section="4.2.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>. In particular, each element of the CBOR array 'gid' is a CBOR byte string (REQ13), which encodes the Gid of the group for which the group name and the URI to the group-membership resource are provided.</t>
      <t>For each of its groups, the Group Manager maintains an association between the group name and the URI to the group-membership resource on one hand, and only the current Gid for that group on the other hand. That is, the Group Manager MUST NOT maintain an association between the former pair and any other Gid for that group than the current, most recent one.</t>
      <t><xref target="fig-group-names-req-resp" format="default"/> gives an overview of the exchanges described above, while <xref target="fig-group-names-req-resp-ex" format="default"/> shows an example.</t>
      <figure anchor="fig-group-names-req-resp">
        <name>Message Flow of Group Name and URI Retrieval Request-Response</name>
        <artwork align="center" name="" type="" alt=""><![CDATA[
                                                                Group
Node                                                           Manager
 |                                                                |
 |---- Group Name and URI Retrieval Request: FETCH ace-group/ --->|
 |                                                                |
 |<--- Group Name and URI Retrieval Response: 2.05 (Content) -----|
 |                                                                |
]]></artwork>
      </figure>
      <figure anchor="fig-group-names-req-resp-ex">
        <name>Example of Group Name and URI Retrieval Request-Response</name>
        <artwork name="" type="" align="left" alt=""><![CDATA[
   Request:

   Header: FETCH (Code=0.05)
   Uri-Host: "kdc.example.com"
   Uri-Path: "ace-group"
   Content-Format: "application/ace-groupcomm+cbor"
   Payload (in CBOR diagnostic notation):
     {
       "gid": [h'37fc', h'84bd']
     }

   Response:

   Header: Content (Code=2.05)
   Content-Format: "application/ace-groupcomm+cbor"
   Payload (in CBOR diagnostic notation):
     {
       "gid": [h'37fc', h'84bd'],
       "gname": ["g1", "g2"],
       "guri": ["ace-group/g1", "ace-group/g2"]
     }
]]></artwork>
      </figure>
    </section>
    <section anchor="sec-leave-req" numbered="true" toc="default">
      <name>Leave the Group</name>
      <t>A group member may request to leave the OSCORE group. To this end, the group member sends a Group Leaving Request, as per <xref section="4.8.3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>. In particular, it sends a CoAP DELETE request to the endpoint /ace-group/GROUPNAME/nodes/NODENAME at the Group Manager.</t>
      <t>Upon receiving the Group Leaving Request, the Group Manager processes it as per <xref section="4.8.3" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>. Then, the Group Manager performs the follow-up actions defined in <xref target="sec-leaving" format="default"/>.</t>
    </section>
    <section anchor="sec-leaving" numbered="true" toc="default">
      <name>Removal of a Group Member</name>
      <t>Other than after a spontaneous request to the Group Manager as described in <xref target="sec-leave-req" format="default"/>, a node may be forcibly removed from the OSCORE group, e.g., due to expired or revoked authorization.</t>
      <t>In either case, if the Group Manager reassigns Gid values during the group's lifetime (see <xref section="3.2.1.1" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm" format="default"/>), the Group Manager "forgets" the Birth Gid currently associated with the leaving node in the OSCORE group. This was stored following the Joining Response sent to that node, after its latest (re-)joining of the OSCORE group (see <xref target="ssec-join-resp" format="default"/>).</t>
      <t>If any of the two conditions below holds, the Group Manager MUST inform the leaving node of its eviction as follows. If both conditions hold, the Group Manager MUST inform the leaving node only once, using either of the corresponding methods.</t>
      <ul spacing="normal">
        <li>If, upon joining the group (see <xref target="ssec-join-req-sending" format="default"/>), the leaving node specified a URI in the 'control_uri' parameter defined in <xref section="4.3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>, the Group Manager sends a DELETE request targeting the URI specified in the 'control_uri' parameter (OPT7).</li>
        <li>If, when sending Joining Responses to nodes joining the group (see <xref target="ssec-join-resp" format="default"/>) the Group Manager specifies a URI in the 'control_group_uri' parameter defined in <xref section="4.3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>, the Group Manager sends a DELETE request targeting the URI specified in the 'control_group_uri' parameter (OPT10).</li>
        <li>If the leaving node has been observing the associated resource at ace-group/GROUPNAME/nodes/NODENAME, the Group Manager sends an unsolicited 4.04 (Not Found) error response to the leaving node, as specified in <xref section="4.3.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>.</li>
      </ul>
      <t>If the leaving node has not exclusively the role of monitor, the Group Manager performs the following actions.</t>
      <ul spacing="normal">
        <li>The Group Manager frees the OSCORE Sender ID value of the leaving node. This value MUST NOT become available for possible upcoming joining nodes in the same group, until the group has been rekeyed and assigned a new Group Identifier (Gid).</li>
        <li>The Group Manager MUST add the relinquished Sender ID of the leaving node to the most recent set of stale Sender IDs, in the collection associated with the group (see <xref target="sssec-stale-sender-ids" format="default"/>).</li>
        <li>The Group Manager cancels the association between, on one hand, the authentication credential of the leaving node and, on the other hand, the Gid associated with the OSCORE group together with the freed Sender ID value. The Group Manager deletes the authentication credential of the leaving node, if that authentication credential has no remaining association with any pair (Gid, Sender ID).</li>
      </ul>
      <t>Then, the Group Manager MUST generate updated security parameters and group keying material, and provide it to the remaining group members (see <xref target="sec-group-rekeying-process" format="default"/>). As a consequence, the leaving node is not able to acquire the new security parameters and group keying material distributed after its leaving.</t>
      <t>The same considerations from <xref section="5" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/> apply here as well, considering the Group Manager acting as KDC.</t>
    </section>
    <section anchor="sec-group-rekeying-process" numbered="true" toc="default">
      <name>Group Rekeying Process</name>
      <t>In order to rekey the OSCORE group, the Group Manager distributes a new Group Identifier (Gid), i.e., a new OSCORE ID Context; a new OSCORE Master Secret; and, optionally, a new OSCORE Master Salt for that group. When doing so, the Group Manager MUST increment the version number of the group keying material, before starting its distribution.</t>
      <t>As per <xref section="3.2.1.1" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm" format="default"/>, the Group Manager MAY reassign a Gid to the same group over that group's lifetime, e.g., once the whole space of Gid values has been used for the group in question. If the Group Manager supports reassignment of Gid values and performs it in a group, then the Group Manager additionally takes the following actions.</t>
      <ul spacing="normal">
        <li>Before rekeying the group, the Group Manager MUST check if the new Gid to be distributed coincides with the Birth Gid of any of the current group members (see <xref target="ssec-join-resp" format="default"/>).</li>
        <li>
          <t>If any of such "elder members" is found in the group, the Group Manager MUST evict them from the group. That is, the Group Manager MUST terminate their membership and MUST rekey the group in such a way that the new keying material is not provided to those evicted elder members. This also includes adding their relinquished Sender IDs to the most recent set of stale Sender IDs, in the collection associated with the group (see <xref target="sssec-stale-sender-ids" format="default"/>), before rekeying the group.  </t>
          <t>
Until a further following group rekeying, the Group Manager MUST store the list of those latest-evicted elder members. If any of those nodes re-joins the group before a further following group rekeying occurs, the Group Manager MUST NOT rekey the group upon their re-joining. When one of those nodes re-joins the group, the Group Manager can rely, e.g., on the ongoing secure communication association to recognize the node as included in the stored list.</t>
        </li>
      </ul>
      <t>Across the rekeying execution, the Group Manager MUST preserve the same unchanged OSCORE Sender IDs for all group members intended to remain in the group. This avoids affecting the retrieval of authentication credentials from the Group Manager and the verification of group messages.</t>
      <t>The Group Manager MUST support the "Point-to-Point" group rekeying scheme registered in <xref section="11.14" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>, as per the detailed use defined in <xref target="sending-rekeying-msg" format="default"/> of this document. Future specifications may define how this application profile can use alternative group rekeying schemes, which MUST comply with the functional steps defined in <xref section="3.2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm" format="default"/>. The Group Manager MUST indicate the use of such an alternative group rekeying scheme to joining nodes, by means of the 'group_rekeying' parameter included in Joining Response messages (see <xref target="ssec-join-resp" format="default"/>).</t>
      <t>It is RECOMMENDED that the Group Manager gets confirmation of successful distribution from the group members, and admits a maximum number of individual retransmissions to non-confirming group members. Once completed the group rekeying process, the Group Manager creates a new empty set X' of stale Sender IDs associated with the version of the newly distributed group keying material. Then, the Group Manager MUST add the set X' to the collection of stale Sender IDs associated with the group (see <xref target="sssec-stale-sender-ids" format="default"/>).</t>
      <t>In case the rekeying terminates and some group members have not received the new keying material, they will not be able to correctly process following secured messages exchanged in the group. These group members will eventually contact the Group Manager, in order to retrieve the current keying material and its version.</t>
      <t>Some of these group members may be in multiple groups, each associated with a different Group Manager. When failing to correctly process messages secured with the new keying material, these group members may not have sufficient information to determine which exact Group Manager they should contact, in order to retrieve the current keying material they are missing.</t>
      <t>If the Gid is formatted as described in Appendix C of <xref target="I-D.ietf-core-oscore-groupcomm" format="default"/>, the Group Prefix can be used as a hint to determine the right Group Manager, as long as no collisions among Group Prefixes are experienced. Otherwise, a group member needs to contact the Group Manager of each group, e.g., by first requesting only the version of the current group keying material (see <xref target="sec-version" format="default"/>) and then possibly requesting the current keying material (see <xref target="ssec-updated-key-only" format="default"/>).</t>
      <t>Furthermore, some of these group members can be in multiple groups, all of which associated with the same Group Manager. In this case, these group members may also not have sufficient information to determine which exact group they should refer to, when contacting the right Group Manager. Hence, they need to contact a Group Manager multiple times, i.e., separately for each group they belong to and associated with that Group Manager.</t>
      <t>Finally, <xref target="missed-rekeying" format="default"/> discusses how a group member can realize that it has missed one or more rekeying instances, and the actions it is accordingly required to take.</t>
      <section anchor="sending-rekeying-msg" numbered="true" toc="default">
        <name>Sending Rekeying Messages</name>
        <t>The group rekeying messages MUST have Content-Format set to application/ace-groupcomm+cbor and have the same format used for the Joining Response message in <xref target="ssec-join-resp" format="default"/>, with the following differences. Note that this extends the minimal content of a rekeying message as defined in <xref section="6" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/> (OPT14).</t>
        <ul spacing="normal">
          <li>
            <t>From the Joining Response, only the parameters 'gkty', 'key', 'num', 'exp', and 'ace-groupcomm-profile' are present. In particular, the 'key' parameter includes only the following data.  </t>
            <ul spacing="normal">
              <li>The 'ms' parameter, specifying the new OSCORE Master Secret value. This parameter MUST be present.</li>
              <li>The 'contextId' parameter, specifying the new Gid to use as OSCORE ID Context value. This parameter MUST be present.</li>
              <li>The 'salt' value, specifying the new OSCORE Master Salt value. This parameter MAY be present.</li>
            </ul>
          </li>
          <li>
            <t>The parameter 'stale_node_ids' MUST also be included, with CBOR label defined in <xref target="ssec-iana-ace-groupcomm-parameters-registry" format="default"/>. This parameter is encoded as a CBOR array, where each element is encoded as a CBOR byte string. The CBOR array has to be intended as a set, i.e., the order of its elements is irrelevant. The parameter is populated as follows.  </t>
            <ul spacing="normal">
              <li>The Group Manager creates an empty CBOR array ARRAY.</li>
              <li>The Group Manager considers the collection of stale Sender IDs associated with the group (see <xref target="sssec-stale-sender-ids" format="default"/>), and takes the most recent set X, i.e., the set associated with the current version of the group keying material about to be relinquished.</li>
              <li>For each Sender ID in X, the Group Manager encodes it as a CBOR byte string and adds the result to ARRAY.</li>
              <li>The parameter 'stale_node_ids' takes ARRAY as value.</li>
            </ul>
          </li>
          <li>The parameters 'pub_keys', 'peer_roles' and 'peer_identifiers' SHOULD be present, if the group rekeying is performed due to one or multiple Clients that have requested join the group. Following the same semantics used in the Joining Response message (see <xref target="ssec-join-resp" format="default"/>), the three parameters specify the authentication credential, roles in the group and node identifier of each of the Clients that have requested to join the group. The Group Manager MUST NOT include a non-empty subset of these three parameters.</li>
        </ul>
        <t>The Group Manager separately sends a group rekeying message formatted as defined above to each group member to be rekeyed.</t>
        <t>Each rekeying message MUST be secured with the pairwise secure communication channel between the Group Manager and the group member used during the joining process. In particular, each rekeying message can target the 'control_uri' URI path defined in <xref section="4.3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/> (OPT7), if provided by the intended recipient upon joining the group (see <xref target="ssec-join-req-sending" format="default"/>).</t>
        <t>This distribution approach requires group members to act (also) as servers, in order to correctly handle unsolicited group rekeying messages from the Group Manager. In particular, if a group member and the Group Manager use OSCORE <xref target="RFC8613" format="default"/> to secure their pairwise communications, the group member MUST create a Replay Window in its own Recipient Context upon establishing the OSCORE Security Context with the Group Manager, e.g., by means of the OSCORE profile of ACE <xref target="I-D.ietf-ace-oscore-profile" format="default"/>.</t>
        <t>Group members and the Group Manager SHOULD additionally support alternative distribution approaches that do not require group members to act (also) as servers. A number of such approaches are defined in <xref section="6" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>. In particular, a group member may use CoAP Observe <xref target="RFC7641" format="default"/> and subscribe for updates to the group-membership resource of the group, at the endpoint /ace-group/GROUPNAME/ of the Group Manager (see <xref section="6.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>). Alternatively, a full-fledged Pub-Sub model can be considered <xref target="I-D.ietf-core-coap-pubsub" format="default"/>, where the Group Manager publishes to a rekeying topic hosted at a Broker, while the group members subscribe to such topic (see <xref section="6.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>).</t>
      </section>
      <section anchor="receiving-rekeying-msg" numbered="true" toc="default">
        <name>Receiving Rekeying Messages</name>
        <t>Once received the new group keying material, a group member proceeds as follows.</t>
        <t>The group member considers the stale Sender IDs received from the Group Manager. If the group rekeying scheme defined in <xref target="sending-rekeying-msg" format="default"/> is used, the stale Sender IDs are specified by the 'stale_node_ids' parameter.</t>
        <t>After that, as per <xref section="3.2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm" format="default"/>, the group member MUST remove every authentication credential associated with a stale Sender ID from its list of group members' authentication credentials used in the group, and MUST delete each of its Recipient Contexts used in the group whose corresponding Recipient ID is a stale Sender ID.</t>
        <t>Then, the following cases can occur, based on the version number V' of the new group keying material distributed through the rekeying process. If the group rekeying scheme defined in <xref target="sending-rekeying-msg" format="default"/> is used, this information is specified by the 'num' parameter.</t>
        <ul spacing="normal">
          <li>The group member has not missed any group rekeying. That is, the old keying material stored by the group member has version number V, while the received new keying material has version number V' = (V + 1). In such a case, the group member simply installs the new keying material and derives the corresponding new Security Context.</li>
          <li>The group member has missed one or more group rekeying instances. That is, the old keying material stored by the group member has version number V, while the received new keying material has version number V' &gt; (V + 1). In such a case, the group member MUST proceed as defined in <xref target="missed-rekeying" format="default"/>.</li>
          <li>The group member has received keying material not newer than the stored one. That is, the old keying material stored by the group member has version number V, while the received keying material has version number V' &lt; (V + 1). In such a case, the group member MUST ignore the received rekeying messages and MUST NOT install the received keying material.</li>
        </ul>
      </section>
      <section anchor="missed-rekeying" numbered="true" toc="default">
        <name>Missed Rekeying Instances</name>
        <t>A group member can realize to have missed one or more rekeying instances in one of the ways discussed below. In the following, V denotes the version number of the old keying material stored by the group member, while V' denotes the version number of the latest, possibly just distributed, keying material.</t>
        <t>a. The group member has participated to a rekeying process that has distributed new keying material with version number V' &gt; (V + 1), as discussed in <xref target="receiving-rekeying-msg" format="default"/>.</t>
        <t>b. The group member has obtained the latest keying material from the Group Manager, as a response to a Key Distribution Request (see <xref target="ssec-updated-key-only" format="default"/>) or to a Joining Request when re-joining the group (see <xref target="ssec-join-req-sending" format="default"/>). In particular, V is different than V' specified by the 'num' parameter in the response.</t>
        <t>c. The group member has obtained the authentication credentials of other group members, through a Public Key Request-Response exchange with the Group Manager (see <xref target="sec-pub-keys" format="default"/>). In particular, V is different than V' specified by the 'num' parameter in the response.</t>
        <t>d. The group member has performed a Version Request-Response exchange with the Group Manager (see <xref target="sec-version" format="default"/>). In particular, V is different than V' specified by the 'num' parameter in the response.</t>
        <t>In either case, the group member MUST delete the stored keying material with version number V.</t>
        <t>If case (a) or case (b) applies, the group member MUST perform the following actions.</t>
        <ol spacing="normal" type="1"><li>The group member MUST NOT install the latest keying material yet, in case that was already obtained.</li>
          <li>
            <t>The group member sends a Stale Sender IDs Request to the Group Manager (see <xref target="sec-retrieve-stale-sids" format="default"/>), specifying the version number V as payload of the request.  </t>
            <t>
If the Stale Sender IDs Response from the Group Manager has no payload, the group member MUST remove all the authentication credentials from its list of group members' authentication credentials used in the group, and MUST delete all its Recipient Contexts used in the group.  </t>
            <t>
Otherwise, the group member considers the stale Sender IDs specified in the Stale Sender IDs Response from the Group Manager. Then, the group member MUST remove every authentication credential associated with a stale Sender ID from its list of group members' authentication credentials used in the group, and MUST delete each of its Recipient Contexts used in the group whose corresponding Recipient ID is a stale Sender ID.</t>
          </li>
          <li>The group member installs the latest keying material with version number V' and derives the corresponding new Security Context.</li>
        </ol>
        <t>If case (c) or case (d) applies, the group member SHOULD perform the following actions.</t>
        <ol spacing="normal" type="1"><li>
            <t>The group member sends a Stale Sender IDs Request to the Group Manager (see <xref target="sec-retrieve-stale-sids" format="default"/>), specifying the version number V as payload of the request.  </t>
            <t>
If the Stale Sender IDs Response from the Group Manager has no payload, the group member MUST remove all the authentication credentials from its list of group members' authentication credentials used in the group, and MUST delete all its Recipient Contexts used in the group.  </t>
            <t>
Otherwise, the group member considers the stale Sender IDs specified in the Stale Sender IDs Response from the Group Manager. Then, the group member MUST remove every authentication credential associated with a stale Sender ID from its list of group members' authentication credentials used in the group, and MUST delete each of its Recipient Contexts used in the group whose corresponding Recipient ID is a stale Sender ID.</t>
          </li>
          <li>The group member obtains the latest keying material with version number V' from the Group Manager. This can happen by sending a Key Distribution Request to the Group Manager (see <xref target="ssec-updated-key-only" format="default"/>), or by re-joining the group (see <xref target="ssec-join-req-sending" format="default"/>).</li>
          <li>The group member installs the latest keying material with version number V' and derives the corresponding new Security Context.</li>
        </ol>
        <t>If case (c) or case (d) applies, the group member can alternatively perform the following actions.</t>
        <ol spacing="normal" type="1"><li>The group member re-joins the group (see <xref target="ssec-join-req-sending" format="default"/>). When doing so, the group member MUST re-join with the same roles it currently has in the group, and MUST request the Group Manager for the authentication credentials of all the current group members. That is, the 'get_pub_keys' parameter of the Joining Request MUST be present and MUST be set to the CBOR simple value "null" (0xf6).</li>
          <li>
            <t>When receiving the Joining Response (see <xref target="ssec-join-resp-processing" format="default"/> and <xref target="ssec-join-resp-processing" format="default"/>), the group member retrieves the set Z of authentication credentials specified in the 'pub_keys' parameter.  </t>
            <t>
Then, the group member MUST remove every authentication credential which is not in Z from its list of group members' authentication credentials used in the group, and MUST delete each of its Recipient Contexts used in the group that does not include any of the authentication credentials in Z.</t>
          </li>
          <li>The group member installs the latest keying material with version number V' and derives the corresponding new Security Context.</li>
        </ol>
        <section anchor="sec-retrieve-stale-sids" numbered="true" toc="default">
          <name>Retrieval of Stale Sender IDs</name>
          <t>When realizing to have missed one or more group rekeying instances (see <xref target="missed-rekeying" format="default"/>), a node needs to retrieve from the Group Manager the data required to delete some of its stored group members' authentication credentials and Recipient Contexts (see <xref target="stale-sids-fetch" format="default"/>). This data is provided as an aggregated set of stale Sender IDs, which are used as specified in <xref target="missed-rekeying" format="default"/>.</t>
          <t>In particular, the node sends a CoAP FETCH request to the endpoint /ace-group/GROUPNAME/stale-sids at the Group Manager defined in <xref target="ssec-resource-stale-sids" format="default"/> of this document, where GROUPNAME is the name of the OSCORE group.</t>
          <t>The payload of the Stale Sender IDs Request MUST include a CBOR unsigned integer. This encodes the version number V of the most recent group keying material stored and installed by the requesting client, which is older than the latest, possibly just distributed, keying material with version number V'.</t>
          <t>The handler MUST reply with a 4.00 (Bad Request) error response, if the request is not formatted correctly. Also, the handler MUST respond with a 4.00 (Bad Request) error response, if the specified version number V is greater or equal than the version number V' associated with the latest keying material in the group, i.e., if V &gt;= V'.</t>
          <t>Otherwise, the handler responds with a 2.05 (Content) Stale Sender IDs Response. The payload of the response is formatted as defined below, where SKEW = (V' - V + 1).</t>
          <ul spacing="normal">
            <li>The Group Manager considers ITEMS as the current number of sets stored in the collection of stale Sender IDs associated with the group (see <xref target="sssec-stale-sender-ids" format="default"/>).</li>
            <li>If SKEW &gt; ITEMS, the Stale Sender IDs Response MUST NOT have a payload.</li>
            <li>
              <t>Otherwise, the payload of the Stale Sender IDs Response MUST include a CBOR array, where each element is encoded as a CBOR byte string. The CBOR array has to be intended as a set, i.e., the order of its elements is irrelevant. The Group Manager populates the CBOR array as follows.  </t>
              <ul spacing="normal">
                <li>The Group Manager creates an empty CBOR array ARRAY and an empty set X.</li>
                <li>The Group Manager considers the SKEW most recent sets stored in the collection of stale Sender IDs associated with the group. Note that the most recent set is the one associate to the latest version of the group keying material.</li>
                <li>The Group Manager copies all the Sender IDs from the selected sets into X. When doing so, the Group Manager MUST discard duplicates. That is, the same Sender ID MUST NOT be present more than once in the final content of X.</li>
                <li>For each Sender ID in X, the Group Manager encodes it as a CBOR byte string and adds the result to ARRAY.</li>
                <li>Finally, ARRAY is specified as payload of the Stale Sender IDs Response. Note that ARRAY might result in the empty CBOR array.</li>
              </ul>
            </li>
          </ul>
          <t><xref target="fig-stale-ids-req-resp" format="default"/> gives an overview of the exchange described above,  while <xref target="fig-stale-ids-req-resp-ex" format="default"/> shows an example.</t>
          <figure anchor="fig-stale-ids-req-resp">
            <name>Message Flow of Stale Sender IDs Request-Response</name>
            <artwork align="center" name="" type="" alt=""><![CDATA[
                                                              Group
Node                                                         Manager
  |                                                             |
  |                   Stale Sender IDs Request                  |
  |------------------------------------------------------------>|
  |             FETCH ace-group/GROUPNAME/stale-sids            |
  |                                                             |
  |<---------- Stale Sender IDs Response: 2.05 (Content) -------|
  |                                                             |
]]></artwork>
          </figure>
          <figure anchor="fig-stale-ids-req-resp-ex">
            <name>Example of Stale Sender IDs Request-Response</name>
            <artwork name="" type="" align="left" alt=""><![CDATA[
   Request:

   Header: FETCH (Code=0.05)
   Uri-Host: "kdc.example.com"
   Uri-Path: "ace-group"
   Uri-Path: "g1"
   Uri-Path: "stale-sids"
   Payload (in CBOR diagnostic notation):
     42

   Response:

   Header: Content (Code=2.05)
   Payload (in CBOR diagnostic notation):
     [h'01', h'fc', h'12ab', h'de44', h'ff']
]]></artwork>
          </figure>
        </section>
      </section>
    </section>
    <section anchor="ace-groupcomm-params" numbered="true" toc="default">
      <name>ACE Groupcomm Parameters</name>
      <t>Clients are required to support the new parameters defined in this application profile as specified below (REQ29).</t>
      <ul spacing="normal">
        <li>'group_senderId' MUST be supported by a Client that intends to join an OSCORE group with the role of Requester and/or Responder.</li>
        <li>'ecdh_info' MUST be supported by a Client that intends to join a group which uses the pairwise mode of Group OSCORE.</li>
        <li>'kdc_dh_creds' MUST be supported by a Client that intends to join a group which uses the pairwise mode of Group OSCORE and that does not plan to or cannot rely on an early retrieval of the Group Manager's Diffie-Hellman authentication credential.</li>
        <li>'group_enc_key' MUST be supported by a Client that intends to join a group which uses the group mode of Group OSCORE or to be signature verifier for that group.</li>
        <li>'stale_node_ids' MUST be supported.</li>
      </ul>
      <t>When the conditional parameters defined in <xref section="8" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/> are used with this application profile, Clients must, should or may support them as specified below (REQ30).</t>
      <ul spacing="normal">
        <li>'client_cred', 'cnonce', 'client_cred_verify'. A Client that has an own authentication credential to use in a group MUST support these parameters.</li>
        <li>'kdcchallenge'. A Client that has an own authentication credential to use in a group and that provides the Access Token to the Group Manager through a Token Transfer Request (see <xref target="ssec-token-post" format="default"/>) MUST support this parameter.</li>
        <li>'pub_keys_repo'. This parameter is not relevant for this application profile, since the Group Manager always acts as repository of the group members' authentication credentials.</li>
        <li>'group_policies'. A Client that is interested in the specific policies used in a group, but that does not know them or cannot become aware of them before joining that group SHOULD support this parameter.</li>
        <li>'peer_roles'. A Client MUST support this parameter, since in this application profile it is relevant for Clients to know the roles of the group member associated with each authentication credential.</li>
        <li>'kdc_nonce', 'kdc_cred' and 'kdc_cred_verify'. A Client MUST support these parameters, since the Group Manager's authentication credential is required to process messages protected with Group OSCORE (see Section 4.3 of <xref target="I-D.ietf-core-oscore-groupcomm" format="default"/>).</li>
        <li>'mgt_key_material'. A Client that supports an advanced rekeying scheme possibly used in the group, such as based on one-to-many rekeying messages sent over IP multicast, MUST support this parameter.</li>
        <li>'control_group_uri'. A Client that support the hosting of local resources each associated with a group (hence acting as CoAP server) and the reception of one-to-many requests sent to those resources by the Group Manager (e.g., over IP
multicast) MUST support this parameter.</li>
      </ul>
    </section>
    <section anchor="error-types" numbered="true" toc="default">
      <name>ACE Groupcomm Error Identifiers</name>
      <t>In addition to what is defined in <xref section="9" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>, this application profile defines new values that the Group Manager can include as error identifiers, in the 'error' field of an error response with Content-Format application/ace-groupcomm+cbor.</t>
      <figure anchor="fig-ACE-Groupcomm-Error">
        <name>ACE Groupcomm Error Identifiers</name>
        <artwork align="center" name="" type="" alt=""><![CDATA[
+-------+-------------------------------------------------+
| Value |                   Description                   |
+-------+-------------------------------------------------+
|   7   | Signatures not used in the group                |
+-------+-------------------------------------------------+
|   8   | Operation permitted only to signature verifiers |
+-------+-------------------------------------------------+
|   9   | Group currently not active                      |
+-------+-------------------------------------------------+
]]></artwork>
      </figure>
      <t>A Client supporting the 'error' parameter (see Sections <xref target="I-D.ietf-ace-key-groupcomm" section="4.1.2" sectionFormat="bare" format="default"/> and <xref target="I-D.ietf-ace-key-groupcomm" section="8" sectionFormat="bare" format="default"/> of <xref target="I-D.ietf-ace-key-groupcomm" format="default"/>) and able to understand the specified error may use that information to determine what actions to take next. If it is included in the error response and supported by the Client, the 'error_description' parameter may provide additional context. In particular, the following guidelines apply.</t>
      <ul spacing="normal">
        <li>In case of error 7, the Client should stop sending the request in question to the Group Manager. In this application profile, this error is relevant only for a signature verifiers, in case it tries to access resources related to a pairwise-only group.</li>
        <li>In case of error 8, the Client should stop sending the request in question to the Group Manager.</li>
        <li>In case of error 9, the Client should wait for a certain (pre-configured) amount of time, before trying re-sending its request to the Group Manager.</li>
      </ul>
    </section>
    <section anchor="default-values-for-group-configuration-parameters" numbered="true" toc="default">
      <name>Default Values for Group Configuration Parameters</name>
      <t>This section defines the default values that the Group Manager assumes for the configuration parameters of an OSCORE group, unless differently specified when creating and configuring the group. This can be achieved as specified in <xref target="I-D.ietf-ace-oscore-gm-admin" format="default"/>.</t>
      <section anchor="common" numbered="true" toc="default">
        <name>Common</name>
        <t>This section always applies, as related to common configuration parameters.</t>
        <ul spacing="normal">
          <li>For the HKDF Algorithm 'hkdf', the Group Manager SHOULD use the same default value defined in <xref section="3.2" sectionFormat="of" target="RFC8613" format="default"/>, i.e., HKDF SHA-256 (COSE algorithm encoding: -10).</li>
          <li>
            <t>For the format 'cred_fmt' used for the authentication credentials in the group, the Group Manager SHOULD use CBOR Web Token (CWT) or CWT Claims Set (CCS) <xref target="RFC8392" format="default"/>, i.e., the COSE Header Parameter 'kcwt' and 'kccs', respectively.  </t>
            <t>
[
    These COSE Header Parameters are under pending registration requested by draft-ietf-lake-edhoc.
 ]</t>
          </li>
          <li>For 'max_stale_sets', the Group Manager SHOULD consider N = 3 as the maximum number of stored sets of stale Sender IDs in the collection associated with the group (see <xref target="sssec-stale-sender-ids" format="default"/>).</li>
        </ul>
      </section>
      <section anchor="group-mode" numbered="true" toc="default">
        <name>Group Mode</name>
        <t>This section applies if the group uses (also) the group mode of Group OSCORE.</t>
        <ul spacing="normal">
          <li>For the Signature Encryption Algorithm 'sign_enc_alg' used to encrypted messages protected with the group mode, the Group Manager SHOULD use AES-CCM-16-64-128 (COSE algorithm encoding: 10) as default value.</li>
        </ul>
        <t>The Group Manager SHOULD use the following default values for the Signature Algorithm 'sign_alg' and related parameters 'sign_params', consistently with the "COSE Algorithms" registry <xref target="COSE.Algorithms" format="default"/>, the "COSE Key Types" registry <xref target="COSE.Key.Types" format="default"/> and the "COSE Elliptic Curves" registry <xref target="COSE.Elliptic.Curves" format="default"/>.</t>
        <ul spacing="normal">
          <li>For the Signature Algorithm 'sign_alg' used to sign messages protected with the group mode, the signature algorithm EdDSA <xref target="RFC8032" format="default"/>.</li>
          <li>
            <t>For the parameters 'sign_params' of the Signature Algorithm:  </t>
            <ul spacing="normal">
              <li>The array [[OKP], [OKP, Ed25519]], in case EdDSA is assumed or specified for 'sign_alg'. In particular, this indicates to use the COSE key type OKP and the elliptic curve Ed25519 <xref target="RFC8032" format="default"/>.</li>
              <li>The array [[EC2], [EC2, P-256]], in case ES256 <xref target="RFC6979" format="default"/> is specified for 'sign_alg'. In particular, this indicates to use the COSE key type EC2 and the elliptic curve P-256.</li>
              <li>The array [[EC2], [EC2, P-384]], in case ES384 <xref target="RFC6979" format="default"/> is specified for 'sign_alg'. In particular, this indicates to use the COSE key type EC2 and the elliptic curve P-384.</li>
              <li>The array [[EC2], [EC2, P-521]], in case ES512 <xref target="RFC6979" format="default"/> is specified for 'sign_alg'. In particular, this indicates to use the COSE key type EC2 and the elliptic curve P-521.</li>
              <li>The array [[RSA], [RSA]], in case PS256, PS384 or PS512 <xref target="RFC8017" format="default"/> is specified for 'sign_alg'. In particular, this indicates to use the COSE key type RSA.</li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="pairwise-mode" numbered="true" toc="default">
        <name>Pairwise Mode</name>
        <t>This section applies if the group uses (also) the pairwise mode of Group OSCORE.</t>
        <t>For the AEAD Algorithm 'alg' used to encrypt messages protected with the pairwise mode, the Group Manager SHOULD use the same default value defined in <xref section="3.2" sectionFormat="of" target="RFC8613" format="default"/>, i.e., AES-CCM-16-64-128 (COSE algorithm encoding: 10).</t>
        <t>For the Pairwise Key Agreement Algorithm 'ecdh_alg' and related parameters 'ecdh_params', the Group Manager SHOULD use the following default values, consistently with the "COSE Algorithms" registry <xref target="COSE.Algorithms" format="default"/>, the "COSE Key Types" registry <xref target="COSE.Key.Types" format="default"/> and the "COSE Elliptic Curves" registry <xref target="COSE.Elliptic.Curves" format="default"/>.</t>
        <ul spacing="normal">
          <li>For the Pairwise Key Agreement Algorithm 'ecdh_alg' used to compute static-static Diffie-Hellman shared secrets, the ECDH algorithm ECDH-SS + HKDF-256 specified in <xref section="6.3.1" sectionFormat="of" target="I-D.ietf-cose-rfc8152bis-algs" format="default"/>.</li>
          <li>
            <t>For the parameters 'ecdh_params' of the Pairwise Key Agreement Algorithm:  </t>
            <ul spacing="normal">
              <li>The array [[OKP], [OKP, X25519]], in case EdDSA is assumed or specified for 'sign_alg'. In particular, this indicates to use the COSE key type OKP and the elliptic curve X25519 <xref target="RFC8032" format="default"/>.</li>
              <li>The array [[EC2], [EC2, P-256]], in case ES256 <xref target="RFC6979" format="default"/> is specified for 'sign_alg'. In particular, this indicates to use the COSE key type EC2 and the elliptic curve P-256.</li>
              <li>The array [[EC2], [EC2, P-384]], in case ES384 <xref target="RFC6979" format="default"/> is specified for 'sign_alg'. In particular, this indicates to use the COSE key type EC2 and the elliptic curve P-384.</li>
              <li>The array [[EC2], [EC2, P-521]], in case ES512 <xref target="RFC6979" format="default"/> is specified for 'sign_alg'. In particular, this indicates to use the COSE key type EC2 and the elliptic curve P-521.</li>
            </ul>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="sec-security-considerations" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>Security considerations for this profile are inherited from <xref target="I-D.ietf-ace-key-groupcomm" format="default"/>, the ACE framework for Authentication and Authorization <xref target="I-D.ietf-ace-oauth-authz" format="default"/>, and the specific transport profile of ACE signalled by the AS, such as <xref target="I-D.ietf-ace-dtls-authorize" format="default"/> and <xref target="I-D.ietf-ace-oscore-profile" format="default"/>.</t>
      <t>The following security considerations also apply for this profile.</t>
      <section anchor="ssec-security-considerations-management" numbered="true" toc="default">
        <name>Management of OSCORE Groups</name>
        <t>This profile leverages the following management aspects related to OSCORE groups and discussed in the sections of <xref target="I-D.ietf-core-oscore-groupcomm" format="default"/> referred below.</t>
        <ul spacing="normal">
          <li>Management of group keying material (see <xref section="3.2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm" format="default"/>). The Group Manager is responsible for the renewal and re-distribution of the keying material in the groups of its competence (rekeying). According to the specific application requirements, this can include rekeying the group upon changes in its membership. In particular, renewing the group keying material is required upon a new node's joining or a current node's leaving, in case backward security and forward security have to be preserved, respectively.</li>
          <li>Provisioning and retrieval of authentication credentials (see <xref section="3" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm" format="default"/>). The Group Manager acts as repository of authentication credentials of group members, and provides them upon request.</li>
          <li>Synchronization of sequence numbers (see <xref section="6.3" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm" format="default"/>). This concerns how a responder node that has just joined an OSCORE group can synchronize with the sequence number of requesters in the same group.</li>
        </ul>
        <t>Before sending the Joining Response, the Group Manager MUST verify that the joining node actually owns the associated private key. To this end, the Group Manager can rely on the proof-of-possession challenge-response defined in <xref target="sec-joining-node-to-GM" format="default"/>.</t>
        <t>Alternatively, when establishing a secure communication association with the Group Manager, the joining node can provide the Group Manager with its own authentication credential, and use the public key included thereof as asymmetric proof-of-possession key, e.g., as in <xref section="3.2.2" sectionFormat="of" target="I-D.ietf-ace-dtls-authorize" format="default"/> in case the joining node authenticates itself during the DTLS handshake with the the Group Manager. However, this requires the authentication credential to be in the format used in the OSCORE group, and that both the authentication credential and the included public key are compatible with the signature or ECDH algorithm, and possible associated parameters used in the OSCORE group.</t>
        <t>A node may have joined multiple OSCORE groups under different non-synchronized Group Managers. Therefore, it can happen that those OSCORE groups have the same Group Identifier (Gid). It follows that, upon receiving a Group OSCORE message addressed to one of those groups, the node would have multiple Security Contexts matching with the Gid in the incoming message. It is up to the application to decide how to handle such collisions of Group Identifiers, e.g., by trying to process the incoming message using one Security Context at the time until the right one is found.</t>
      </section>
      <section anchor="ssec-security-considerations-challenges" numbered="true" toc="default">
        <name>Size of Nonces as Proof-of-Possesion Challenge</name>
        <t>With reference to the Joining Request message in <xref target="ssec-join-req-sending" format="default"/>, the proof-of-possession (PoP) evidence included in 'client_cred_verify' is computed over an input including also N_C | N_S, where | denotes concatenation.</t>
        <t>For the N_C challenge, it is RECOMMENDED to use a 8-byte long random nonce. Furthermore, N_C is always conveyed in the 'cnonce' parameter of the Joining Request, which is always sent over the secure communication channel between the joining node and the Group Manager.</t>
        <t>As defined in <xref target="sssec-challenge-value" format="default"/>, the way the N_S value is computed depends on the particular way the joining node provides the Group Manager with the Access Token, as well as on following interactions between the two.</t>
        <ul spacing="normal">
          <li>If the Access Token has not been provided to the Group Manager by means of a Token Transfer Request to the /authz-info endpoint as in <xref target="ssec-token-post" format="default"/>, then N_S is computed as a 32-byte long challenge. For an example, see point (2) of <xref target="sssec-challenge-value" format="default"/>.</li>
          <li>If the Access Token has been provided to the Group Manager by means of a Token Transfer Request to the /authz-info endpoint as in <xref target="ssec-token-post" format="default"/>, then N_S takes the most recent value provided to the client by the Group Manager in the 'kdcchallenge' parameter, as specified in point (1) of <xref target="sssec-challenge-value" format="default"/>. This is provided either in the Token Transfer Response (see <xref target="ssec-token-post" format="default"/>), or in a 4.00 (Bad Request) error response to a following Joining Request (see <xref target="ssec-join-req-processing" format="default"/>). In either case, it is RECOMMENDED to use a 8-byte long random challenge as value for N_S.</li>
        </ul>
        <t>If we consider both N_C and N_S to take 8-byte long values, the following considerations hold.</t>
        <ul spacing="normal">
          <li>Let us consider both N_C and N_S as taking random values, and the Group Manager to never change the value of the N_S provided to a Client during the lifetime of an Access Token. Then, as per the birthday paradox, the average collision for N_S will happen after 2^32 new transferred Access Tokens, while the average collision for N_C will happen after 2^32 new Joining Requests. This amounts to considerably more token provisionings than the expected new joinings of OSCORE groups under a same Group Manager, as well as to considerably more requests to join OSCORE groups from a same Client using a same Access Token under a same Group Manager.</li>
          <li>
            <xref section="7" sectionFormat="of" target="I-D.ietf-ace-oscore-profile" format="default"/> as well <xref section="B.2" sectionFormat="of" target="RFC8613" format="default"/> recommend the use of 8-byte random values as well. Unlike in those cases, the values of N_C and N_S considered in this document are not used for as sensitive operations as the derivation of a Security Context, and thus do not have possible implications in the security of AEAD ciphers.</li>
        </ul>
      </section>
      <section anchor="ssec-security-considerations-reusage-nonces" numbered="true" toc="default">
        <name>Reusage of Nonces for Proof-of-Possession Input</name>
        <t>As long as the Group Manager preserves the same N_S value currently associated with an Access Token, i.e., the latest value provided to a Client in a 'kdcchallenge' parameter, the Client is able to successfully reuse the same proof-of-possession (PoP) input for multiple Joining Requests to that Group Manager.</t>
        <t>In particular, the Client can reuse the same N_C value for every Joining Request to the Group Manager, and combine it with the same unchanged N_S value. This results in reusing the same PoP input for producing the PoP evidence to include in the 'client_cred_verify' parameter of the Joining Requests.</t>
        <t>Unless the Group Manager maintains a list of N_C values already used by that Client since the latest update to the N_S value associated with the Access Token, the Group Manager can be forced to falsely believe that the Client possesses its own private key at that point in time, upon verifying the PoP evidence in the 'client_cred_verify' parameter.</t>
      </section>
    </section>
    <section anchor="sec-iana" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>Note to RFC Editor: Please replace all occurrences of "[[This document]]" with the RFC number of this specification and delete this paragraph.</t>
      <t>This document has the following actions for IANA.</t>
      <section anchor="iana-kinfo" numbered="true" toc="default">
        <name>OAuth Parameters</name>
        <t>IANA is asked to register the following entries to the "OAuth Parameters" registry, as per the procedure specified in <xref section="11.2" sectionFormat="of" target="RFC6749" format="default"/>.</t>
        <ul spacing="normal">
          <li>Parameter name: ecdh_info</li>
          <li>Parameter usage location: client-rs request, rs-client response</li>
          <li>Change Controller: IESG</li>
          <li>Specification Document(s): [[This specification]]</li>
        </ul>
        <t>&nbsp;</t>
        <ul spacing="normal">
          <li>Parameter name: kdc_dh_creds</li>
          <li>Parameter usage location: client-rs request, rs-client response</li>
          <li>Change Controller: IESG</li>
          <li>Specification Document(s): [[This specification]]</li>
        </ul>
      </section>
      <section anchor="iana-kinfo-map" numbered="true" toc="default">
        <name>OAuth Parameters CBOR Mappings</name>
        <t>IANA is asked to register the following entries to the "OAuth Parameters CBOR Mappings" registry, as per the procedure specified in <xref section="8.10" sectionFormat="of" target="I-D.ietf-ace-oauth-authz" format="default"/>.</t>
        <ul spacing="normal">
          <li>Name: ecdh_info</li>
          <li>CBOR Key: TBD (range -256 to 255)</li>
          <li>Value Type: Simple value "null" / array</li>
          <li>Reference: [[This specification]]</li>
        </ul>
        <t>&nbsp;</t>
        <ul spacing="normal">
          <li>Name: kdc_dh_creds</li>
          <li>CBOR Key: TBD (range -256 to 255)</li>
          <li>Value Type: Simple value "null" / array</li>
          <li>Reference: [[This specification]]</li>
        </ul>
      </section>
      <section anchor="ssec-iana-ace-groupcomm-parameters-registry" numbered="true" toc="default">
        <name>ACE Groupcomm Parameters</name>
        <t>IANA is asked to register the following entry to the "ACE Groupcomm Parameters" registry defined in <xref section="11.7" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>.</t>
        <ul spacing="normal">
          <li>Name: group_senderId</li>
          <li>CBOR Key: TBD</li>
          <li>CBOR Type: Byte string</li>
          <li>Reference: [[This document]] (<xref target="sec-new-key" format="default"/>)</li>
        </ul>
        <t>&nbsp;</t>
        <ul spacing="normal">
          <li>Name: ecdh_info</li>
          <li>CBOR Key: TBD</li>
          <li>CBOR Type: Array</li>
          <li>Reference: [[This document]] (<xref target="ssec-join-req-processing" format="default"/>)</li>
        </ul>
        <t>&nbsp;</t>
        <ul spacing="normal">
          <li>Name: kdc_dh_creds</li>
          <li>CBOR Key: TBD</li>
          <li>CBOR Type: Array</li>
          <li>Reference: [[This document]] (<xref target="ssec-join-req-processing" format="default"/>)</li>
        </ul>
        <t>&nbsp;</t>
        <ul spacing="normal">
          <li>Name: group_enc_key</li>
          <li>CBOR Key: TBD</li>
          <li>CBOR Type: Byte String</li>
          <li>Reference: [[This document]] (<xref target="verif-data-get" format="default"/>)</li>
        </ul>
        <t>&nbsp;</t>
        <ul spacing="normal">
          <li>Name: stale_node_ids</li>
          <li>CBOR Key: TBD</li>
          <li>CBOR Type: Array</li>
          <li>Reference: [[This document]] (<xref target="sec-group-rekeying-process" format="default"/>)</li>
        </ul>
      </section>
      <section anchor="ssec-iana-groupcomm-keys-registry" numbered="true" toc="default">
        <name>ACE Groupcomm Key Types</name>
        <t>IANA is asked to register the following entry to the "ACE Groupcomm Key Types" registry defined in <xref section="11.8" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>.</t>
        <ul spacing="normal">
          <li>Name: Group_OSCORE_Input_Material object</li>
          <li>Key Type Value: GROUPCOMM_KEY_TBD</li>
          <li>Profile: "coap_group_oscore_app", defined in <xref target="ssec-iana-groupcomm-profile-registry" format="default"/> of this document.</li>
          <li>Description: A Group_OSCORE_Input_Material object encoded as described in <xref target="ssec-join-resp" format="default"/> of this document.</li>
          <li>Reference: [[This document]] (<xref target="ssec-join-resp" format="default"/>)</li>
        </ul>
      </section>
      <section anchor="ssec-iana-groupcomm-profile-registry" numbered="true" toc="default">
        <name>ACE Groupcomm Profiles</name>
        <t>IANA is asked to register the following entry to the "ACE Groupcomm Profiles" registry defined in <xref section="11.9" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>.</t>
        <ul spacing="normal">
          <li>Name: coap_group_oscore_app</li>
          <li>Description: Application profile to provision keying material for participating in group communication protected with Group OSCORE as per <xref target="I-D.ietf-core-oscore-groupcomm" format="default"/>.</li>
          <li>CBOR Value: PROFILE_TBD</li>
          <li>Reference: [[This document]] (<xref target="ssec-join-resp" format="default"/>)</li>
        </ul>
      </section>
      <section anchor="ssec-iana-security-context-parameter-registry" numbered="true" toc="default">
        <name>OSCORE Security Context Parameters</name>
        <t>IANA is asked to register the following entries in the "OSCORE Security Context Parameters" registry defined in <xref section="9.4" sectionFormat="of" target="I-D.ietf-ace-oscore-profile" format="default"/>.</t>
        <ul spacing="normal">
          <li>Name: group_SenderId</li>
          <li>CBOR Label: TBD</li>
          <li>CBOR Type: bstr</li>
          <li>Registry: -</li>
          <li>Description: OSCORE Sender ID assigned to a member of an OSCORE group</li>
          <li>Reference: [[This document]] (<xref target="ssec-join-resp" format="default"/>)</li>
        </ul>
        <t>&nbsp;</t>
        <ul spacing="normal">
          <li>Name: cred_fmt</li>
          <li>CBOR Label: TBD</li>
          <li>CBOR Type: integer</li>
          <li>Registry: COSE Header Parameters</li>
          <li>Description: Format of authentication credentials to be used in the OSCORE group</li>
          <li>Reference: [[This document]] (<xref target="ssec-join-resp" format="default"/>)</li>
        </ul>
        <t>&nbsp;</t>
        <ul spacing="normal">
          <li>Name: sign_enc_alg</li>
          <li>CBOR Label: TBD</li>
          <li>CBOR Type: tstr / int</li>
          <li>Registry: COSE Algorithms</li>
          <li>Description: OSCORE Signature Encryption Algorithm Value</li>
          <li>Reference: [[This document]] (<xref target="ssec-join-resp" format="default"/>)</li>
        </ul>
        <t>&nbsp;</t>
        <ul spacing="normal">
          <li>Name: sign_alg</li>
          <li>CBOR Label: TBD</li>
          <li>CBOR Type: tstr / int</li>
          <li>Registry: COSE Algorithms</li>
          <li>Description: OSCORE Signature Algorithm Value</li>
          <li>Reference: [[This document]] (<xref target="ssec-join-resp" format="default"/>)</li>
        </ul>
        <t>&nbsp;</t>
        <ul spacing="normal">
          <li>Name: sign_params</li>
          <li>CBOR Label: TBD</li>
          <li>CBOR Type: array</li>
          <li>Registry: COSE Algorithms, COSE Key Types, COSE Elliptic Curves</li>
          <li>Description: OSCORE Signature Algorithm Parameters</li>
          <li>Reference: [[This document]] (<xref target="ssec-join-resp" format="default"/>)</li>
        </ul>
        <t>&nbsp;</t>
        <ul spacing="normal">
          <li>Name: ecdh_alg</li>
          <li>CBOR Label: TBD</li>
          <li>CBOR Type: tstr / int</li>
          <li>Registry: COSE Algorithms</li>
          <li>Description: OSCORE Pairwise Key Agreement Algorithm Value</li>
          <li>Reference: [[This document]] (<xref target="ssec-join-resp" format="default"/>)</li>
        </ul>
        <t>&nbsp;</t>
        <ul spacing="normal">
          <li>Name: ecdh_params</li>
          <li>CBOR Label: TBD</li>
          <li>CBOR Type: array</li>
          <li>Registry: COSE Algorithms, COSE Key Types, COSE Elliptic Curves</li>
          <li>Description: OSCORE Pairwise Key Agreement Algorithm Parameters</li>
          <li>Reference: [[This document]] (<xref target="ssec-join-resp" format="default"/>)</li>
        </ul>
      </section>
      <section anchor="ssec-iana-tls-esporter-label-registry" numbered="true" toc="default">
        <name>TLS Exporter Labels</name>
        <t>IANA is asked to register the following entry to the "TLS Exporter Labels" registry defined in <xref section="6" sectionFormat="of" target="RFC5705" format="default"/> and updated in <xref section="12" sectionFormat="of" target="RFC8447" format="default"/>.</t>
        <ul spacing="normal">
          <li>Value: EXPORTER-ACE-Sign-Challenge-coap-group-oscore-app</li>
          <li>DTLS-OK: Y</li>
          <li>Recommended: N</li>
          <li>Reference: [[This document]] (<xref target="sssec-challenge-value" format="default"/>)</li>
        </ul>
      </section>
      <section anchor="ssec-iana-AIF-registry" numbered="true" toc="default">
        <name>AIF</name>
        <t>For the media-types application/aif+cbor and application/aif+json defined in <xref section="5.1" sectionFormat="of" target="I-D.ietf-ace-aif" format="default"/>, IANA is requested to register the following entries for the two media-type parameters Toid and Tperm, in the respective sub-registry defined in <xref section="5.2" sectionFormat="of" target="I-D.ietf-ace-aif" format="default"/> within the "MIME Media Type Sub-Parameter" registry group.</t>
        <ul spacing="normal">
          <li>Name: oscore-group-name</li>
          <li>Description/Specification: group name of an OSCORE group</li>
          <li>Reference: [[This document]]</li>
        </ul>
        <t>&nbsp;</t>
        <ul spacing="normal">
          <li>Name: oscore-group-roles</li>
          <li>Description/Specification: role(s) in the OSCORE group</li>
          <li>Reference: [[This document]]</li>
        </ul>
      </section>
      <section anchor="ssec-iana-coap-content-format-registry" numbered="true" toc="default">
        <name>CoAP Content-Format</name>
        <t>IANA is asked to register the following entries to the "CoAP Content-Formats" registry within the "Constrained RESTful Environments (CoRE) Parameters" registry group.</t>
        <ul spacing="normal">
          <li>Media Type: application/aif+cbor;Toid="oscore-group-name",Tperm="oscore-group-roles"</li>
          <li>Encoding: -</li>
          <li>ID: TBD</li>
          <li>Reference: [[This document]]</li>
        </ul>
        <t>&nbsp;</t>
        <ul spacing="normal">
          <li>Media Type: application/aif+json;Toid="oscore-group-name",Tperm="oscore-group-roles"</li>
          <li>Encoding: -</li>
          <li>ID: TBD</li>
          <li>Reference: [[This document]]</li>
        </ul>
      </section>
      <section anchor="ssec-iana-group-oscore-roles-registry" numbered="true" toc="default">
        <name>Group OSCORE Roles</name>
        <t>This document establishes the IANA "Group OSCORE Roles" registry. The registry has been created to use the "Expert Review" registration procedure <xref target="RFC8126" format="default"/>. Expert review guidelines are provided in <xref target="ssec-iana-expert-review" format="default"/>.</t>
        <t>This registry includes the possible roles that nodes can take in an OSCORE group, each in combination with a numeric identifier. These numeric identifiers are used to express authorization information about joining OSCORE groups, as specified in <xref target="sec-format-scope" format="default"/> of [[This document]].</t>
        <t>The columns of this registry are:</t>
        <ul spacing="normal">
          <li>Name: A value that can be used in documents for easier comprehension, to identify a possible role that nodes can take in an OSCORE group.</li>
          <li>Value: The numeric identifier for this role. Integer values greater than 65535 are marked as "Private Use", all other values use the registration policy "Expert Review" <xref target="RFC8126" format="default"/>.</li>
          <li>Description: This field contains a brief description of the role.</li>
          <li>Reference: This contains a pointer to the public specification for the role.</li>
        </ul>
        <t>This registry will be initially populated by the values in <xref target="fig-role-values" format="default"/>.</t>
        <t>The Reference column for all of these entries will be [[This document]].</t>
      </section>
      <section anchor="iana-rt" numbered="true" toc="default">
        <name>CoRE Resource Type</name>
        <t>IANA is asked to register the following entry in the "Resource Type (rt=) Link Target Attribute Values" registry within the "Constrained Restful Environments (CoRE) Parameters" registry group.</t>
        <ul spacing="normal">
          <li>Value: "core.osc.gm"</li>
          <li>Description: Group-membership resource of an OSCORE Group Manager.</li>
          <li>Reference: [[This document]]</li>
        </ul>
        <t>Client applications can use this resource type to discover a group membership resource at an OSCORE Group Manager, where to send a request for joining the corresponding OSCORE group.</t>
      </section>
      <section anchor="iana-scope-semantics" numbered="true" toc="default">
        <name>ACE Scope Semantics</name>
        <t>IANA is asked to register the following entry in the "ACE Scope Semantics" registry defined in <xref section="11.12" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>.</t>
        <ul spacing="normal">
          <li>Value: SEM_ID_TBD</li>
          <li>Description: Membership and key management operations at the ACE Group Manager for Group OSCORE.</li>
          <li>Reference: [[This document]]</li>
        </ul>
      </section>
      <section anchor="iana-ace-groupcomm-errors" numbered="true" toc="default">
        <name>ACE Groupcomm Errors</name>
        <t>IANA is asked to register the following entry in the "ACE Groupcomm Errors" registry defined in <xref section="11.13" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>.</t>
        <ul spacing="normal">
          <li>Value: 7</li>
          <li>Description: Signatures not used in the group.</li>
          <li>Reference: [[This document]]</li>
        </ul>
        <t>&nbsp;</t>
        <ul spacing="normal">
          <li>Value: 8</li>
          <li>Description: Operation permitted only to signature verifiers.</li>
          <li>Reference: [[This document]]</li>
        </ul>
        <t>&nbsp;</t>
        <ul spacing="normal">
          <li>Value: 9</li>
          <li>Description: Group currently not active.</li>
          <li>Reference: [[This document]]</li>
        </ul>
      </section>
      <section anchor="ssec-iana-expert-review" numbered="true" toc="default">
        <name>Expert Review Instructions</name>
        <t>The IANA registry established in this document is defined as "Expert Review".  This section gives some general guidelines for what the experts should be looking for, but they are being designated as experts for a reason so they should be given substantial latitude.</t>
        <t>Expert reviewers should take into consideration the following points:</t>
        <ul spacing="normal">
          <li>
            <t>Clarity and correctness of registrations. Experts are expected to check the clarity of purpose and use of the requested entries. Experts should inspect the entry for the considered role, to verify the correctness of its description against the role as intended in the specification that defined it. Expert should consider requesting an opinion on the correctness of registered parameters from the Authentication and Authorization for Constrained Environments (ACE) Working Group and the Constrained RESTful Environments (CoRE) Working Group.  </t>
            <t>
Entries that do not meet these objective of clarity and completeness should not be registered.</t>
          </li>
          <li>Duplicated registration and point squatting should be discouraged. Reviewers are encouraged to get sufficient information for registration requests to ensure that the usage is not going to duplicate one that is already registered and that the point is likely to be used in deployments.</li>
          <li>Experts should take into account the expected usage of roles when approving point assignment. Given a 'Value' V as code point, the length of the encoding of (2^(V+1) - 1) should be weighed against the usage of the entry, considering the resources and capabilities of devices it will be used on. Additionally, given a 'Value' V as code point, the length of the encoding of (2^(V+1) - 1) should be weighed against how many code points resulting in that encoding length are left, and the resources and capabilities of devices it will be used on.</li>
          <li>Specifications are recommended. When specifications are not provided, the description provided needs to have sufficient information to verify the points above.</li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author initials="S." surname="Bradner" fullname="S. Bradner">
              <organization/>
            </author>
            <date year="1997" month="March"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC5705" target="https://www.rfc-editor.org/info/rfc5705" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.5705.xml">
          <front>
            <title>Keying Material Exporters for Transport Layer Security (TLS)</title>
            <author initials="E." surname="Rescorla" fullname="E. Rescorla">
              <organization/>
            </author>
            <date year="2010" month="March"/>
            <abstract>
              <t>A number of protocols wish to leverage Transport Layer Security (TLS) to perform key establishment but then use some of the keying material for their own purposes.  This document describes a general mechanism for allowing that.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5705"/>
          <seriesInfo name="DOI" value="10.17487/RFC5705"/>
        </reference>
        <reference anchor="RFC6838" target="https://www.rfc-editor.org/info/rfc6838" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6838.xml">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author initials="N." surname="Freed" fullname="N. Freed">
              <organization/>
            </author>
            <author initials="J." surname="Klensin" fullname="J. Klensin">
              <organization/>
            </author>
            <author initials="T." surname="Hansen" fullname="T. Hansen">
              <organization/>
            </author>
            <date year="2013" month="January"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols.  This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
        <reference anchor="RFC6979" target="https://www.rfc-editor.org/info/rfc6979" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6979.xml">
          <front>
            <title>Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA)</title>
            <author initials="T." surname="Pornin" fullname="T. Pornin">
              <organization/>
            </author>
            <date year="2013" month="August"/>
            <abstract>
              <t>This document defines a deterministic digital signature generation procedure.  Such signatures are compatible with standard Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA) digital signatures and can be processed with unmodified verifiers, which need not be aware of the procedure described therein.  Deterministic signatures retain the cryptographic security features associated with digital signatures but can be more easily implemented in various environments, since they do not need access to a source of high-quality randomness.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6979"/>
          <seriesInfo name="DOI" value="10.17487/RFC6979"/>
        </reference>
        <reference anchor="RFC7252" target="https://www.rfc-editor.org/info/rfc7252" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7252.xml">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author initials="Z." surname="Shelby" fullname="Z. Shelby">
              <organization/>
            </author>
            <author initials="K." surname="Hartke" fullname="K. Hartke">
              <organization/>
            </author>
            <author initials="C." surname="Bormann" fullname="C. Bormann">
              <organization/>
            </author>
            <date year="2014" month="June"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks.  The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s.  The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types.  CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC7748" target="https://www.rfc-editor.org/info/rfc7748" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7748.xml">
          <front>
            <title>Elliptic Curves for Security</title>
            <author initials="A." surname="Langley" fullname="A. Langley">
              <organization/>
            </author>
            <author initials="M." surname="Hamburg" fullname="M. Hamburg">
              <organization/>
            </author>
            <author initials="S." surname="Turner" fullname="S. Turner">
              <organization/>
            </author>
            <date year="2016" month="January"/>
            <abstract>
              <t>This memo specifies two elliptic curves over prime fields that offer a high level of practical security in cryptographic applications, including Transport Layer Security (TLS).  These curves are intended to operate at the ~128-bit and ~224-bit security level, respectively, and are generated deterministically based on a list of required properties.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7748"/>
          <seriesInfo name="DOI" value="10.17487/RFC7748"/>
        </reference>
        <reference anchor="RFC8017" target="https://www.rfc-editor.org/info/rfc8017" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8017.xml">
          <front>
            <title>PKCS #1: RSA Cryptography Specifications Version 2.2</title>
            <author initials="K." surname="Moriarty" fullname="K. Moriarty" role="editor">
              <organization/>
            </author>
            <author initials="B." surname="Kaliski" fullname="B. Kaliski">
              <organization/>
            </author>
            <author initials="J." surname="Jonsson" fullname="J. Jonsson">
              <organization/>
            </author>
            <author initials="A." surname="Rusch" fullname="A. Rusch">
              <organization/>
            </author>
            <date year="2016" month="November"/>
            <abstract>
              <t>This document provides recommendations for the implementation of public-key cryptography based on the RSA algorithm, covering cryptographic primitives, encryption schemes, signature schemes with appendix, and ASN.1 syntax for representing keys and for identifying the schemes.</t>
              <t>This document represents a republication of PKCS #1 v2.2 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series.  By publishing this RFC, change control is transferred to the IETF.</t>
              <t>This document also obsoletes RFC 3447.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8017"/>
          <seriesInfo name="DOI" value="10.17487/RFC8017"/>
        </reference>
        <reference anchor="RFC8032" target="https://www.rfc-editor.org/info/rfc8032" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8032.xml">
          <front>
            <title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
            <author initials="S." surname="Josefsson" fullname="S. Josefsson">
              <organization/>
            </author>
            <author initials="I." surname="Liusvaara" fullname="I. Liusvaara">
              <organization/>
            </author>
            <date year="2017" month="January"/>
            <abstract>
              <t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA).  The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves.  An example implementation and test vectors are provided.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8032"/>
          <seriesInfo name="DOI" value="10.17487/RFC8032"/>
        </reference>
        <reference anchor="RFC8126" target="https://www.rfc-editor.org/info/rfc8126" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8126.xml">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author initials="M." surname="Cotton" fullname="M. Cotton">
              <organization/>
            </author>
            <author initials="B." surname="Leiba" fullname="B. Leiba">
              <organization/>
            </author>
            <author initials="T." surname="Narten" fullname="T. Narten">
              <organization/>
            </author>
            <date year="2017" month="June"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters.  To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper.  For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed.  This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author initials="B." surname="Leiba" fullname="B. Leiba">
              <organization/>
            </author>
            <date year="2017" month="May"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8446.xml">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author initials="E." surname="Rescorla" fullname="E. Rescorla">
              <organization/>
            </author>
            <date year="2018" month="August"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8447" target="https://www.rfc-editor.org/info/rfc8447" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8447.xml">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author initials="J." surname="Salowey" fullname="J. Salowey">
              <organization/>
            </author>
            <author initials="S." surname="Turner" fullname="S. Turner">
              <organization/>
            </author>
            <date year="2018" month="August"/>
            <abstract>
              <t>This document describes a number of changes to TLS and DTLS IANA registries that range from adding notes to the registry all the way to changing the registration policy.  These changes were mostly motivated by WG review of the TLS- and DTLS-related registries undertaken as part of the TLS 1.3 development process.</t>
              <t>This document updates the following RFCs: 3749, 5077, 4680, 5246, 5705, 5878, 6520, and 7301.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8447"/>
          <seriesInfo name="DOI" value="10.17487/RFC8447"/>
        </reference>
        <reference anchor="RFC8610" target="https://www.rfc-editor.org/info/rfc8610" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8610.xml">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author initials="H." surname="Birkholz" fullname="H. Birkholz">
              <organization/>
            </author>
            <author initials="C." surname="Vigano" fullname="C. Vigano">
              <organization/>
            </author>
            <author initials="C." surname="Bormann" fullname="C. Bormann">
              <organization/>
            </author>
            <date year="2019" month="June"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049).  Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC8613" target="https://www.rfc-editor.org/info/rfc8613" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8613.xml">
          <front>
            <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author initials="G." surname="Selander" fullname="G. Selander">
              <organization/>
            </author>
            <author initials="J." surname="Mattsson" fullname="J. Mattsson">
              <organization/>
            </author>
            <author initials="F." surname="Palombini" fullname="F. Palombini">
              <organization/>
            </author>
            <author initials="L." surname="Seitz" fullname="L. Seitz">
              <organization/>
            </author>
            <date year="2019" month="July"/>
            <abstract>
              <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE).  OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
              <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration.  Therefore, this document updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8613"/>
          <seriesInfo name="DOI" value="10.17487/RFC8613"/>
        </reference>
        <reference anchor="RFC8742" target="https://www.rfc-editor.org/info/rfc8742" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8742.xml">
          <front>
            <title>Concise Binary Object Representation (CBOR) Sequences</title>
            <author initials="C." surname="Bormann" fullname="C. Bormann">
              <organization/>
            </author>
            <date year="2020" month="February"/>
            <abstract>
              <t>This document describes the Concise Binary Object Representation (CBOR) Sequence format and associated media type "application/cbor-seq".  A CBOR Sequence consists of any number of encoded CBOR data items, simply concatenated in sequence.</t>
              <t>Structured syntax suffixes for media types allow other media types to build on them and make it explicit that they are built on an existing media type as their foundation.  This specification defines and registers "+cbor-seq" as a structured syntax suffix for CBOR Sequences.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8742"/>
          <seriesInfo name="DOI" value="10.17487/RFC8742"/>
        </reference>
        <reference anchor="RFC8949" target="https://www.rfc-editor.org/info/rfc8949" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8949.xml">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author initials="C." surname="Bormann" fullname="C. Bormann">
              <organization/>
            </author>
            <author initials="P." surname="Hoffman" fullname="P. Hoffman">
              <organization/>
            </author>
            <date year="2020" month="December"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049.  It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="I-D.ietf-ace-aif" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-ace-aif.xml" target="https://www.ietf.org/archive/id/draft-ietf-ace-aif-06.txt">
          <front>
            <title>An Authorization Information Format (AIF) for ACE</title>
            <author fullname="Carsten Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date month="March" day="4" year="2022"/>
            <abstract>
              <t>   Information about which entities are authorized to perform what
   operations on which constituents of other entities is a crucial
   component of producing an overall system that is secure.  Conveying
   precise authorization information is especially critical in highly
   automated systems with large numbers of entities, such as the
   "Internet of Things".

   This specification provides a generic information model and format
   for representing such authorization information, as well as two
   variants of a specific instantiation of that format for use with REST
   resources identified by URI path.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-aif-06"/>
        </reference>
        <reference anchor="I-D.ietf-cose-rfc8152bis-struct" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-cose-rfc8152bis-struct.xml" target="https://www.ietf.org/archive/id/draft-ietf-cose-rfc8152bis-struct-15.txt">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="Jim Schaad">
              <organization>August Cellars</organization>
            </author>
            <date month="February" day="1" year="2021"/>
            <abstract>
              <t>   Concise Binary Object Representation (CBOR) is a data format designed
   for small code size and small message size.  There is a need for the
   ability to have basic security services defined for this data format.
   This document defines the CBOR Object Signing and Encryption (COSE)
   protocol.  This specification describes how to create and process
   signatures, message authentication codes, and encryption using CBOR
   for serialization.  This specification additionally describes how to
   represent cryptographic keys using CBOR.

   This document along with [I-D.ietf-cose-rfc8152bis-algs] obsoletes
   RFC8152.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-rfc8152bis-struct-15"/>
        </reference>
        <reference anchor="I-D.ietf-cose-rfc8152bis-algs" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-cose-rfc8152bis-algs.xml" target="https://www.ietf.org/archive/id/draft-ietf-cose-rfc8152bis-algs-12.txt">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
            <author fullname="Jim Schaad">
              <organization>August Cellars</organization>
            </author>
            <date month="September" day="24" year="2020"/>
            <abstract>
              <t>   Concise Binary Object Representation (CBOR) is a data format designed
   for small code size and small message size.  There is a need for the
   ability to have basic security services defined for this data format.
   THis document defines a set of algorithms that can be used with the
   CBOR Object Signing and Encryption (COSE) protocol RFC XXXX.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-rfc8152bis-algs-12"/>
        </reference>
        <reference anchor="I-D.ietf-core-oscore-groupcomm" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-core-oscore-groupcomm.xml" target="https://www.ietf.org/archive/id/draft-ietf-core-oscore-groupcomm-14.txt">
          <front>
            <title>Group OSCORE - Secure Group Communication for CoAP</title>
            <author fullname="Marco Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Göran Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Francesca Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="John Preuss Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Jiye Park">
              <organization>Universitaet Duisburg-Essen</organization>
            </author>
            <date month="March" day="7" year="2022"/>
            <abstract>
              <t>   This document defines Group Object Security for Constrained RESTful
   Environments (Group OSCORE), providing end-to-end security of CoAP
   messages exchanged between members of a group, e.g., sent over IP
   multicast.  In particular, the described approach defines how OSCORE
   is used in a group communication setting to provide source
   authentication for CoAP group requests, sent by a client to multiple
   servers, and for protection of the corresponding CoAP responses.
   Group OSCORE also defines a pairwise mode where each member of the
   group can efficiently derive a symmetric pairwise key with any other
   member of the group for pairwise OSCORE communication.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-oscore-groupcomm-14"/>
        </reference>
        <reference anchor="I-D.ietf-ace-key-groupcomm" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-ace-key-groupcomm.xml" target="https://www.ietf.org/archive/id/draft-ietf-ace-key-groupcomm-15.txt">
          <front>
            <title>Key Provisioning for Group Communication using ACE</title>
            <author fullname="Francesca Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Marco Tiloca">
              <organization>RISE AB</organization>
            </author>
            <date month="December" day="23" year="2021"/>
            <abstract>
              <t>   This document defines how to use the Authentication and Authorization
   for Constrained Environments (ACE) framework to distribute keying
   material and configuration parameters for secure group communication.
   Candidate group members acting as Clients and authorized to join a
   group can do so by interacting with a Key Distribution Center (KDC)
   acting as Resource Server, from which they obtain the keying material
   to communicate with other group members.  While defining general
   message formats as well as the interface and operations available at
   the KDC, this document supports different approaches and protocols
   for secure group communication.  Therefore, details are delegated to
   separate application profiles of this document, as specialized
   instances that target a particular group communication approach and
   define how communications in the group are protected.  Compliance
   requirements for such application profiles are also specified.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-key-groupcomm-15"/>
        </reference>
        <reference anchor="I-D.ietf-ace-oauth-authz" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-ace-oauth-authz.xml" target="https://www.ietf.org/archive/id/draft-ietf-ace-oauth-authz-46.txt">
          <front>
            <title>Authentication and Authorization for Constrained Environments (ACE) using the OAuth 2.0 Framework (ACE-OAuth)</title>
            <author fullname="Ludwig Seitz">
              <organization>Combitech</organization>
            </author>
            <author fullname="Goeran Selander">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Erik Wahlstroem">
	 </author>
            <author fullname="Samuel Erdtman">
              <organization>Spotify AB</organization>
            </author>
            <author fullname="Hannes Tschofenig">
              <organization>Arm Ltd.</organization>
            </author>
            <date month="November" day="8" year="2021"/>
            <abstract>
              <t>   This specification defines a framework for authentication and
   authorization in Internet of Things (IoT) environments called ACE-
   OAuth.  The framework is based on a set of building blocks including
   OAuth 2.0 and the Constrained Application Protocol (CoAP), thus
   transforming a well-known and widely used authorization solution into
   a form suitable for IoT devices.  Existing specifications are used
   where possible, but extensions are added and profiles are defined to
   better serve the IoT use cases.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-oauth-authz-46"/>
        </reference>
        <reference anchor="I-D.ietf-ace-oscore-profile" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-ace-oscore-profile.xml" target="https://www.ietf.org/archive/id/draft-ietf-ace-oscore-profile-19.txt">
          <front>
            <title>OSCORE Profile of the Authentication and Authorization for Constrained Environments Framework</title>
            <author fullname="Francesca Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Ludwig Seitz">
              <organization>Combitech</organization>
            </author>
            <author fullname="Göran Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Martin Gunnarsson">
              <organization>RISE</organization>
            </author>
            <date month="May" day="6" year="2021"/>
            <abstract>
              <t>   This document specifies a profile for the Authentication and
   Authorization for Constrained Environments (ACE) framework.  It
   utilizes Object Security for Constrained RESTful Environments
   (OSCORE) to provide communication security and proof-of-possession
   for a key owned by the client and bound to an OAuth 2.0 access token.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-oscore-profile-19"/>
        </reference>
        <reference anchor="I-D.ietf-ace-dtls-authorize" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-ace-dtls-authorize.xml" target="https://www.ietf.org/archive/id/draft-ietf-ace-dtls-authorize-18.txt">
          <front>
            <title>Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="Stefanie Gerdes">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Olaf Bergmann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Carsten Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Göran Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Ludwig Seitz">
              <organization>Combitech</organization>
            </author>
            <date month="June" day="4" year="2021"/>
            <abstract>
              <t>   This specification defines a profile of the ACE framework that allows
   constrained servers to delegate client authentication and
   authorization.  The protocol relies on DTLS version 1.2 for
   communication security between entities in a constrained network
   using either raw public keys or pre-shared keys.  A resource-
   constrained server can use this protocol to delegate management of
   authorization information to a trusted host with less severe
   limitations regarding processing power and memory.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-dtls-authorize-18"/>
        </reference>
        <reference anchor="NIST-800-56A" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Ar3.pdf">
          <front>
            <title>Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography - NIST Special Publication 800-56A, Revision 3</title>
            <author initials="E." surname="Barker" fullname="Elaine Barker">
              <organization/>
            </author>
            <author initials="L." surname="Chen" fullname="Lily Chen">
              <organization/>
            </author>
            <author initials="A." surname="Roginsky" fullname="Allen Roginsky">
              <organization/>
            </author>
            <author initials="A." surname="Vassilev" fullname="Apostol Vassilev">
              <organization/>
            </author>
            <author initials="R." surname="Davis" fullname="Richard Davis">
              <organization/>
            </author>
            <date year="2018" month="April"/>
          </front>
        </reference>
        <reference anchor="COSE.Algorithms" target="https://www.iana.org/assignments/cose/cose.xhtml#algorithms">
          <front>
            <title>COSE Algorithms</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="COSE.Key.Types" target="https://www.iana.org/assignments/cose/cose.xhtml#key-type">
          <front>
            <title>COSE Key Types</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="COSE.Elliptic.Curves" target="https://www.iana.org/assignments/cose/cose.xhtml#elliptic-curves">
          <front>
            <title>COSE Elliptic Curves</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="COSE.Header.Parameters" target="https://www.iana.org/assignments/cose/cose.xhtml#header-parameters">
          <front>
            <title>COSE Header Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="I-D.ietf-core-groupcomm-bis" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-core-groupcomm-bis.xml" target="https://www.ietf.org/archive/id/draft-ietf-core-groupcomm-bis-06.txt">
          <front>
            <title>Group Communication for the Constrained Application Protocol (CoAP)</title>
            <author fullname="Esko Dijk">
              <organization>IoTconsultancy.nl</organization>
            </author>
            <author fullname="Chonggang Wang">
              <organization>InterDigital</organization>
            </author>
            <author fullname="Marco Tiloca">
              <organization>RISE AB</organization>
            </author>
            <date month="March" day="7" year="2022"/>
            <abstract>
              <t>   This document specifies the use of the Constrained Application
   Protocol (CoAP) for group communication, including the use of UDP/IP
   multicast as the default underlying data transport.  Both unsecured
   and secured CoAP group communication are specified.  Security is
   achieved by use of the Group Object Security for Constrained RESTful
   Environments (Group OSCORE) protocol.  The target application area of
   this specification is any group communication use cases that involve
   resource-constrained devices or networks that support CoAP.  This
   document replaces RFC 7390, while it updates RFC 7252 and RFC 7641.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-groupcomm-bis-06"/>
        </reference>
        <reference anchor="I-D.ietf-core-coap-pubsub" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-core-coap-pubsub.xml" target="https://www.ietf.org/archive/id/draft-ietf-core-coap-pubsub-09.txt">
          <front>
            <title>Publish-Subscribe Broker for the Constrained Application Protocol (CoAP)</title>
            <author fullname="Michael Koster">
              <organization>SmartThings</organization>
            </author>
            <author fullname="Ari Keranen">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Jaime Jimenez">
              <organization>Ericsson</organization>
            </author>
            <date month="September" day="30" year="2019"/>
            <abstract>
              <t>   The Constrained Application Protocol (CoAP), and related extensions
   are intended to support machine-to-machine communication in systems
   where one or more nodes are resource constrained, in particular for
   low power wireless sensor networks.  This document defines a publish-
   subscribe Broker for CoAP that extends the capabilities of CoAP for
   supporting nodes with long breaks in connectivity and/or up-time.

   There is work in progress to resolve some of the transfer layer
   issues by using a more RESTful approach.

   Please see https://github.com/core-wg/pubsub/blob/master/proposal.txt

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-coap-pubsub-09"/>
        </reference>
        <reference anchor="I-D.tiloca-core-oscore-discovery" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.tiloca-core-oscore-discovery.xml" target="https://www.ietf.org/archive/id/draft-tiloca-core-oscore-discovery-11.txt">
          <front>
            <title>Discovery of OSCORE Groups with the CoRE Resource Directory</title>
            <author fullname="Marco Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Christian Amsuess">
	 </author>
            <author fullname="Peter van der Stok">
              <organization>Consultant</organization>
            </author>
            <date month="March" day="7" year="2022"/>
            <abstract>
              <t>   Group communication over the Constrained Application Protocol (CoAP)
   can be secured by means of Group Object Security for Constrained
   RESTful Environments (Group OSCORE).  At deployment time, devices may
   not know the exact security groups to join, the respective Group
   Manager, or other information required to perform the joining
   process.  This document describes how a CoAP endpoint can use
   descriptions and links of resources registered at the CoRE Resource
   Directory to discover security groups and to acquire information for
   joining them through the respective Group Manager.  A given security
   group may protect multiple application groups, which are separately
   announced in the Resource Directory as sets of endpoints sharing a
   pool of resources.  This approach is consistent with, but not limited
   to, the joining of security groups based on the ACE framework for
   Authentication and Authorization in constrained environments.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-tiloca-core-oscore-discovery-11"/>
        </reference>
        <reference anchor="I-D.ietf-ace-oscore-gm-admin" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-ace-oscore-gm-admin.xml" target="https://www.ietf.org/archive/id/draft-ietf-ace-oscore-gm-admin-05.txt">
          <front>
            <title>Admin Interface for the OSCORE Group Manager</title>
            <author fullname="Marco Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Rikard Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Peter van der Stok">
              <organization>Consultant</organization>
            </author>
            <author fullname="Francesca Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <date month="March" day="7" year="2022"/>
            <abstract>
              <t>   Group communication for CoAP can be secured using Group Object
   Security for Constrained RESTful Environments (Group OSCORE).  A
   Group Manager is responsible to handle the joining of new group
   members, as well as to manage and distribute the group keying
   material.  This document defines a RESTful admin interface at the
   Group Manager, that allows an Administrator entity to create and
   delete OSCORE groups, as well as to retrieve and update their
   configuration.  The ACE framework for Authentication and
   Authorization is used to enforce authentication and authorization of
   the Administrator at the Group Manager.  Protocol-specific transport
   profiles of ACE are used to achieve communication security, proof-of-
   possession and server authentication.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-oscore-gm-admin-05"/>
        </reference>
        <reference anchor="I-D.ietf-cose-cbor-encoded-cert" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-cose-cbor-encoded-cert.xml" target="https://www.ietf.org/archive/id/draft-ietf-cose-cbor-encoded-cert-03.txt">
          <front>
            <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
            <author fullname="John Preuß Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Göran Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Shahid Raza">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Joel Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Martin Furuhed">
              <organization>Nexus Group</organization>
            </author>
            <date month="January" day="10" year="2022"/>
            <abstract>
              <t>   This document specifies a CBOR encoding of X.509 certificates.  The
   resulting certificates are called C509 Certificates.  The CBOR
   encoding supports a large subset of RFC 5280 and all certificates
   compatible with the RFC 7925, IEEE 802.1AR (DevID), CNSA, RPKI, GSMA
   eUICC, and CA/Browser Forum Baseline Requirements profiles.  When
   used to re-encode DER encoded X.509 certificates, the CBOR encoding
   can in many cases reduce the size of RFC 7925 profiled certificates
   with over 50%.  The CBOR encoded structure can alternatively be
   signed directly ("natively signed"), which does not require re-
   encoding for the signature to be verified.  The document also
   specifies C509 COSE headers, a C509 TLS certificate type, and a C509
   file format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-03"/>
        </reference>
        <reference anchor="RFC5869" target="https://www.rfc-editor.org/info/rfc5869" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.5869.xml">
          <front>
            <title>HMAC-based Extract-and-Expand Key Derivation Function (HKDF)</title>
            <author initials="H." surname="Krawczyk" fullname="H. Krawczyk">
              <organization/>
            </author>
            <author initials="P." surname="Eronen" fullname="P. Eronen">
              <organization/>
            </author>
            <date year="2010" month="May"/>
            <abstract>
              <t>This document specifies a simple Hashed Message Authentication Code (HMAC)-based key derivation function (HKDF), which can be used as a building block in various protocols and applications.  The key derivation function (KDF) is intended to support a wide range of applications and requirements, and is conservative in its use of cryptographic hash functions.  This document is not an Internet  Standards Track specification; it is published for informational  purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5869"/>
          <seriesInfo name="DOI" value="10.17487/RFC5869"/>
        </reference>
        <reference anchor="RFC6347" target="https://www.rfc-editor.org/info/rfc6347" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6347.xml">
          <front>
            <title>Datagram Transport Layer Security Version 1.2</title>
            <author initials="E." surname="Rescorla" fullname="E. Rescorla">
              <organization/>
            </author>
            <author initials="N." surname="Modadugu" fullname="N. Modadugu">
              <organization/>
            </author>
            <date year="2012" month="January"/>
            <abstract>
              <t>This document specifies version 1.2 of the Datagram Transport Layer Security (DTLS) protocol.  The DTLS protocol provides communications privacy for datagram protocols.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees.  Datagram semantics of the underlying transport are preserved by the DTLS protocol.  This document updates DTLS 1.0 to work with TLS version 1.2.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6347"/>
          <seriesInfo name="DOI" value="10.17487/RFC6347"/>
        </reference>
        <reference anchor="RFC6690" target="https://www.rfc-editor.org/info/rfc6690" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6690.xml">
          <front>
            <title>Constrained RESTful Environments (CoRE) Link Format</title>
            <author initials="Z." surname="Shelby" fullname="Z. Shelby">
              <organization/>
            </author>
            <date year="2012" month="August"/>
            <abstract>
              <t>This specification defines Web Linking using a link format for use by constrained web servers to describe hosted resources, their attributes, and other relationships between links.  Based on the HTTP Link Header field defined in RFC 5988, the Constrained RESTful Environments (CoRE) Link Format is carried as a payload and is assigned an Internet media type.  "RESTful" refers to the Representational State Transfer (REST) architecture.  A well-known URI is defined as a default entry point for requesting the links hosted by a server.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6690"/>
          <seriesInfo name="DOI" value="10.17487/RFC6690"/>
        </reference>
        <reference anchor="RFC6749" target="https://www.rfc-editor.org/info/rfc6749" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6749.xml">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author initials="D." surname="Hardt" fullname="D. Hardt" role="editor">
              <organization/>
            </author>
            <date year="2012" month="October"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf.  This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC7641" target="https://www.rfc-editor.org/info/rfc7641" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7641.xml">
          <front>
            <title>Observing Resources in the Constrained Application Protocol (CoAP)</title>
            <author initials="K." surname="Hartke" fullname="K. Hartke">
              <organization/>
            </author>
            <date year="2015" month="September"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a RESTful application protocol for constrained nodes and networks.  The state of a resource on a CoAP server can change over time.  This document specifies a simple protocol extension for CoAP that enables CoAP clients to "observe" resources, i.e., to retrieve a representation of a resource and keep this representation updated by the server over a period of time.  The protocol follows a best-effort approach for sending new representations to clients and provides eventual consistency between the state observed by each client and the actual resource state at the server.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7641"/>
          <seriesInfo name="DOI" value="10.17487/RFC7641"/>
        </reference>
        <reference anchor="RFC7925" target="https://www.rfc-editor.org/info/rfc7925" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7925.xml">
          <front>
            <title>Transport Layer Security (TLS) / Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things</title>
            <author initials="H." surname="Tschofenig" fullname="H. Tschofenig" role="editor">
              <organization/>
            </author>
            <author initials="T." surname="Fossati" fullname="T. Fossati">
              <organization/>
            </author>
            <date year="2016" month="July"/>
            <abstract>
              <t>A common design pattern in Internet of Things (IoT) deployments is the use of a constrained device that collects data via sensors or controls actuators for use in home automation, industrial control systems, smart cities, and other IoT deployments.</t>
              <t>This document defines a Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) 1.2 profile that offers communications security for this data exchange thereby preventing eavesdropping, tampering, and message forgery.  The lack of communication security is a common vulnerability in IoT products that can easily be solved by using these well-researched and widely deployed Internet security protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7925"/>
          <seriesInfo name="DOI" value="10.17487/RFC7925"/>
        </reference>
        <reference anchor="RFC8392" target="https://www.rfc-editor.org/info/rfc8392" xml:base="https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8392.xml">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author initials="M." surname="Jones" fullname="M. Jones">
              <organization/>
            </author>
            <author initials="E." surname="Wahlstroem" fullname="E. Wahlstroem">
              <organization/>
            </author>
            <author initials="S." surname="Erdtman" fullname="S. Erdtman">
              <organization/>
            </author>
            <author initials="H." surname="Tschofenig" fullname="H. Tschofenig">
              <organization/>
            </author>
            <date year="2018" month="May"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties.  The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection.  A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value.  CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
      </references>
    </references>
    <section anchor="profile-req" numbered="true" toc="default">
      <name>Profile Requirements</name>
      <t>This section lists how this application profile of ACE addresses the requirements defined in Appendix A of <xref target="I-D.ietf-ace-key-groupcomm" format="default"/>.</t>
      <section anchor="mandatory-to-address-requirements" numbered="true" toc="default">
        <name>Mandatory-to-Address Requirements</name>
        <ul spacing="normal">
          <li>REQ1 - Specify the format and encoding of 'scope'. This includes defining the set of possible roles and their identifiers, as well as the corresponding encoding to use in the scope entries according to the used scope format: see <xref target="sec-format-scope" format="default"/> and <xref target="ssec-auth-req" format="default"/>.</li>
          <li>REQ2 - If the AIF format of 'scope' is used, register its specific instance of "Toid" and "Tperm" as Media Type parameters and a corresponding Content-Format, as per the guidelines in <xref target="I-D.ietf-ace-aif" format="default"/>: see <xref target="ssec-iana-AIF-registry" format="default"/> and <xref target="ssec-iana-coap-content-format-registry" format="default"/>.</li>
          <li>REQ3 - if used, specify the acceptable values for 'sign_alg': values from the "Value" column of the "COSE Algorithms" registry <xref target="COSE.Algorithms" format="default"/>.</li>
          <li>REQ4 - If used, specify the acceptable values for 'sign_parameters': format and values from the COSE algorithm capabilities as specified in the "COSE Algorithms" registry <xref target="COSE.Algorithms" format="default"/>.</li>
          <li>REQ5 - If used, specify the acceptable values for 'sign_key_parameters': format and values from the COSE key type capabilities as specified in the "COSE Key Types" registry <xref target="COSE.Key.Types" format="default"/>.</li>
          <li>REQ6 - Specify the acceptable formats for authentication credentials and, if used, the acceptable values for 'pub_key_enc': acceptable formats explicitly provide the public key as well as the comprehensive set of information related to the public key algorithm (see <xref target="ssec-token-post" format="default"/> and <xref target="ssec-join-resp" format="default"/>). Consistent acceptable values for 'pub_key_enc' are taken from the "Label" column of the "COSE Header Parameters" registry <xref target="COSE.Header.Parameters" format="default"/>.</li>
          <li>REQ7 - If the value of the GROUPNAME URI path and the group name in the Access Token scope (gname in <xref section="3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>) are not required to coincide, specify the mechanism to map the GROUPNAME value in the URI to the group name: not applicable, since a perfect matching is required.</li>
          <li>REQ8 - Define whether the KDC has an authentication credential and if this has to be provided through the 'kdc_cred' parameter, see <xref section="4.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>: yes, as required by the Group OSCORE protocol <xref target="I-D.ietf-core-oscore-groupcomm" format="default"/>, see <xref target="ssec-join-resp" format="default"/> of this document.</li>
          <li>REQ9 - Specify if any part of the KDC interface as defined in <xref section="4.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/> is not supported by the KDC: not applicable.</li>
          <li>REQ10 - Register a Resource Type for the root url-path, which is used to discover the correct url to access at the KDC (see <xref section="4.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>): the Resource Type (rt=) Link Target Attribute value "core.osc.gm" is registered in <xref target="iana-rt" format="default"/>.</li>
          <li>REQ11 - Define what specific actions (e.g., CoAP methods) are allowed on each resource provided by the KDC interface, depending on whether the Client is a current group member; the roles that a Client is authorized to take as per the obtained access token; and the roles that the Client has as current group member: see <xref target="ssec-admitted-methods" format="default"/>.</li>
          <li>REQ12 - Categorize possible newly defined operations for Clients into primary operations expected to be minimally supported and secondary operations, and provide accompanying considerations (see <xref target="client-operations" format="default"/>).</li>
          <li>REQ13 - Specify the encoding of group identifier (see <xref section="4.2.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>): CBOR byte string (see <xref target="sec-retrieve-gnames" format="default"/>).</li>
          <li>REQ14 - Specify the approaches used to compute and verify the PoP evidence to include in 'client_cred_verify', and which of those approaches is used in which case: see <xref target="ssec-join-req-sending" format="default"/> and <xref target="ssec-join-req-processing" format="default"/>.</li>
          <li>REQ15 - Specify how the nonce N_S is generated, if the token is not provided to the KDC through the Token Transfer Request to the authz-info endpoint (e.g., if it is used directly to validate TLS instead): see <xref target="sssec-challenge-value" format="default"/>.</li>
          <li>REQ16 - Define the initial value of the 'num' parameter: The initial value MUST be set to 0 when creating the OSCORE group, e.g., as in <xref target="I-D.ietf-ace-oscore-gm-admin" format="default"/>.</li>
          <li>REQ17 - Specify the format of the 'key' parameter: see <xref target="ssec-join-resp" format="default"/>.</li>
          <li>REQ18 - Specify acceptable values of the 'gkty' parameter: Group_OSCORE_Input_Material object (see <xref target="ssec-join-resp" format="default"/>).</li>
          <li>REQ19 - Specify and register the application profile identifier: coap_group_oscore_app (see <xref target="ssec-iana-groupcomm-profile-registry" format="default"/>).</li>
          <li>REQ20 - If used, specify the format and content of 'group_policies' and its entries: see <xref target="ssec-join-resp" format="default"/>.</li>
          <li>REQ21 - Specify the approaches used to compute and verify the PoP evidence to include in 'kdc_cred_verify', and which of those approaches is used in which case: see <xref target="ssec-join-resp" format="default"/>, <xref target="ssec-join-resp-processing" format="default"/> and <xref target="sec-gm-pub-key" format="default"/>.</li>
          <li>REQ22 - Specify the communication protocol that the members of the group must use: CoAP <xref target="RFC7252" format="default"/>, possibly over IP multicast <xref target="I-D.ietf-core-groupcomm-bis" format="default"/>.</li>
          <li>REQ23 - Specify the security protocols that the group members must use to protect their communication: Group OSCORE <xref target="I-D.ietf-core-oscore-groupcomm" format="default"/>.</li>
          <li>REQ24 - Specify how the communication is secured between the Client and KDC: by means of any transport profile of ACE <xref target="I-D.ietf-ace-oauth-authz" format="default"/> between Client and Group Manager that complies with the requirements in Appendix C of <xref target="I-D.ietf-ace-oauth-authz" format="default"/>.</li>
          <li>REQ25 - Specify the format of the identifiers of group members: the Sender ID used in the OSCORE group (see <xref target="ssec-join-resp" format="default"/> and <xref target="sec-pub-keys" format="default"/>).</li>
          <li>REQ26 - Specify policies at the KDC to handle member ids that are not included in 'get_pub_keys': see <xref target="sec-pub-keys" format="default"/>.</li>
          <li>REQ27 - Specify the format of newly-generated individual keying material for group members, or of the information to derive it, and corresponding CBOR label: see <xref target="sec-new-key" format="default"/>.</li>
          <li>REQ28 - Specify and register the identifier of newly defined semantics for binary scopes: see <xref target="iana-scope-semantics" format="default"/>.</li>
          <li>REQ29 - Categorize newly defined parameters according to the same criteria of <xref section="8" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>: see <xref target="ace-groupcomm-params" format="default"/>.</li>
          <li>REQ30 - Define whether Clients must, should or may support the conditional parameters defined in <xref section="8" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>, and under which circumstances: see <xref target="ace-groupcomm-params" format="default"/>.</li>
        </ul>
      </section>
      <section anchor="optional-to-address-requirements" numbered="true" toc="default">
        <name>Optional-to-Address Requirements</name>
        <ul spacing="normal">
          <li>OPT1 (Optional) - If the textual format of 'scope' is used, specify CBOR values to use for abbreviating the role identifiers in the group: not applicable.</li>
          <li>
            <t>OPT2 (Optional) - Specify additional parameters used in the exchange of Token Transfer Request and Response:  </t>
            <ul spacing="normal">
              <li>'ecdh_info', to negotiate the ECDH algorithm, ECDH algorithm parameters, ECDH key parameters and exact format of authentication credentials used in the group, in case the joining node supports the pairwise mode of Group OSCORE (see <xref target="ssec-token-post" format="default"/>).</li>
              <li>'kdc_dh_creds', to ask for and retrieve the Group Manager's Diffie-Hellman authentication credentials, in case the joining node supports the pairwise mode of Group OSCORE and the Access Token authorizes to join parwise-only groups (see <xref target="ssec-token-post" format="default"/>).</li>
            </ul>
          </li>
          <li>OPT3 (Optional) - Specify the negotiation of parameter values for signature algorithm and signature keys, if 'sign_info' is not used: possible early discovery by using the approach based on the CoRE Resource Directory described in <xref target="I-D.tiloca-core-oscore-discovery" format="default"/>.</li>
          <li>OPT4 (Optional) - Specify possible or required payload formats for specific error cases: send a 4.00 (Bad Request) error response to a Joining Request (see <xref target="ssec-join-req-processing" format="default"/>).</li>
          <li>OPT5 (Optional) - Specify additional identifiers of error types, as values of the 'error' field in an error response from the KDC: see <xref target="iana-ace-groupcomm-errors" format="default"/>.</li>
          <li>OPT6 (Optional) - Specify the encoding of 'pub_keys_repos' if the default is not used: no.</li>
          <li>OPT7 (Optional) - Specify the functionalities implemented at the 'control_uri' resource hosted at the Client, including message exchange encoding and other details (see <xref section="4.3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>): see <xref target="sec-leaving" format="default"/> for the eviction of a group member; see <xref target="sec-group-rekeying-process" format="default"/> for the group rekeying process.</li>
          <li>OPT8 (Optional) - Specify the behavior of the handler in case of failure to retrieve an authentication credential for the specific node: send a 4.00 (Bad Request) error response to a Joining Request (see <xref target="ssec-join-req-processing" format="default"/>).</li>
          <li>OPT9 (Optional) - Define a default group rekeying scheme, to refer to in case the 'rekeying_scheme' parameter is not included in the Joining Response (see <xref section="4.3.1.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>): the "Point-to-Point" rekeying scheme registered in <xref section="11.14" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>, whose detailed use for this profile is defined in <xref target="sec-group-rekeying-process" format="default"/> of this document.</li>
          <li>OPT10 (Optional) - Specify the functionalities implemented at the 'control_group_uri' resource hosted at the Client, including message exchange encoding and other details (see <xref section="4.3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>): see <xref target="sec-leaving" format="default"/> for the eviction of multiple group members.</li>
          <li>OPT11 (Optional) - Specify policies that instruct clients to retain unsuccessfully decrypted messages and for how long, so that they can be decrypted after getting updated keying material: no.</li>
          <li>OPT12 (Optional) - Specify for the KDC to perform group rekeying (together or instead of renewing individual keying material) when receiving a Key Renewal Request: the Group Manager SHOULD NOT perform a group rekeying, unless already scheduled to occur shortly (see <xref target="sec-new-key" format="default"/>).</li>
          <li>OPT13 (Optional) - Specify how the identifier of a group members's authentication credential is included in requests sent to other group members: no.</li>
          <li>OPT14 (Optional) - Specify additional information to include in rekeying messages for the "Point-to-Point" group rekeying scheme (see <xref section="6.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>): see <xref target="sending-rekeying-msg" format="default"/>.</li>
          <li>OPT15 (Optional) - Specify if Clients must or should support any of the parameters defined as optional in <xref section="8" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm" format="default"/>: no.</li>
        </ul>
      </section>
    </section>
    <section anchor="sec-future-cose-algs" numbered="true" toc="default">
      <name>Extensibility for Future COSE Algorithms</name>
      <t>As defined in <xref section="8.1" sectionFormat="of" target="I-D.ietf-cose-rfc8152bis-algs" format="default"/>, future algorithms can be registered in the "COSE Algorithms" registry <xref target="COSE.Algorithms" format="default"/> as specifying none or multiple COSE capabilities.</t>
      <t>To enable the seamless use of such future registered algorithms, this section defines a general, agile format for:</t>
      <ul spacing="normal">
        <li>Each 'ecdh_info_entry' of the 'ecdh_info' parameter in the Token Transfer Response, see <xref target="ssec-token-post" format="default"/> and <xref target="ecdh-info" format="default"/>;</li>
        <li>The 'sign_params' and 'ecdh_params' parameters within the 'key' parameter, see <xref target="ssec-join-resp" format="default"/>, as part of the response payloads used in <xref target="ssec-join-resp" format="default"/>, <xref target="ssec-updated-key-only" format="default"/>, <xref target="ssec-updated-and-individual-key" format="default"/> and <xref target="sec-group-rekeying-process" format="default"/>.</li>
      </ul>
      <t>Appendix B of <xref target="I-D.ietf-ace-key-groupcomm" format="default"/> describes the analogous general format for 'sign_info_entry' of the 'sign_info' parameter in the Token Transfer Response, see <xref target="ssec-token-post" format="default"/>.</t>
      <t>If any of the currently registered COSE algorithms is considered, using this general format yields the same structure defined in this document for the items above, thus ensuring retro-compatibility.</t>
      <section anchor="sec-future-cose-algs-ecdh-info-entry" numbered="true" toc="default">
        <name>Format of 'ecdh_info_entry'</name>
        <t>The format of each 'ecdh_info_entry' (see <xref target="ssec-token-post" format="default"/> and <xref target="ecdh-info" format="default"/>) is generalized as follows. Given N the number of elements of the 'ecdh_parameters' array, i.e., the number of COSE capabilities of the ECDH algorithm, then:</t>
        <ul spacing="normal">
          <li>'ecdh_key_parameters' is replaced by N elements 'ecdh_capab_i', each of which is a CBOR array.</li>
          <li>The i-th array following 'ecdh_parameters', i.e., 'ecdh_capab_i' (i = 0, ..., N-1), is the array of COSE capabilities for the algorithm capability specified in 'ecdh_parameters'[i].</li>
        </ul>
        <figure anchor="fig-ecdh-info-entry-general">
          <name>'ecdh_info_entry' with general format</name>
          <sourcecode type="CDDL"><![CDATA[
ecdh_info_entry =
[
  id : gname / [ + gname ],
  ecdh_alg : int / tstr,
  ecdh_parameters : [ alg_capab_1 : any,
                      alg_capab_2 : any,
                      ...,
                      alg_capab_N : any],
  ecdh_capab_1 : [ any ],
  ecdh_capab_2 : [ any ],
  ...,
  ecdh_capab_N : [ any ],
  cred_fmt = int / null
]

gname = tstr
]]></sourcecode>
        </figure>
      </section>
      <section anchor="sec-future-cose-algs-key" numbered="true" toc="default">
        <name>Format of 'key'</name>
        <t>The format of 'key' (see <xref target="ssec-join-resp" format="default"/>) is generalized as follows.</t>
        <ul spacing="normal">
          <li>
            <t>The 'sign_params' array includes N+1 elements, whose exact structure and value depend on the value of the signature algorithm specified in 'sign_alg'.  </t>
            <ul spacing="normal">
              <li>The first element, i.e., 'sign_params'[0], is the array of the N COSE capabilities for the signature algorithm, as specified for that algorithm in the "Capabilities" column of the "COSE Algorithms" registry <xref target="COSE.Algorithms" format="default"/> (see <xref section="8.1" sectionFormat="of" target="I-D.ietf-cose-rfc8152bis-algs" format="default"/>).</li>
              <li>Each following element 'sign_params'[i], i.e., with index i &gt; 0, is the array of COSE capabilities for the algorithm capability specified in 'sign_params'[0][i-1].</li>
            </ul>
            <t>
For example, if 'sign_params'[0][0] specifies the key type as capability of the algorithm, then 'sign_params'[1] is the array of COSE capabilities for the COSE key type associated with the signature algorithm, as specified for that key type in the "Capabilities" column of the "COSE Key Types" registry <xref target="COSE.Key.Types" format="default"/> (see <xref section="8.2" sectionFormat="of" target="I-D.ietf-cose-rfc8152bis-algs" format="default"/>).</t>
          </li>
          <li>
            <t>The 'ecdh_params' array includes M+1 elements, whose exact structure and value depend on the value of the ECDH algorithm specified in 'ecdh_alg'.  </t>
            <ul spacing="normal">
              <li>The first element, i.e., 'ecdh_params'[0], is the array of the M COSE capabilities for the ECDH algorithm, as specified for that algorithm in the "Capabilities" column of the "COSE Algorithms" registry <xref target="COSE.Algorithms" format="default"/> (see <xref section="8.1" sectionFormat="of" target="I-D.ietf-cose-rfc8152bis-algs" format="default"/>).</li>
              <li>Each following element 'ecdh_params'[i], i.e., with index i &gt; 0, is the array of COSE capabilities for the algorithm capability specified in 'ecdh_params'[0][i-1].</li>
            </ul>
            <t>
For example, if 'ecdh_params'[0][0] specifies the key type as capability of the algorithm, then 'ecdh_params'[1] is the array of COSE capabilities for the COSE key type associated with the ECDH algorithm, as specified for that key type in the "Capabilities" column of the "COSE Key Types" registry <xref target="COSE.Key.Types" format="default"/> (see <xref section="8.2" sectionFormat="of" target="I-D.ietf-cose-rfc8152bis-algs" format="default"/>).</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="sec-document-updates" numbered="true" toc="default">
      <name>Document Updates</name>
      <t>RFC EDITOR: PLEASE REMOVE THIS SECTION.</t>
      <section anchor="sec-12-13" numbered="true" toc="default">
        <name>Version -12 to -13</name>
        <ul spacing="normal">
          <li>Renamed parameters about authentication credentials.</li>
          <li>It is optional for the Group Manager to reassign Gids by tracking "Birth Gids".</li>
          <li>Distinction between authentication credentials and public keys.</li>
          <li>Updated IANA considerations related to AIF.</li>
          <li>Updated textual description of registered ACE Scope Semantics value.</li>
        </ul>
      </section>
      <section anchor="sec-11-12" numbered="true" toc="default">
        <name>Version -11 to -12</name>
        <ul spacing="normal">
          <li>Clarified semantics of 'ecdh_info' and 'kdc_dh_creds'.</li>
          <li>Definition of /ace-group/GROUPNAME/kdc-pub-key moved to draft-ietf-ace-key-groupcomm.</li>
          <li>ace-group/ accessible also to non-members that are not Verifiers.</li>
          <li>Clarified what resources are accessible to Verifiers.</li>
          <li>Revised error handling for the newly defined resources.</li>
          <li>Revised use of CoAP error codes.</li>
          <li>Use of "Token Tranfer Request" and "Token Transfer Response".</li>
          <li>New parameter 'rekeying_scheme'.</li>
          <li>Categorization of new parameters and inherited conditional parameters.</li>
          <li>Clarifications on what to do in case of enhanced error responses.</li>
          <li>Changed UCCS to CCS.</li>
          <li>Authentication credentials of just joined Clients can be in rekeying messages.</li>
          <li>Revised names of new IANA registries.</li>
          <li>Clarified meaning of registered CoRE resource type.</li>
          <li>Alignment to new requirements from draft-ietf-ace-key-groupcomm.</li>
          <li>Fixes and editorial improvements.</li>
        </ul>
      </section>
      <section anchor="sec-10-11" numbered="true" toc="default">
        <name>Version -10 to -11</name>
        <ul spacing="normal">
          <li>Removed redundancy of key type capabilities, from 'sign_info', 'ecdh_info' and 'key'.</li>
          <li>New resource to retrieve the Group Manager's authentication credential.</li>
          <li>New resource to retrieve material for Signature Verifiers.</li>
          <li>New parameter 'sign_enc_alg' related to the group mode.</li>
          <li>'cred_fmt' takes value from the COSE Header Parameters registry.</li>
          <li>Improved alignment of the Joining Response payload with the Group OSCORE Security Context parameters.</li>
          <li>Recycling Group IDs by tracking "Birth GIDs".</li>
          <li>Error handling in case of non available Sender IDs upon joining.</li>
          <li>Error handling in case EdDSA public keys with invalid Y coordinate when the pairwise mode of Group OSCORE is supported.</li>
          <li>Generalized proof-of-possession (PoP) for the joining node's private key; defined Diffie-Hellman based PoP for OSCORE groups using only the pairwise mode.</li>
          <li>Proof-of-possession of the Group Manager's private key in the Joining Response.</li>
          <li>Always use 'peer_identifiers' to convey Sender IDs as node identifiers.</li>
          <li>Stale Sender IDs provided when rekeying the group.</li>
          <li>New resource for late retrieval of stale Sender IDs.</li>
          <li>Added examples of message exchanges.</li>
          <li>Revised default values of group configuration parameters.</li>
          <li>Fixes to IANA registrations.</li>
          <li>General format of parameters related to COSE capabilities, supporting future registered COSE algorithms (new Appendix).</li>
        </ul>
      </section>
      <section anchor="sec-09-10" numbered="true" toc="default">
        <name>Version -09 to -10</name>
        <ul spacing="normal">
          <li>Updated non-recycling policy of Sender IDs.</li>
          <li>Removed policies about Sender Sequence Number synchronization.</li>
          <li>'control_path' renamed to 'control_uri'.</li>
          <li>Format of 'get_pub_keys' aligned with draft-ietf-ace-key-groupcomm.</li>
          <li>Additional way to inform of group eviction.</li>
          <li>Registered semantics identifier for extended scope format.</li>
          <li>Extended error handling, with error type specified in some error responses.</li>
          <li>Renumbered requirements.</li>
        </ul>
      </section>
      <section anchor="sec-08-09" numbered="true" toc="default">
        <name>Version -08 to -09</name>
        <ul spacing="normal">
          <li>The url-path "ace-group" is used.</li>
          <li>Added overview of admitted methods on the Group Manager resources.</li>
          <li>Added exchange of parameters relevant for the pairwise mode of Group OSCORE.</li>
          <li>The signed value for 'client_cred_verify' includes also the scope.</li>
          <li>Renamed the key material object as Group_OSCORE_Input_Material object.</li>
          <li>Replaced 'clientId' with 'group_SenderId'.</li>
          <li>Added message exchange for Group Names request-response.</li>
          <li>No reassignment of Sender ID and Gid in the same OSCORE group.</li>
          <li>Updates on group rekeying contextual with request of new Sender ID.</li>
          <li>Signature verifiers can also retrieve Group Names and URIs.</li>
          <li>Removed group policy about supporting Group OSCORE in pairwise mode.</li>
          <li>Registration of the resource type rt="core.osc.gm".</li>
          <li>Update list of requirements.</li>
          <li>Clarifications and editorial revision.</li>
        </ul>
      </section>
      <section anchor="sec-07-08" numbered="true" toc="default">
        <name>Version -07 to -08</name>
        <ul spacing="normal">
          <li>AIF specific data model to express scope entries.</li>
          <li>A set of roles is checked as valid when processing the Joining Request.</li>
          <li>Updated format of 'get_pub_keys' in the Joining Request.</li>
          <li>Payload format and default values of group policies in the Joining Response.</li>
          <li>Updated payload format of the FETCH request to retrieve authentication credentials.</li>
          <li>Default values for group configuration parameters.</li>
          <li>IANA registrations to support the AIF specific data model.</li>
        </ul>
      </section>
      <section anchor="sec-06-07" numbered="true" toc="default">
        <name>Version -06 to -07</name>
        <ul spacing="normal">
          <li>Alignments with draft-ietf-core-oscore-groupcomm.</li>
          <li>New format of 'sign_info', using the COSE capabilities.</li>
          <li>New format of Joining Response parameters, using the COSE capabilities.</li>
          <li>Considerations on group rekeying.</li>
          <li>Editorial revision.</li>
        </ul>
      </section>
      <section anchor="sec-05-06" numbered="true" toc="default">
        <name>Version -05 to -06</name>
        <ul spacing="normal">
          <li>Added role of external signature verifier.</li>
          <li>Parameter 'rsnonce' renamed to 'kdcchallenge'.</li>
          <li>Parameter 'kdcchallenge' may be omitted in some cases.</li>
          <li>Clarified difference between group name and OSCORE Gid.</li>
          <li>Removed the role combination ["requester", "monitor"].</li>
          <li>Admit implicit scope and audience in the Authorization Request.</li>
          <li>New format for the 'sign_info' parameter.</li>
          <li>Scope not mandatory to include in the Joining Request.</li>
          <li>Group policy about supporting Group OSCORE in pairwise mode.</li>
          <li>Possible individual rekeying of a single requesting node combined with a group rekeying.</li>
          <li>Security considerations on reusage of signature challenges.</li>
          <li>Addressing optional requirement OPT12 from draft-ietf-ace-key-groupcomm</li>
          <li>Editorial improvements.</li>
        </ul>
      </section>
      <section anchor="sec-04-05" numbered="true" toc="default">
        <name>Version -04 to -05</name>
        <ul spacing="normal">
          <li>Nonce N_S also in error responses to the Joining Requests.</li>
          <li>Supporting single Access Token for multiple groups/topics.</li>
          <li>Supporting legal requesters/responders using the 'peer_roles' parameter.</li>
          <li>Registered and used dedicated label for TLS Exporter.</li>
          <li>Added method for uploading a new authentication credential to the Group Manager.</li>
          <li>Added resource and method for retrieving the current group status.</li>
          <li>Fixed inconsistency in retrieving group keying material only.</li>
          <li>Clarified retrieval of keying material for monitor-only members.</li>
          <li>Clarification on incrementing version number when rekeying the group.</li>
          <li>Clarification on what is re-distributed with the group rekeying.</li>
          <li>Security considerations on the size of the nonces used for the signature challenge.</li>
          <li>Added CBOR values to abbreviate role identifiers in the group.</li>
        </ul>
      </section>
      <section anchor="sec-03-04" numbered="true" toc="default">
        <name>Version -03 to -04</name>
        <ul spacing="normal">
          <li>New abstract.</li>
          <li>Moved general content to draft-ietf-ace-key-groupcomm</li>
          <li>Terminology: node name; node resource.</li>
          <li>Creation and pointing at node resource.</li>
          <li>Updated Group Manager API (REST methods and offered services).</li>
          <li>Size of challenges 'cnonce' and 'rsnonce'.</li>
          <li>Value of 'rsnonce' for reused or non-traditionally-posted tokens.</li>
          <li>Removed reference to RFC 7390.</li>
          <li>New requirements from draft-ietf-ace-key-groupcomm</li>
          <li>Editorial improvements.</li>
        </ul>
      </section>
      <section anchor="sec-02-03" numbered="true" toc="default">
        <name>Version -02 to -03</name>
        <ul spacing="normal">
          <li>New sections, aligned with the interface of ace-key-groupcomm .</li>
          <li>Exchange of information on the signature algorithm and related parameters, during the Token POST (Section 4.1).</li>
          <li>Nonce 'rsnonce' from the Group Manager to the Client (Section 4.1).</li>
          <li>Client PoP signature in the Key Distribution Request upon joining (Section 4.2).</li>
          <li>Local actions on the Group Manager, upon a new node's joining (Section 4.2).</li>
          <li>Local actions on the Group Manager, upon a node's leaving (Section 12).</li>
          <li>IANA registration in ACE Groupcomm Parameters registry.</li>
          <li>More fulfilled profile requirements (Appendix A).</li>
        </ul>
      </section>
      <section anchor="sec-01-02" numbered="true" toc="default">
        <name>Version -01 to -02</name>
        <ul spacing="normal">
          <li>Editorial fixes.</li>
          <li>Changed: "listener" to "responder"; "pure listener" to "monitor".</li>
          <li>Changed profile name to "coap_group_oscore_app", to reflect it is an application profile.</li>
          <li>Added the 'type' parameter for all requests to a Join Resource.</li>
          <li>Added parameters to indicate the encoding of authentication credentials.</li>
          <li>Challenge-response for proof-of-possession of signature keys (Section 4).</li>
          <li>Renamed 'key_info' parameter to 'sign_info'; updated its format; extended to include also parameters of the signature key (Section 4.1).</li>
          <li>Code 4.00 (Bad request), in responses to joining nodes providing an invalid authentication credential (Section 4.3).</li>
          <li>Clarifications on provisioning and checking of authentication credentials (Sections 4 and 6).</li>
          <li>Extended discussion on group rekeying and possible different approaches (Section 7).</li>
          <li>Extended security considerations: proof-of-possession of signature keys; collision of OSCORE Group Identifiers (Section 8).</li>
          <li>Registered three entries in the IANA registry "Sequence Number Synchronization Method" (Section 9).</li>
          <li>Registered one public key encoding in the "ACE Public Key Encoding" IANA registry (Section 9).</li>
        </ul>
      </section>
      <section anchor="sec-00-01" numbered="true" toc="default">
        <name>Version -00 to -01</name>
        <ul spacing="normal">
          <li>Changed name of 'req_aud' to 'audience' in the Authorization Request (Section 3.1).</li>
          <li>Added negotiation of signature algorithm/parameters between Client and Group Manager (Section 4).</li>
          <li>Updated format of the Key Distribution Response as a whole (Section 4.3).</li>
          <li>Added parameter 'cs_params' in the 'key' parameter of the Key Distribution Response (Section 4.3).</li>
          <li>New IANA registrations in the "ACE Authorization Server Request Creation Hints" registry, "ACE Groupcomm Key" registry, "OSCORE Security Context Parameters" registry and "ACE Groupcomm Profile" registry (Section 9).</li>
        </ul>
      </section>
    </section>
    <section numbered="false" anchor="sec-acknowledgments" toc="default">
      <name>Acknowledgments</name>
      <t>The authors sincerely thank Christian Amsuess, Santiago Aragon, Stefan Beck, Carsten Bormann, Martin Gunnarsson, Rikard Hoeglund, Watson Ladd, Daniel Migault, Jim Schaad, Ludwig Seitz, Goeran Selander and Peter van der Stok for their comments and feedback.</t>
      <t>The work on this document has been partly supported by VINNOVA and the Celtic-Next project CRITISEC; by the H2020 project SIFIS-Home (Grant agreement 952652); and by the EIT-Digital High Impact Initiative ACTIVE.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
