<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.14 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-ace-key-groupcomm-oscore-15" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.2 -->
  <front>
    <title abbrev="Key Management for OSCORE Groups in ACE">Key Management for OSCORE Groups in ACE</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-ace-key-groupcomm-oscore-15"/>
    <author initials="M." surname="Tiloca" fullname="Marco Tiloca">
      <organization>RISE AB</organization>
      <address>
        <postal>
          <street>Isafjordsgatan 22</street>
          <city>Kista</city>
          <code>164 29 Stockholm</code>
          <country>Sweden</country>
        </postal>
        <email>marco.tiloca@ri.se</email>
      </address>
    </author>
    <author initials="J." surname="Park" fullname="Jiye Park">
      <organization>Universitaet Duisburg-Essen</organization>
      <address>
        <postal>
          <street>Schuetzenbahn 70</street>
          <city>Essen</city>
          <code>45127</code>
          <country>Germany</country>
        </postal>
        <email>ji-ye.park@uni-due.de</email>
      </address>
    </author>
    <author initials="F." surname="Palombini" fullname="Francesca Palombini">
      <organization>Ericsson AB</organization>
      <address>
        <postal>
          <street>Torshamnsgatan 23</street>
          <city>Kista</city>
          <code>16440 Stockholm</code>
          <country>Sweden</country>
        </postal>
        <email>francesca.palombini@ericsson.com</email>
      </address>
    </author>
    <date year="2022" month="September" day="05"/>
    <area>Security</area>
    <workgroup>ACE Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document defines an application profile of the ACE framework for Authentication and Authorization, to request and provision keying material in group communication scenarios that are based on CoAP and are secured with Group Object Security for Constrained RESTful Environments (Group OSCORE). This application profile delegates the authentication and authorization of Clients, that join an OSCORE group through a Resource Server acting as Group Manager for that group. This application profile leverages protocol-specific transport profiles of ACE to achieve communication security, server authentication and proof-of-possession for a key owned by the Client and bound to an OAuth 2.0 Access Token.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="sec-introduction">
      <name>Introduction</name>
      <t>Object Security for Constrained RESTful Environments (OSCORE) <xref target="RFC8613"/> is a method for application-layer protection of the Constrained Application Protocol (CoAP) <xref target="RFC7252"/>, using CBOR Object Signing and Encryption (COSE) <xref target="RFC9052"/><xref target="RFC9053"/> and enabling end-to-end security of CoAP payload and options.</t>
      <t>As described in <xref target="I-D.ietf-core-oscore-groupcomm"/>, Group OSCORE is used to protect CoAP group communication <xref target="I-D.ietf-core-groupcomm-bis"/>, which can employ, for example, IP multicast as underlying data transport. This relies on a Group Manager, which is responsible for managing an OSCORE group and enables the group members to exchange CoAP messages secured with Group OSCORE. The Group Manager can be responsible for multiple groups, coordinates the joining process of new group members, and is entrusted with the distribution and renewal of group keying material.</t>
      <t>This document is an application profile of <xref target="I-D.ietf-ace-key-groupcomm"/>, which itself builds on the ACE framework for Authentication and Authorization <xref target="RFC9200"/>. Message exchanges among the participants as well as message formats and processing follow what specified in <xref target="I-D.ietf-ace-key-groupcomm"/> for provisioning and renewing keying material in group communication scenarios, where Group OSCORE is used to protect CoAP group communication.</t>
      <section anchor="ssec-terminology">
        <name>Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/><xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>
        <t>Readers are expected to be familiar with:</t>
        <ul spacing="normal">
          <li>The terms and concepts described in the ACE framework for authentication and authorization <xref target="RFC9200"/> and in the Authorization Information Format (AIF) <xref target="RFC9237"/> to express authorization information. The terminology for entities in the considered architecture is defined in OAuth 2.0 <xref target="RFC6749"/>. In particular, this includes Client (C), Resource Server (RS), and Authorization Server (AS).</li>
          <li>The terms and concept related to the message formats and processing specified in <xref target="I-D.ietf-ace-key-groupcomm"/>, for provisioning and renewing keying material in group communication scenarios.</li>
          <li>The terms and concepts described in CBOR <xref target="RFC8949"/> and COSE <xref target="RFC9052"/><xref target="RFC9053"/>.</li>
          <li>The terms and concepts described in CoAP <xref target="RFC7252"/> and group communication for CoAP <xref target="I-D.ietf-core-groupcomm-bis"/>. Unless otherwise indicated, the term "endpoint" is used here following its OAuth definition, aimed at denoting resources such as /token and /introspect at the AS, and /authz-info at the RS. This document does not use the CoAP definition of "endpoint", which is "An entity participating in the CoAP protocol".</li>
          <li>
            <t>The terms and concepts for protection and processing of CoAP messages through OSCORE <xref target="RFC8613"/> and through Group OSCORE <xref target="I-D.ietf-core-oscore-groupcomm"/> in group communication scenarios. These especially include:  </t>
            <ul spacing="normal">
              <li>Group Manager, as the entity responsible for a set of groups where communications are secured with Group OSCORE. In this document, the Group Manager acts as Resource Server.</li>
              <li>Authentication credential, as the set of information associated with an entity, including that entity's public key and parameters associated with the public key. Examples of authentication credentials are CBOR Web Tokens (CWTs) and CWT Claims Sets (CCSs) <xref target="RFC8392"/>, X.509 certificates <xref target="RFC7925"/> and C509 certificates <xref target="I-D.ietf-cose-cbor-encoded-cert"/>.</li>
            </ul>
          </li>
        </ul>
        <t>Additionally, this document makes use of the following terminology.</t>
        <ul spacing="normal">
          <li>Requester: member of an OSCORE group that sends request messages to other members of the group.</li>
          <li>Responder: member of an OSCORE group that receives request messages from other members of the group. A responder may reply back, by sending a response message to the requester which has sent the request message.</li>
          <li>Monitor: member of an OSCORE group that is configured as responder and never replies back to requesters after receiving request messages. This corresponds to the term "silent server" used in <xref target="I-D.ietf-core-oscore-groupcomm"/>.</li>
          <li>Signature verifier: entity external to the OSCORE group and intended to verify the signature of messages exchanged in the group (see Sections <xref target="I-D.ietf-core-oscore-groupcomm" section="3.1" sectionFormat="bare"/> and <xref target="I-D.ietf-core-oscore-groupcomm" section="8.5" sectionFormat="bare"/> of <xref target="I-D.ietf-core-oscore-groupcomm"/>). An authorized signature verifier does not join the OSCORE group as an actual member, yet it can retrieve the authentication credentials of the current group members from the Group Manager.</li>
          <li>Signature-only group: an OSCORE group that uses only the group mode (see <xref section="8" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>).</li>
          <li>Pairwise-only group: an OSCORE group that uses only the pairwise mode (see <xref section="9" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>).</li>
        </ul>
      </section>
    </section>
    <section anchor="sec-protocol-overview">
      <name>Protocol Overview</name>
      <t>Group communication for CoAP has been enabled in <xref target="I-D.ietf-core-groupcomm-bis"/> and can be secured with Group Object Security for Constrained RESTful Environments (Group OSCORE) as specified in <xref target="I-D.ietf-core-oscore-groupcomm"/>. A network node joins an OSCORE group by interacting with the responsible Group Manager. Once registered in the group, the new node can securely exchange messages with other group members.</t>
      <t>This document describes how to use <xref target="I-D.ietf-ace-key-groupcomm"/> and <xref target="RFC9200"/> to perform a number of authentication, authorization and key distribution actions as overviewed in <xref section="2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, when the considered group is specifically an OSCORE group.</t>
      <t>With reference to <xref target="I-D.ietf-ace-key-groupcomm"/>:</t>
      <ul spacing="normal">
        <li>The node wishing to join the OSCORE group, i.e., the joining node, is the Client.</li>
        <li>The Group Manager is the Key Distribution Center (KDC), acting as a Resource Server.</li>
        <li>The Authorization Server associated with the Group Manager is the AS.</li>
      </ul>
      <t>A node performs the steps described in Sections <xref target="I-D.ietf-ace-key-groupcomm" section="3" sectionFormat="bare"/> and <xref target="I-D.ietf-ace-key-groupcomm" section="4.3.1.1" sectionFormat="bare"/> of <xref target="I-D.ietf-ace-key-groupcomm"/> in order to obtain an authorization for joining an OSCORE group and then to join that group. The format and processing of messages exchanged during such steps are further specified in <xref target="sec-joining-node-to-AS"/> and <xref target="sec-joining-node-to-GM"/> of this document.</t>
      <t>All communications between the involved entities MUST be secured.</t>
      <t>In particular, communications between the Client and the Group Manager leverage protocol-specific transport profiles of ACE to achieve communication security, proof-of-possession and server authentication. It is expected that, in the commonly referred base-case of this document, the transport profile to use is pre-configured and well-known to nodes participating in constrained applications.</t>
      <t>With respect to what is defined in <xref target="I-D.ietf-ace-key-groupcomm"/>:</t>
      <ul spacing="normal">
        <li>The interface provided by the Group Manager extends the original interface defined in <xref section="4.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/> for the KDC, as specified in <xref target="sec-interface-GM"/> of this document.</li>
        <li>In addition to those defined in <xref section="8" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, additional parameters are defined in this document and summarized in <xref target="ace-groupcomm-params"/>.</li>
        <li>In addition to those defined in <xref section="9" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, additional error identifiers are defined in this document and summarized in <xref target="error-types"/>.</li>
      </ul>
      <t>Finally, <xref target="profile-req"/> lists the specifications on this application profile of ACE, based on the requirements defined in Appendix A of <xref target="I-D.ietf-ace-key-groupcomm"/>.</t>
    </section>
    <section anchor="sec-format-scope">
      <name>Format of Scope</name>
      <t>Building on <xref section="3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, this section defines the exact format and encoding of scope used in this profile.</t>
      <t>To this end, this profile uses the Authorization Information Format (AIF) <xref target="RFC9237"/>. In particular, with reference to the generic AIF model</t>
      <artwork><![CDATA[
   AIF-Generic<Toid, Tperm> = [* [Toid, Tperm]]
]]></artwork>
      <t>the value of the CBOR byte string used as scope encodes the CBOR array [* [Toid, Tperm]], where each [Toid, Tperm] element corresponds to one scope entry.</t>
      <t>Furthermore, this document defines the new AIF specific data model AIF-OSCORE-GROUPCOMM, that this profile MUST use to format and encode scope entries.</t>
      <t>In particular, the following holds for each scope entry.</t>
      <ul spacing="normal">
        <li>The object identifier ("Toid") is specialized as a CBOR item specifying the name of the groups pertaining to the scope entry.</li>
        <li>The permission set ("Tperm") is specialized as a CBOR unsigned integer with value R, specifying the permissions that the Client wishes to have in the groups indicated by "Toid".</li>
      </ul>
      <t>More specifically, the following applies when, as defined in this document, a scope entry includes as set of permissions the set of roles to take in an OSCORE group.</t>
      <ul spacing="normal">
        <li>The object identifier ("Toid") is a CBOR text string, specifying the group name for the scope entry.</li>
        <li>
          <t>The permission set ("Tperm") is a CBOR unsigned integer with value R, specifying the role(s) that the Client wishes to take in the group (REQ1). The value R is computed as follows.  </t>
          <ul spacing="normal">
            <li>Each role in the permission set is converted into the corresponding numeric identifier X from the "Value" column of the "Group OSCORE Roles" registry, for which this document defines the entries in <xref target="fig-role-values"/>.</li>
            <li>The set of N numbers is converted into the single value R, by taking two to the power of each numeric identifier X_1, X_2, ..., X_N, and then computing the inclusive OR of the binary representations of all the power values.</li>
          </ul>
        </li>
      </ul>
      <figure anchor="fig-role-values">
        <name>Numeric identifier of roles in an OSCORE group</name>
        <artwork align="center"><![CDATA[
+-----------+-------+-------------------------------------------------+
| Name      | Value | Description                                     |
+===========+=======+=================================================+
| Reserved  | 0     | This value is reserved                          |
|-----------+-------+-------------------------------------------------+
| Requester | 1     | Send requests; receive responses                |
|-----------+-------+-------------------------------------------------+
| Responder | 2     | Send responses; receive requests                |
+-----------+-------+-------------------------------------------------+
| Monitor   | 3     | Receive requests; never send requests/responses |
|-----------+-------+-------------------------------------------------|
| Verifier  | 4     | Verify signature of intercepted messages        |
+-----------+-------+-------------------------------------------------+
]]></artwork>
      </figure>
      <t>The following CDDL <xref target="RFC8610"/> notation defines a scope entry that uses the AIF-OSCORE-GROUPCOMM data model and expresses a set of Group OSCORE roles from those in <xref target="fig-role-values"/>.</t>
      <artwork><![CDATA[
   AIF-OSCORE-GROUPCOMM = AIF-Generic<oscore-gname, oscore-gperm>

   oscore-gname = tstr  ; Group name
   oscore-gperm = uint . bits group-oscore-roles

   group-oscore-roles = &(
      Requester: 1,
      Responder: 2,
      Monitor: 3,
      Verifier: 4
   )

   scope_entry = [oscore-gname, oscore-gperm]
]]></artwork>
      <t>Future specifications that define new Group OSCORE roles MUST register a corresponding numeric identifier in the "Group OSCORE Roles" registry defined in <xref target="ssec-iana-group-oscore-roles-registry"/> of this document.</t>
      <t>Note that the value 0 is not available to use as numeric identifier to specify a Group OSCORE role. It follows that, when expressing Group OSCORE roles to take in a group as per this document, a scope entry has the least significant bit of "Tperm" always set to 0.</t>
      <t>This is an explicit feature of the AIF-OSCORE-GROUPCOMM data model. That is, for each scope entry, the least significant bit of "Tperm" set to 0 explicitly identifies the scope entry as exactly expressing a set of Group OSCORE roles ("Tperm"), pertaining to a single group whose name is specified by the string literal in "Toid".</t>
      <t>Instead, by relying on the same AIF-OSCORE-GROUPCOMM data model, <xref target="I-D.ietf-ace-oscore-gm-admin"/> defines the format of scope entries for Administrator Clients that wish to access an admin interface at the Group Manager. In such scope entries, the least significant bit of "Tperm" is always set to 1.</t>
    </section>
    <section anchor="sec-public-keys-of-joining-nodes">
      <name>Authentication Credentials</name>
      <t>Source authentication of a message sent within the group and protected with Group OSCORE is ensured by means of a digital signature embedded in the message (in group mode), or by integrity-protecting the message with pairwise keying material derived from the asymmetric keys of sender and recipient (in pairwise mode).</t>
      <t>Therefore, group members must be able to retrieve each other's authentication credential from a trusted repository, in order to verify source authenticity of incoming group messages.</t>
      <t>As also discussed in <xref target="I-D.ietf-core-oscore-groupcomm"/>, the Group Manager acts as trusted repository of the authentication credentials of the group members, and provides those authentication credentials to group members if requested to. Upon joining an OSCORE group, a joining node is thus expected to provide its own authentication credential to the Group Manager.</t>
      <t>In particular, one of the following four cases can occur when a new node joins an OSCORE group.</t>
      <ul spacing="normal">
        <li>The joining node is going to join the group exclusively as monitor, i.e., it is not going to send messages to the group. In this case, the joining node is not required to provide its own authentication credential to the Group Manager, which thus does not have to perform any check related to the format of the authentication credential, to a signature or ECDH algorithm, and to possible parameters associated with the algorithm and the public key. In case the joining node still provides an authentication credential in the 'client_cred' parameter of the Join Request (see <xref target="ssec-join-req-sending"/>), the Group Manager silently ignores that parameter, as well as the related parameters 'cnonce' and 'client_cred_verify'.</li>
        <li>The Group Manager already acquired the authentication credential of the joining node during a past joining process. In this case, the joining node MAY choose not to provide again its own authentication credential to the Group Manager, in order to limit the size of the Join Request. The joining node MUST provide its own authentication credential again if it has provided the Group Manager with multiple authentication credentials during past joining processes, intended for different OSCORE groups. If the joining node provides its own authentication credential, the Group Manager performs consistency checks as per <xref target="ssec-join-req-processing"/> and, in case of success, considers it as the authentication credential associated with the joining node in the OSCORE group.</li>
        <li>
          <t>The joining node and the Group Manager use an asymmetric proof-of-possession key to establish a secure communication association. Then, two cases can occur.  </t>
          <ol spacing="normal" type="1"><li>
              <t>When establishing the secure communication association, the Group Manager obtained from the joining node the joining node's authentication credential, in the format used in the OSCORE group and including the asymmetric proof-of-possession key as public key. Also, such authentication credential and the proof-of-possession key are compatible with the signature or ECDH algorithm, and possible associated parameters used in the OSCORE group.      </t>
              <t>
In this case, the Group Manager considers the authentication credential as the one associated with the joining node in the OSCORE group. If the joining node is aware that the authentication credential and the public key included thereof are also valid for the OSCORE group, then the joining node MAY choose to not provide again its own authentication credential to the Group Manager.      </t>
              <t>
The joining node MUST provide again its own authentication credential if it has provided the Group Manager with multiple authentication credentials during past joining processes, intended for different OSCORE groups. If the joining node provides its own authentication credential in the 'client_cred' parameter of the Join Request (see <xref target="ssec-join-req-sending"/>), the Group Manager performs consistency checks as per <xref target="ssec-join-req-processing"/> and, in case of success, considers it as the authentication credential associated with the joining node in the OSCORE group.</t>
            </li>
            <li>
              <t>The authentication credential is not in the format used in the OSCORE group, or else the authentication credential and the proof-of-possession key included as public key are not compatible with the signature or ECDH algorithm, and possible associated parameters used in the OSCORE group.      </t>
              <t>
In this case, the joining node MUST provide a different compatible authentication credential and public key included thereof to the Group Manager in the 'client_cred' parameter of the Join Request (see <xref target="ssec-join-req-sending"/>). Then, the Group Manager performs consistency checks on this latest provided authentication credential as per <xref target="ssec-join-req-processing"/> and, in case of success, considers it as the authentication credential associated with the joining node in the OSCORE group.</t>
            </li>
          </ol>
        </li>
        <li>The joining node and the Group Manager use a symmetric proof-of-possession key to establish a secure communication association. In this case, upon performing a joining process with that Group Manager for the first time, the joining node specifies its own authentication credential in the 'client_cred' parameter of the Join Request (see <xref target="ssec-join-req-sending"/>).</li>
      </ul>
    </section>
    <section anchor="sec-joining-node-to-AS">
      <name>Authorization to Join a Group</name>
      <t>This section builds on <xref section="3" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/> and is organized as follows.</t>
      <t>First, <xref target="ssec-auth-req"/> and <xref target="ssec-auth-resp"/> describe how the joining node interacts with the AS, in order to be authorized to join an OSCORE group under a given Group Manager and to obtain an Access Token. Then, <xref target="ssec-token-post"/> describes how the joining node transfers the obtained Access Token to the Group Manager. The following considers a joining node that intends to contact the Group Manager for the first time.</t>
      <t>Note that what is defined in <xref section="3" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/> applies, and only additions or modifications to that specification are defined in this document.</t>
      <section anchor="ssec-auth-req">
        <name>Authorization Request</name>
        <t>The Authorization Request message is as defined in <xref section="3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, with the following additions.</t>
        <ul spacing="normal">
          <li>
            <t>If the 'scope' parameter is present:  </t>
            <ul spacing="normal">
              <li>
                <t>The value of the CBOR byte string encodes a CBOR array, whose format MUST follow the data model AIF-OSCORE-GROUPCOMM defined in <xref target="sec-format-scope"/>. In particular, for each OSCORE group to join:      </t>
                <ul spacing="normal">
                  <li>The group name is encoded as a CBOR text string.</li>
                  <li>The set of requested roles is expressed as a single CBOR unsigned integer. This is computed as defined in <xref target="sec-format-scope"/>, from the numerical abbreviations of each requested role defined in the "Group OSCORE Roles" registry, for which this document defines the entries in <xref target="fig-role-values"/> (REQ1).</li>
                </ul>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="ssec-auth-resp">
        <name>Authorization Response</name>
        <t>The Authorization Response message is as defined in <xref section="3.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, with the following additions:</t>
        <ul spacing="normal">
          <li>The AS MUST include the 'expires_in' parameter. Other means for the AS to specify the lifetime of Access Tokens are out of the scope of this document.</li>
          <li>The AS MUST include the 'scope' parameter, when the value included in the Access Token differs from the one specified by the joining node in the Authorization Request. In such a case, the second element of each scope entry MUST be present, and specifies the set of roles that the joining node is actually authorized to take in the OSCORE group for that scope entry, encoded as specified in <xref target="ssec-auth-req"/>.</li>
        </ul>
        <t>Furthermore, the AS MAY use the extended format of scope defined in <xref section="7" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/> for the 'scope' claim of the Access Token. In such a case, the AS MUST use the CBOR tag with tag number TAG_NUMBER, associated with the CoAP Content-Format CF_ID for the media type application/aif+cbor registered in <xref target="ssec-iana-coap-content-format-registry"/> of this document (REQ28).</t>
        <t>Note to RFC Editor: In the previous paragraph, please replace "TAG_NUMBER" with the CBOR tag number computed as TN(ct) in <xref section="4.3" sectionFormat="of" target="RFC9277"/>, where ct is the ID assigned to the CoAP Content-Format registered in <xref target="ssec-iana-coap-content-format-registry"/> of this document. Then, please replace "CF_ID" with the ID assigned to that CoAP Content-Format. Finally, please delete this paragraph.</t>
        <t>This indicates that the binary encoded scope, as conveying the actual access control information, follows the scope semantics defined for this application profile in <xref target="sec-format-scope"/> of this document.</t>
      </section>
      <section anchor="ssec-token-post">
        <name>Token Transferring</name>
        <t>The exchange of Token Transfer Request and Token Transfer Response is defined in <xref section="3.3" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. In addition to that, the following applies.</t>
        <ul spacing="normal">
          <li>
            <t>The Token Transfer Request MAY additionally contain the following parameters, which, if included, MUST have the corresponding values defined below (OPT2):  </t>
            <ul spacing="normal">
              <li>'ecdh_info' defined in <xref target="ecdh-info"/> of this document, with value the CBOR simple value "null" (0xf6) to request information about the ECDH algorithm, the ECDH algorithm parameters, the ECDH key parameters and the exact format of authentication credentials used in the groups that the Client has been authorized to join. This is relevant in case the joining node supports the pairwise mode of Group OSCORE <xref target="I-D.ietf-core-oscore-groupcomm"/>.</li>
              <li>'kdc_dh_creds' defined in <xref target="gm-dh-info"/> of this document, with value the CBOR simple value "null" (0xf6) to request the Diffie-Hellman authentication credentials of the Group Manager for the groups that the Client has been authorized to join. That is, each of such authentication credentials includes a Diffie-Hellman public key of the Group Manager. This is relevant in case the joining node supports the pairwise mode of Group OSCORE <xref target="I-D.ietf-core-oscore-groupcomm"/>.</li>
            </ul>
            <t>
Alternatively, the joining node may retrieve this information by other means.</t>
          </li>
          <li>
            <t>The 'kdcchallenge' parameter contains a dedicated nonce N_S generated by the Group Manager. For the N_S value, it is RECOMMENDED to use a 8-byte long random nonce. The joining node can use this nonce in order to prove the possession of its own private key, upon joining the group (see <xref target="ssec-join-req-sending"/>).  </t>
            <t>
The 'kdcchallenge' parameter MAY be omitted from the Token Transfer Response, if the 'scope' of the Access Token specifies only the role "monitor" or only the role "verifier" or only the two roles combined, for each and every of the specified groups.</t>
          </li>
          <li>
            <t>If the 'sign_info' parameter is present in the response, the following applies for each element 'sign_info_entry'.  </t>
            <ul spacing="normal">
              <li>'id' MUST NOT refer to OSCORE groups that are pairwise-only groups.</li>
              <li>'sign_alg' takes value from the "Value" column of the "COSE Algorithms" registry <xref target="COSE.Algorithms"/>.</li>
              <li>'sign_parameters' is a CBOR array. Its format and value are the same of the COSE capabilities array for the algorithm indicated in 'sign_alg', as specified for that algorithm in the "Capabilities" column of the "COSE Algorithms" registry <xref target="COSE.Algorithms"/> (REQ4).</li>
              <li>'sign_key_parameters' is a CBOR array. Its format and value are the same of the COSE capabilities array for the COSE key type of the keys used with the algorithm indicated in 'sign_alg', as specified for that key type in the "Capabilities" column of the "COSE Key Types" registry <xref target="COSE.Key.Types"/> (REQ5).</li>
              <li>
                <t>'cred_fmt' takes value from the "Label" column of the "COSE Header Parameters" registry <xref target="COSE.Header.Parameters"/> (REQ6). Consistently with <xref section="2.3" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>, acceptable values denote a format of authentication credential that MUST explicitly provide the public key as well as the comprehensive set of information related to the public key algorithm, including, e.g., the used elliptic curve (when applicable).      </t>
                <t>
At the time of writing this specification, acceptable formats of authentication credentials are CBOR Web Tokens (CWTs) and CWT Claims Sets (CCSs) <xref target="RFC8392"/>, X.509 certificates <xref target="RFC7925"/> and C509 certificates <xref target="I-D.ietf-cose-cbor-encoded-cert"/>. Further formats may be available in the future, and would be acceptable to use as long as they comply with the criteria defined above.      </t>
                <t>
[ As to CWTs and CCSs, the COSE Header Parameters 'kcwt' and 'kccs' are under pending registration requested by draft-ietf-lake-edhoc. ]      </t>
                <t>
[ As to C509 certificates, the COSE Header Parameters 'c5b' and 'c5c' are under pending registration requested by draft-ietf-cose-cbor-encoded-cert. ]</t>
              </li>
            </ul>
            <t>
This format is consistent with every signature algorithm currently considered in <xref target="RFC9053"/>, i.e., with algorithms that have only the COSE key type as their COSE capability. Appendix B of <xref target="I-D.ietf-ace-key-groupcomm"/> describes how the format of each 'sign_info_entry' can be generalized for possible future registered algorithms having a different set of COSE capabilities.</t>
          </li>
          <li>
            <t>If 'ecdh_info' is included in the Token Transfer Request, the Group Manager SHOULD include the 'ecdh_info' parameter in the Token Transfer Response, as per the format defined in <xref target="ecdh-info"/>. Note that the field 'id' of each 'ecdh_info_entry' specifies the name, or array of group names, for which that 'ecdh_info_entry' applies to.  </t>
            <t>
As an exception, the KDC MAY omit the 'ecdh_info' parameter in the Token Transfer Response even if 'ecdh_info' is included in the Token Transfer Request, in case all the groups that the Client is authorized to join are signature-only groups.</t>
          </li>
          <li>If 'kdc_dh_creds' is included in the Token Transfer Request and any of the groups that the Client has been authorized to join is a pairwise-only group, then the Group Manager MUST include the 'kdc_dh_creds' parameter in the Token Transfer Response, as per the format defined in <xref target="gm-dh-info"/>. Otherwise, if 'kdc_dh_creds' is included in the Token Transfer Request, the Group Manager MAY include the 'kdc_dh_creds' parameter in the Token Transfer Response. Note that the field 'id' specifies the group name, or array of group names, for which the corresponding 'kdc_dh_creds' applies to.</li>
        </ul>
        <t>Note that, other than through the above parameters as defined in <xref section="3.3" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, the joining node may have obtained such information by alternative means. For example, information conveyed in the 'sign_info' and 'ecdh_info' parameters may have been pre-configured, or the joining node may early retrieve it, e.g., by using the approach described in <xref target="I-D.tiloca-core-oscore-discovery"/> to discover the OSCORE group and the link to the associated group-membership resource at the Group Manager (OPT3).</t>
        <section anchor="ecdh-info">
          <name>'ecdh_info' Parameter</name>
          <t>The 'ecdh_info' parameter is an OPTIONAL parameter of the request and response messages exchanged between the Client and the authz-info endpoint at the RS (see <xref section="5.10.1." sectionFormat="of" target="RFC9200"/>).</t>
          <t>This parameter allows the Client and the RS to exchange information about an ECDH algorithm as well as about the authentication credentials and public keys to accordingly use for deriving Diffie-Hellman secrets. Its exact semantics and content are application specific.</t>
          <t>In this application profile, this parameter is used to exchange information about the ECDH algorithm as well as about the authentication credentials and public keys to be used with it, in the groups indicated by the transferred Acces Token as per its 'scope' claim (see <xref section="3.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>).</t>
          <t>When used in the Token Transfer Request sent to the Group Manager, the 'ecdh_info' parameter has value the CBOR simple value "null" (0xf6). This is done to ask for information about the ECDH algorithm as well as about the authentication credentials and public keys to be used to compute static-static Diffie-Hellman shared secrets <xref target="NIST-800-56A"/>, in the OSCORE groups that the Client has been authorized to join and that use the pairwise mode of Group OSCORE <xref target="I-D.ietf-core-oscore-groupcomm"/>.</t>
          <t>When used in the following Token Transfer Response from the Group Manager, the 'ecdh_info' parameter is a CBOR array of one or more elements. The number of elements is at most the number of OSCORE groups that the Client has been authorized to join.</t>
          <t>Each element contains information about ECDH parameters as well as about authentication credentials and public keys, for one or more OSCORE groups that use the pairwise mode of Group OSCORE and that the Client has been authorized to join. Each element is formatted as follows.</t>
          <ul spacing="normal">
            <li>The first element 'id' is the group name of the OSCORE group or an array of group names for the OSCORE groups for which the specified information applies. In particular 'id' MUST NOT refer to OSCORE groups that are signature-only groups.</li>
            <li>The second element 'ecdh_alg' is a CBOR integer or a CBOR text string indicating the ECDH algorithm used in the OSCORE group identified by 'gname'. Values are taken from the "Value" column of the "COSE Algorithms" registry <xref target="COSE.Algorithms"/>.</li>
            <li>The third element 'ecdh_parameters' is a CBOR array indicating the parameters of the ECDH algorithm used in the OSCORE group identified by 'gname'. Its format and value are the same of the COSE capabilities array for the algorithm indicated in 'ecdh_alg', as specified for that algorithm in the "Capabilities" column of the "COSE Algorithms" registry <xref target="COSE.Algorithms"/>.</li>
            <li>The fourth element 'ecdh_key_parameters' is a CBOR array indicating the parameters of the keys used with the ECDH algorithm in the OSCORE group identified by 'gname'. Its content depends on the value of 'ecdh_alg'. In particular, its format and value are the same of the COSE capabilities array for the COSE key type of the keys used with the algorithm indicated in 'ecdh_alg', as specified for that key type in the "Capabilities" column of the "COSE Key Types" registry <xref target="COSE.Key.Types"/>.</li>
            <li>The fifth element 'cred_fmt' is a CBOR integer indicating the format of authentication credentials used in the OSCORE group identified by 'gname'. It takes value from the "Label" column of the "COSE Header Parameters" registry <xref target="COSE.Header.Parameters"/> (REQ6). Acceptable values denote a format that MUST  provide the public key as well as the comprehensive set of information related to the public key algorithm, including, e.g., the used elliptic curve (when applicable). The same considerations and guidelines for the 'cred_fmt' element of 'sign_info' apply (see <xref target="ssec-token-post"/>).</li>
          </ul>
          <t>The CDDL notation <xref target="RFC8610"/> of the 'ecdh_info' parameter is given below.</t>
          <sourcecode type="CDDL"><![CDATA[
ecdh_info = ecdh_info_req / ecdh_info_resp

ecdh_info_req = null                  ; in the Token Transfer
                                      ; Request to the
                                      ; Group Manager

ecdh_info_res = [ + ecdh_info_entry ] ; in the Token Transfer
                                      ; Response from the
                                      ; Group Manager

ecdh_info_entry =
[
  id : gname / [ + gname ],
  ecdh_alg : int / tstr,
  ecdh_parameters : [ any ],
  ecdh_key_parameters : [ any ],
  cred_fmt = int
]

gname = tstr
]]></sourcecode>
          <t>This format is consistent with every ECDH algorithm currently defined in <xref target="RFC9053"/>, i.e., with algorithms that have only the COSE key type as their COSE capability. <xref target="sec-future-cose-algs"/> of this document describes how the format of each 'ecdh_info_entry' can be generalized for possible future registered algorithms having a different set of COSE capabilities.</t>
        </section>
        <section anchor="gm-dh-info">
          <name>'kdc_dh_creds' Parameter</name>
          <t>The 'kdc_dh_creds' parameter is an OPTIONAL parameter of the request and response messages exchanged between the Client and the authz-info endpoint at the RS (see <xref section="5.10.1." sectionFormat="of" target="RFC9200"/>).</t>
          <t>This parameter allows the Client to request and retrieve the Diffie-Hellman authentication credentials of the RS, i.e., authentication credentials including a Diffie-Hellman public key of the RS.</t>
          <t>In this application profile, this parameter is used to request and retrieve from the Group Manager its Diffie-Hellman authentication credentials to use, in the OSCORE groups that the Client has been authorized to join. The Group Manager has specifically a Diffie-Hellman authentication credential in an OSCORE group, and thus a Diffie-Hellman public key in that group, if and only if the group is a pairwise-only group. In this case, the early retrieval of the Group Manager's authentication credential is necessary in order for the joining node to prove the possession of its own private key, upon joining the group (see <xref target="ssec-join-req-sending"/>).</t>
          <t>When used in the Token Transfer Request sent to the Group Manager, the 'kdc_dh_creds' parameter has value the CBOR simple value "null" (0xf6). This is done to ask for the Diffie-Hellman authentication credentials that the Group Manager uses in the OSCORE groups that the Client has been authorized to join.</t>
          <t>When used in the following Token Transfer Response from the Group Manager, the 'kdc_dh_creds' parameter is a CBOR array of one or more elements. The number of elements is at most the number of OSCORE groups that the Client has been authorized to join.</t>
          <t>Each element 'kdc_dh_creds_entry' contains information about the Group Manager's Diffie-Hellman authentication credentials, for one or more OSCORE groups that are pairwise-only groups and that the Client has been authorized to join. Each element is formatted as follows.</t>
          <ul spacing="normal">
            <li>The first element 'id' is the group name of the OSCORE group or an array of group names for the OSCORE groups for which the specified information applies. In particular 'id' MUST refer exclusively to OSCORE groups that are pairwise-only groups.</li>
            <li>The second element 'cred_fmt' is a CBOR integer indicating the format of authentication credentials used in the OSCORE group identified by 'gname'. It takes value from the "Label" column of the "COSE Header Parameters" registry <xref target="COSE.Header.Parameters"/> (REQ6). Acceptable values denote a format that MUST explicitly provide the public key as well as comprehensive set of information related to the public key algorithm, including, e.g., the used elliptic curve (when applicable). The same considerations and guidelines for the 'cred_fmt' element of 'sign_info' apply (see <xref target="ssec-token-post"/>).</li>
            <li>The third element 'cred' is a CBOR byte string, which encodes the Group Manager's Diffie-Hellman authentication credential in its original binary representation made available to other endpoints in the group. In particular, the original binary representation complies with the format specified by the 'cred_fmt' element. Note that the authentication credential provides the comprehensive set of information related to its public key algorithm, i.e., the ECDH algorithm used in the OSCORE group as pairwise key agreement algorithm.</li>
          </ul>
          <t>The CDDL notation <xref target="RFC8610"/> of the 'kdc_dh_creds' parameter is given below.</t>
          <sourcecode type="CDDL"><![CDATA[
kdc_dh_creds = kdc_dh_creds_req / kdc_dh_creds_resp

kdc_dh_creds_req = null                     ; in the Token Transfer
                                            ; Request to the
                                            ; Group Manager

kdc_dh_creds_res = [ + kdc_dh_creds_entry ] ; in the Token Transfer
                                            ; Response from the
                                            ; Group Manager

kdc_dh_creds_entry =
[
  id : gname / [ + gname ],
  cred_fmt = int,
  cred = bstr
]

gname = tstr
]]></sourcecode>
        </section>
      </section>
    </section>
    <section anchor="sec-joining-node-to-GM">
      <name>Group Joining</name>
      <t>This section describes the interactions between the joining node and the Group Manager to join an OSCORE group. The message exchange between the joining node and the Group Manager consists of the messages defined in <xref section="4.3.1.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. Note that what is defined in <xref target="I-D.ietf-ace-key-groupcomm"/> applies, and only additions or modifications to that specification are defined in this document.</t>
      <section anchor="ssec-join-req-sending">
        <name>Send the Join Request</name>
        <t>The joining node requests to join the OSCORE group by sending a Join Request message to the related group-membership resource at the Group Manager, as per <xref section="4.3.1.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. Additionally to what is defined in <xref section="4.3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, the following applies.</t>
        <ul spacing="normal">
          <li>The 'scope' parameter MUST be included. Its value encodes one scope entry with the format defined in <xref target="sec-format-scope"/>, indicating the group name and the role(s) that the joining node wants to take in the group.</li>
          <li>
            <t>The 'get_creds' parameter is present only if the joining node wants to retrieve the authentication credentials of the group members from the Group Manager during the joining process (see <xref target="sec-public-keys-of-joining-nodes"/>). Otherwise, this parameter MUST NOT be present.  </t>
            <t>
If this parameter is present and its value is not the CBOR simple value "null" (0xf6), each element of the inner CBOR array 'role_filter' is encoded as a CBOR unsigned integer, with the same value of a permission set ("Tperm") indicating that role or combination of roles in a scope entry, as defined in <xref target="sec-format-scope"/>.</t>
          </li>
          <li>'cnonce' contains a dedicated nonce N_C generated by the joining node. For the N_C value, it is RECOMMENDED to use a 8-byte long random nonce.</li>
          <li>
            <t>The proof-of-possession (PoP) evidence included in 'client_cred_verify' is computed as defined below (REQ14). In either case, the N_S used to build the PoP input is as defined in <xref target="sssec-challenge-value"/>.  </t>
            <ul spacing="normal">
              <li>If the group is not a pairwise-only group, the PoP evidence MUST be a signature. The joining node computes the signature by using the same private key and signature algorithm it intends to use for signing messages in the OSCORE group.</li>
              <li>
                <t>If the group is a pairwise-only group, the PoP evidence MUST be a MAC computed as follows, by using the HKDF Algorithm HKDF SHA-256, which consists of composing the HKDF-Extract and HKDF-Expand steps <xref target="RFC5869"/>.      </t>
                <t>
MAC = HKDF(salt, IKM, info, L)      </t>
                <t>
The input parameters of HKDF are as follows.      </t>
                <ul spacing="normal">
                  <li>salt takes as value the empty byte string.</li>
                  <li>IKM is computed as a cofactor Diffie-Hellman shared secret, see Section 5.7.1.2 of <xref target="NIST-800-56A"/>, using the ECDH algorithm used in the OSCORE group. The joining node uses its own Diffie-Hellman private key and the Diffie-Hellman public key of the Group Manager. For X25519 and X448, the procedure is described in <xref section="5" sectionFormat="of" target="RFC7748"/>.</li>
                  <li>info takes as value the PoP input.</li>
                  <li>L is equal to 8, i.e., the size of the MAC, in bytes.</li>
                </ul>
              </li>
            </ul>
          </li>
        </ul>
        <section anchor="sssec-challenge-value">
          <name>Value of the N_S Challenge</name>
          <t>The value of the N_S challenge is determined as follows.</t>
          <ol spacing="normal" type="1"><li>If the joining node has provided the Access Token to the Group Manager by means of a Token Transfer Request to the /authz-info endpoint as in <xref target="ssec-token-post"/>, then N_S takes the same value of the most recent 'kdcchallenge' parameter received by the joining node from the Group Manager. This can be either the one specified in the Token Transfer Response, or the one possibly specified in a 4.00 (Bad Request) error response to a following Join Request (see <xref target="ssec-join-req-processing"/>).</li>
            <li>
              <t>If the provisioning of the Access Token to the Group Manager has relied on the DTLS profile of ACE <xref target="RFC9202"/>, and the Access Token was specified:  </t>
              <ul spacing="normal">
                <li>in the "psk_identity" field of the ClientKeyExchange message when using DTLS 1.2 <xref target="RFC6347"/>; or</li>
                <li>in the "identity" field of a PskIdentity within the PreSharedKeyExtension of the ClientHello message when using DTLS 1.3 <xref target="RFC9147"/>,</li>
              </ul>
              <t>
then N_S is an exporter value computed as defined in <xref section="7.5" sectionFormat="of" target="RFC8446"/>. Specifically, N_S is exported from the DTLS session between the joining node and the Group Manager, using an empty 'context_value', 32 bytes as 'key_length', and the exporter label "EXPORTER-ACE-Sign-Challenge-coap-group-oscore-app" defined in <xref target="ssec-iana-tls-esporter-label-registry"/> of this document.</t>
            </li>
          </ol>
          <t>It is up to applications to define how N_S is computed in further alternative settings.</t>
          <t><xref target="ssec-security-considerations-reusage-nonces"/> provides security considerations on the reusage of the N_S challenge.</t>
        </section>
      </section>
      <section anchor="ssec-join-req-processing">
        <name>Receive the Join Request</name>
        <t>The Group Manager processes the Join Request as defined in <xref section="4.3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, with the following additions.</t>
        <t>The Group Manager verifies the PoP evidence contained in 'client_cred_verify' as follows:</t>
        <ul spacing="normal">
          <li>As PoP input, the Group Manager uses the value of the 'scope' parameter from the Join Request as a CBOR byte string, concatenated with N_S encoded as a CBOR byte string, concatenated with N_C encoded as a CBOR byte string. In particular, N_S is determined as described in <xref target="sssec-challenge-value"/>, while N_C is the nonce provided in the 'cnonce' parameter of the Join Request.</li>
          <li>As public key of the joining node, the Group Manager uses either the one included in the authentication credential retrieved from the 'client_cred' parameter of the Join Request, or the one from the already stored authentication credential as acquired from previous interactions with the joining node (see <xref target="sec-public-keys-of-joining-nodes"/>).</li>
          <li>If the group is not a pairwise-only group, the PoP evidence is a signature. The Group Manager verifies it by using the public key of the joining node, as well as the signature algorithm used in the OSCORE group and possible corresponding parameters.</li>
          <li>If the group is a pairwise-only group, the PoP evidence is a MAC. The Group Manager recomputes the MAC through the same process taken by the joining node when preparing the value of the 'client_cred_verify' parameter for the Join Request (see <xref target="ssec-join-req-sending"/>), with the difference that the Group Manager uses its own Diffie-Hellman private key and the Diffie-Hellman public key of the joining node. The verification succeeds if and only if the recomputed MAC is equal to the MAC conveyed as PoP evidence in the Join Request.</li>
        </ul>
        <t>The Group Manager MUST reply with a 5.03 (Service Unavailable) error response in the following cases:</t>
        <ul spacing="normal">
          <li>There are currently no OSCORE Sender IDs available to assign in the OSCORE group and, at the same time, the joining node is not going to join the group exclusively as monitor. The response MUST have Content-Format set to application/ace-groupcomm+cbor and is formatted as defined in <xref section="4.1.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. The value of the 'error' field MUST be set to 4 ("No available node identifiers").</li>
          <li>The OSCORE group that the joining node has been trying to join is currently inactive (see <xref target="ssec-resource-active"/>). The response MUST have Content-Format set to application/ace-groupcomm+cbor and is formatted as defined in <xref section="4.1.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. The value of the 'error' field MUST be set to 9 ("Group currently not active").</li>
        </ul>
        <t>The Group Manager MUST reply with a 4.00 (Bad Request) error response in the following cases:</t>
        <ul spacing="normal">
          <li>The 'client_cred' parameter is present in the Join Request and its value is not an eligible authentication credential (e.g., it is not of the format accepted in the group).</li>
          <li>
            <t>The 'client_cred' parameter is not present in the Join Request while the joining node is not going to join the group exclusively as monitor, and any of the following conditions holds:  </t>
            <ul spacing="normal">
              <li>The Group Manager does not store an eligible authentication credential (e.g., of the format accepted in the group) for the joining node.</li>
              <li>The Group Manager stores multiple eligible authentication credentials (e.g., of the format accepted in the group) for the joining node.</li>
            </ul>
          </li>
          <li>The 'scope' parameter is not present in the Join Request, or it is present and specifies any set of roles not included in the following list: "requester", "responder", "monitor", ("requester", "responder"). Future specifications that define a new role for members of OSCORE groups MUST define possible sets of roles (including the new role and existing roles) that are acceptable to specify in the 'scope' parameter of a Join Request.</li>
          <li>The Join Request includes the 'client_cred' parameter but does not include both the 'cnonce' and 'client_cred_verify' parameters.</li>
        </ul>
        <t>In order to prevent the acceptance of Ed25519 and Ed448 public keys that cannot be successfully converted to Montgomery coordinates, and thus cannot be used for the derivation of pairwise keys (see <xref section="2.4.1" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>), the Group Manager MAY reply with a 4.00 (Bad Request) error response in case all the following conditions hold:</t>
        <ul spacing="normal">
          <li>The OSCORE group uses the pairwise mode of Group OSCORE.</li>
          <li>The OSCORE group uses EdDSA public keys <xref target="RFC8032"/>.</li>
          <li>
            <t>The authentication credential of the joining node from the 'client_cred' parameter includes a public key which:  </t>
            <ul spacing="normal">
              <li>Is for the elliptic curve Ed25519 and has its Y coordinate equal to -1 or 1 (mod p), with p = (2^255 - 19), see <xref section="4.1" sectionFormat="of" target="RFC7748"/>; or</li>
              <li>Is for the elliptic curve Ed448 and has its Y coordinate equal to -1 or 1 (mod p), with p =  (2^448 - 2^224 - 1), see <xref section="4.2" sectionFormat="of" target="RFC7748"/>.</li>
            </ul>
          </li>
        </ul>
        <t>A 4.00 (Bad Request) error response from the Group Manager to the joining node MUST have content format application/ace-groupcomm+cbor. The response payload is a CBOR map formatted as follows:</t>
        <ul spacing="normal">
          <li>If the group uses (also) the group mode of Group OSCORE, the CBOR map MUST contain the 'sign_info' parameter, whose CBOR label is defined in <xref section="8" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. This parameter has the same format of 'sign_info_res' defined in <xref section="3.3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. In particular, it includes a single element 'sign_info_entry' pertaining to the OSCORE group that the joining node has tried to join with the Join Request.</li>
          <li>If the group uses (also) the pairwise mode of Group OSCORE, the CBOR map MUST contain the 'ecdh_info' parameter, whose CBOR label is defined in <xref target="ssec-iana-ace-groupcomm-parameters-registry"/>. This parameter has the same format of 'ecdh_info_res' defined in <xref target="ecdh-info"/>. In particular, it includes a single element 'ecdh_info_entry' pertaining to the OSCORE group that the joining node has tried to join with the Join Request.</li>
          <li>If the group is a pairwise-only group, the CBOR map MUST contain the 'kdc_dh_creds' parameter, whose CBOR label is defined in <xref target="ssec-iana-ace-groupcomm-parameters-registry"/>. This parameter has the same format of 'kdc_dh_creds_res' defined in <xref target="gm-dh-info"/>. In particular, it includes a single element 'kdc_dh_creds_entry' pertaining to the OSCORE group that the joining node has tried to join with the Join Request.</li>
          <li>The CBOR map MAY include the 'kdcchallenge' parameter, whose CBOR label is defined in <xref section="8" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. If present, this parameter is a CBOR byte string, which encodes a newly generated 'kdcchallenge' value that the Client can use when preparing a Join Request (see <xref target="ssec-join-req-sending"/>). In such a case the Group Manager MUST store the newly generated value as the 'kdcchallenge' value associated with the joining node, possibly replacing the currently stored value.</li>
        </ul>
        <section anchor="follow-up-to-a-400-bad-request-error-response">
          <name>Follow-up to a 4.00 (Bad Request) Error Response</name>
          <t>When receiving a 4.00 (Bad Request) error response, the joining node MAY send a new Join Request to the Group Manager. In such a case:</t>
          <ul spacing="normal">
            <li>The 'cnonce' parameter MUST include a new dedicated nonce N_C generated by the joining node.</li>
            <li>The 'client_cred' parameter MUST include an authentication credential in the format indicated by the Group Manager. Also, the authentication credential as well as the included public key MUST be compatible with the signature or ECDH algorithm, and possible associated parameters.</li>
            <li>The 'client_cred_verify' parameter MUST include a PoP evidence computed as described in <xref target="ssec-join-req-sending"/>, by using the private key associated with the authentication credential specified in the current 'client_cred' parameter, with the signature or ECDH algorithm, and possible associated parameters indicated by the Group Manager. If the error response from the Group Manager includes the 'kdcchallenge' parameter, the joining node MUST use its content as new N_S challenge to compute the PoP evidence.</li>
          </ul>
        </section>
      </section>
      <section anchor="ssec-join-resp">
        <name>Send the Join Response</name>
        <t>If the processing of the Join Request described in <xref target="ssec-join-req-processing"/> is successful, the Group Manager updates the group membership by registering the joining node NODENAME as a new member of the OSCORE group GROUPNAME, as described in <xref section="4.3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>.</t>
        <t>If the joining node has not taken exclusively the role of monitor, the Group Manager performs also the following actions.</t>
        <ul spacing="normal">
          <li>
            <t>The Group Manager selects an available OSCORE Sender ID in the OSCORE group, and exclusively assigns it to the joining node. The Group Manager MUST NOT assign an OSCORE Sender ID to the joining node if this joins the group exclusively with the role of monitor, according to what is specified in the Access Token (see <xref target="ssec-auth-resp"/>).  </t>
            <t>
Consistently with <xref section="3.2.1" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>, the Group Manager MUST assign an OSCORE Sender ID that has not been used in the OSCORE group since the latest time when the current Gid value was assigned to the group.  </t>
            <t>
If the joining node is recognized as a current group member, e.g., through the ongoing secure communication association, the following also applies.  </t>
            <ul spacing="normal">
              <li>The Group Manager MUST assign a new OSCORE Sender ID different than the one currently used by the joining node in the OSCORE group.</li>
              <li>The Group Manager MUST add the old, relinquished OSCORE Sender ID of the joining node to the most recent set of stale Sender IDs, in the collection associated with the group (see <xref target="sssec-stale-sender-ids"/>).</li>
            </ul>
          </li>
          <li>The Group Manager stores the association between i) the authentication credential of the joining node; and ii) the Group Identifier (Gid), i.e., the OSCORE ID Context, associated with the OSCORE group together with the OSCORE Sender ID assigned to the joining node in the group. The Group Manager MUST keep this association updated over time.</li>
        </ul>
        <t>Then, the Group Manager replies to the joining node, providing the updated security parameters and keying meterial necessary to participate in the group communication. This success Join Response is formatted as defined in <xref section="4.3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, with the following additions:</t>
        <ul spacing="normal">
          <li>The 'gkty' parameter identifies a key of type "Group_OSCORE_Input_Material object", defined in <xref target="ssec-iana-groupcomm-keys-registry"/> of this document.</li>
          <li>
            <t>The 'key' parameter includes what the joining node needs in order to set up the Group OSCORE Security Context as per <xref section="2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>.  </t>
            <t>
This parameter has as value a Group_OSCORE_Input_Material object, which is defined in this document and extends the OSCORE_Input_Material object encoded in CBOR as defined in <xref section="3.2.1" sectionFormat="of" target="RFC9203"/>. In particular, it contains the additional parameters 'group_senderId', 'cred_fmt', 'sign_enc_alg', 'sign_alg', 'sign_params', 'ecdh_alg' and 'ecdh_params' defined in <xref target="ssec-iana-security-context-parameter-registry"/> of this document.  </t>
            <t>
More specifically, the 'key' parameter is composed as follows.  </t>
            <ul spacing="normal">
              <li>The 'hkdf' parameter, if present, specifies the HKDF Algorithm used in the OSCORE group. The HKDF Algorithm is specified by the HMAC Algorithm value. This parameter MAY be omitted, if the HKDF Algorithm used in the group is HKDF SHA-256. Otherwise, this parameter MUST be present.</li>
              <li>The 'salt' parameter, if present, has as value the OSCORE Master Salt used in the OSCORE group. This parameter MAY be omitted, if the Master Salt used in the group is the empty byte string. Otherwise, this parameter MUST be present.</li>
              <li>The 'ms' parameter includes the OSCORE Master Secret value used in the OSCORE group. This parameter MUST be present.</li>
              <li>The 'contextId' parameter has as value the Group Identifier (Gid), i.e., the OSCORE ID Context of the OSCORE group. This parameter MUST be present.</li>
              <li>The 'group_senderId' parameter has as value the OSCORE Sender ID assigned to the joining node by the Group Manager, as described above. This parameter MUST be present if and only if the node does not join the OSCORE group exclusively with the role of monitor, according to what is specified in the Access Token (see <xref target="ssec-auth-resp"/>).</li>
              <li>
                <t>The 'cred_fmt' parameter specifies the format of authentication credentials used in the OSCORE group. This parameter MUST be present and it takes value from the "Label" column of the "COSE Header Parameters" registry <xref target="COSE.Header.Parameters"/> (REQ6). Consistently with <xref section="2.3" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>, acceptable values denote a format that MUST explicitly provide the public key as well as the comprehensive set of information related to the public key algorithm, including, e.g., the used elliptic curve (when applicable).      </t>
                <t>
At the time of writing this specification, acceptable formats of authentication credentials are CBOR Web Tokens (CWTs) and CWT Claims Sets (CCSs) <xref target="RFC8392"/>, X.509 certificates <xref target="RFC7925"/> and C509 certificates <xref target="I-D.ietf-cose-cbor-encoded-cert"/>. Further formats may be available in the future, and would be acceptable to use as long as they comply with the criteria defined above.      </t>
                <t>
[ As to CWTs and CCSs, the COSE Header Parameters 'kcwt' and 'kccs' are under pending registration requested by draft-ietf-lake-edhoc. ]      </t>
                <t>
[ As to C509 certificates, the COSE Header Parameters 'c5b' and 'c5c' are under pending registration requested by draft-ietf-cose-cbor-encoded-cert. ]</t>
              </li>
            </ul>
            <t>
The 'key' parameter MUST also include the following parameters, if and only if the OSCORE group is not a pairwise-only group.  </t>
            <ul spacing="normal">
              <li>The 'sign_enc_alg' parameter, specifying the Signature Encryption Algorithm used in the OSCORE group to encrypt messages protected with the group mode. This parameter takes values from the "Value" column of the "COSE Algorithms" registry <xref target="COSE.Algorithms"/>.</li>
              <li>The 'sign_alg' parameter, specifying the Signature Algorithm used to sign messages in the OSCORE group. This parameter takes values from the "Value" column of the "COSE Algorithms" registry <xref target="COSE.Algorithms"/>.</li>
              <li>
                <t>The 'sign_params' parameter, specifying the parameters of the Signature Algorithm. This parameter is a CBOR array, which includes the following two elements:      </t>
                <ul spacing="normal">
                  <li>'sign_alg_capab': a CBOR array, with the same format and value of the COSE capabilities array for the Signature Algorithm indicated in 'sign_alg', as specified for that algorithm in the "Capabilities" column of the "COSE Algorithms" registry <xref target="COSE.Algorithms"/>.</li>
                  <li>'sign_key_type_capab': a CBOR array, with the same format and value of the COSE capabilities array for the COSE key type of the keys used with the Signature Algorithm indicated in 'sign_alg', as specified for that key type in the "Capabilities" column of the "COSE Key Types" registry <xref target="COSE.Key.Types"/>.</li>
                </ul>
              </li>
            </ul>
            <t>
The 'key' parameter MUST also include the following parameters, if and only if the OSCORE group is not a signature-only group.  </t>
            <ul spacing="normal">
              <li>The 'alg' parameter, specifying the AEAD Algorithm used in the OSCORE group to encrypt messages protected with the pairwise mode.</li>
              <li>The 'ecdh_alg' parameter, specifying the Pairwise Key Agreement Algorithm used in the OSCORE group. This parameter takes values from the "Value" column of the "COSE Algorithms" registry <xref target="COSE.Algorithms"/>.</li>
              <li>
                <t>The 'ecdh_params' parameter, specifying the parameters of the Pairwise Key Agreement Algorithm. This parameter is a CBOR array, which includes the following two elements:      </t>
                <ul spacing="normal">
                  <li>'ecdh_alg_capab': a CBOR array, with the same format and value of the COSE capabilities array for the algorithm indicated in 'ecdh_alg', as specified for that algorithm in the "Capabilities" column of the "COSE Algorithms" registry <xref target="COSE.Algorithms"/>.</li>
                  <li>'ecdh_key_type_capab': a CBOR array, with the same format and value of the COSE capabilities array for the COSE key type of the keys used with the algorithm indicated in 'ecdh_alg', as specified for that key type in the "Capabilities" column of the "COSE Key Types" registry <xref target="COSE.Key.Types"/>.</li>
                </ul>
              </li>
            </ul>
            <t>
The format of 'key' defined above is consistent with every signature algorithm and ECDH algorithm currently considered in <xref target="RFC9053"/>, i.e., with algorithms that have only the COSE key type as their COSE capability. <xref target="sec-future-cose-algs"/> of this document describes how the format of the 'key' parameter can be generalized for possible future registered algorithms having a different set of COSE capabilities.</t>
          </li>
        </ul>
        <t>Furthermore, the following applies.</t>
        <ul spacing="normal">
          <li>The 'exp' parameter MUST be present.</li>
          <li>The 'ace-groupcomm-profile' parameter MUST be present and has value coap_group_oscore_app (PROFILE_TBD), which is defined in <xref target="ssec-iana-groupcomm-profile-registry"/> of this document.</li>
          <li>
            <t>The 'creds' parameter, if present, includes the authentication credentials requested by the joining node by means of the 'get_creds' parameter in the Join Request.  </t>
            <t>
If the joining node has asked for the authentication credentials of all the group members, i.e., 'get_creds' had value the CBOR simple value "null" (0xf6) in the Join Request, then the Group Manager provides only the authentication credentials of the group members that are relevant to the joining node. That is, in such a case, 'creds' includes only: i) the authentication credentials of the responders currently in the OSCORE group, in case the joining node is configured (also) as requester; and ii) the authentication credentials of the requesters currently in the OSCORE group, in case the joining node is configured (also) as responder or monitor.</t>
          </li>
          <li>The 'peer_identifiers' parameter includes the OSCORE Sender ID of each group member whose authentication credential is specified in the 'creds' parameter. That is, a group member's Sender ID is used as identifier for that group member (REQ25).</li>
          <li>
            <t>The 'group_policies' parameter SHOULD be present, and SHOULD include the following elements:  </t>
            <ul spacing="normal">
              <li>"Key Update Check Interval" defined in <xref section="4.3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, with default value 3600;</li>
              <li>"Expiration Delta" defined in <xref section="4.3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, with default value 0.</li>
            </ul>
          </li>
          <li>The 'kdc_cred' parameter MUST be present, specifying the Group Manager's authentication credential in its original binary representation (REQ8). The Group Manager's authentication credential MUST be in the format used in the OSCORE group. Also, the authentication credential as well as the included public key MUST be compatible with the signature or ECDH algorithm, and possible associated parameters used in the OSCORE group.</li>
          <li>The 'kdc_nonce' parameter MUST be present, specifying the dedicated nonce N_KDC generated by the Group Manager. For N_KDC, it is RECOMMENDED to use a 8-byte long random nonce.</li>
          <li>
            <t>The 'kdc_cred_verify' parameter MUST be present, specifying the proof-of-possession (PoP) evidence computed by the Group Manager. The PoP evidence is computed over the nonce N_KDC, which is specified in the 'kdc_nonce' parameter and taken as PoP input. The PoP evidence is computed as defined below (REQ21).  </t>
            <ul spacing="normal">
              <li>If the group is not a pairwise-only group, the PoP evidence MUST be a signature. The Group Manager computes the signature by using the signature algorithm used in the OSCORE group, as well as its own private key associated with the authentication credential specified in the 'kdc_cred' parameter.</li>
              <li>
                <t>If the group is a pairwise-only group, the PoP evidence MUST be a MAC computed as follows, by using the HKDF Algorithm HKDF SHA-256, which consists of composing the HKDF-Extract and HKDF-Expand steps <xref target="RFC5869"/>.      </t>
                <t>
MAC = HKDF(salt, IKM, info, L)      </t>
                <t>
The input parameters of HKDF are as follows.      </t>
                <ul spacing="normal">
                  <li>salt takes as value the empty byte string.</li>
                  <li>IKM is computed as a cofactor Diffie-Hellman shared secret, see Section 5.7.1.2 of <xref target="NIST-800-56A"/>, using the ECDH algorithm used in the OSCORE group. The Group Manager uses its own Diffie-Hellman private key and the Diffie-Hellman public key of the joining node. For X25519 and X448, the procedure is described in <xref section="5" sectionFormat="of" target="RFC7748"/>.</li>
                  <li>info takes as value the PoP input.</li>
                  <li>L is equal to 8, i.e., the size of the MAC, in bytes.</li>
                </ul>
              </li>
            </ul>
          </li>
          <li>The 'group_rekeying' parameter MAY be omitted, if the Group Manager uses the "Point-to-Point" group rekeying scheme registered in <xref section="11.12" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/> as rekeying scheme in the OSCORE group (OPT9). Its detailed use for this profile is defined in <xref target="sec-group-rekeying-process"/> of this document. In any other case, the 'group_rekeying' parameter MUST be included.</li>
        </ul>
        <t>As a last action, if the Group Manager reassigns Gid values during the group's lifetime (see <xref section="3.2.1.1" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>), then the Group Manager MUST store the Gid specified in the 'contextId' parameter of the 'key' parameter, as the Birth Gid of the joining node in the joined group (see <xref section="3" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>). This applies also in case the joining node is in fact re-joining the group; in such a case, the newly determined Birth Gid overwrites the one currently stored.</t>
      </section>
      <section anchor="ssec-join-resp-processing">
        <name>Receive the Join Response</name>
        <t>Upon receiving the Join Response, the joining node retrieves the Group Manager's authentication credential from the 'kdc_cred' parameter. The joining node MUST verify the proof-of-possession (PoP) evidence specified in the 'kdc_cred_verify' parameter of the Join Response as defined below (REQ21).</t>
        <ul spacing="normal">
          <li>If the group is not a pairwise-only group, the PoP evidence is a signature. The joining node verifies it by using the public key of the Group Manager from the received authentication credential, as well as the signature algorithm used in the OSCORE group and possible corresponding parameters.</li>
          <li>If the group is a pairwise-only group, the PoP evidence is a MAC. The joining node recomputes the MAC through the same process taken by the Group Manager when computing the value of the 'kdc_cred_verify' parameter (see <xref target="ssec-join-resp"/>), with the difference that the joining node uses its own Diffie-Hellman private key and the Diffie-Hellman public key of the Group Manager from the received authentication credential. The verification succeeds if and only if the recomputed MAC is equal to the MAC conveyed as PoP evidence in the Join Response.</li>
        </ul>
        <t>In case of failed verification of the PoP evidence, the joining node MUST stop processing the Join Response and MAY send a new Join Request to the Group Manager (see <xref target="ssec-join-req-sending"/>).</t>
        <t>In case of successful verification of the PoP evidence, the joining node uses the information received in the Join Response to set up the Group OSCORE Security Context, as described in <xref section="2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>. If the following parameters were not included in the 'key' parameter of the Join Response, the joining node considers the default values specified below, consistently with <xref section="3.2" sectionFormat="of" target="RFC8613"/>.</t>
        <ul spacing="normal">
          <li>Absent the 'hkdf' parameter, the joining node considers HKDF SHA-256 as HKDF Algorithm to use in the OSCORE group.</li>
          <li>Absent the 'salt' parameter, the joining node considers the empty byte string as Master Salt to use in the OSCORE group.</li>
          <li>Absent the 'group_rekeying' parameter, the joining node considers the "Point-to-Point" group rekeying scheme registered in <xref section="11.12" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/> as the rekeying scheme used in the group (OPT9). Its detailed use for this profile is defined in <xref target="sec-group-rekeying-process"/> of this document.</li>
        </ul>
        <t>In addition, the joining node maintains an association between each authentication credential retrieved from the 'creds' parameter and the role(s) that the corresponding group member has in the OSCORE group.</t>
        <t>From then on, the joining node can exchange group messages secured with Group OSCORE as described in <xref target="I-D.ietf-core-oscore-groupcomm"/>. When doing so:</t>
        <ul spacing="normal">
          <li>The joining node MUST NOT process an incoming request message, if protected by a group member whose authentication credential is not associated with the role "Requester".</li>
          <li>The joining node MUST NOT process an incoming response message, if protected by a group member whose authentication credential is not associated with the role "Responder".</li>
          <li>The joining node MUST NOT use the pairwise mode of Group OSCORE to process messages in the group, if the Join Response did not include the 'ecdh_alg' parameter.</li>
        </ul>
        <t>If the application requires backward security, the Group Manager MUST generate updated security parameters and group keying material, and provide it to the current group members, upon the new node's joining (see <xref target="sec-group-rekeying-process"/>). In such a case, the joining node is not able to access secure communication in the OSCORE group occurred prior its joining.</t>
      </section>
    </section>
    <section anchor="ssec-overview-group-rekeying-process">
      <name>Overview of the Group Rekeying Process</name>
      <t>In a number of cases, the Group Manager has to generate new keying material and distribute it to the group (rekeying), as also discussed in <xref section="3.2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>.</t>
      <t>To this end the Group Manager MUST support the Group Rekeying Process described in <xref target="sec-group-rekeying-process"/> of this document, as an instance of the "Point-to-Point" rekeying scheme defined in <xref section="6.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/> and registered in <xref section="11.12" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. Future documents may define the use of alternative group rekeying schemes for this application profile, together with the corresponding rekeying message formats. The resulting group rekeying process MUST comply with the functional steps defined in <xref section="3.2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>.</t>
      <t>Upon generating the new group keying material and before starting its distribution, the Group Manager MUST increment the version number of the group keying material. When rekeying a group, the Group Manager MUST preserve the current value of the OSCORE Sender ID of each member in that group.</t>
      <t>The data distributed to a group through a rekeying MUST include:</t>
      <ul spacing="normal">
        <li>The new version number of the group keying material for the group.</li>
        <li>
          <t>A new Group Identifier (Gid) for the group as introduced in <xref target="I-D.ietf-ace-key-groupcomm"/>, used as ID Context parameter of the Group OSCORE Common Security Context of that group (see <xref section="2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>).  </t>
          <t>
Note that the Gid differs from the group name also introduced in <xref target="I-D.ietf-ace-key-groupcomm"/>, which is a plain, stable and invariant identifier, with no cryptographic relevance and meaning.</t>
        </li>
        <li>A new value for the Master Secret parameter of the Group OSCORE Common Security Context of the group (see <xref section="2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>).</li>
        <li>A set of stale Sender IDs, which allows each rekeyed node to purge authentication credentials and Recipient Contexts used in the group and associated with those Sender IDs. This in turn allows every group member to rely on stored authentication credentials, in order to confidently assert the group membership of other sender nodes, when receiving protected messages in the group (see <xref section="3.2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>). More details on the maintenance of stale Sender IDs are provided in <xref target="sssec-stale-sender-ids"/>.</li>
      </ul>
      <t>Also, the data distributed through a group rekeying MAY include a new value for the Master Salt parameter of the Group OSCORE Common Security Context of that group.</t>
      <t>The Group Manager MUST rekey the group in the following cases.</t>
      <ul spacing="normal">
        <li>The application requires backward security - In this case, the group is rekeyed when a node joins the group as a new member. Therefore, a joining node cannot access communications in the group prior its joining.</li>
        <li>
          <t>One or more nodes leave the group - That is, the group is rekeyed when one or more current members spontaneously request to leave the group (see <xref target="sec-leave-req"/>), or when the Group Manager forcibly evicts them from the group, e.g., due to expired or revoked authorization (see <xref target="sec-leaving"/>). Therefore, a leaving node cannot access communications in the group after its leaving, thus ensuring forward security in the group.  </t>
          <t>
Due to the set of stale Sender IDs distributed through the rekeying, this ensures that a node owning the latest group keying material does not store the authentication credentials of former group members (see Sections <xref target="I-D.ietf-core-oscore-groupcomm" section="3.2" sectionFormat="bare"/> and <xref target="I-D.ietf-core-oscore-groupcomm" section="12.1" sectionFormat="bare"/> of <xref target="I-D.ietf-core-oscore-groupcomm"/>).</t>
        </li>
        <li>Extension of group lifetime - That is, the group is rekeyed when the expiration time for the group keying material approaches or has passed, if it is appropriate to extend the group operation beyond that.</li>
      </ul>
      <t>The Group Manager MAY rekey the group for other reasons, e.g., according to an application-specific rekeying period or scheduling.</t>
      <section anchor="sssec-stale-sender-ids">
        <name>Stale OSCORE Sender IDs</name>
        <t>Throughout the lifetime of every group, the Group Manager MUST maintain a collection of stale Sender IDs for that group.</t>
        <t>The collection associated with a group MUST include up to N &gt; 1 ordered sets of stale OSCORE Sender IDs. It is up to the application to specify the value of N, possibly on a per-group basis.</t>
        <t>The N-th set includes the Sender IDs that have become "stale" under the current version V of the group keying material. The (N - 1)-th set refers to the immediately previous version (V - 1) of the group keying material, and so on.</t>
        <t>In the following cases, the Group Manager MUST add a new element to the most recent set X, i.e., the set associated with the current version V of the group keying material.</t>
        <ul spacing="normal">
          <li>When a current group member obtains a new Sender ID, its old Sender ID is added to X. This happens when the Group Manager assigns a new Sender ID upon request from the group member (see <xref target="sec-new-key"/>), or in case the group member re-joins the group (see <xref target="ssec-join-req-sending"/> and <xref target="ssec-join-resp"/>), thus also obtaining a new Sender ID.</li>
          <li>When a current group member leaves the group, its current Sender ID is added to X. This happens when a group member requests to leave the group (see <xref target="sec-leave-req"/>) or is forcibly evicted from the group (see <xref target="sec-leaving"/>).</li>
        </ul>
        <t>The value of N can change throughout the lifetime of the group. If the new value N' is smaller than N, the Group Manager MUST preserve the (up to) N' most recent sets in the collection and MUST delete any possible older set from the collection.</t>
        <t>Finally, the Group Manager MUST perform the following actions, when the group is rekeyed and the group shifts to the next version V' = (V + 1) of the group keying material.</t>
        <ol spacing="normal" type="1"><li>The Group Manager rekeys the group. This includes also distributing the set of stale Sender IDs X associated with the old group keying material with version V (see <xref target="ssec-overview-group-rekeying-process"/>).</li>
          <li>After completing the group rekeying, the Group Manager creates a new empty set X' associated with the new version V' of the newly established group keying material, i.e., V' = (V + 1).</li>
          <li>If the current collection of stale Sender IDs has size N, the Group Manager deletes the oldest set in the collection.</li>
          <li>The Group Manager adds the new set X' to the collection of stale Sender IDs, as the most recent set.</li>
        </ol>
      </section>
    </section>
    <section anchor="sec-interface-GM">
      <name>Interface at the Group Manager</name>
      <t>The Group Manager provides the interface defined in <xref section="4.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, with the additional sub-resources defined from <xref target="ssec-resource-active"/> to <xref target="ssec-resource-stale-sids"/> of this document.</t>
      <t>Furthermore, <xref target="ssec-admitted-methods"/> provides a summary of the CoAP methods admitted to access different resources at the Group Manager, for nodes with different roles in the group or as non members (REQ11).</t>
      <t>The GROUPNAME segment of the URI path MUST match with the group name specified in the scope entry of the Access Token scope (i.e., 'gname' in <xref section="3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>) (REQ7).</t>
      <t>The Resource Type (rt=) Link Target Attribute value "core.osc.gm" is registered in <xref target="iana-rt"/> (REQ10), and can be used to describe group-membership resources and its sub-resources at a Group Manager, e.g., by using a link-format document <xref target="RFC6690"/>.</t>
      <t>Applications can use this common resource type to discover links to group-membership resources for joining OSCORE groups, e.g., by using the approach described in <xref target="I-D.tiloca-core-oscore-discovery"/>.</t>
      <section anchor="ssec-resource-active">
        <name>ace-group/GROUPNAME/active</name>
        <t>This resource implements a GET handler.</t>
        <section anchor="active-get">
          <name>GET Handler</name>
          <t>The handler expects a GET request.</t>
          <t>In addition to what is defined in <xref section="4.1.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, the handler verifies that the requesting Client is a current member of the group. If the verification fails, the KDC MUST reply with a 4.03 (Forbidden) error response. The response MUST have Content-Format set to application/ace-groupcomm+cbor and is formatted as defined in <xref section="4.1.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. The value of the 'error' field MUST be set to 0 ("Operation permitted only to group members").</t>
          <t>If all verifications succeed, the handler replies with a 2.05 (Content) response, specifying the current status of the group, i.e., active or inactive. The payload of the response is formatted as defined in <xref target="sec-status"/>.</t>
          <t>The method to set the current group status is out of the scope of this document, and is defined for the administrator interface of the Group Manager specified in <xref target="I-D.ietf-ace-oscore-gm-admin"/>.</t>
        </section>
      </section>
      <section anchor="ssec-resource-verif-data">
        <name>ace-group/GROUPNAME/verif-data</name>
        <t>This resource implements a GET handler.</t>
        <section anchor="verif-data-get">
          <name>GET Handler</name>
          <t>The handler expects a GET request.</t>
          <t>In addition to what is defined in <xref section="4.1.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, the Group Manager performs the following checks.</t>
          <t>If the requesting Client is a current group member, the Group Manager MUST reply with a 4.03 (Forbidden) error response. The response MUST have Content-Format set to application/ace-groupcomm+cbor and is formatted as defined in <xref section="4.1.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. The value of the 'error' field MUST be set to 8 ("Operation permitted only to signature verifiers").</t>
          <t>If GROUPNAME denotes a pairwise-only group, the Group Manager MUST reply with a 4.00 (Bad Request) error response. The response MUST have Content-Format set to application/ace-groupcomm+cbor and is formatted as defined in <xref section="4.1.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. The value of the 'error' field MUST be set to 7 ("Signatures not used in the group").</t>
          <t>If all verifications succeed, the handler replies with a 2.05 (Content) response, specifying data that allow also an external signature verifier to verify signatures of messages protected with the group mode and sent to the group (see Sections <xref target="I-D.ietf-core-oscore-groupcomm" section="3.1" sectionFormat="bare"/> and <xref target="I-D.ietf-core-oscore-groupcomm" section="8.5" sectionFormat="bare"/> of <xref target="I-D.ietf-core-oscore-groupcomm"/>). The response MUST have Content-Format set to application/ace-groupcomm+cbor. The payload of the response is a CBOR map, which is formatted as defined in <xref target="sec-verif-data"/>.</t>
        </section>
      </section>
      <section anchor="ssec-resource-stale-sids">
        <name>ace-group/GROUPNAME/stale-sids</name>
        <t>This resource implements a FETCH handler.</t>
        <section anchor="stale-sids-fetch">
          <name>FETCH Handler</name>
          <t>The handler expects a FETCH request, whose payload specifies a version number of the group keying material, encoded as an unsigned CBOR integer.</t>
          <t>In addition to what is defined in <xref section="4.1.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, the handler verifies that the requesting Client is a current member of the group. If the verification fails, the Group Manager MUST reply with a 4.03 (Forbidden) error response. The response MUST have Content-Format set to application/ace-groupcomm+cbor and is formatted as defined in <xref section="4.1.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. The value of the 'error' field MUST be set to 0 ("Operation permitted only to group members").</t>
          <t>If all verifications succeed, the handler replies with a 2.05 (Content) response, specifying data that allow the requesting Client to delete the Recipient Contexts and authentication credentials associated with former members of the group (see <xref section="3.2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>. The payload of the response is formatted as defined in <xref target="sec-retrieve-stale-sids"/>.</t>
        </section>
      </section>
      <section anchor="ssec-admitted-methods">
        <name>Admitted Methods</name>
        <t>The table in <xref target="method-table"/> summarizes the CoAP methods admitted to access different resources at the Group Manager, for (non-)members of a group with group name GROUPNAME, and considering different roles. The last two rows of the table apply to a node with node name NODENAME.</t>
        <figure anchor="method-table">
          <name>Admitted CoAP Methods on the Group Manager Resources</name>
          <artwork align="center"><![CDATA[
+---------------------------------+--------+-------+-------+-------+
| Resource                        | Type1  | Type2 | Type3 | Type4 |
+---------------------------------+--------+-------+-------+-------+
| ace-group/                      | F      | F     | F     | F     |
+---------------------------------+--------+-------+-------+-------+
| ace-group/GROUPNAME/            | G Po   | G Po  | Po *  | Po    |
+---------------------------------+--------+-------+-------+-------+
| ace-group/GROUPNAME/active      | G      | G     | -     | -     |
+---------------------------------+--------+-------+-------+-------+
| ace-group/GROUPNAME/verif-data  | -      | -     | G     | -     |
+---------------------------------+--------+-------+-------+-------+
| ace-group/GROUPNAME/creds       | G F    | G F   | G F   | -     |
+---------------------------------+--------+-------+-------+-------+
| ace-group/GROUPNAME/kdc-cred    | G      | G     | G     | -     |
+---------------------------------+--------+-------+-------+-------+
| ace-group/GROUPNAME/stale-sids  | F      | F     | -     | -     |
+---------------------------------+--------+-------+-------+-------+
| ace-group/GROUPNAME/policies    | G      | G     | -     | -     |
+---------------------------------+--------+-------+-------+-------+
| ace-group/GROUPNAME/num         | G      | G     | -     | -     |
+---------------------------------+--------+-------+-------+-------+
| ace-group/GROUPNAME/nodes/      | G Pu D | G D   | -     | -     |
|           NODENAME              |        |       |       |       |
+---------------------------------+--------+-------+-------+-------+
| ace-group/GROUPNAME/nodes/      | Po     | -     | -     | -     |
|           NODENAME/pub-key      |        |       |       |       |
+---------------------------------+--------+-------+-------+-------+

CoAP methods: G = GET; F = FETCH; Po = POST; Pu = PUT; D = DELETE

Type1 = Member as Requester and/or Responder
Type2 = Member as Monitor
Type3 = Non-member (authorized to be signature verifier)
        (*) = cannot join the group as signature verifier
Type4 = Non-member (not authorized to be signature verifier)
]]></artwork>
        </figure>
        <section anchor="signature-verifiers">
          <name>Signature Verifiers</name>
          <t>Just like any candidate group member, a signature verifier provides the Group Manager with an Access Token, as described in <xref target="ssec-token-post"/>. However, unlike candidate group members, it does not join any OSCORE group, i.e., it does not perform the joining process defined in <xref target="sec-joining-node-to-GM"/>.</t>
          <t>After successfully transferring an Access Token to the Group Manager, a signature verifier is allowed to perform only some operations as non-member of a group, and only for the OSCORE groups specified in the validated Access Token. These are the operations specified in <xref target="sec-pub-keys"/>, <xref target="sec-gm-pub-key"/>, <xref target="sec-verif-data"/> and <xref target="sec-retrieve-gnames"/>.</t>
          <t>Consistently, in case a node is not a member of the group with group name GROUPNAME and is authorized to be only signature verifier for that group, the Group Manager MUST reply with a 4.03 (Forbidden) error response if that node attempts to access any other endpoint than: /ace-group; ace-group/GROUPNAME/verif-data; /ace-group/GROUPNAME/creds; and ace-group/GROUPNAME/kdc-cred.</t>
        </section>
      </section>
      <section anchor="client-operations">
        <name>Operations Supported by Clients</name>
        <t>Building on what is defined in <xref section="4.1.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, and with reference to the resources at the Group Manager newly defined earlier in <xref target="sec-interface-GM"/> of this document, it is expected that a Client minimally supports also the following set of operations and corresponding interactions with the Group Manager (REQ12).</t>
        <ul spacing="normal">
          <li>GET request to ace-group/GROUPNAME/active, in order to check the current status of the group.</li>
          <li>GET request to ace-group/GROUPNAME/verif-data, in order for a signature verifier to retrieve data required to verify signatures of messages protected with the group mode of Group OSCORE and sent to a group (see Sections <xref target="I-D.ietf-core-oscore-groupcomm" section="3.1" sectionFormat="bare"/> and <xref target="I-D.ietf-core-oscore-groupcomm" section="8.5" sectionFormat="bare"/> of <xref target="I-D.ietf-core-oscore-groupcomm"/>). Note that this operation is relevant to support only to signature verifiers.</li>
          <li>FETCH request to ace-group/GROUPNAME/stale-sids, in order to retrieve from the Group Manager the data required to delete some of the stored group members' authentication credentials and associated Recipient Contexts (see <xref target="stale-sids-fetch"/>). These data are provided as an aggregated set of stale Sender IDs, which are used as specified in <xref target="missed-rekeying"/>.</li>
        </ul>
      </section>
    </section>
    <section anchor="sec-additional-interactions">
      <name>Additional Interactions with the Group Manager</name>
      <t>This section defines the possible interactions with the Group Manager, in addition to the group joining specified in <xref target="sec-joining-node-to-GM"/>.</t>
      <section anchor="sec-updated-key">
        <name>Retrieve Updated Keying Material</name>
        <t>At some point, a group member considers the Group OSCORE Security Context invalid and to be renewed. This happens, for instance, after a number of unsuccessful security processing of incoming messages from other group members, or when the Security Context expires as specified by the 'exp' parameter of the Join Response.</t>
        <t>When this happens, the group member retrieves updated security parameters and group keying material. This can occur in the two different ways described below.</t>
        <section anchor="ssec-updated-key-only">
          <name>Get Group Keying Material</name>
          <t>If the group member wants to retrieve only the latest group keying material, it sends a Key Distribution Request to the Group Manager.</t>
          <t>In particular, it sends a CoAP GET request to the endpoint /ace-group/GROUPNAME at the Group Manager.</t>
          <t>The Group Manager processes the Key Distribution Request according to <xref section="4.3.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. The Key Distribution Response is formatted as defined in <xref section="4.3.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, with the following additions.</t>
          <ul spacing="normal">
            <li>The 'key' parameter is formatted as defined in <xref target="ssec-join-resp"/> of this document, with the difference that it does not include the 'group_SenderId' parameter.</li>
            <li>The 'exp' parameter MUST be present.</li>
            <li>The 'ace-groupcomm-profile' parameter MUST be present and has value coap_group_oscore_app.</li>
          </ul>
          <t>Upon receiving the Key Distribution Response, the group member retrieves the updated security parameters and group keying material, and, if they differ from the current ones, uses them to set up the new Group OSCORE Security Context as described in <xref section="2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>.</t>
        </section>
        <section anchor="ssec-updated-and-individual-key">
          <name>Get Group Keying Material and OSCORE Sender ID</name>
          <t>If the group member wants to retrieve the latest group keying material as well as the OSCORE Sender ID that it has in the OSCORE group, it sends a Key Distribution Request to the Group Manager.</t>
          <t>In particular, it sends a CoAP GET request to the endpoint /ace-group/GROUPNAME/nodes/NODENAME at the Group Manager.</t>
          <t>The Group Manager processes the Key Distribution Request according to <xref section="4.8.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. The Key Distribution Response is formatted as defined in <xref section="4.8.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, with the following additions.</t>
          <ul spacing="normal">
            <li>
              <t>The 'key' parameter is formatted as defined in <xref target="ssec-join-resp"/> of this document. In particular, if the requesting group member has exclusively the role of monitor, then the 'key' parameter does not include the 'group_SenderId'.  </t>
              <t>
Note that, in any other case, the current Sender ID of the group member is not specified as a separate parameter, but rather specified by 'group_SenderId' within the 'key' parameter.</t>
            </li>
            <li>The 'exp' parameter MUST be present.</li>
          </ul>
          <t>Upon receiving the Key Distribution Response, the group member retrieves the updated security parameters, group keying material and Sender ID, and, if they differ from the current ones, uses them to set up the new Group OSCORE Security Context as described in <xref section="2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>.</t>
        </section>
      </section>
      <section anchor="sec-new-key">
        <name>Request to Change Individual Keying Material</name>
        <t>As discussed in <xref section="2.5.2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>, a group member may at some point exhaust its Sender Sequence Numbers in the OSCORE group.</t>
        <t>When this happens, the group member MUST send a Key Renewal Request message to the Group Manager, as per <xref section="4.8.2.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. In particular, it sends a CoAP PUT request to the endpoint /ace-group/GROUPNAME/nodes/NODENAME at the Group Manager.</t>
        <t>Upon receiving the Key Renewal Request, the Group Manager processes it as defined in <xref section="4.8.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, with the following additions.</t>
        <t>The Group Manager MUST return a 5.03 (Service Unavailable) response in case the OSCORE group identified by GROUPNAME is currently inactive (see <xref target="ssec-resource-active"/>). The response MUST have Content-Format set to application/ace-groupcomm+cbor and is formatted as defined in <xref section="4.1.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. The value of the 'error' field MUST be set to 9 ("Group currently not active").</t>
        <t>Otherwise, the Group Manager performs one of the following actions.</t>
        <ol spacing="normal" type="1"><li>If the requesting group member has exclusively the role of monitor, the Group Manager replies with a 4.03 (Forbidden) error response. The response MUST have Content-Format set to application/ace-groupcomm+cbor and is formatted as defined in <xref section="4.1.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. The value of the 'error' field MUST be set to 1 ("Request inconsistent with the current roles").</li>
          <li>
            <t>Otherwise, the Group Manager takes one of the following actions.  </t>
            <ul spacing="normal">
              <li>
                <t>The Group Manager rekeys the OSCORE group. That is, the Group Manager generates new group keying material for that group (see <xref target="sec-group-rekeying-process"/>), and replies to the group member with a group rekeying message as defined in <xref target="sec-group-rekeying-process"/>, providing the new group keying material. Then, the Group Manager rekeys the rest of the OSCORE group, as discussed in <xref target="sec-group-rekeying-process"/>.      </t>
                <t>
The Group Manager SHOULD perform a group rekeying only if already scheduled to  occur shortly, e.g., according to an application-specific rekeying period or scheduling, or as a reaction to a recent change in the group membership. In any other case, the Group Manager SHOULD NOT rekey the OSCORE group when receiving a Key Renewal Request (OPT12).</t>
              </li>
              <li>
                <t>The Group Manager determines and assigns a new OSCORE Sender ID for that group member, and replies with a Key Renewal Response formatted as defined in <xref section="4.8.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. In particular, the CBOR Map in the response payload includes a single parameter 'group_SenderId' defined in <xref target="ssec-iana-ace-groupcomm-parameters-registry"/> of this document, specifying the new Sender ID of the group member encoded as a CBOR byte string.      </t>
                <t>
Consistently with <xref section="2.5.3.1" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>, the Group Manager MUST assign a new Sender ID that has not been used in the OSCORE group since the latest time when the current Gid value was assigned to the group.      </t>
                <t>
Furthermore, the Group Manager MUST add the old, relinquished Sender ID of the group member to the most recent set of stale Sender IDs, in the collection associated with the group (see <xref target="sssec-stale-sender-ids"/>).      </t>
                <t>
The Group Manager MUST return a 5.03 (Service Unavailable) response in case there are currently no Sender IDs available to assign in the OSCORE group. The response MUST have Content-Format set to application/ace-groupcomm+cbor and is formatted as defined in <xref section="4.1.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. The value of the 'error' field MUST be set to 4 ("No available node identifiers").</t>
              </li>
            </ul>
          </li>
        </ol>
      </section>
      <section anchor="sec-pub-keys">
        <name>Retrieve Authentication Credentials of Group Members</name>
        <t>A group member or a signature verifier may need to retrieve the authentication credentials of (other) group members. To this end, the group member or signature verifier sends an Authentication Credential Request message to the Group Manager, as per Sections <xref target="I-D.ietf-ace-key-groupcomm" section="4.4.1.1" sectionFormat="bare"/> and <xref target="I-D.ietf-ace-key-groupcomm" section="4.4.2.1" sectionFormat="bare"/> of <xref target="I-D.ietf-ace-key-groupcomm"/>. In particular, it sends the request to the endpoint /ace-group/GROUPNAME/creds at the Group Manager.</t>
        <t>If the Authentication Credential Request uses the method FETCH, the Authentication Credential Request is formatted as defined in <xref section="4.4.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. In particular:</t>
        <ul spacing="normal">
          <li>Each element (if any) of the inner CBOR array 'role_filter' is formatted as in the inner CBOR array 'role_filter' of the 'get_creds' parameter of the Join Request when the parameter value is not the CBOR simple value "null" (0xf6) (see <xref target="ssec-join-req-sending"/>).</li>
          <li>Each element (if any) of the inner CBOR array 'id_filter' is a CBOR byte string, which encodes the OSCORE Sender ID of the group member for which the associated authentication credential is requested (REQ25).</li>
        </ul>
        <t>Upon receiving the Authentication Credential Request, the Group Manager processes it as per Section 4.4.1 or Section 4.4.2 of <xref target="I-D.ietf-ace-key-groupcomm"/>, depending on the request method being FETCH or GET, respectively. Additionally, if the Authentication Credential Request uses the method FETCH, the Group Manager silently ignores node identifiers included in the 'get_creds' parameter of the request that are not associated with any current group member (REQ26).</t>
        <t>The success Authentication Credential Response is formatted as defined in Section 4.4.1 or Section 4.4.2 of <xref target="I-D.ietf-ace-key-groupcomm"/>, depending on the request method being FETCH or GET, respectively.</t>
      </section>
      <section anchor="sec-update-pub-key">
        <name>Upload a New Authentication Credential</name>
        <t>A group member may need to provide the Group Manager with its new authentication credential to use in the group from then on, hence replacing the current one. This can be the case, for instance, if the signature or ECDH algorithm and possible associated parameters used in the OSCORE group have been changed, and the current authentication credential is not compatible with them.</t>
        <t>To this end, the group member sends an Authentication Credential Update Request message to the Group Manager, as per <xref section="4.9.1.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, with the following addition.</t>
        <ul spacing="normal">
          <li>The group member computes the proof-of-possession (PoP) evidence included in 'client_cred_verify' in the same way taken when preparing a Join Request for the OSCORE group in question, as defined in <xref target="ssec-join-req-sending"/> (REQ14).</li>
        </ul>
        <t>In particular, the group member sends a CoAP POST request to the endpoint /ace-group/GROUPNAME/nodes/NODENAME/cred at the Group Manager.</t>
        <t>Upon receiving the Authentication Credential Update Request, the Group Manager processes it as per <xref section="4.9.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, with the following additions.</t>
        <ul spacing="normal">
          <li>The N_S challenge used to build the proof-of-possession input is computed as defined in <xref target="sssec-challenge-value"/> (REQ15).</li>
          <li>The Group Manager verifies the PoP challenge included in 'client_cred_verify' in the same way taken when processing a Join Request for the OSCORE group in question, as defined in <xref target="ssec-join-req-processing"/> (REQ14).</li>
          <li>The Group Manager MUST return a 5.03 (Service Unavailable) response in case the OSCORE group identified by GROUPNAME is currently inactive (see <xref target="ssec-resource-active"/>). The response MUST have Content-Format set to application/ace-groupcomm+cbor and is formatted as defined in <xref section="4.1.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. The value of the 'error' field MUST be set to 9 ("Group currently not active").</li>
          <li>If the requesting group member has exclusively the role of monitor, the Group Manager replies with a 4.00 (Bad request) error response. The response MUST have Content-Format set to application/ace-groupcomm+cbor and is formatted as defined in <xref section="4.1.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. The value of the 'error' field MUST be set to 1 ("Request inconsistent with the current roles").</li>
          <li>If the request is successfully processed, the Group Manager stores the association between i) the new authentication credential of the group member; and ii) the Group Identifier (Gid), i.e., the OSCORE ID Context, associated with the OSCORE group together with the OSCORE Sender ID assigned to the group member in the group. The Group Manager MUST keep this association updated over time.</li>
        </ul>
      </section>
      <section anchor="sec-gm-pub-key">
        <name>Retrieve the Group Manager's Authentication Credential</name>
        <t>A group member or a signature verifier may need to retrieve the authentication credential of the Group Manager. To this end, the requesting Client sends a KDC Authentication Credential Request message to the Group Manager.</t>
        <t>In particular, it sends a CoAP GET request to the endpoint /ace-group/GROUPNAME/kdc-cred at the Group Manager defined in <xref section="4.5.1.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, where GROUPNAME is the name of the OSCORE group.</t>
        <t>In addition to what is defined in <xref section="4.5.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, the Group Manager MUST respond with a 4.00 (Bad Request) error response, if the requesting Client is not a current group member and GROUPNAME denotes a pairwise-only group. The response MUST have Content-Format set to application/ace-groupcomm+cbor and is formatted as defined in <xref section="4.1.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. The value of the 'error' field MUST be set to 7 ("Signatures not used in the group").</t>
        <t>The payload of the 2.05 (Content) KDC Authentication Credential Response is a CBOR map, which is formatted as defined in <xref section="4.5.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. In particular, the Group Manager specifies the parameters 'kdc_cred', 'kdc_nonce' and 'kdc_challenge' as defined for the Join Response in <xref target="ssec-join-resp"/> of this document. This especially applies to the computing of the proof-of-possession (PoP) evidence included in 'kdc_cred_verify' (REQ21).</t>
        <t>Upon receiving a 2.05 (Content) KDC Authentication Credential Response, the requesting Client retrieves the Group Manager's authentication credential from the 'kdc_cred' parameter, and proceeds as defined in <xref section="4.5.1.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. In particular, the requesting Client verifies the PoP evidence included in 'kdc_cred_verify' by means of the same method used when processing the Join Response, as defined in <xref target="ssec-join-resp"/> of this document (REQ21).</t>
        <t>Note that a signature verifier would not receive a successful response from the Group Manager, in case GROUPNAME denotes a pairwise-only group.</t>
      </section>
      <section anchor="sec-verif-data">
        <name>Retrieve Signature Verification Data</name>
        <t>A signature verifier may need to retrieve data required to verify signatures of messages protected with the group mode and sent to a group (see Sections <xref target="I-D.ietf-core-oscore-groupcomm" section="3.1" sectionFormat="bare"/> and <xref target="I-D.ietf-core-oscore-groupcomm" section="8.5" sectionFormat="bare"/> of <xref target="I-D.ietf-core-oscore-groupcomm"/>). To this end, the signature verifier sends a Signature Verification Data Request message to the Group Manager.</t>
        <t>In particular, it sends a CoAP GET request to the endpoint /ace-group/GROUPNAME/verif-data at the Group Manager defined in <xref target="ssec-resource-verif-data"/> of this document, where GROUPNAME is the name of the OSCORE group.</t>
        <t>The payload of the 2.05 (Content) Signature Verification Data Response is a CBOR map, which has the format used for the Join Response message in <xref target="ssec-join-resp"/>, with the following differences.</t>
        <ul spacing="normal">
          <li>
            <t>From the Join Response message, only the parameters 'gkty', 'key', 'num', 'exp' and 'ace-groupcomm-profile' are present. In particular, the 'key' parameter includes only the following data.  </t>
            <ul spacing="normal">
              <li>The parameters 'hkdf', 'contextId', 'cred_fmt', 'sign_enc_alg', 'sign_alg', 'sign_params'. These parameters MUST be present.</li>
              <li>The parameters 'alg' and 'ecdh_alg'. These parameter MUST NOT be present if the group is a signature-only group. Otherwise, they MUST be present.</li>
            </ul>
          </li>
          <li>The parameter 'group_enc_key' is also included, with CBOR label defined in <xref target="ssec-iana-ace-groupcomm-parameters-registry"/>. This parameter specifies the Group Encryption Key of the OSCORE Group, encoded as a CBOR byte string. The Group Manager derives the Group Encryption Key from the group keying material, as per <xref section="2.1.6" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>. This parameter MUST be present.</li>
        </ul>
        <t>In order to verify signatures in the group (see <xref section="8.5" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>), the signature verifier relies on: the data retrieved from the 2.05 (Content) Signature Verification Data Response; the public keys of the group members signing the messages to verify, retrieved from those members' authentication credentials that can be obtained as defined in <xref target="sec-pub-keys"/>; and the public key of the Group Manager, retrieved from the Group Manager's authentication credential that can be obtained as defined in <xref target="sec-gm-pub-key"/>.</t>
        <t><xref target="fig-verif-data-req-resp"/> gives an overview of the exchange described above,  while <xref target="fig-verif-data-req-resp-ex"/> shows an example.</t>
        <figure anchor="fig-verif-data-req-resp">
          <name>Message Flow of Signature Verification Data Request-Response</name>
          <artwork align="center"><![CDATA[
Signature                                                     Group
Verifier                                                     Manager
  |                                                             |
  |              Signature Verification Data Request            |
  |------------------------------------------------------------>|
  |              GET ace-group/GROUPNAME/verif-data             |
  |                                                             |
  |<--- Signature Verification Data Response: 2.05 (Content) ---|
  |                                                             |
]]></artwork>
        </figure>
        <figure anchor="fig-verif-data-req-resp-ex">
          <name>Example of Signature Verification Data Request-Response</name>
          <artwork><![CDATA[
   Request:

   Header: GET (Code=0.01)
   Uri-Host: "kdc.example.com"
   Uri-Path: "ace-group"
   Uri-Path: "g1"
   Uri-Path: "verif-data"
   Payload: -

   Response:

   Header: Content (Code=2.05)
   Content-Format: "application/ace-groupcomm+cbor"
   Payload (in CBOR diagnostic notation, with GROUPCOMM_KEY_TBD
            and PROFILE_TBD being CBOR integers, while GROUP_ENC_KEY
            being a CBOR byte string):
    {
      "gkty": GROUPCOMM_KEY_TBD,
      "key": {
        'hkdf': 5,                     ; HMAC 256/256
        'contextId': h'37fc',
        'cred_fmt': 33,                ; x5chain
        'sign_enc_alg': 10,            ; AES-CCM-16-64-128
        'sign_alg': -8,                ; EdDSA
        'sign_params': [[1], [1, 6]]   ; [[OKP], [OKP, Ed25519]]
      },
      "num": 12,
      "exp": 1609459200,
      "ace_groupcomm_profile": PROFILE_TBD,
      "group_enc_key": GROUP_ENC_KEY
    }
]]></artwork>
        </figure>
      </section>
      <section anchor="sec-policies">
        <name>Retrieve the Group Policies</name>
        <t>A group member may request the current policies used in the OSCORE group. To this end, the group member sends a Policies Request, as per <xref section="4.6.1.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. In particular, it sends a CoAP GET request to the endpoint /ace-group/GROUPNAME/policies at the Group Manager, where GROUPNAME is the name of the OSCORE group.</t>
        <t>Upon receiving the Policies Request, the Group Manager processes it as per <xref section="4.6.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. The success Policies Response is formatted as defined in <xref section="4.6.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>.</t>
      </section>
      <section anchor="sec-version">
        <name>Retrieve the Keying Material Version</name>
        <t>A group member may request the current version of the keying material used in the OSCORE group. To this end, the group member sends a Version Request, as per <xref section="4.7.1.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. In particular, it sends a CoAP GET request to the endpoint /ace-group/GROUPNAME/num at the Group Manager, where GROUPNAME is the name of the OSCORE group.</t>
        <t>Upon receiving the Version Request, the Group Manager processes it as per <xref section="4.7.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. The success Version Response is formatted as defined in <xref section="4.7.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>.</t>
      </section>
      <section anchor="sec-status">
        <name>Retrieve the Group Status</name>
        <t>A group member may request the current status of the the OSCORE group, i.e., active or inactive. To this end, the group member sends a Group Status Request to the Group Manager.</t>
        <t>In particular, the group member sends a CoAP GET request to the endpoint /ace-group/GROUPNAME/active at the Group Manager defined in <xref target="ssec-resource-active"/> of this document, where GROUPNAME is the name of the OSCORE group.</t>
        <t>The payload of the 2.05 (Content) Group Status Response includes the CBOR simple value "true" (0xf5) if the group is currently active, or the CBOR simple value "false" (0xf4) otherwise. The group is considered active if it is set to allow new members to join, and if communication within the group is fine to happen.</t>
        <t>Upon learning from a 2.05 (Content) response that the group is currently inactive, the group member SHOULD stop taking part in communications within the group, until it becomes active again.</t>
        <t>Upon learning from a 2.05 (Content) response that the group has become active again, the group member can resume taking part in communications within the group.</t>
        <t><xref target="fig-key-status-req-resp"/> gives an overview of the exchange described above, while <xref target="fig-key-status-req-resp-ex"/> shows an example.</t>
        <figure anchor="fig-key-status-req-resp">
          <name>Message Flow of Group Status Request-Response</name>
          <artwork align="center"><![CDATA[
Group                                                         Group
Member                                                       Manager
  |                                                             |
  |--- Group Status Request: GET ace-group/GROUPNAME/active --->|
  |                                                             |
  |<---------- Group Status Response: 2.05 (Content) -----------|
  |                                                             |
]]></artwork>
        </figure>
        <figure anchor="fig-key-status-req-resp-ex">
          <name>Example of Group Status Request-Response</name>
          <artwork><![CDATA[
   Request:

   Header: GET (Code=0.01)
   Uri-Host: "kdc.example.com"
   Uri-Path: "ace-group"
   Uri-Path: "g1"
   Uri-Path: "active"
   Payload: -

   Response:

   Header: Content (Code=2.05)
   Payload (in CBOR diagnostic notation):
     true
]]></artwork>
        </figure>
      </section>
      <section anchor="sec-retrieve-gnames">
        <name>Retrieve Group Names</name>
        <t>A node may want to retrieve from the Group Manager the group name and the URI of the group-membership resource of a group. This is relevant in the following cases.</t>
        <ul spacing="normal">
          <li>Before joining a group, a joining node may know only the current Group Identifier (Gid) of that group, but not the group name and the URI to the group-membership resource.</li>
          <li>
            <t>As current group member in several groups, the node has missed a previous group rekeying in one of them (see <xref target="sec-group-rekeying-process"/>). Hence, it retains stale keying material and fails to decrypt received messages exchanged in that group.  </t>
            <t>
Such messages do not provide a direct hint to the correct group name, that the node would need in order to retrieve the latest keying material and authentication credentials from the Group Manager (see <xref target="ssec-updated-key-only"/>, <xref target="ssec-updated-and-individual-key"/> and <xref target="sec-pub-keys"/>). However, such messages may specify the current Gid of the group, as value of the 'kid_context' field of the OSCORE CoAP option (see <xref section="6.1" sectionFormat="of" target="RFC8613"/> and <xref section="4.2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>).</t>
          </li>
          <li>
            <t>As signature verifier, the node also refers to a group name for retrieving the required authentication credentials from the Group Manager (see <xref target="sec-pub-keys"/>). As discussed above, intercepted messages do not provide a direct hint to the correct group name, while they may specify the current Gid of the group, as value of the 'kid_context' field of the OSCORE CoAP option. In such a case, upon intercepting a message in the group, the node requires to correctly map the Gid currently used in the group with the invariant group name.  </t>
            <t>
Furthermore, since it is not a group member, the node does not take part to a possible group rekeying. Thus, following a group rekeying and the consequent change of Gid in a group, the node would retain the old Gid value and cannot correctly associate intercepted messages to the right group, especially if acting as signature verifier in several groups. This in turn prevents the efficient verification of signatures, and especially the retrieval of required, new authentication credentials from the Group Manager.</t>
          </li>
        </ul>
        <t>In either case, the node only knows the current Gid of the group, as learned from received or intercepted messages exchanged in the group. As detailed below, the node can contact the Group Manager, and request the group name and URI to the group-membership resource corresponding to that Gid. Then, it can use that information to either join the group as a candidate group member, get the latest keying material as a current group member, or retrieve authentication credentials used in the group as a signature verifier. To this end, the node sends a Group Name and URI Retrieval Request, as per <xref section="4.2.1.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>.</t>
        <t>In particular, the node sends a CoAP FETCH request to the endpoint /ace-group at the Group Manager formatted as defined in <xref section="4.2.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. Each element of the CBOR array 'gid' is a CBOR byte string (REQ13), which encodes the Gid of the group for which the group name and the URI to the group-membership resource are requested.</t>
        <t>Upon receiving the Group Name and URI Retrieval Request, the Group Manager processes it as per <xref section="4.2.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. The success Group Name and URI Retrieval Response is formatted as defined in <xref section="4.2.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. In particular, each element of the CBOR array 'gid' is a CBOR byte string (REQ13), which encodes the Gid of the group for which the group name and the URI to the group-membership resource are provided.</t>
        <t>For each of its groups, the Group Manager maintains an association between the group name and the URI to the group-membership resource on one hand, and only the current Gid for that group on the other hand. That is, the Group Manager does not maintain an association between the former pair and any other Gid for that group than the current, most recent one.</t>
        <t><xref target="fig-group-names-req-resp"/> gives an overview of the exchanges described above, while <xref target="fig-group-names-req-resp-ex"/> shows an example.</t>
        <figure anchor="fig-group-names-req-resp">
          <name>Message Flow of Group Name and URI Retrieval Request-Response</name>
          <artwork align="center"><![CDATA[
                                                                Group
Node                                                           Manager
 |                                                                |
 |---- Group Name and URI Retrieval Request: FETCH ace-group/ --->|
 |                                                                |
 |<--- Group Name and URI Retrieval Response: 2.05 (Content) -----|
 |                                                                |
]]></artwork>
        </figure>
        <figure anchor="fig-group-names-req-resp-ex">
          <name>Example of Group Name and URI Retrieval Request-Response</name>
          <artwork><![CDATA[
   Request:

   Header: FETCH (Code=0.05)
   Uri-Host: "kdc.example.com"
   Uri-Path: "ace-group"
   Content-Format: "application/ace-groupcomm+cbor"
   Payload (in CBOR diagnostic notation):
     {
       "gid": [h'37fc', h'84bd']
     }

   Response:

   Header: Content (Code=2.05)
   Content-Format: "application/ace-groupcomm+cbor"
   Payload (in CBOR diagnostic notation):
     {
       "gid": [h'37fc', h'84bd'],
       "gname": ["g1", "g2"],
       "guri": ["ace-group/g1", "ace-group/g2"]
     }
]]></artwork>
        </figure>
      </section>
      <section anchor="sec-leave-req">
        <name>Leave the Group</name>
        <t>A group member may request to leave the OSCORE group. To this end, the group member sends a Group Leaving Request, as per <xref section="4.8.3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. In particular, it sends a CoAP DELETE request to the endpoint /ace-group/GROUPNAME/nodes/NODENAME at the Group Manager.</t>
        <t>Upon receiving the Group Leaving Request, the Group Manager processes it as per <xref section="4.8.3" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. Then, the Group Manager performs the follow-up actions defined in <xref target="sec-leaving"/> of this document.</t>
      </section>
    </section>
    <section anchor="sec-leaving">
      <name>Removal of a Group Member</name>
      <t>Other than after a spontaneous request to the Group Manager as described in <xref target="sec-leave-req"/>, a node may be forcibly removed from the OSCORE group, e.g., due to expired or revoked authorization.</t>
      <t>In either case, if the Group Manager reassigns Gid values during the group's lifetime (see <xref section="3.2.1.1" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>), the Group Manager "forgets" the Birth Gid currently associated with the leaving node in the OSCORE group. This was stored following the Join Response sent to that node, after its latest (re-)joining of the OSCORE group (see <xref target="ssec-join-resp"/>).</t>
      <t>If any of the two conditions below holds, the Group Manager MUST inform the leaving node of its eviction as follows. If both conditions hold, the Group Manager MUST inform the leaving node by using only the method corresponding to one of either conditions.</t>
      <ul spacing="normal">
        <li>If, upon joining the group (see <xref target="ssec-join-req-sending"/>), the leaving node specified a URI in the 'control_uri' parameter defined in <xref section="4.3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, the Group Manager sends a DELETE request targeting the URI specified in the 'control_uri' parameter (OPT7).</li>
        <li>If the leaving node has been observing the associated resource at ace-group/GROUPNAME/nodes/NODENAME, the Group Manager sends an unsolicited 4.04 (Not Found) error response to the leaving node, as specified in <xref section="4.3.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>.</li>
      </ul>
      <t>Furthermore, the Group Manager might intend to evict all the current group members from the group at once. In such a case, if the Join Responses sent by the Group Manager to nodes joining the group (see <xref target="ssec-join-resp"/>) specify a URI in the 'control_group_uri' parameter defined in <xref section="4.3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, then the Group Manager MUST additionally send a DELETE request targeting the URI specified in the 'control_group_uri' parameter (OPT10).</t>
      <t>If the leaving node has not exclusively the role of monitor, the Group Manager performs the following actions.</t>
      <ul spacing="normal">
        <li>The Group Manager frees the OSCORE Sender ID value of the leaving node. This value MUST NOT become available for possible upcoming joining nodes in the same group, until the group has been rekeyed and assigned a new Group Identifier (Gid).</li>
        <li>The Group Manager MUST add the relinquished Sender ID of the leaving node to the most recent set of stale Sender IDs, in the collection associated with the group (see <xref target="sssec-stale-sender-ids"/>).</li>
        <li>The Group Manager cancels the association between, on one hand, the authentication credential of the leaving node and, on the other hand, the Gid associated with the OSCORE group together with the freed Sender ID value. The Group Manager deletes the authentication credential of the leaving node, if that authentication credential has no remaining association with any pair (Gid, Sender ID).</li>
      </ul>
      <t>Then, the Group Manager MUST generate updated security parameters and group keying material, and provide it to the remaining group members (see <xref target="sec-group-rekeying-process"/>). As a consequence, the leaving node is not able to acquire the new security parameters and group keying material distributed after its leaving.</t>
      <t>The same considerations from <xref section="5" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/> apply here as well, considering the Group Manager acting as KDC.</t>
    </section>
    <section anchor="sec-group-rekeying-process">
      <name>Group Rekeying Process</name>
      <t>In order to rekey the OSCORE group, the Group Manager distributes a new Group Identifier (Gid), i.e., a new OSCORE ID Context; a new OSCORE Master Secret; and, optionally, a new OSCORE Master Salt for that group. When doing so, the Group Manager MUST increment the version number of the group keying material, before starting its distribution.</t>
      <t>As per <xref section="3.2.1.1" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>, the Group Manager MAY reassign a Gid to the same group over that group's lifetime, e.g., once the whole space of Gid values has been used for the group in question. If the Group Manager supports reassignment of Gid values and performs it in a group, then the Group Manager additionally takes the following actions.</t>
      <ul spacing="normal">
        <li>Before rekeying the group, the Group Manager MUST check if the new Gid to be distributed coincides with the Birth Gid of any of the current group members (see <xref target="ssec-join-resp"/>).</li>
        <li>
          <t>If any of such "elder members" is found in the group, the Group Manager MUST evict them from the group. That is, the Group Manager MUST terminate their membership and MUST rekey the group in such a way that the new keying material is not provided to those evicted elder members. This also includes adding their relinquished Sender IDs to the most recent set of stale Sender IDs, in the collection associated with the group (see <xref target="sssec-stale-sender-ids"/>), before rekeying the group.  </t>
          <t>
Until a further following group rekeying, the Group Manager MUST store the list of those latest-evicted elder members. If any of those nodes re-joins the group before a further following group rekeying occurs, the Group Manager MUST NOT rekey the group upon their re-joining. When one of those nodes re-joins the group, the Group Manager can rely, e.g., on the ongoing secure communication association to recognize the node as included in the stored list.</t>
        </li>
      </ul>
      <t>Across the rekeying execution, the Group Manager MUST preserve the same unchanged OSCORE Sender IDs for all group members intended to remain in the group. This avoids affecting the retrieval of authentication credentials from the Group Manager and the verification of group messages.</t>
      <t>The Group Manager MUST support the "Point-to-Point" group rekeying scheme registered in <xref section="11.12" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, as per the detailed use defined in <xref target="sending-rekeying-msg"/> of this document. Future specifications may define how this application profile can use alternative group rekeying schemes, which MUST comply with the functional steps defined in <xref section="3.2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>. The Group Manager MUST indicate the use of such an alternative group rekeying scheme to joining nodes, by means of the 'group_rekeying' parameter included in Join Response messages (see <xref target="ssec-join-resp"/>).</t>
      <t>It is RECOMMENDED that the Group Manager gets confirmation of successful distribution from the group members, and admits a maximum number of individual retransmissions to non-confirming group members. Once completed the group rekeying process, the Group Manager creates a new empty set X' of stale Sender IDs associated with the version of the newly distributed group keying material. Then, the Group Manager MUST add the set X' to the collection of stale Sender IDs associated with the group (see <xref target="sssec-stale-sender-ids"/>).</t>
      <t>In case the rekeying terminates and some group members have not received the new keying material, they will not be able to correctly process following secured messages exchanged in the group. These group members will eventually contact the Group Manager, in order to retrieve the current keying material and its version.</t>
      <t>Some of these group members may be in multiple groups, each associated with a different Group Manager. When failing to correctly process messages secured with the new keying material, these group members may not have sufficient information to determine which exact Group Manager they should contact, in order to retrieve the current keying material they are missing.</t>
      <t>If the Gid is formatted as described in Appendix C of <xref target="I-D.ietf-core-oscore-groupcomm"/>, the Group Prefix can be used as a hint to determine the right Group Manager, as long as no collisions among Group Prefixes are experienced. Otherwise, a group member needs to contact the Group Manager of each group, e.g., by first requesting only the version of the current group keying material (see <xref target="sec-version"/>) and then possibly requesting the current keying material (see <xref target="ssec-updated-key-only"/>).</t>
      <t>Furthermore, some of these group members can be in multiple groups, all of which associated with the same Group Manager. In this case, these group members may also not have sufficient information to determine which exact group they should refer to, when contacting the right Group Manager. Hence, they need to contact a Group Manager multiple times, i.e., separately for each group they belong to and associated with that Group Manager.</t>
      <t><xref target="receiving-rekeying-msg"/> defines the actions performed by a group member upon receiving the new group keying material. <xref target="missed-rekeying"/> discusses how a group member can realize that it has missed one or more rekeying instances, and the actions it is accordingly required to take.</t>
      <section anchor="sending-rekeying-msg">
        <name>Sending Rekeying Messages</name>
        <t>When using the "Point-to-Point" group rekeying scheme, the group rekeying messages MUST have Content-Format set to application/ace-groupcomm+cbor and have the same format used for the Join Response message in <xref target="ssec-join-resp"/>, with the following differences. Note that this extends the minimal content of a rekeying message as defined in <xref section="6" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/> (OPT14).</t>
        <ul spacing="normal">
          <li>
            <t>From the Join Response, only the parameters 'gkty', 'key', 'num', 'exp', and 'ace-groupcomm-profile' are present. In particular, the 'key' parameter includes only the following data.  </t>
            <ul spacing="normal">
              <li>The 'ms' parameter, specifying the new OSCORE Master Secret value. This parameter MUST be present.</li>
              <li>The 'contextId' parameter, specifying the new Gid to use as OSCORE ID Context value. This parameter MUST be present.</li>
              <li>The 'salt' value, specifying the new OSCORE Master Salt value. This parameter MAY be present.</li>
            </ul>
          </li>
          <li>
            <t>The parameter 'stale_node_ids' MUST also be included, with CBOR label defined in <xref target="ssec-iana-ace-groupcomm-parameters-registry"/>. This parameter is encoded as a CBOR array, where each element is encoded as a CBOR byte string. The CBOR array has to be intended as a set, i.e., the order of its elements is irrelevant. The parameter is populated as follows.  </t>
            <ul spacing="normal">
              <li>The Group Manager creates an empty CBOR array ARRAY.</li>
              <li>The Group Manager considers the collection of stale Sender IDs associated with the group (see <xref target="sssec-stale-sender-ids"/>), and takes the most recent set X, i.e., the set associated with the current version of the group keying material about to be relinquished.</li>
              <li>For each Sender ID in X, the Group Manager encodes it as a CBOR byte string and adds the result to ARRAY.</li>
              <li>The parameter 'stale_node_ids' takes ARRAY as value.</li>
            </ul>
          </li>
          <li>The parameters 'creds', 'peer_roles' and 'peer_identifiers' SHOULD be present, if the group rekeying is performed due to one or multiple Clients that have requested to join the group. Following the same semantics used in the Join Response message (see <xref target="ssec-join-resp"/>), the three parameters specify the authentication credential, roles in the group and node identifier of each of the Clients that have requested to join the group. The Group Manager MUST NOT include a non-empty subset of these three parameters.</li>
        </ul>
        <t>The Group Manager separately sends a group rekeying message formatted as defined above to each group member to be rekeyed.</t>
        <t>Each rekeying message MUST be secured with the pairwise secure communication association between the Group Manager and the group member used during the joining process. In particular, each rekeying message can target the 'control_uri' URI path defined in <xref section="4.3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/> (OPT7), if provided by the intended recipient upon joining the group (see <xref target="ssec-join-req-sending"/>).</t>
        <t>This distribution approach requires group members to act (also) as servers, in order to correctly handle unsolicited group rekeying messages from the Group Manager. In particular, if a group member and the Group Manager use OSCORE <xref target="RFC8613"/> to secure their pairwise communications, the group member MUST create a Replay Window in its own Recipient Context upon establishing the OSCORE Security Context with the Group Manager, e.g., by means of the OSCORE profile of ACE <xref target="RFC9203"/>.</t>
        <t>Group members and the Group Manager SHOULD additionally support alternative distribution approaches that do not require group members to act (also) as servers. A number of such approaches are defined in <xref section="6" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>. In particular, a group member may use CoAP Observe <xref target="RFC7641"/> and subscribe for updates to the group-membership resource of the group, at the endpoint /ace-group/GROUPNAME/ of the Group Manager (see <xref section="6.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>). Alternatively, a full-fledged Pub-Sub model can be considered <xref target="I-D.ietf-core-coap-pubsub"/>, where the Group Manager publishes to a rekeying topic hosted at a Broker, while the group members subscribe to such topic (see <xref section="6.2" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>).</t>
      </section>
      <section anchor="receiving-rekeying-msg">
        <name>Receiving Rekeying Messages</name>
        <t>Once received the new group keying material, a group member proceeds as follows. Unless otherwise specified, the following is independent of the specifically used group rekeying scheme.</t>
        <t>The group member considers the stale Sender IDs received from the Group Manager. If the "Point-to-Point" group rekeying scheme as detailed in <xref target="sending-rekeying-msg"/> is used, the stale Sender IDs are specified by the 'stale_node_ids' parameter.</t>
        <t>After that, as per <xref section="3.2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>, the group member MUST remove every authentication credential associated with a stale Sender ID from its list of group members' authentication credentials used in the group, and MUST delete each of its Recipient Contexts used in the group whose corresponding Recipient ID is a stale Sender ID.</t>
        <t>Then, the following cases can occur, based on the version number V' of the new group keying material distributed through the rekeying process. If the "Point-to-Point" group rekeying scheme as detailed in <xref target="sending-rekeying-msg"/> is used, this information is specified by the 'num' parameter.</t>
        <ul spacing="normal">
          <li>The group member has not missed any group rekeying. That is, the old keying material stored by the group member has version number V, while the received new keying material has version number V' = (V + 1). In such a case, the group member simply installs the new keying material and derives the corresponding new Security Context.</li>
          <li>The group member has missed one or more group rekeying instances. That is, the old keying material stored by the group member has version number V, while the received new keying material has version number V' &gt; (V + 1). In such a case, the group member MUST proceed as defined in <xref target="missed-rekeying"/>.</li>
          <li>The group member has received keying material not newer than the stored one. That is, the old keying material stored by the group member has version number V, while the received keying material has version number V' &lt; (V + 1). In such a case, the group member MUST ignore the received rekeying messages and MUST NOT install the received keying material.</li>
        </ul>
      </section>
      <section anchor="missed-rekeying">
        <name>Missed Rekeying Instances</name>
        <t>A group member can realize to have missed one or more rekeying instances in one of the ways discussed below. In the following, V denotes the version number of the old keying material stored by the group member, while V' denotes the version number of the latest, possibly just distributed, keying material.</t>
        <t>a. The group member has participated to a rekeying process that has distributed new keying material with version number V' &gt; (V + 1), as discussed in <xref target="receiving-rekeying-msg"/>.</t>
        <t>b. The group member has obtained the latest keying material from the Group Manager, as a response to a Key Distribution Request (see <xref target="ssec-updated-key-only"/>) or to a Join Request when re-joining the group (see <xref target="ssec-join-req-sending"/>). In particular, V is different than V' specified by the 'num' parameter in the response.</t>
        <t>c. The group member has obtained the authentication credentials of other group members, through an Authentication Credential Request-Response exchange with the Group Manager (see <xref target="sec-pub-keys"/>). In particular, V is different than V' specified by the 'num' parameter in the response.</t>
        <t>d. The group member has performed a Version Request-Response exchange with the Group Manager (see <xref target="sec-version"/>). In particular, V is different than V' specified by the 'num' parameter in the response.</t>
        <t>In either case, the group member MUST delete the stored keying material with version number V.</t>
        <t>If case (a) or case (b) applies, the group member MUST perform the following actions.</t>
        <ol spacing="normal" type="1"><li>The group member MUST NOT install the latest keying material yet, in case that was already obtained.</li>
          <li>
            <t>The group member sends a Stale Sender IDs Request to the Group Manager (see <xref target="sec-retrieve-stale-sids"/>), specifying the version number V as payload of the request.  </t>
            <t>
If the Stale Sender IDs Response from the Group Manager has no payload, the group member MUST remove all the authentication credentials from its list of group members' authentication credentials used in the group, and MUST delete all its Recipient Contexts used in the group.  </t>
            <t>
Otherwise, the group member considers the stale Sender IDs specified in the Stale Sender IDs Response from the Group Manager. Then, the group member MUST remove every authentication credential associated with a stale Sender ID from its list of group members' authentication credentials used in the group, and MUST delete each of its Recipient Contexts used in the group whose corresponding Recipient ID is a stale Sender ID.</t>
          </li>
          <li>The group member installs the latest keying material with version number V' and derives the corresponding new Security Context.</li>
        </ol>
        <t>If case (c) or case (d) applies, the group member SHOULD perform the following actions.</t>
        <ol spacing="normal" type="1"><li>
            <t>The group member sends a Stale Sender IDs Request to the Group Manager (see <xref target="sec-retrieve-stale-sids"/>), specifying the version number V as payload of the request.  </t>
            <t>
If the Stale Sender IDs Response from the Group Manager has no payload, the group member MUST remove all the authentication credentials from its list of group members' authentication credentials used in the group, and MUST delete all its Recipient Contexts used in the group.  </t>
            <t>
Otherwise, the group member considers the stale Sender IDs specified in the Stale Sender IDs Response from the Group Manager. Then, the group member MUST remove every authentication credential associated with a stale Sender ID from its list of group members' authentication credentials used in the group, and MUST delete each of its Recipient Contexts used in the group whose corresponding Recipient ID is a stale Sender ID.</t>
          </li>
          <li>The group member obtains the latest keying material with version number V' from the Group Manager. This can happen by sending a Key Distribution Request to the Group Manager (see <xref target="ssec-updated-key-only"/>) and <xref target="ssec-updated-and-individual-key"/>).</li>
          <li>The group member installs the latest keying material with version number V' and derives the corresponding new Security Context.</li>
        </ol>
        <t>If case (c) or case (d) applies, the group member can alternatively perform the following actions.</t>
        <ol spacing="normal" type="1"><li>The group member re-joins the group (see <xref target="ssec-join-req-sending"/>). When doing so, the group member MUST re-join with the same roles it currently has in the group, and MUST request the Group Manager for the authentication credentials of all the current group members. That is, the 'get_creds' parameter of the Join Request MUST be present and MUST be set to the CBOR simple value "null" (0xf6).</li>
          <li>
            <t>When receiving the Join Response (see <xref target="ssec-join-resp-processing"/> and <xref target="ssec-join-resp-processing"/>), the group member retrieves the set Z of authentication credentials specified in the 'creds' parameter.  </t>
            <t>
Then, the group member MUST remove every authentication credential which is not in Z from its list of group members' authentication credentials used in the group, and MUST delete each of its Recipient Contexts used in the group that does not include any of the authentication credentials in Z.</t>
          </li>
          <li>The group member installs the latest keying material with version number V' and derives the corresponding new Security Context.</li>
        </ol>
        <section anchor="sec-retrieve-stale-sids">
          <name>Retrieve Stale Sender IDs</name>
          <t>When realizing to have missed one or more group rekeying instances (see <xref target="missed-rekeying"/>), a node needs to retrieve from the Group Manager the data required to delete some of its stored group members' authentication credentials and Recipient Contexts (see <xref target="stale-sids-fetch"/>). These data are provided as an aggregated set of stale Sender IDs, which are used as specified in <xref target="missed-rekeying"/>.</t>
          <t>In particular, the node sends a CoAP FETCH request to the endpoint /ace-group/GROUPNAME/stale-sids at the Group Manager defined in <xref target="ssec-resource-stale-sids"/> of this document, where GROUPNAME is the name of the OSCORE group.</t>
          <t>The payload of the Stale Sender IDs Request MUST include a CBOR unsigned integer. This encodes the version number V of the most recent group keying material stored and installed by the requesting Client, which is older than the latest, possibly just distributed, keying material with version number V'.</t>
          <t>The handler MUST reply with a 4.00 (Bad Request) error response, if the request is not formatted correctly. Also, the handler MUST respond with a 4.00 (Bad Request) error response, if the specified version number V is greater or equal than the version number V' associated with the latest keying material in the group, i.e., in case V &gt;= V'.</t>
          <t>Otherwise, the handler responds with a 2.05 (Content) Stale Sender IDs Response. The payload of the response is formatted as defined below, where SKEW = (V' - V + 1).</t>
          <ul spacing="normal">
            <li>The Group Manager considers ITEMS as the current number of sets stored in the collection of stale Sender IDs associated with the group (see <xref target="sssec-stale-sender-ids"/>).</li>
            <li>If SKEW &gt; ITEMS, the Stale Sender IDs Response MUST NOT have a payload.</li>
            <li>
              <t>Otherwise, the payload of the Stale Sender IDs Response MUST include a CBOR array, where each element is encoded as a CBOR byte string. The CBOR array has to be intended as a set, i.e., the order of its elements is irrelevant. The Group Manager populates the CBOR array as follows.  </t>
              <ul spacing="normal">
                <li>The Group Manager creates an empty CBOR array ARRAY and an empty set X.</li>
                <li>The Group Manager considers the SKEW most recent sets stored in the collection of stale Sender IDs associated with the group. Note that the most recent set is the one associate to the latest version of the group keying material.</li>
                <li>The Group Manager copies all the Sender IDs from the selected sets into X. When doing so, the Group Manager MUST discard duplicates. That is, the same Sender ID MUST NOT be present more than once in the final content of X.</li>
                <li>For each Sender ID in X, the Group Manager encodes it as a CBOR byte string and adds the result to ARRAY.</li>
                <li>Finally, ARRAY is specified as payload of the Stale Sender IDs Response. Note that ARRAY might result in the empty CBOR array.</li>
              </ul>
            </li>
          </ul>
          <t><xref target="fig-stale-ids-req-resp"/> gives an overview of the exchange described above,  while <xref target="fig-stale-ids-req-resp-ex"/> shows an example.</t>
          <figure anchor="fig-stale-ids-req-resp">
            <name>Message Flow of Stale Sender IDs Request-Response</name>
            <artwork align="center"><![CDATA[
                                                              Group
Node                                                         Manager
  |                                                             |
  |                   Stale Sender IDs Request                  |
  |------------------------------------------------------------>|
  |             FETCH ace-group/GROUPNAME/stale-sids            |
  |                                                             |
  |<---------- Stale Sender IDs Response: 2.05 (Content) -------|
  |                                                             |
]]></artwork>
          </figure>
          <figure anchor="fig-stale-ids-req-resp-ex">
            <name>Example of Stale Sender IDs Request-Response</name>
            <artwork><![CDATA[
   Request:

   Header: FETCH (Code=0.05)
   Uri-Host: "kdc.example.com"
   Uri-Path: "ace-group"
   Uri-Path: "g1"
   Uri-Path: "stale-sids"
   Payload (in CBOR diagnostic notation):
     42

   Response:

   Header: Content (Code=2.05)
   Payload (in CBOR diagnostic notation):
     [h'01', h'fc', h'12ab', h'de44', h'ff']
]]></artwork>
          </figure>
        </section>
      </section>
    </section>
    <section anchor="ace-groupcomm-params">
      <name>ACE Groupcomm Parameters</name>
      <t>In addition to those defined in <xref section="8" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, this application profile defines additional parameters used during the second part of the message exchange with the Group Manager, i.e., after the exchange of Token Transfer Request and Response (see <xref target="ssec-token-post"/>). The table below summarizes them and specifies the CBOR key to use instead of the full descriptive name.</t>
      <t>Note that the media type application/ace-groupcomm+cbor MUST be used when these parameters are transported in the respective message fields.</t>
      <figure anchor="fig-ACE-Groupcomm-Parameters">
        <name>ACE Groupcomm Parameters</name>
        <artwork align="center"><![CDATA[
+----------------+------+-------+------------+
| Name           | CBOR | CBOR  | Reference  |
|                | Key  | Type  |            |
+----------------+------+-------+------------+
| group_senderId | TBD  | bstr  | [RFC-XXXX] |
+----------------+------+-------+------------+
| ecdh_info      | TBD  | array | [RFC-XXXX] |
+----------------+------+-------+------------+
| kdc_dh_creds   | TBD  | array | [RFC-XXXX] |
+----------------+------+-------+------------+
| group_enc_key  | TBD  | bstr  | [RFC-XXXX] |
+----------------+------+-------+------------+
| stale_node_ids | TBD  | array | [RFC-XXXX] |
+----------------+------+-------+------------+
]]></artwork>
      </figure>
      <t>Note to RFC Editor: Please replace all occurrences of "[RFC-XXXX]" with the RFC number of this specification and delete this paragraph.</t>
      <t>The Group Manager is expected to support and understand all the parameters above. Instead, a Client is required to support the new parameters defined in this application profile as specified below (REQ29).</t>
      <ul spacing="normal">
        <li>'group_senderId' MUST be supported by a Client that intends to join an OSCORE group with the role of Requester and/or Responder.</li>
        <li>'ecdh_info' MUST be supported by a Client that intends to join a group which uses the pairwise mode of Group OSCORE.</li>
        <li>'kdc_dh_creds' MUST be supported by a Client that intends to join a group which uses the pairwise mode of Group OSCORE and that does not plan to or cannot rely on an early retrieval of the Group Manager's Diffie-Hellman authentication credential.</li>
        <li>'group_enc_key' MUST be supported by a Client that intends to join a group which uses the group mode of Group OSCORE or to be signature verifier for that group.</li>
        <li>'stale_node_ids' MUST be supported.</li>
      </ul>
      <t>When the conditional parameters defined in <xref section="8" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/> are used with this application profile, a Client must, should or may support them as specified below (REQ30).</t>
      <ul spacing="normal">
        <li>'client_cred', 'cnonce', 'client_cred_verify'. A Client that has an own authentication credential to use in a group MUST support these parameters.</li>
        <li>'kdcchallenge'. A Client that has an own authentication credential to use in a group and that provides the Access Token to the Group Manager through a Token Transfer Request (see <xref target="ssec-token-post"/>) MUST support this parameter.</li>
        <li>'creds_repo'. This parameter is not relevant for this application profile, since the Group Manager always acts as repository of the group members' authentication credentials.</li>
        <li>'group_policies'. A Client that is interested in the specific policies used in a group, but that does not know them or cannot become aware of them before joining that group, SHOULD support this parameter.</li>
        <li>'peer_roles'. A Client MUST support this parameter, since in this application profile it is relevant for Clients to know the roles of the group member associated with each authentication credential.</li>
        <li>'kdc_nonce', 'kdc_cred' and 'kdc_cred_verify'. A Client MUST support these parameters, since the Group Manager's authentication credential is required to process messages protected with Group OSCORE (see Section 4.3 of <xref target="I-D.ietf-core-oscore-groupcomm"/>).</li>
        <li>'mgt_key_material'. A Client that supports an advanced rekeying scheme possibly used in the group, such as based on one-to-many rekeying messages sent by the Group Manager (e.g., over IP multicast), MUST support this parameter.</li>
        <li>'control_group_uri'. A Client that supports the hosting of local resources each associated with a group (hence acting as CoAP server) and the reception of one-to-many requests sent to those resources by the Group Manager (e.g., over IP
multicast) MUST support this parameter.</li>
      </ul>
    </section>
    <section anchor="error-types">
      <name>ACE Groupcomm Error Identifiers</name>
      <t>In addition to those defined in <xref section="9" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, this application profile defines new values that the Group Manager can include as error identifiers, in the 'error' field of an error response with Content-Format application/ace-groupcomm+cbor.</t>
      <figure anchor="fig-ACE-Groupcomm-Error">
        <name>ACE Groupcomm Error Identifiers</name>
        <artwork align="center"><![CDATA[
+-------+-------------------------------------------------+
| Value |                   Description                   |
+-------+-------------------------------------------------+
|   7   | Signatures not used in the group                |
+-------+-------------------------------------------------+
|   8   | Operation permitted only to signature verifiers |
+-------+-------------------------------------------------+
|   9   | Group currently not active                      |
+-------+-------------------------------------------------+
]]></artwork>
      </figure>
      <t>A Client supporting the 'error' parameter (see Sections <xref target="I-D.ietf-ace-key-groupcomm" section="4.1.2" sectionFormat="bare"/> and <xref target="I-D.ietf-ace-key-groupcomm" section="8" sectionFormat="bare"/> of <xref target="I-D.ietf-ace-key-groupcomm"/>) and able to understand the specified error may use that information to determine what actions to take next. If it is included in the error response and supported by the Client, the 'error_description' parameter may provide additional context. In particular, the following guidelines apply.</t>
      <ul spacing="normal">
        <li>In case of error 7, the Client should stop sending the request in question to the Group Manager. In this application profile, this error is relevant only for a signature verifier, in case it tries to access resources related to a pairwise-only group.</li>
        <li>In case of error 8, the Client should stop sending the request in question to the Group Manager.</li>
        <li>In case of error 9, the Client should wait for a certain (pre-configured) amount of time, before trying re-sending its request to the Group Manager.</li>
      </ul>
    </section>
    <section anchor="default-values-for-group-configuration-parameters">
      <name>Default Values for Group Configuration Parameters</name>
      <t>This section defines the default values that the Group Manager assumes for the configuration parameters of an OSCORE group, unless differently specified when creating and configuring the group. This can be achieved as specified in <xref target="I-D.ietf-ace-oscore-gm-admin"/>.</t>
      <section anchor="common">
        <name>Common</name>
        <t>This section always applies, as related to common configuration parameters.</t>
        <ul spacing="normal">
          <li>For the HKDF Algorithm 'hkdf', the Group Manager SHOULD use HKDF SHA-256, defined as default in <xref section="3.2" sectionFormat="of" target="RFC8613"/>. In the 'hkdf' parameter, this HKDF Algorithm is specified by the HMAC Algorithm HMAC 256/256 (COSE algorithm encoding: 5).</li>
          <li>
            <t>For the format 'cred_fmt' used for the authentication credentials in the group, the Group Manager SHOULD use CBOR Web Token (CWT) or CWT Claims Set (CCS) <xref target="RFC8392"/>, i.e., the COSE Header Parameter 'kcwt' and 'kccs', respectively.  </t>
            <t>
[
    These COSE Header Parameters are under pending registration requested by draft-ietf-lake-edhoc.
 ]</t>
          </li>
          <li>For 'max_stale_sets', the Group Manager SHOULD consider N = 3 as the maximum number of stored sets of stale Sender IDs in the collection associated with the group (see <xref target="sssec-stale-sender-ids"/>).</li>
        </ul>
      </section>
      <section anchor="group-mode">
        <name>Group Mode</name>
        <t>This section applies if the group uses (also) the group mode of Group OSCORE.</t>
        <ul spacing="normal">
          <li>For the Signature Encryption Algorithm 'sign_enc_alg' used to encrypt messages protected with the group mode, the Group Manager SHOULD use AES-CCM-16-64-128 (COSE algorithm encoding: 10) as default value.</li>
        </ul>
        <t>The Group Manager SHOULD use the following default values for the Signature Algorithm 'sign_alg' and related parameters 'sign_params', consistently with the "COSE Algorithms" registry <xref target="COSE.Algorithms"/>, the "COSE Key Types" registry <xref target="COSE.Key.Types"/> and the "COSE Elliptic Curves" registry <xref target="COSE.Elliptic.Curves"/>.</t>
        <ul spacing="normal">
          <li>For the Signature Algorithm 'sign_alg' used to sign messages protected with the group mode, the signature algorithm EdDSA <xref target="RFC8032"/>.</li>
          <li>
            <t>For the parameters 'sign_params' of the Signature Algorithm:  </t>
            <ul spacing="normal">
              <li>The array [[OKP], [OKP, Ed25519]], in case EdDSA is assumed or specified for 'sign_alg'. In particular, this indicates to use the COSE key type OKP and the elliptic curve Ed25519 <xref target="RFC8032"/>.</li>
              <li>The array [[EC2], [EC2, P-256]], in case ES256 <xref target="RFC6979"/> is specified for 'sign_alg'. In particular, this indicates to use the COSE key type EC2 and the elliptic curve P-256.</li>
              <li>The array [[EC2], [EC2, P-384]], in case ES384 <xref target="RFC6979"/> is specified for 'sign_alg'. In particular, this indicates to use the COSE key type EC2 and the elliptic curve P-384.</li>
              <li>The array [[EC2], [EC2, P-521]], in case ES512 <xref target="RFC6979"/> is specified for 'sign_alg'. In particular, this indicates to use the COSE key type EC2 and the elliptic curve P-521.</li>
              <li>The array [[RSA], [RSA]], in case PS256, PS384 or PS512 <xref target="RFC8017"/> is specified for 'sign_alg'. In particular, this indicates to use the COSE key type RSA.</li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="pairwise-mode">
        <name>Pairwise Mode</name>
        <t>This section applies if the group uses (also) the pairwise mode of Group OSCORE.</t>
        <t>For the AEAD Algorithm 'alg' used to encrypt messages protected with the pairwise mode, the Group Manager SHOULD use the same default value defined in <xref section="3.2" sectionFormat="of" target="RFC8613"/>, i.e., AES-CCM-16-64-128 (COSE algorithm encoding: 10).</t>
        <t>For the Pairwise Key Agreement Algorithm 'ecdh_alg' and related parameters 'ecdh_params', the Group Manager SHOULD use the following default values, consistently with the "COSE Algorithms" registry <xref target="COSE.Algorithms"/>, the "COSE Key Types" registry <xref target="COSE.Key.Types"/> and the "COSE Elliptic Curves" registry <xref target="COSE.Elliptic.Curves"/>.</t>
        <ul spacing="normal">
          <li>For the Pairwise Key Agreement Algorithm 'ecdh_alg' used to compute static-static Diffie-Hellman shared secrets, the ECDH algorithm ECDH-SS + HKDF-256 specified in <xref section="6.3.1" sectionFormat="of" target="RFC9053"/>.</li>
          <li>
            <t>For the parameters 'ecdh_params' of the Pairwise Key Agreement Algorithm:  </t>
            <ul spacing="normal">
              <li>The array [[OKP], [OKP, X25519]], in case EdDSA is assumed or specified for 'sign_alg', or in case the group is a pairwise-only group. In particular, this indicates to use the COSE key type OKP and the elliptic curve X25519 <xref target="RFC8032"/>.</li>
              <li>The array [[EC2], [EC2, P-256]], in case ES256 <xref target="RFC6979"/> is specified for 'sign_alg'. In particular, this indicates to use the COSE key type EC2 and the elliptic curve P-256.</li>
              <li>The array [[EC2], [EC2, P-384]], in case ES384 <xref target="RFC6979"/> is specified for 'sign_alg'. In particular, this indicates to use the COSE key type EC2 and the elliptic curve P-384.</li>
              <li>The array [[EC2], [EC2, P-521]], in case ES512 <xref target="RFC6979"/> is specified for 'sign_alg'. In particular, this indicates to use the COSE key type EC2 and the elliptic curve P-521.</li>
            </ul>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="sec-security-considerations">
      <name>Security Considerations</name>
      <t>Security considerations for this profile are inherited from <xref target="I-D.ietf-ace-key-groupcomm"/>, the ACE framework for Authentication and Authorization <xref target="RFC9200"/>, and the specific transport profile of ACE signalled by the AS, such as <xref target="RFC9202"/> and <xref target="RFC9203"/>.</t>
      <t>The following security considerations also apply for this profile.</t>
      <section anchor="ssec-security-considerations-management">
        <name>Management of OSCORE Groups</name>
        <t>This profile leverages the following management aspects related to OSCORE groups and discussed in the sections of <xref target="I-D.ietf-core-oscore-groupcomm"/> referred below.</t>
        <ul spacing="normal">
          <li>
            <t>Management of group keying material (see <xref section="3.2" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>). The Group Manager is responsible for the renewal and re-distribution of the keying material in the groups of its competence (rekeying).  </t>
            <t>
The Group Manager performs a rekeying when one ore more members leave the group, thus preserving forward security and ensuring that the security properties of Group OSCORE are fulfilled. According to the specific application requirements, the Group Manager can also rekey the group upon a new node's joining, in case backward security has also to be preserved.</t>
          </li>
          <li>Provisioning and retrieval of authentication credentials (see <xref section="3" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>). The Group Manager acts as repository of authentication credentials of group members, and provides them upon request.</li>
          <li>Synchronization of sequence numbers (see <xref section="6.3" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>). This concerns how a responder node that has just joined an OSCORE group can synchronize with the sequence number of requesters in the same group.</li>
        </ul>
        <t>Before sending the Join Response, the Group Manager MUST verify that the joining node actually owns the associated private key. To this end, the Group Manager can rely on the proof-of-possession challenge-response defined in <xref target="sec-joining-node-to-GM"/>.</t>
        <t>Alternatively, when establishing a secure communication association with the Group Manager, the joining node can provide the Group Manager with its own authentication credential, and use the public key included thereof as asymmetric proof-of-possession key. For example, this is the case when the joining node relies on <xref section="3.2.2" sectionFormat="of" target="RFC9202"/> and authenticates itself during the DTLS handshake with the Group Manager. However, this requires the authentication credential to be in the format used in the OSCORE group, and that both the authentication credential of the joining node and the included public key are compatible with the signature or ECDH algorithm, and possible associated parameters used in the OSCORE group.</t>
        <t>A node may have joined multiple OSCORE groups under different non-synchronized Group Managers. Therefore, it can happen that those OSCORE groups have the same Group Identifier (Gid). It follows that, upon receiving a Group OSCORE message addressed to one of those groups, the node would have multiple Security Contexts matching with the Gid in the incoming message. It is up to the application to decide how to handle such collisions of Group Identifiers, e.g., by trying to process the incoming message using one Security Context at the time until the right one is found.</t>
      </section>
      <section anchor="ssec-security-considerations-challenges">
        <name>Size of Nonces as Proof-of-Possesion Challenge</name>
        <t>With reference to the Join Request message in <xref target="ssec-join-req-sending"/>, the proof-of-possession (PoP) evidence included in 'client_cred_verify' is computed over an input including also N_C | N_S, where | denotes concatenation.</t>
        <t>For the N_C challenge, it is RECOMMENDED to use a 8-byte long random nonce. Furthermore, N_C is always conveyed in the 'cnonce' parameter of the Join Request, which is always sent over the secure communication association between the joining node and the Group Manager.</t>
        <t>As defined in <xref target="sssec-challenge-value"/>, the way the N_S value is computed depends on the particular way the joining node provides the Group Manager with the Access Token, as well as on following interactions between the two.</t>
        <ul spacing="normal">
          <li>If the Access Token has not been provided to the Group Manager by means of a Token Transfer Request to the /authz-info endpoint as in <xref target="ssec-token-post"/>, then N_S is computed as a 32-byte long challenge. For an example, see point (2) of <xref target="sssec-challenge-value"/>.</li>
          <li>If the Access Token has been provided to the Group Manager by means of a Token Transfer Request to the /authz-info endpoint as in <xref target="ssec-token-post"/>, then N_S takes the most recent value provided to the Client by the Group Manager in the 'kdcchallenge' parameter, as specified in point (1) of <xref target="sssec-challenge-value"/>. This value is provided either in the Token Transfer Response (see <xref target="ssec-token-post"/>), or in a 4.00 (Bad Request) error response to a following Join Request (see <xref target="ssec-join-req-processing"/>). In either case, it is RECOMMENDED to use a 8-byte long random challenge as value for N_S.</li>
        </ul>
        <t>If we consider both N_C and N_S to take 8-byte long values, the following considerations hold.</t>
        <ul spacing="normal">
          <li>Let us consider both N_C and N_S as taking random values, and the Group Manager to never change the value of the N_S provided to a Client during the lifetime of an Access Token. Then, as per the birthday paradox, the average collision for N_S will happen after 2^32 new transferred Access Tokens, while the average collision for N_C will happen after 2^32 new Join Requests. This amounts to considerably more token provisionings than the expected new joinings of OSCORE groups under a same Group Manager, as well as to considerably more requests to join OSCORE groups from a same Client using a same Access Token under a same Group Manager.</li>
          <li>
            <xref section="7" sectionFormat="of" target="RFC9203"/> as well <xref section="B.2" sectionFormat="of" target="RFC8613"/> recommend the use of 8-byte random values as well. Unlike in those cases, the values of N_C and N_S considered in this document are not used for as sensitive operations as the derivation of a Security Context, and thus do not have possible implications in the security of AEAD ciphers.</li>
        </ul>
      </section>
      <section anchor="ssec-security-considerations-reusage-nonces">
        <name>Reusage of Nonces for Proof-of-Possession Input</name>
        <t>As long as the Group Manager preserves the same N_S value currently associated with an Access Token, i.e., the latest value provided to a Client in a 'kdcchallenge' parameter, the Client is able to successfully reuse the same proof-of-possession (PoP) input for multiple Join Requests to that Group Manager.</t>
        <t>In particular, the Client can reuse the same N_C value for every Join Request to the Group Manager, and combine it with the same unchanged N_S value. This results in reusing the same PoP input for producing the PoP evidence to include in the 'client_cred_verify' parameter of the Join Requests.</t>
        <t>Unless the Group Manager maintains a list of N_C values already used by that Client since the latest update to the N_S value associated with the Access Token, the Group Manager can be forced to falsely believe that the Client possesses its own private key at that point in time, upon verifying the PoP evidence in the 'client_cred_verify' parameter.</t>
      </section>
    </section>
    <section anchor="sec-iana">
      <name>IANA Considerations</name>
      <t>This document has the following actions for IANA.</t>
      <t>Note to RFC Editor: Please replace all occurrences of "[RFC-XXXX]" with the RFC number of this specification and delete this paragraph.</t>
      <section anchor="iana-kinfo">
        <name>OAuth Parameters</name>
        <t>IANA is asked to register the following entries to the "OAuth Parameters" registry, as per the procedure specified in <xref section="11.2" sectionFormat="of" target="RFC6749"/>.</t>
        <ul spacing="normal">
          <li>Parameter name: ecdh_info</li>
          <li>Parameter usage location: client-rs request, rs-client response</li>
          <li>Change Controller: IESG</li>
          <li>Specification Document(s): [RFC-XXXX]</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Parameter name: kdc_dh_creds</li>
          <li>Parameter usage location: client-rs request, rs-client response</li>
          <li>Change Controller: IESG</li>
          <li>Specification Document(s): [RFC-XXXX]</li>
        </ul>
      </section>
      <section anchor="iana-kinfo-map">
        <name>OAuth Parameters CBOR Mappings</name>
        <t>IANA is asked to register the following entries to the "OAuth Parameters CBOR Mappings" registry, as per the procedure specified in <xref section="8.10" sectionFormat="of" target="RFC9200"/>.</t>
        <ul spacing="normal">
          <li>Name: ecdh_info</li>
          <li>CBOR Key: TBD (range -256 to 255)</li>
          <li>Value Type: Simple value "null" / Array</li>
          <li>Reference: [RFC-XXXX]</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Name: kdc_dh_creds</li>
          <li>CBOR Key: TBD (range -256 to 255)</li>
          <li>Value Type: Simple value "null" / Array</li>
          <li>Reference: [RFC-XXXX]</li>
        </ul>
      </section>
      <section anchor="ssec-iana-ace-groupcomm-parameters-registry">
        <name>ACE Groupcomm Parameters</name>
        <t>IANA is asked to register the following entry to the "ACE Groupcomm Parameters" registry defined in <xref section="11.6" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>.</t>
        <ul spacing="normal">
          <li>Name: group_senderId</li>
          <li>CBOR Key: TBD</li>
          <li>CBOR Type: Byte string</li>
          <li>Reference: [RFC-XXXX] (<xref target="sec-new-key"/>)</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Name: ecdh_info</li>
          <li>CBOR Key: TBD</li>
          <li>CBOR Type: Array</li>
          <li>Reference: [RFC-XXXX] (<xref target="ssec-join-req-processing"/>)</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Name: kdc_dh_creds</li>
          <li>CBOR Key: TBD</li>
          <li>CBOR Type: Array</li>
          <li>Reference: [RFC-XXXX] (<xref target="ssec-join-req-processing"/>)</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Name: group_enc_key</li>
          <li>CBOR Key: TBD</li>
          <li>CBOR Type: Byte string</li>
          <li>Reference: [RFC-XXXX] (<xref target="verif-data-get"/>)</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Name: stale_node_ids</li>
          <li>CBOR Key: TBD</li>
          <li>CBOR Type: Array</li>
          <li>Reference: [RFC-XXXX] (<xref target="sec-group-rekeying-process"/>)</li>
        </ul>
      </section>
      <section anchor="ssec-iana-groupcomm-keys-registry">
        <name>ACE Groupcomm Key Types</name>
        <t>IANA is asked to register the following entry to the "ACE Groupcomm Key Types" registry defined in <xref section="11.7" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>.</t>
        <ul spacing="normal">
          <li>Name: Group_OSCORE_Input_Material object</li>
          <li>Key Type Value: GROUPCOMM_KEY_TBD</li>
          <li>Profile: "coap_group_oscore_app", defined in <xref target="ssec-iana-groupcomm-profile-registry"/> of this document.</li>
          <li>Description: A Group_OSCORE_Input_Material object encoded as described in <xref target="ssec-join-resp"/> of this document.</li>
          <li>Reference: [RFC-XXXX] (<xref target="ssec-join-resp"/>)</li>
        </ul>
      </section>
      <section anchor="ssec-iana-groupcomm-profile-registry">
        <name>ACE Groupcomm Profiles</name>
        <t>IANA is asked to register the following entry to the "ACE Groupcomm Profiles" registry defined in <xref section="11.8" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>.</t>
        <ul spacing="normal">
          <li>Name: coap_group_oscore_app</li>
          <li>Description: Application profile to provision keying material for participating in group communication protected with Group OSCORE as per <xref target="I-D.ietf-core-oscore-groupcomm"/>.</li>
          <li>CBOR Value: PROFILE_TBD</li>
          <li>Reference: [RFC-XXXX] (<xref target="ssec-join-resp"/>)</li>
        </ul>
      </section>
      <section anchor="ssec-iana-security-context-parameter-registry">
        <name>OSCORE Security Context Parameters</name>
        <t>IANA is asked to register the following entries in the "OSCORE Security Context Parameters" registry defined in <xref section="9.4" sectionFormat="of" target="RFC9203"/>.</t>
        <ul spacing="normal">
          <li>Name: group_SenderId</li>
          <li>CBOR Label: TBD</li>
          <li>CBOR Type: Byte string</li>
          <li>Registry: -</li>
          <li>Description: OSCORE Sender ID assigned to a member of an OSCORE group</li>
          <li>Reference: [RFC-XXXX] (<xref target="ssec-join-resp"/>)</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Name: cred_fmt</li>
          <li>CBOR Label: TBD</li>
          <li>CBOR Type: Integer</li>
          <li>Registry: COSE Header Parameters</li>
          <li>Description: Format of authentication credentials to be used in the OSCORE group</li>
          <li>Reference: [RFC-XXXX] (<xref target="ssec-join-resp"/>)</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Name: sign_enc_alg</li>
          <li>CBOR Label: TBD</li>
          <li>CBOR Type: Text string / Integer</li>
          <li>Registry: COSE Algorithms</li>
          <li>Description: OSCORE Signature Encryption Algorithm Value</li>
          <li>Reference: [RFC-XXXX] (<xref target="ssec-join-resp"/>)</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Name: sign_alg</li>
          <li>CBOR Label: TBD</li>
          <li>CBOR Type: Text string / Integer</li>
          <li>Registry: COSE Algorithms</li>
          <li>Description: OSCORE Signature Algorithm Value</li>
          <li>Reference: [RFC-XXXX] (<xref target="ssec-join-resp"/>)</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Name: sign_params</li>
          <li>CBOR Label: TBD</li>
          <li>CBOR Type: Array</li>
          <li>Registry: COSE Algorithms, COSE Key Types, COSE Elliptic Curves</li>
          <li>Description: OSCORE Signature Algorithm Parameters</li>
          <li>Reference: [RFC-XXXX] (<xref target="ssec-join-resp"/>)</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Name: ecdh_alg</li>
          <li>CBOR Label: TBD</li>
          <li>CBOR Type: Text string / Integer</li>
          <li>Registry: COSE Algorithms</li>
          <li>Description: OSCORE Pairwise Key Agreement Algorithm Value</li>
          <li>Reference: [RFC-XXXX] (<xref target="ssec-join-resp"/>)</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Name: ecdh_params</li>
          <li>CBOR Label: TBD</li>
          <li>CBOR Type: Array</li>
          <li>Registry: COSE Algorithms, COSE Key Types, COSE Elliptic Curves</li>
          <li>Description: OSCORE Pairwise Key Agreement Algorithm Parameters</li>
          <li>Reference: [RFC-XXXX] (<xref target="ssec-join-resp"/>)</li>
        </ul>
      </section>
      <section anchor="ssec-iana-tls-esporter-label-registry">
        <name>TLS Exporter Labels</name>
        <t>IANA is asked to register the following entry to the "TLS Exporter Labels" registry defined in <xref section="6" sectionFormat="of" target="RFC5705"/> and updated in <xref section="12" sectionFormat="of" target="RFC8447"/>.</t>
        <ul spacing="normal">
          <li>Value: EXPORTER-ACE-Sign-Challenge-coap-group-oscore-app</li>
          <li>DTLS-OK: Y</li>
          <li>Recommended: N</li>
          <li>Reference: [RFC-XXXX] (<xref target="sssec-challenge-value"/>)</li>
        </ul>
      </section>
      <section anchor="ssec-iana-AIF-registry">
        <name>AIF Media-Type Sub-Parameters</name>
        <t>For the media-types application/aif+cbor and application/aif+json defined in <xref section="5.1" sectionFormat="of" target="RFC9237"/>, IANA is requested to register the following entries for the two media-type parameters Toid and Tperm, in the respective sub-registry defined in <xref section="5.2" sectionFormat="of" target="RFC9237"/> within the "MIME Media Type Sub-Parameter" registry group.</t>
        <ul spacing="normal">
          <li>Parameter: Toid</li>
          <li>Name: oscore-gname</li>
          <li>Description/Specification: OSCORE group name</li>
          <li>Reference: [RFC-XXXX]</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Parameter: Tperm</li>
          <li>Name: oscore-gperm</li>
          <li>Description/Specification: permissions pertaining OSCORE groups</li>
          <li>Reference: [RFC-XXXX]</li>
        </ul>
      </section>
      <section anchor="ssec-iana-coap-content-format-registry">
        <name>CoAP Content-Format</name>
        <t>IANA is asked to register the following entries to the "CoAP Content-Formats" registry within the "Constrained RESTful Environments (CoRE) Parameters" registry group.</t>
        <ul spacing="normal">
          <li>Media Type: application/aif+cbor;Toid="oscore-gname",Tperm="oscore-gperm"</li>
          <li>Encoding: -</li>
          <li>ID: 292 (suggested)</li>
          <li>Reference: [RFC-XXXX]</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Media Type: application/aif+json;Toid="oscore-gname",Tperm="oscore-gperm"</li>
          <li>Encoding: -</li>
          <li>ID: 293 (suggested)</li>
          <li>Reference: [RFC-XXXX]</li>
        </ul>
      </section>
      <section anchor="ssec-iana-group-oscore-roles-registry">
        <name>Group OSCORE Roles</name>
        <t>This document establishes the IANA "Group OSCORE Roles" registry. The registry has been created to use the "Expert Review" registration procedure <xref target="RFC8126"/>. Expert review guidelines are provided in <xref target="ssec-iana-expert-review"/>.</t>
        <t>This registry includes the possible roles that nodes can take in an OSCORE group, each in combination with a numeric identifier. These numeric identifiers are used to express authorization information about joining OSCORE groups, as specified in <xref target="sec-format-scope"/> of [RFC-XXXX].</t>
        <t>The columns of this registry are:</t>
        <ul spacing="normal">
          <li>Name: A value that can be used in documents for easier comprehension, to identify a possible role that nodes can take in an OSCORE group.</li>
          <li>Value: The numeric identifier for this role. Integer values greater than 65535 are marked as "Private Use", all other values use the registration policy "Expert Review" <xref target="RFC8126"/>.</li>
          <li>Description: This field contains a brief description of the role.</li>
          <li>Reference: This contains a pointer to the public specification for the role.</li>
        </ul>
        <t>This registry will be initially populated by the values in <xref target="fig-role-values"/>.</t>
        <t>The Reference column for all of these entries will be [RFC-XXXX].</t>
      </section>
      <section anchor="iana-rt">
        <name>CoRE Resource Type</name>
        <t>IANA is asked to register the following entry in the "Resource Type (rt=) Link Target Attribute Values" registry within the "Constrained Restful Environments (CoRE) Parameters" registry group.</t>
        <ul spacing="normal">
          <li>Value: "core.osc.gm"</li>
          <li>Description: Group-membership resource of an OSCORE Group Manager.</li>
          <li>Reference: [RFC-XXXX]</li>
        </ul>
        <t>Client applications can use this resource type to discover a group membership resource at an OSCORE Group Manager, where to send a request for joining the corresponding OSCORE group.</t>
      </section>
      <section anchor="iana-ace-groupcomm-errors">
        <name>ACE Groupcomm Errors</name>
        <t>IANA is asked to register the following entry in the "ACE Groupcomm Errors" registry defined in <xref section="11.11" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>.</t>
        <ul spacing="normal">
          <li>Value: 7</li>
          <li>Description: Signatures not used in the group.</li>
          <li>Reference: [RFC-XXXX]</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Value: 8</li>
          <li>Description: Operation permitted only to signature verifiers.</li>
          <li>Reference: [RFC-XXXX]</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Value: 9</li>
          <li>Description: Group currently not active.</li>
          <li>Reference: [RFC-XXXX]</li>
        </ul>
      </section>
      <section anchor="ssec-iana-expert-review">
        <name>Expert Review Instructions</name>
        <t>The IANA registry established in this document is defined as "Expert Review".  This section gives some general guidelines for what the experts should be looking for, but they are being designated as experts for a reason so they should be given substantial latitude.</t>
        <t>Expert reviewers should take into consideration the following points:</t>
        <ul spacing="normal">
          <li>
            <t>Clarity and correctness of registrations. Experts are expected to check the clarity of purpose and use of the requested entries. Experts should inspect the entry for the considered role, to verify the correctness of its description against the role as intended in the specification that defined it. Experts should consider requesting an opinion on the correctness of registered parameters from the Authentication and Authorization for Constrained Environments (ACE) Working Group and the Constrained RESTful Environments (CoRE) Working Group.  </t>
            <t>
Entries that do not meet these objective of clarity and completeness should not be registered.</t>
          </li>
          <li>Duplicated registration and point squatting should be discouraged. Reviewers are encouraged to get sufficient information for registration requests to ensure that the usage is not going to duplicate one that is already registered and that the point is likely to be used in deployments.</li>
          <li>Experts should take into account the expected usage of roles when approving point assignment. Given a 'Value' V as code point, the length of the encoding of (2^(V+1) - 1) should be weighed against the usage of the entry, considering the resources and capabilities of devices it will be used on. Additionally, given a 'Value' V as code point, the length of the encoding of (2^(V+1) - 1) should be weighed against how many code points resulting in that encoding length are left, and the resources and capabilities of devices it will be used on.</li>
          <li>Specifications are recommended. When specifications are not provided, the description provided needs to have sufficient information to verify the points above.</li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC5705" target="https://www.rfc-editor.org/info/rfc5705">
          <front>
            <title>Keying Material Exporters for Transport Layer Security (TLS)</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="March" year="2010"/>
            <abstract>
              <t>A number of protocols wish to leverage Transport Layer Security (TLS) to perform key establishment but then use some of the keying material for their own purposes.  This document describes a general mechanism for allowing that.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5705"/>
          <seriesInfo name="DOI" value="10.17487/RFC5705"/>
        </reference>
        <reference anchor="RFC6347" target="https://www.rfc-editor.org/info/rfc6347">
          <front>
            <title>Datagram Transport Layer Security Version 1.2</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu">
              <organization/>
            </author>
            <date month="January" year="2012"/>
            <abstract>
              <t>This document specifies version 1.2 of the Datagram Transport Layer Security (DTLS) protocol.  The DTLS protocol provides communications privacy for datagram protocols.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees.  Datagram semantics of the underlying transport are preserved by the DTLS protocol.  This document updates DTLS 1.0 to work with TLS version 1.2.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6347"/>
          <seriesInfo name="DOI" value="10.17487/RFC6347"/>
        </reference>
        <reference anchor="RFC6979" target="https://www.rfc-editor.org/info/rfc6979">
          <front>
            <title>Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA)</title>
            <author fullname="T. Pornin" initials="T." surname="Pornin">
              <organization/>
            </author>
            <date month="August" year="2013"/>
            <abstract>
              <t>This document defines a deterministic digital signature generation procedure.  Such signatures are compatible with standard Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA) digital signatures and can be processed with unmodified verifiers, which need not be aware of the procedure described therein.  Deterministic signatures retain the cryptographic security features associated with digital signatures but can be more easily implemented in various environments, since they do not need access to a source of high-quality randomness.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6979"/>
          <seriesInfo name="DOI" value="10.17487/RFC6979"/>
        </reference>
        <reference anchor="RFC7252" target="https://www.rfc-editor.org/info/rfc7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby">
              <organization/>
            </author>
            <author fullname="K. Hartke" initials="K." surname="Hartke">
              <organization/>
            </author>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks.  The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s.  The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types.  CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC7748" target="https://www.rfc-editor.org/info/rfc7748">
          <front>
            <title>Elliptic Curves for Security</title>
            <author fullname="A. Langley" initials="A." surname="Langley">
              <organization/>
            </author>
            <author fullname="M. Hamburg" initials="M." surname="Hamburg">
              <organization/>
            </author>
            <author fullname="S. Turner" initials="S." surname="Turner">
              <organization/>
            </author>
            <date month="January" year="2016"/>
            <abstract>
              <t>This memo specifies two elliptic curves over prime fields that offer a high level of practical security in cryptographic applications, including Transport Layer Security (TLS).  These curves are intended to operate at the ~128-bit and ~224-bit security level, respectively, and are generated deterministically based on a list of required properties.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7748"/>
          <seriesInfo name="DOI" value="10.17487/RFC7748"/>
        </reference>
        <reference anchor="RFC8017" target="https://www.rfc-editor.org/info/rfc8017">
          <front>
            <title>PKCS #1: RSA Cryptography Specifications Version 2.2</title>
            <author fullname="K. Moriarty" initials="K." role="editor" surname="Moriarty">
              <organization/>
            </author>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski">
              <organization/>
            </author>
            <author fullname="J. Jonsson" initials="J." surname="Jonsson">
              <organization/>
            </author>
            <author fullname="A. Rusch" initials="A." surname="Rusch">
              <organization/>
            </author>
            <date month="November" year="2016"/>
            <abstract>
              <t>This document provides recommendations for the implementation of public-key cryptography based on the RSA algorithm, covering cryptographic primitives, encryption schemes, signature schemes with appendix, and ASN.1 syntax for representing keys and for identifying the schemes.</t>
              <t>This document represents a republication of PKCS #1 v2.2 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series.  By publishing this RFC, change control is transferred to the IETF.</t>
              <t>This document also obsoletes RFC 3447.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8017"/>
          <seriesInfo name="DOI" value="10.17487/RFC8017"/>
        </reference>
        <reference anchor="RFC8032" target="https://www.rfc-editor.org/info/rfc8032">
          <front>
            <title>Edwards-Curve Digital Signature Algorithm (EdDSA)</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson">
              <organization/>
            </author>
            <author fullname="I. Liusvaara" initials="I." surname="Liusvaara">
              <organization/>
            </author>
            <date month="January" year="2017"/>
            <abstract>
              <t>This document describes elliptic curve signature scheme Edwards-curve Digital Signature Algorithm (EdDSA).  The algorithm is instantiated with recommended parameters for the edwards25519 and edwards448 curves.  An example implementation and test vectors are provided.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8032"/>
          <seriesInfo name="DOI" value="10.17487/RFC8032"/>
        </reference>
        <reference anchor="RFC8126" target="https://www.rfc-editor.org/info/rfc8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton">
              <organization/>
            </author>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <author fullname="T. Narten" initials="T." surname="Narten">
              <organization/>
            </author>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters.  To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper.  For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed.  This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC8447" target="https://www.rfc-editor.org/info/rfc8447">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="J. Salowey" initials="J." surname="Salowey">
              <organization/>
            </author>
            <author fullname="S. Turner" initials="S." surname="Turner">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes a number of changes to TLS and DTLS IANA registries that range from adding notes to the registry all the way to changing the registration policy.  These changes were mostly motivated by WG review of the TLS- and DTLS-related registries undertaken as part of the TLS 1.3 development process.</t>
              <t>This document updates the following RFCs: 3749, 5077, 4680, 5246, 5705, 5878, 6520, and 7301.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8447"/>
          <seriesInfo name="DOI" value="10.17487/RFC8447"/>
        </reference>
        <reference anchor="RFC8610" target="https://www.rfc-editor.org/info/rfc8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz">
              <organization/>
            </author>
            <author fullname="C. Vigano" initials="C." surname="Vigano">
              <organization/>
            </author>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049).  Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC8613" target="https://www.rfc-editor.org/info/rfc8613">
          <front>
            <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="G. Selander" initials="G." surname="Selander">
              <organization/>
            </author>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson">
              <organization/>
            </author>
            <author fullname="F. Palombini" initials="F." surname="Palombini">
              <organization/>
            </author>
            <author fullname="L. Seitz" initials="L." surname="Seitz">
              <organization/>
            </author>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE).  OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
              <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration.  Therefore, this document updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8613"/>
          <seriesInfo name="DOI" value="10.17487/RFC8613"/>
        </reference>
        <reference anchor="RFC8949" target="https://www.rfc-editor.org/info/rfc8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman">
              <organization/>
            </author>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049.  It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9052" target="https://www.rfc-editor.org/info/rfc9052">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad">
              <organization/>
            </author>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size.  There is a need to be able to define basic security services for this data format.  This document defines the CBOR Object Signing and Encryption (COSE) protocol.  This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization.  This specification additionally describes how to represent cryptographic keys using CBOR.  </t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC9053" target="https://www.rfc-editor.org/info/rfc9053">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad">
              <organization/>
            </author>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines a set of algorithms that can be used with the CBOR Object Signing and Encryption (COSE) protocol (RFC 9052). </t>
              <t>This document, along with RFC 9052, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9053"/>
          <seriesInfo name="DOI" value="10.17487/RFC9053"/>
        </reference>
        <reference anchor="RFC9147" target="https://www.rfc-editor.org/info/rfc9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu">
              <organization/>
            </author>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability.  Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="RFC9200" target="https://www.rfc-editor.org/info/rfc9200">
          <front>
            <title>Authentication and Authorization for Constrained Environments Using the OAuth 2.0 Framework (ACE-OAuth)</title>
            <author fullname="L. Seitz" initials="L." surname="Seitz">
              <organization/>
            </author>
            <author fullname="G. Selander" initials="G." surname="Selander">
              <organization/>
            </author>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem">
              <organization/>
            </author>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <date month="August" year="2022"/>
            <abstract>
              <t>This specification defines a framework for authentication and authorization in Internet of Things (IoT) environments called ACE-OAuth. The framework is based on a set of building blocks including OAuth 2.0 and the Constrained Application Protocol (CoAP), thus transforming a well-known and widely used authorization solution into a form suitable for IoT devices.  Existing specifications are used where possible, but extensions are added and profiles are defined to better serve the IoT use cases.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9200"/>
          <seriesInfo name="DOI" value="10.17487/RFC9200"/>
        </reference>
        <reference anchor="RFC9202" target="https://www.rfc-editor.org/info/rfc9202">
          <front>
            <title>Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="S. Gerdes" initials="S." surname="Gerdes">
              <organization/>
            </author>
            <author fullname="O. Bergmann" initials="O." surname="Bergmann">
              <organization/>
            </author>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <author fullname="G. Selander" initials="G." surname="Selander">
              <organization/>
            </author>
            <author fullname="L. Seitz" initials="L." surname="Seitz">
              <organization/>
            </author>
            <date month="August" year="2022"/>
            <abstract>
              <t>This specification defines a profile of the Authentication and Authorization for Constrained Environments (ACE) framework that allows constrained servers to delegate client authentication and authorization.  The protocol relies on DTLS version 1.2 or later for communication security between entities in a constrained network using either raw public keys or pre-shared keys. A resource-constrained server can use this protocol to delegate management of authorization information to a trusted host with less-severe limitations regarding processing power and memory.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9202"/>
          <seriesInfo name="DOI" value="10.17487/RFC9202"/>
        </reference>
        <reference anchor="RFC9203" target="https://www.rfc-editor.org/info/rfc9203">
          <front>
            <title>The Object Security for Constrained RESTful Environments (OSCORE) Profile of the Authentication and Authorization for Constrained Environments (ACE) Framework</title>
            <author fullname="F. Palombini" initials="F." surname="Palombini">
              <organization/>
            </author>
            <author fullname="L. Seitz" initials="L." surname="Seitz">
              <organization/>
            </author>
            <author fullname="G. Selander" initials="G." surname="Selander">
              <organization/>
            </author>
            <author fullname="M. Gunnarsson" initials="M." surname="Gunnarsson">
              <organization/>
            </author>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document specifies a profile for the Authentication and Authorization for Constrained Environments (ACE) framework.  It utilizes Object Security for Constrained RESTful Environments (OSCORE) to provide communication security and proof-of-possession for a key owned by the client and bound to an OAuth 2.0 access token.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9203"/>
          <seriesInfo name="DOI" value="10.17487/RFC9203"/>
        </reference>
        <reference anchor="RFC9237" target="https://www.rfc-editor.org/info/rfc9237">
          <front>
            <title>An Authorization Information Format (AIF) for Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <date month="August" year="2022"/>
            <abstract>
              <t>Information about which entities are authorized to perform what operations on which constituents of other entities is a crucial component of producing an overall system that is secure.  Conveying precise authorization information is especially critical in highly automated systems with large numbers of entities, such as the Internet of Things.</t>
              <t>This specification provides a generic information model and format for representing such authorization information, as well as two variants of a specific instantiation of that format for use with Representational State Transfer (REST) resources identified by URI path.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9237"/>
          <seriesInfo name="DOI" value="10.17487/RFC9237"/>
        </reference>
        <reference anchor="RFC9277" target="https://www.rfc-editor.org/info/rfc9277">
          <front>
            <title>On Stable Storage for Items in Concise Binary Object Representation (CBOR)</title>
            <author fullname="M. Richardson" initials="M." surname="Richardson">
              <organization/>
            </author>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document defines a stored ("file") format for Concise Binary Object Representation (CBOR) data items that is friendly to common systems that recognize file types, such as the Unix file(1) command.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9277"/>
          <seriesInfo name="DOI" value="10.17487/RFC9277"/>
        </reference>
        <reference anchor="I-D.ietf-core-oscore-groupcomm" target="https://www.ietf.org/archive/id/draft-ietf-core-oscore-groupcomm-14.txt">
          <front>
            <title>Group OSCORE - Secure Group Communication for CoAP</title>
            <author fullname="Marco Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Göran Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Francesca Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="John Preuss Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Jiye Park">
              <organization>Universitaet Duisburg-Essen</organization>
            </author>
            <date day="7" month="March" year="2022"/>
            <abstract>
              <t>   This document defines Group Object Security for Constrained RESTful
   Environments (Group OSCORE), providing end-to-end security of CoAP
   messages exchanged between members of a group, e.g., sent over IP
   multicast.  In particular, the described approach defines how OSCORE
   is used in a group communication setting to provide source
   authentication for CoAP group requests, sent by a client to multiple
   servers, and for protection of the corresponding CoAP responses.
   Group OSCORE also defines a pairwise mode where each member of the
   group can efficiently derive a symmetric pairwise key with any other
   member of the group for pairwise OSCORE communication.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-oscore-groupcomm-14"/>
        </reference>
        <reference anchor="I-D.ietf-ace-key-groupcomm" target="https://www.ietf.org/archive/id/draft-ietf-ace-key-groupcomm-15.txt">
          <front>
            <title>Key Provisioning for Group Communication using ACE</title>
            <author fullname="Francesca Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Marco Tiloca">
              <organization>RISE AB</organization>
            </author>
            <date day="23" month="December" year="2021"/>
            <abstract>
              <t>   This document defines how to use the Authentication and Authorization
   for Constrained Environments (ACE) framework to distribute keying
   material and configuration parameters for secure group communication.
   Candidate group members acting as Clients and authorized to join a
   group can do so by interacting with a Key Distribution Center (KDC)
   acting as Resource Server, from which they obtain the keying material
   to communicate with other group members.  While defining general
   message formats as well as the interface and operations available at
   the KDC, this document supports different approaches and protocols
   for secure group communication.  Therefore, details are delegated to
   separate application profiles of this document, as specialized
   instances that target a particular group communication approach and
   define how communications in the group are protected.  Compliance
   requirements for such application profiles are also specified.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-key-groupcomm-15"/>
        </reference>
        <reference anchor="NIST-800-56A" target="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-56Ar3.pdf">
          <front>
            <title>Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography - NIST Special Publication 800-56A, Revision 3</title>
            <author initials="E." surname="Barker" fullname="Elaine Barker">
              <organization/>
            </author>
            <author initials="L." surname="Chen" fullname="Lily Chen">
              <organization/>
            </author>
            <author initials="A." surname="Roginsky" fullname="Allen Roginsky">
              <organization/>
            </author>
            <author initials="A." surname="Vassilev" fullname="Apostol Vassilev">
              <organization/>
            </author>
            <author initials="R." surname="Davis" fullname="Richard Davis">
              <organization/>
            </author>
            <date year="2018" month="April"/>
          </front>
        </reference>
        <reference anchor="COSE.Algorithms" target="https://www.iana.org/assignments/cose/cose.xhtml#algorithms">
          <front>
            <title>COSE Algorithms</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="COSE.Key.Types" target="https://www.iana.org/assignments/cose/cose.xhtml#key-type">
          <front>
            <title>COSE Key Types</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="COSE.Elliptic.Curves" target="https://www.iana.org/assignments/cose/cose.xhtml#elliptic-curves">
          <front>
            <title>COSE Elliptic Curves</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="COSE.Header.Parameters" target="https://www.iana.org/assignments/cose/cose.xhtml#header-parameters">
          <front>
            <title>COSE Header Parameters</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="I-D.ietf-core-groupcomm-bis" target="https://www.ietf.org/archive/id/draft-ietf-core-groupcomm-bis-07.txt">
          <front>
            <title>Group Communication for the Constrained Application Protocol (CoAP)</title>
            <author fullname="Esko Dijk">
              <organization>IoTconsultancy.nl</organization>
            </author>
            <author fullname="Chonggang Wang">
              <organization>InterDigital</organization>
            </author>
            <author fullname="Marco Tiloca">
              <organization>RISE AB</organization>
            </author>
            <date day="11" month="July" year="2022"/>
            <abstract>
              <t>   This document specifies the use of the Constrained Application
   Protocol (CoAP) for group communication, including the use of UDP/IP
   multicast as the default underlying data transport.  Both unsecured
   and secured CoAP group communication are specified.  Security is
   achieved by use of the Group Object Security for Constrained RESTful
   Environments (Group OSCORE) protocol.  The target application area of
   this specification is any group communication use cases that involve
   resource-constrained devices or networks that support CoAP.  This
   document replaces RFC 7390, while it updates RFC 7252 and RFC 7641.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-groupcomm-bis-07"/>
        </reference>
        <reference anchor="I-D.ietf-core-coap-pubsub" target="https://www.ietf.org/archive/id/draft-ietf-core-coap-pubsub-10.txt">
          <front>
            <title>Publish-Subscribe Broker for the Constrained Application Protocol (CoAP)</title>
            <author fullname="Michael Koster">
              <organization>SmartThings</organization>
            </author>
            <author fullname="Ari Keranen">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Jaime Jimenez">
              <organization>Ericsson</organization>
            </author>
            <date day="4" month="May" year="2022"/>
            <abstract>
              <t>   The Constrained Application Protocol (CoAP), and related extensions
   are intended to support machine-to-machine communication in systems
   where one or more nodes are resource constrained, in particular for
   low power wireless sensor networks.  This document defines a publish-
   subscribe Broker for CoAP that extends the capabilities of CoAP for
   supporting nodes with long breaks in connectivity and/or up-time.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-coap-pubsub-10"/>
        </reference>
        <reference anchor="I-D.tiloca-core-oscore-discovery" target="https://www.ietf.org/archive/id/draft-tiloca-core-oscore-discovery-11.txt">
          <front>
            <title>Discovery of OSCORE Groups with the CoRE Resource Directory</title>
            <author fullname="Marco Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Christian Amsuess">
	 </author>
            <author fullname="Peter van der Stok">
              <organization>Consultant</organization>
            </author>
            <date day="7" month="March" year="2022"/>
            <abstract>
              <t>   Group communication over the Constrained Application Protocol (CoAP)
   can be secured by means of Group Object Security for Constrained
   RESTful Environments (Group OSCORE).  At deployment time, devices may
   not know the exact security groups to join, the respective Group
   Manager, or other information required to perform the joining
   process.  This document describes how a CoAP endpoint can use
   descriptions and links of resources registered at the CoRE Resource
   Directory to discover security groups and to acquire information for
   joining them through the respective Group Manager.  A given security
   group may protect multiple application groups, which are separately
   announced in the Resource Directory as sets of endpoints sharing a
   pool of resources.  This approach is consistent with, but not limited
   to, the joining of security groups based on the ACE framework for
   Authentication and Authorization in constrained environments.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-tiloca-core-oscore-discovery-11"/>
        </reference>
        <reference anchor="I-D.ietf-ace-oscore-gm-admin" target="https://www.ietf.org/archive/id/draft-ietf-ace-oscore-gm-admin-06.txt">
          <front>
            <title>Admin Interface for the OSCORE Group Manager</title>
            <author fullname="Marco Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Rikard Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Peter van der Stok">
              <organization>Consultant</organization>
            </author>
            <author fullname="Francesca Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <date day="11" month="July" year="2022"/>
            <abstract>
              <t>   Group communication for CoAP can be secured using Group Object
   Security for Constrained RESTful Environments (Group OSCORE).  A
   Group Manager is responsible to handle the joining of new group
   members, as well as to manage and distribute the group keying
   material.  This document defines a RESTful admin interface at the
   Group Manager, that allows an Administrator entity to create and
   delete OSCORE groups, as well as to retrieve and update their
   configuration.  The ACE framework for Authentication and
   Authorization is used to enforce authentication and authorization of
   the Administrator at the Group Manager.  Protocol-specific transport
   profiles of ACE are used to achieve communication security, proof-of-
   possession and server authentication.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-oscore-gm-admin-06"/>
        </reference>
        <reference anchor="I-D.ietf-cose-cbor-encoded-cert" target="https://www.ietf.org/archive/id/draft-ietf-cose-cbor-encoded-cert-04.txt">
          <front>
            <title>CBOR Encoded X.509 Certificates (C509 Certificates)</title>
            <author fullname="John Preuß Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Göran Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Shahid Raza">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Joel Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Martin Furuhed">
              <organization>Nexus Group</organization>
            </author>
            <date day="10" month="July" year="2022"/>
            <abstract>
              <t>   This document specifies a CBOR encoding of X.509 certificates.  The
   resulting certificates are called C509 Certificates.  The CBOR
   encoding supports a large subset of RFC 5280 and all certificates
   compatible with the RFC 7925, IEEE 802.1AR (DevID), CNSA, RPKI, GSMA
   eUICC, and CA/Browser Forum Baseline Requirements profiles.  When
   used to re-encode DER encoded X.509 certificates, the CBOR encoding
   can in many cases reduce the size of RFC 7925 profiled certificates
   with over 50%.  The CBOR encoded structure can alternatively be
   signed directly ("natively signed"), which does not require re-
   encoding for the signature to be verified.  The document also
   specifies C509 COSE headers, a C509 TLS certificate type, and a C509
   file format.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-cbor-encoded-cert-04"/>
        </reference>
        <reference anchor="RFC5869" target="https://www.rfc-editor.org/info/rfc5869">
          <front>
            <title>HMAC-based Extract-and-Expand Key Derivation Function (HKDF)</title>
            <author fullname="H. Krawczyk" initials="H." surname="Krawczyk">
              <organization/>
            </author>
            <author fullname="P. Eronen" initials="P." surname="Eronen">
              <organization/>
            </author>
            <date month="May" year="2010"/>
            <abstract>
              <t>This document specifies a simple Hashed Message Authentication Code (HMAC)-based key derivation function (HKDF), which can be used as a building block in various protocols and applications.  The key derivation function (KDF) is intended to support a wide range of applications and requirements, and is conservative in its use of cryptographic hash functions.  This document is not an Internet  Standards Track specification; it is published for informational  purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5869"/>
          <seriesInfo name="DOI" value="10.17487/RFC5869"/>
        </reference>
        <reference anchor="RFC6690" target="https://www.rfc-editor.org/info/rfc6690">
          <front>
            <title>Constrained RESTful Environments (CoRE) Link Format</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby">
              <organization/>
            </author>
            <date month="August" year="2012"/>
            <abstract>
              <t>This specification defines Web Linking using a link format for use by constrained web servers to describe hosted resources, their attributes, and other relationships between links.  Based on the HTTP Link Header field defined in RFC 5988, the Constrained RESTful Environments (CoRE) Link Format is carried as a payload and is assigned an Internet media type.  "RESTful" refers to the Representational State Transfer (REST) architecture.  A well-known URI is defined as a default entry point for requesting the links hosted by a server.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6690"/>
          <seriesInfo name="DOI" value="10.17487/RFC6690"/>
        </reference>
        <reference anchor="RFC6749" target="https://www.rfc-editor.org/info/rfc6749">
          <front>
            <title>The OAuth 2.0 Authorization Framework</title>
            <author fullname="D. Hardt" initials="D." role="editor" surname="Hardt">
              <organization/>
            </author>
            <date month="October" year="2012"/>
            <abstract>
              <t>The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf.  This specification replaces and obsoletes the OAuth 1.0 protocol described in RFC 5849.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6749"/>
          <seriesInfo name="DOI" value="10.17487/RFC6749"/>
        </reference>
        <reference anchor="RFC7641" target="https://www.rfc-editor.org/info/rfc7641">
          <front>
            <title>Observing Resources in the Constrained Application Protocol (CoAP)</title>
            <author fullname="K. Hartke" initials="K." surname="Hartke">
              <organization/>
            </author>
            <date month="September" year="2015"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a RESTful application protocol for constrained nodes and networks.  The state of a resource on a CoAP server can change over time.  This document specifies a simple protocol extension for CoAP that enables CoAP clients to "observe" resources, i.e., to retrieve a representation of a resource and keep this representation updated by the server over a period of time.  The protocol follows a best-effort approach for sending new representations to clients and provides eventual consistency between the state observed by each client and the actual resource state at the server.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7641"/>
          <seriesInfo name="DOI" value="10.17487/RFC7641"/>
        </reference>
        <reference anchor="RFC7925" target="https://www.rfc-editor.org/info/rfc7925">
          <front>
            <title>Transport Layer Security (TLS) / Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things</title>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig">
              <organization/>
            </author>
            <author fullname="T. Fossati" initials="T." surname="Fossati">
              <organization/>
            </author>
            <date month="July" year="2016"/>
            <abstract>
              <t>A common design pattern in Internet of Things (IoT) deployments is the use of a constrained device that collects data via sensors or controls actuators for use in home automation, industrial control systems, smart cities, and other IoT deployments.</t>
              <t>This document defines a Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) 1.2 profile that offers communications security for this data exchange thereby preventing eavesdropping, tampering, and message forgery.  The lack of communication security is a common vulnerability in IoT products that can easily be solved by using these well-researched and widely deployed Internet security protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7925"/>
          <seriesInfo name="DOI" value="10.17487/RFC7925"/>
        </reference>
        <reference anchor="RFC8392" target="https://www.rfc-editor.org/info/rfc8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones">
              <organization/>
            </author>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem">
              <organization/>
            </author>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties.  The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection.  A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value.  CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
      </references>
    </references>
    <section anchor="profile-req">
      <name>Profile Requirements</name>
      <t>This section lists how this application profile of ACE addresses the requirements defined in Appendix A of <xref target="I-D.ietf-ace-key-groupcomm"/>.</t>
      <section anchor="mandatory-to-address-requirements">
        <name>Mandatory-to-Address Requirements</name>
        <ul spacing="normal">
          <li>REQ1 - Specify the format and encoding of 'scope'. This includes defining the set of possible roles and their identifiers, as well as the corresponding encoding to use in the scope entries according to the used scope format: see <xref target="sec-format-scope"/> and <xref target="ssec-auth-req"/>.</li>
          <li>REQ2 - If the AIF format of 'scope' is used, register its specific instance of "Toid" and "Tperm" as Media Type parameters and a corresponding Content-Format, as per the guidelines in <xref target="RFC9237"/>: see <xref target="ssec-iana-AIF-registry"/> and <xref target="ssec-iana-coap-content-format-registry"/>.</li>
          <li>REQ3 - if used, specify the acceptable values for 'sign_alg': values from the "Value" column of the "COSE Algorithms" registry <xref target="COSE.Algorithms"/>.</li>
          <li>REQ4 - If used, specify the acceptable values for 'sign_parameters': format and values from the COSE algorithm capabilities as specified in the "COSE Algorithms" registry <xref target="COSE.Algorithms"/>.</li>
          <li>REQ5 - If used, specify the acceptable values for 'sign_key_parameters': format and values from the COSE key type capabilities as specified in the "COSE Key Types" registry <xref target="COSE.Key.Types"/>.</li>
          <li>REQ6 - Specify the acceptable formats for authentication credentials and, if used, the acceptable values for 'cred_fmt': acceptable formats explicitly provide the public key as well as the comprehensive set of information related to the public key algorithm (see <xref target="ssec-token-post"/> and <xref target="ssec-join-resp"/>). Consistent acceptable values for 'cred_fmt' are taken from the "Label" column of the "COSE Header Parameters" registry <xref target="COSE.Header.Parameters"/>.</li>
          <li>REQ7 - If the value of the GROUPNAME URI path and the group name in the Access Token scope (gname in <xref section="3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>) are not required to coincide, specify the mechanism to map the GROUPNAME value in the URI to the group name: not applicable, since a perfect matching is required.</li>
          <li>REQ8 - Define whether the KDC has an authentication credential and if this has to be provided through the 'kdc_cred' parameter, see <xref section="4.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>: yes, as required by the Group OSCORE protocol <xref target="I-D.ietf-core-oscore-groupcomm"/>, see <xref target="ssec-join-resp"/> of this document.</li>
          <li>REQ9 - Specify if any part of the KDC interface as defined in <xref section="4.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/> is not supported by the KDC: not applicable.</li>
          <li>REQ10 - Register a Resource Type for the root url-path, which is used to discover the correct url to access at the KDC (see <xref section="4.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>): the Resource Type (rt=) Link Target Attribute value "core.osc.gm" is registered in <xref target="iana-rt"/>.</li>
          <li>REQ11 - Define what specific actions (e.g., CoAP methods) are allowed on each resource provided by the KDC interface, depending on whether the Client is a current group member; the roles that a Client is authorized to take as per the obtained access token; and the roles that the Client has as current group member: see <xref target="ssec-admitted-methods"/>.</li>
          <li>REQ12 - Categorize possible newly defined operations for Clients into primary operations expected to be minimally supported and secondary operations, and provide accompanying considerations: see <xref target="client-operations"/>.</li>
          <li>REQ13 - Specify the encoding of group identifier (see <xref section="4.2.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>): CBOR byte string (see <xref target="sec-retrieve-gnames"/>).</li>
          <li>REQ14 - Specify the approaches used to compute and verify the PoP evidence to include in 'client_cred_verify', and which of those approaches is used in which case: see <xref target="ssec-join-req-sending"/> and <xref target="ssec-join-req-processing"/>.</li>
          <li>REQ15 - Specify how the nonce N_S is generated, if the token is not provided to the KDC through the Token Transfer Request to the authz-info endpoint (e.g., if it is used directly to validate TLS instead): see <xref target="sssec-challenge-value"/>.</li>
          <li>REQ16 - Define the initial value of the 'num' parameter: the initial value MUST be set to 0 when creating the OSCORE group, e.g., as in <xref target="I-D.ietf-ace-oscore-gm-admin"/>.</li>
          <li>REQ17 - Specify the format of the 'key' parameter: see <xref target="ssec-join-resp"/>.</li>
          <li>REQ18 - Specify acceptable values of the 'gkty' parameter: Group_OSCORE_Input_Material object (see <xref target="ssec-join-resp"/>).</li>
          <li>REQ19 - Specify and register the application profile identifier: coap_group_oscore_app (see <xref target="ssec-iana-groupcomm-profile-registry"/>).</li>
          <li>REQ20 - If used, specify the format and content of 'group_policies' and its entries: see <xref target="ssec-join-resp"/>.</li>
          <li>REQ21 - Specify the approaches used to compute and verify the PoP evidence to include in 'kdc_cred_verify', and which of those approaches is used in which case: see <xref target="ssec-join-resp"/>, <xref target="ssec-join-resp-processing"/> and <xref target="sec-gm-pub-key"/>.</li>
          <li>REQ22 - Specify the communication protocol that the members of the group must use: CoAP <xref target="RFC7252"/>, also for group communication <xref target="I-D.ietf-core-groupcomm-bis"/>.</li>
          <li>REQ23 - Specify the security protocols that the group members must use to protect their communication: Group OSCORE <xref target="I-D.ietf-core-oscore-groupcomm"/>.</li>
          <li>REQ24 - Specify how the communication is secured between the Client and KDC: by means of any transport profile of ACE <xref target="RFC9200"/> between Client and Group Manager that complies with the requirements in Appendix C of <xref target="RFC9200"/>.</li>
          <li>REQ25 - Specify the format of the identifiers of group members: the Sender ID used in the OSCORE group (see <xref target="ssec-join-resp"/> and <xref target="sec-pub-keys"/>).</li>
          <li>REQ26 - Specify policies at the KDC to handle member ids that are not included in 'get_creds': see <xref target="sec-pub-keys"/>.</li>
          <li>REQ27 - Specify the format of newly-generated individual keying material for group members, or of the information to derive it, and corresponding CBOR label: see <xref target="sec-new-key"/>.</li>
          <li>REQ28 - Specify which CBOR tag is used for identifying the semantics of binary scopes, or register a new CBOR tag if a suitable one does not exist already: see <xref target="ssec-auth-resp"/>.</li>
          <li>REQ29 - Categorize newly defined parameters according to the same criteria of <xref section="8" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>: see <xref target="ace-groupcomm-params"/>.</li>
          <li>REQ30 - Define whether Clients must, should or may support the conditional parameters defined in <xref section="8" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, and under which circumstances: see <xref target="ace-groupcomm-params"/>.</li>
        </ul>
      </section>
      <section anchor="optional-to-address-requirements">
        <name>Optional-to-Address Requirements</name>
        <ul spacing="normal">
          <li>OPT1 (Optional) - If the textual format of 'scope' is used, specify CBOR values to use for abbreviating the role identifiers in the group: not applicable.</li>
          <li>
            <t>OPT2 (Optional) - Specify additional parameters used in the exchange of Token Transfer Request and Response:  </t>
            <ul spacing="normal">
              <li>'ecdh_info', to negotiate the ECDH algorithm, ECDH algorithm parameters, ECDH key parameters and exact format of authentication credentials used in the group, in case the joining node supports the pairwise mode of Group OSCORE (see <xref target="ssec-token-post"/>).</li>
              <li>'kdc_dh_creds', to ask for and retrieve the Group Manager's Diffie-Hellman authentication credentials, in case the joining node supports the pairwise mode of Group OSCORE and the Access Token authorizes to join parwise-only groups (see <xref target="ssec-token-post"/>).</li>
            </ul>
          </li>
          <li>OPT3 (Optional) - Specify the negotiation of parameter values for signature algorithm and signature keys, if 'sign_info' is not used: possible early discovery by using the approach based on the CoRE Resource Directory described in <xref target="I-D.tiloca-core-oscore-discovery"/>.</li>
          <li>OPT4 (Optional) - Specify possible or required payload formats for specific error cases: send a 4.00 (Bad Request) error response to a Join Request (see <xref target="ssec-join-req-processing"/>).</li>
          <li>OPT5 (Optional) - Specify additional identifiers of error types, as values of the 'error' field in an error response from the KDC: see <xref target="iana-ace-groupcomm-errors"/>.</li>
          <li>OPT6 (Optional) - Specify the encoding of 'creds_repo' if the default is not used: no.</li>
          <li>OPT7 (Optional) - Specify the functionalities implemented at the 'control_uri' resource hosted at the Client, including message exchange encoding and other details (see <xref section="4.3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>): see <xref target="sec-leaving"/> for the eviction of a group member; see <xref target="sec-group-rekeying-process"/> for the group rekeying process.</li>
          <li>OPT8 (Optional) - Specify the behavior of the handler in case of failure to retrieve an authentication credential for the specific node: send a 4.00 (Bad Request) error response to a Join Request (see <xref target="ssec-join-req-processing"/>).</li>
          <li>OPT9 (Optional) - Define a default group rekeying scheme, to refer to in case the 'rekeying_scheme' parameter is not included in the Join Response (see <xref section="4.3.1.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>): the "Point-to-Point" rekeying scheme registered in <xref section="11.12" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>, whose detailed use for this profile is defined in <xref target="sec-group-rekeying-process"/> of this document.</li>
          <li>OPT10 (Optional) - Specify the functionalities implemented at the 'control_group_uri' resource hosted at the Client, including message exchange encoding and other details (see <xref section="4.3.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>): see <xref target="sec-leaving"/> for the eviction of multiple group members.</li>
          <li>OPT11 (Optional) - Specify policies that instruct Clients to retain unsuccessfully decrypted messages and for how long, so that they can be decrypted after getting updated keying material: no.</li>
          <li>OPT12 (Optional) - Specify for the KDC to perform group rekeying (together or instead of renewing individual keying material) when receiving a Key Renewal Request: the Group Manager SHOULD NOT perform a group rekeying, unless already scheduled to occur shortly (see <xref target="sec-new-key"/>).</li>
          <li>OPT13 (Optional) - Specify how the identifier of a group members's authentication credential is included in requests sent to other group members: no.</li>
          <li>OPT14 (Optional) - Specify additional information to include in rekeying messages for the "Point-to-Point" group rekeying scheme (see <xref section="6.1" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>): see <xref target="sending-rekeying-msg"/>.</li>
          <li>OPT15 (Optional) - Specify if Clients must or should support any of the parameters defined as optional in <xref section="8" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm"/>: no.</li>
        </ul>
      </section>
    </section>
    <section anchor="sec-future-cose-algs">
      <name>Extensibility for Future COSE Algorithms</name>
      <t>As defined in <xref section="8.1" sectionFormat="of" target="RFC9053"/>, future algorithms can be registered in the "COSE Algorithms" registry <xref target="COSE.Algorithms"/> as specifying none or multiple COSE capabilities.</t>
      <t>To enable the seamless use of such future registered algorithms, this section defines a general, agile format for:</t>
      <ul spacing="normal">
        <li>Each 'ecdh_info_entry' of the 'ecdh_info' parameter in the Token Transfer Response (see <xref target="ssec-token-post"/> and <xref target="ecdh-info"/>);</li>
        <li>The 'sign_params' and 'ecdh_params' parameters within the 'key' parameter (see <xref target="ssec-join-resp"/>), as part of the response payloads used in <xref target="ssec-join-resp"/>, <xref target="ssec-updated-key-only"/>, <xref target="ssec-updated-and-individual-key"/> and <xref target="sec-group-rekeying-process"/>.</li>
      </ul>
      <t>Appendix B of <xref target="I-D.ietf-ace-key-groupcomm"/> describes the analogous general format for 'sign_info_entry' of the 'sign_info' parameter in the Token Transfer Response (see <xref target="ssec-token-post"/> of this document).</t>
      <t>If any of the currently registered COSE algorithms is considered, using this general format yields the same structure defined in this document for the items above, thus ensuring retro-compatibility.</t>
      <section anchor="sec-future-cose-algs-ecdh-info-entry">
        <name>Format of 'ecdh_info_entry'</name>
        <t>The format of each 'ecdh_info_entry' (see <xref target="ssec-token-post"/> and <xref target="ecdh-info"/>) is generalized as follows. Given N the number of elements of the 'ecdh_parameters' array, i.e., the number of COSE capabilities of the ECDH algorithm, then:</t>
        <ul spacing="normal">
          <li>'ecdh_key_parameters' is replaced by N elements 'ecdh_capab_i', each of which is a CBOR array.</li>
          <li>The i-th array following 'ecdh_parameters', i.e., 'ecdh_capab_i' (i = 0, ..., N-1), is the array of COSE capabilities for the algorithm capability specified in 'ecdh_parameters'[i].</li>
        </ul>
        <figure anchor="fig-ecdh-info-entry-general">
          <name>'ecdh_info_entry' with general format</name>
          <sourcecode type="CDDL"><![CDATA[
ecdh_info_entry =
[
  id : gname / [ + gname ],
  ecdh_alg : int / tstr,
  ecdh_parameters : [ alg_capab_1 : any,
                      alg_capab_2 : any,
                      ...,
                      alg_capab_N : any],
  ecdh_capab_1 : [ any ],
  ecdh_capab_2 : [ any ],
  ...,
  ecdh_capab_N : [ any ],
  cred_fmt = int / null
]

gname = tstr
]]></sourcecode>
        </figure>
      </section>
      <section anchor="sec-future-cose-algs-key">
        <name>Format of 'key'</name>
        <t>The format of 'key' (see <xref target="ssec-join-resp"/>) is generalized as follows.</t>
        <ul spacing="normal">
          <li>
            <t>The 'sign_params' array includes N+1 elements, whose exact structure and value depend on the value of the signature algorithm specified in 'sign_alg'.  </t>
            <ul spacing="normal">
              <li>The first element, i.e., 'sign_params'[0], is the array of the N COSE capabilities for the signature algorithm, as specified for that algorithm in the "Capabilities" column of the "COSE Algorithms" registry <xref target="COSE.Algorithms"/> (see <xref section="8.1" sectionFormat="of" target="RFC9053"/>).</li>
              <li>Each following element 'sign_params'[i], i.e., with index i &gt; 0, is the array of COSE capabilities for the algorithm capability specified in 'sign_params'[0][i-1].</li>
            </ul>
            <t>
For example, if 'sign_params'[0][0] specifies the key type as capability of the algorithm, then 'sign_params'[1] is the array of COSE capabilities for the COSE key type associated with the signature algorithm, as specified for that key type in the "Capabilities" column of the "COSE Key Types" registry <xref target="COSE.Key.Types"/> (see <xref section="8.2" sectionFormat="of" target="RFC9053"/>).</t>
          </li>
          <li>
            <t>The 'ecdh_params' array includes M+1 elements, whose exact structure and value depend on the value of the ECDH algorithm specified in 'ecdh_alg'.  </t>
            <ul spacing="normal">
              <li>The first element, i.e., 'ecdh_params'[0], is the array of the M COSE capabilities for the ECDH algorithm, as specified for that algorithm in the "Capabilities" column of the "COSE Algorithms" registry <xref target="COSE.Algorithms"/> (see <xref section="8.1" sectionFormat="of" target="RFC9053"/>).</li>
              <li>Each following element 'ecdh_params'[i], i.e., with index i &gt; 0, is the array of COSE capabilities for the algorithm capability specified in 'ecdh_params'[0][i-1].</li>
            </ul>
            <t>
For example, if 'ecdh_params'[0][0] specifies the key type as capability of the algorithm, then 'ecdh_params'[1] is the array of COSE capabilities for the COSE key type associated with the ECDH algorithm, as specified for that key type in the "Capabilities" column of the "COSE Key Types" registry <xref target="COSE.Key.Types"/> (see <xref section="8.2" sectionFormat="of" target="RFC9053"/>).</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="sec-document-updates">
      <name>Document Updates</name>
      <t>RFC EDITOR: PLEASE REMOVE THIS SECTION.</t>
      <section anchor="sec-14-15">
        <name>Version -14 to -15</name>
        <ul spacing="normal">
          <li>Alignment with renaming in draft-ietf-ace-key-groupcomm.</li>
          <li>Updated signaling of semantics for binary encoded scopes.</li>
          <li>Considered the upload of Access Tokens in the DTLS 1.3 Handshake.</li>
          <li>Fixes in IANA registrations.</li>
          <li>Editorial fixes.</li>
        </ul>
      </section>
      <section anchor="sec-13-14">
        <name>Version -13 to -14</name>
        <ul spacing="normal">
          <li>Major reordering of the document sections.</li>
          <li>The HKDF Algorithm is specified by the HMAC Algorithm.</li>
          <li>Group communication does not necessarily use IP multicast.</li>
          <li>Generalized AIF data model, also for draft-ace-oscore-gm-admin.</li>
          <li>Clarifications and editorial improvements.</li>
        </ul>
      </section>
      <section anchor="sec-12-13">
        <name>Version -12 to -13</name>
        <ul spacing="normal">
          <li>Renamed parameters about authentication credentials.</li>
          <li>It is optional for the Group Manager to reassign Gids by tracking "Birth Gids".</li>
          <li>Distinction between authentication credentials and public keys.</li>
          <li>Updated IANA considerations related to AIF.</li>
          <li>Updated textual description of registered ACE Scope Semantics value.</li>
        </ul>
      </section>
      <section anchor="sec-11-12">
        <name>Version -11 to -12</name>
        <ul spacing="normal">
          <li>Clarified semantics of 'ecdh_info' and 'kdc_dh_creds'.</li>
          <li>Definition of /ace-group/GROUPNAME/kdc-pub-key moved to draft-ietf-ace-key-groupcomm.</li>
          <li>ace-group/ accessible also to non-members that are not Verifiers.</li>
          <li>Clarified what resources are accessible to Verifiers.</li>
          <li>Revised error handling for the newly defined resources.</li>
          <li>Revised use of CoAP error codes.</li>
          <li>Use of "Token Tranfer Request" and "Token Transfer Response".</li>
          <li>New parameter 'rekeying_scheme'.</li>
          <li>Categorization of new parameters and inherited conditional parameters.</li>
          <li>Clarifications on what to do in case of enhanced error responses.</li>
          <li>Changed UCCS to CCS.</li>
          <li>Authentication credentials of just joined Clients can be in rekeying messages.</li>
          <li>Revised names of new IANA registries.</li>
          <li>Clarified meaning of registered CoRE resource type.</li>
          <li>Alignment to new requirements from draft-ietf-ace-key-groupcomm.</li>
          <li>Fixes and editorial improvements.</li>
        </ul>
      </section>
      <section anchor="sec-10-11">
        <name>Version -10 to -11</name>
        <ul spacing="normal">
          <li>Removed redundancy of key type capabilities, from 'sign_info', 'ecdh_info' and 'key'.</li>
          <li>New resource to retrieve the Group Manager's authentication credential.</li>
          <li>New resource to retrieve material for Signature Verifiers.</li>
          <li>New parameter 'sign_enc_alg' related to the group mode.</li>
          <li>'cred_fmt' takes value from the COSE Header Parameters registry.</li>
          <li>Improved alignment of the Join Response payload with the Group OSCORE Security Context parameters.</li>
          <li>Recycling Group IDs by tracking "Birth GIDs".</li>
          <li>Error handling in case of non available Sender IDs upon joining.</li>
          <li>Error handling in case EdDSA public keys with invalid Y coordinate when the pairwise mode of Group OSCORE is supported.</li>
          <li>Generalized proof-of-possession (PoP) for the joining node's private key; defined Diffie-Hellman based PoP for OSCORE groups using only the pairwise mode.</li>
          <li>Proof-of-possession of the Group Manager's private key in the Join Response.</li>
          <li>Always use 'peer_identifiers' to convey Sender IDs as node identifiers.</li>
          <li>Stale Sender IDs provided when rekeying the group.</li>
          <li>New resource for late retrieval of stale Sender IDs.</li>
          <li>Added examples of message exchanges.</li>
          <li>Revised default values of group configuration parameters.</li>
          <li>Fixes to IANA registrations.</li>
          <li>General format of parameters related to COSE capabilities, supporting future registered COSE algorithms (new Appendix).</li>
        </ul>
      </section>
      <section anchor="sec-09-10">
        <name>Version -09 to -10</name>
        <ul spacing="normal">
          <li>Updated non-recycling policy of Sender IDs.</li>
          <li>Removed policies about Sender Sequence Number synchronization.</li>
          <li>'control_path' renamed to 'control_uri'.</li>
          <li>Format of 'get_pub_keys' aligned with draft-ietf-ace-key-groupcomm.</li>
          <li>Additional way to inform of group eviction.</li>
          <li>Registered semantics identifier for extended scope format.</li>
          <li>Extended error handling, with error type specified in some error responses.</li>
          <li>Renumbered requirements.</li>
        </ul>
      </section>
      <section anchor="sec-08-09">
        <name>Version -08 to -09</name>
        <ul spacing="normal">
          <li>The url-path "ace-group" is used.</li>
          <li>Added overview of admitted methods on the Group Manager resources.</li>
          <li>Added exchange of parameters relevant for the pairwise mode of Group OSCORE.</li>
          <li>The signed value for 'client_cred_verify' includes also the scope.</li>
          <li>Renamed the key material object as Group_OSCORE_Input_Material object.</li>
          <li>Replaced 'clientId' with 'group_SenderId'.</li>
          <li>Added message exchange for Group Names request-response.</li>
          <li>No reassignment of Sender ID and Gid in the same OSCORE group.</li>
          <li>Updates on group rekeying contextual with request of new Sender ID.</li>
          <li>Signature verifiers can also retrieve Group Names and URIs.</li>
          <li>Removed group policy about supporting Group OSCORE in pairwise mode.</li>
          <li>Registration of the resource type rt="core.osc.gm".</li>
          <li>Update list of requirements.</li>
          <li>Clarifications and editorial revision.</li>
        </ul>
      </section>
      <section anchor="sec-07-08">
        <name>Version -07 to -08</name>
        <ul spacing="normal">
          <li>AIF specific data model to express scope entries.</li>
          <li>A set of roles is checked as valid when processing the Join Request.</li>
          <li>Updated format of 'get_pub_keys' in the Join Request.</li>
          <li>Payload format and default values of group policies in the Join Response.</li>
          <li>Updated payload format of the FETCH request to retrieve authentication credentials.</li>
          <li>Default values for group configuration parameters.</li>
          <li>IANA registrations to support the AIF specific data model.</li>
        </ul>
      </section>
      <section anchor="sec-06-07">
        <name>Version -06 to -07</name>
        <ul spacing="normal">
          <li>Alignments with draft-ietf-core-oscore-groupcomm.</li>
          <li>New format of 'sign_info', using the COSE capabilities.</li>
          <li>New format of Join Response parameters, using the COSE capabilities.</li>
          <li>Considerations on group rekeying.</li>
          <li>Editorial revision.</li>
        </ul>
      </section>
      <section anchor="sec-05-06">
        <name>Version -05 to -06</name>
        <ul spacing="normal">
          <li>Added role of external signature verifier.</li>
          <li>Parameter 'rsnonce' renamed to 'kdcchallenge'.</li>
          <li>Parameter 'kdcchallenge' may be omitted in some cases.</li>
          <li>Clarified difference between group name and OSCORE Gid.</li>
          <li>Removed the role combination ["requester", "monitor"].</li>
          <li>Admit implicit scope and audience in the Authorization Request.</li>
          <li>New format for the 'sign_info' parameter.</li>
          <li>Scope not mandatory to include in the Join Request.</li>
          <li>Group policy about supporting Group OSCORE in pairwise mode.</li>
          <li>Possible individual rekeying of a single requesting node combined with a group rekeying.</li>
          <li>Security considerations on reusage of signature challenges.</li>
          <li>Addressing optional requirement OPT12 from draft-ietf-ace-key-groupcomm</li>
          <li>Editorial improvements.</li>
        </ul>
      </section>
      <section anchor="sec-04-05">
        <name>Version -04 to -05</name>
        <ul spacing="normal">
          <li>Nonce N_S also in error responses to the Join Requests.</li>
          <li>Supporting single Access Token for multiple groups/topics.</li>
          <li>Supporting legal requesters/responders using the 'peer_roles' parameter.</li>
          <li>Registered and used dedicated label for TLS Exporter.</li>
          <li>Added method for uploading a new authentication credential to the Group Manager.</li>
          <li>Added resource and method for retrieving the current group status.</li>
          <li>Fixed inconsistency in retrieving group keying material only.</li>
          <li>Clarified retrieval of keying material for monitor-only members.</li>
          <li>Clarification on incrementing version number when rekeying the group.</li>
          <li>Clarification on what is re-distributed with the group rekeying.</li>
          <li>Security considerations on the size of the nonces used for the signature challenge.</li>
          <li>Added CBOR values to abbreviate role identifiers in the group.</li>
        </ul>
      </section>
      <section anchor="sec-03-04">
        <name>Version -03 to -04</name>
        <ul spacing="normal">
          <li>New abstract.</li>
          <li>Moved general content to draft-ietf-ace-key-groupcomm</li>
          <li>Terminology: node name; node resource.</li>
          <li>Creation and pointing at node resource.</li>
          <li>Updated Group Manager API (REST methods and offered services).</li>
          <li>Size of challenges 'cnonce' and 'rsnonce'.</li>
          <li>Value of 'rsnonce' for reused or non-traditionally-posted tokens.</li>
          <li>Removed reference to RFC 7390.</li>
          <li>New requirements from draft-ietf-ace-key-groupcomm</li>
          <li>Editorial improvements.</li>
        </ul>
      </section>
      <section anchor="sec-02-03">
        <name>Version -02 to -03</name>
        <ul spacing="normal">
          <li>New sections, aligned with the interface of ace-key-groupcomm .</li>
          <li>Exchange of information on the signature algorithm and related parameters, during the Token POST (Section 4.1).</li>
          <li>Nonce 'rsnonce' from the Group Manager to the Client (Section 4.1).</li>
          <li>Client PoP signature in the Key Distribution Request upon joining (Section 4.2).</li>
          <li>Local actions on the Group Manager, upon a new node's joining (Section 4.2).</li>
          <li>Local actions on the Group Manager, upon a node's leaving (Section 12).</li>
          <li>IANA registration in ACE Groupcomm Parameters registry.</li>
          <li>More fulfilled profile requirements (Appendix A).</li>
        </ul>
      </section>
      <section anchor="sec-01-02">
        <name>Version -01 to -02</name>
        <ul spacing="normal">
          <li>Editorial fixes.</li>
          <li>Changed: "listener" to "responder"; "pure listener" to "monitor".</li>
          <li>Changed profile name to "coap_group_oscore_app", to reflect it is an application profile.</li>
          <li>Added the 'type' parameter for all requests to a Join Resource.</li>
          <li>Added parameters to indicate the encoding of authentication credentials.</li>
          <li>Challenge-response for proof-of-possession of signature keys (Section 4).</li>
          <li>Renamed 'key_info' parameter to 'sign_info'; updated its format; extended to include also parameters of the signature key (Section 4.1).</li>
          <li>Code 4.00 (Bad request), in responses to joining nodes providing an invalid authentication credential (Section 4.3).</li>
          <li>Clarifications on provisioning and checking of authentication credentials (Sections 4 and 6).</li>
          <li>Extended discussion on group rekeying and possible different approaches (Section 7).</li>
          <li>Extended security considerations: proof-of-possession of signature keys; collision of OSCORE Group Identifiers (Section 8).</li>
          <li>Registered three entries in the IANA registry "Sequence Number Synchronization Method" (Section 9).</li>
          <li>Registered one public key encoding in the "ACE Public Key Encoding" IANA registry (Section 9).</li>
        </ul>
      </section>
      <section anchor="sec-00-01">
        <name>Version -00 to -01</name>
        <ul spacing="normal">
          <li>Changed name of 'req_aud' to 'audience' in the Authorization Request (Section 3.1).</li>
          <li>Added negotiation of signature algorithm/parameters between Client and Group Manager (Section 4).</li>
          <li>Updated format of the Key Distribution Response as a whole (Section 4.3).</li>
          <li>Added parameter 'cs_params' in the 'key' parameter of the Key Distribution Response (Section 4.3).</li>
          <li>New IANA registrations in the "ACE Authorization Server Request Creation Hints" registry, "ACE Groupcomm Key" registry, "OSCORE Security Context Parameters" registry and "ACE Groupcomm Profile" registry (Section 9).</li>
        </ul>
      </section>
    </section>
    <section numbered="false" anchor="sec-acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors sincerely thank <contact fullname="Christian Amsüss"/>, <contact fullname="Santiago Aragón"/>, <contact fullname="Stefan Beck"/>, <contact fullname="Carsten Bormann"/>, <contact fullname="Martin Gunnarsson"/>, <contact fullname="Rikard Höglund"/>, <contact fullname="Watson Ladd"/>, <contact fullname="Daniel Migault"/>, <contact fullname="Jim Schaad"/>, <contact fullname="Ludwig Seitz"/>, <contact fullname="Göran Selander"/> and <contact fullname="Peter van der Stok"/> for their comments and feedback.</t>
      <t>The work on this document has been partly supported by VINNOVA and the Celtic-Next project CRITISEC; by the H2020 project SIFIS-Home (Grant agreement 952652); and by the EIT-Digital High Impact Initiative ACTIVE.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
