<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.14 (Ruby 3.1.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lake-edhoc-grease-00" category="info" version="3">
  <!-- xml2rfc v2v3 conversion 3.25.0 -->
  <front>
    <title>Applying Generate Random Extensions And Sustain Extensibility (GREASE) to EDHOC Extensibility</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lake-edhoc-grease-00"/>
    <author initials="C." surname="Amsüss" fullname="Christian Amsüss">
      <organization/>
      <address>
        <postal>
          <country>Austria</country>
        </postal>
        <email>christian@amsuess.com</email>
      </address>
    </author>
    <date year="2025" month="January" day="27"/>
    <workgroup>LAKE</workgroup>
    <abstract>
      <?line 20?>

<t>This document applies the extensibility mechanism GREASE (Generate Random Extensions And Sustain Extensibility),
which was pioneered for TLS,
to the EDHOC ecosystem.
It reserves a set of non-critical EAD labels and unusable cipher suites
that may be included in messages
to ensure peers correctly handle unknown values.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Constrained RESTful Environments Working Group mailing list (core@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/core/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://gitlab.com/chrysn/core-edhoc-grease"/>.</t>
    </note>
  </front>
  <middle>
    <?line 29?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document applies the extensibility mechanism GREASE (Generate Random Extensions And Sustain Extensibility),
which was pioneered for TLS in <xref target="RFC8701"/>,
to the EDHOC <xref target="RFC9528"/> ecosystem.</t>
      <t>The introduction of <xref target="RFC8701"/> and <xref section="3.3" sectionFormat="of" target="RFC9170"/> provide comprehensive motivation for adding such extensions;
<xref target="I-D.edm-protocol-greasing-02"/> provides additional background that influenced this document.</t>
      <t>The extension points of the EDHOC protocol (<xref target="RFC9528"/>) are
cipher suites,
methods,
EADs (External Authorization Data items)
and COSE headers.
This document utilizes the cipher suite and EAD extension points.</t>
      <t>Unlike in TLS GREASE <xref target="RFC8701"/>,
EDHOC is operating on tight bandwidth and message size budget,
with some messages just barely fitting within relevant networks' fragmentation limits.
Thus,
more than with TLS GREASE,
it is up to implementations to decide
whether in their particular use case
they can afford to send addtional data.</t>
      <section anchor="variability-in-other-extension-points">
        <name>Variability in other extension points</name>
        <t>If the selected method or the used COSE heades are unsupported by the peer,
EDHOC does not conclude successfully.
While values could be reserved for these for use as GREASE,
these failed attempts would not be verified between the EDHOC participants
without maintaining state between attempted EDHOC sessions.
Such an addition is considered impractical for constrained devices,
and thus out of scope for this document.</t>
        <t>Recommendations for GREASE <xref section="4" sectionFormat="of" target="I-D.edm-protocol-greasing-02"/>
also include varying other aspects of the protocol,
such as varying sequences of elements.
EDHOC has little known variability,
and intentionally limits choice at times
(for example, <xref section="3.3.2" sectionFormat="of" target="RFC9528"/> allows only the numeric identifier form where that is possible).
Where variation is allowed,
e.g. in padding or in the ordering of EAD options,
applications are encouraged to exercise it.</t>
      </section>
    </section>
    <section anchor="the-grease-ead-labels">
      <name>The GREASE EAD labels</name>
      <t>This document registers the following EAD labels as GREASE EADs:</t>
      <t>160, 41120, 43690, 44975</t>
      <t>These EADs are available in all EDHOC messages.
The EADs are only used in their positive (non-critical) form.</t>
      <t>It is expected that future documents register additional values with the same semantics.</t>
      <section anchor="use-of-grease-eads-by-message-senders">
        <name>Use of GREASE EADs by message senders</name>
        <t>A sender of an EDHOC message MAY send a GREASE EAD using the non-critical (positive) form at any time,
with any or no EAD value (that is, with or without a byte string of any usable length),
in any message.</t>
        <t>Senders SHOULD consider the properties of the network their messages are sent over,
and refrain from adding GREASE when its use would be detrimental to the network
(for example, they might use it less frequently when the added size causes fragmentation of the message).</t>
        <t>On networks where the data added by the grease EADs does not significantly impact the network,
senders SHOULD irregularly send arbitrary (possibly random) GREASE EADs with their messages
to ensure that errors resulting from the use of GREASE are detected.</t>
        <t>The GREASE EADs MAY be used as an alternative form of padding.</t>
        <section anchor="suggested-pattern">
          <name>Pattern for limited fingerprinting</name>
          <t>A method of applying GREASE is suggested as follows:</t>
          <ul spacing="normal">
            <li>
              <t>For every message, use GREASE with a random probability of 1 in 64.</t>
            </li>
            <li>
              <t>Pick a random GREASE label out of the uniform distribution of available options.</t>
            </li>
            <li>
              <t>Pick a random length from the uniformly distributed interval 9 to 40 (inclusive).</t>
            </li>
            <li>
              <t>Add the selected GREASE label with a value of the selected length,
filled with random bytes.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="use-of-grease-eads-by-message-recipients">
        <name>Use of GREASE EADs by message recipients</name>
        <t>A party receiving a GREASE EAD MUST NOT alter its behavior
in any way that would allow random GREASE EADs
to alter the security context that gets established.</t>
        <t>It MAY alter its behavior in other ways;
in particular, it SHOULD randomly insert GREASE EADs
in later messages of an exchange in which unprocessed EADs (including GREASE EADs) were present.</t>
        <t>Implementations SHOULD NOT attempt to recognize GREASE EADs,
and apply the default processing rules.</t>
      </section>
    </section>
    <section anchor="grease-cipher-suites">
      <name>GREASE cipher suites</name>
      <t>This document registers the following cipher suites:</t>
      <t>160, 41120, -41121, 43690</t>
      <t>It is expected that future documents register additional values with the same semantics.</t>
      <t>An initiator may insert a GREASE cipher suite
at any position in its sequence of preferred cipher suites.</t>
      <t>A responder MUST NOT support any of these cipher suites,
and MUST treat them like any other cipher suite it does not support.</t>
      <t>Thus, these cipher suites never occur as the selected cipher suite.
An initiator whose choice of a GREASE cipher suite is accepted
needs to discontinue the protocol.</t>
    </section>
    <section anchor="processing-of-grease-related-failures">
      <name>Processing of GREASE related failures</name>
      <t>It is RECOMMENDED that any counters or statistics about successful and failed connections
distinguish between connections in which GREASE was applied and those in which it was not applied.
Any operator feedback channel, be it immediately to the user or through network monitoring,
SHOULD warn the operator if there are errors that were determined to originate from the use of GREASE
or that are significantly likely to originate from there.
This provides a feedback path as described in <xref section="4.4" sectionFormat="of" target="RFC9170"/>.</t>
      <t>Whether logging of GREASE related failed connection details is appropriate
depends on the privacy policies of the application.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy considerations</name>
      <t>The way in which GREASE is applied
can contribute to identifying which implementation of EDHOC
is being used.
Implementers of EDHOC are encouraged to use the algorithm described in <xref target="suggested-pattern"/>,
both to reduce the likelihood of their implementation to be identified through the use of GREASE
and to increase the anonymity set of other users of the same algorithm.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The use of the GREASE option has no impact on security
in a correct EDHOC implementation.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA considerations</name>
      <section anchor="edhoc-eads">
        <name>EDHOC EADs</name>
        <t>IANA is requested to register
four new entries into the EDHOC External Authorization Data Registry
established in <xref target="RFC9528"/>:</t>
        <t>160, 41120, 43690, 44975</t>
        <t>All share the name "GREASE",
the description "Arbitrary data to ensure extensibility",
and this document as a reference.</t>
      </section>
      <section anchor="edhoc-cipher-suites">
        <name>EDHOC cipher suites</name>
        <t>IANA is requested to register
four new values into the EDHOC Cipher Suites Registry
established in <xref target="RFC9528"/>:</t>
        <t>160, 41120, -41121, 43690</t>
        <t>All share the name "GREASE",
the array N/A,
the description "Unimplementable cipher suite to ensure extensibility",
and this document as a reference.</t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9528">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a very compact and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys. EDHOC provides mutual authentication, forward secrecy, and identity protection. EDHOC is intended for usage in constrained scenarios, and a main use case is to establish an Object Security for Constrained RESTful Environments (OSCORE) security context. By reusing CBOR Object Signing and Encryption (COSE) for cryptography, Concise Binary Object Representation (CBOR) for encoding, and Constrained Application Protocol (CoAP) for transport, the additional code size can be kept very low.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9528"/>
          <seriesInfo name="DOI" value="10.17487/RFC9528"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8701">
          <front>
            <title>Applying Generate Random Extensions And Sustain Extensibility (GREASE) to TLS Extensibility</title>
            <author fullname="D. Benjamin" initials="D." surname="Benjamin"/>
            <date month="January" year="2020"/>
            <abstract>
              <t>This document describes GREASE (Generate Random Extensions And Sustain Extensibility), a mechanism to prevent extensibility failures in the TLS ecosystem. It reserves a set of TLS protocol values that may be advertised to ensure peers correctly handle unknown values.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8701"/>
          <seriesInfo name="DOI" value="10.17487/RFC8701"/>
        </reference>
        <reference anchor="RFC9170">
          <front>
            <title>Long-Term Viability of Protocol Extension Mechanisms</title>
            <author fullname="M. Thomson" initials="M." surname="Thomson"/>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>The ability to change protocols depends on exercising the extension and version-negotiation mechanisms that support change. This document explores how regular use of new protocol features can ensure that it remains possible to deploy changes to a protocol. Examples are given where lack of use caused changes to be more difficult or costly.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9170"/>
          <seriesInfo name="DOI" value="10.17487/RFC9170"/>
        </reference>
        <reference anchor="I-D.edm-protocol-greasing-02">
          <front>
            <title>Maintaining Protocols Using Grease and Variability</title>
            <author fullname="Lucas Pardue" initials="L." surname="Pardue">
              <organization>Cloudflare</organization>
            </author>
            <date day="10" month="July" year="2023"/>
            <abstract>
              <t>   Long-term interoperability of protocols is an important goal of the
   network standards process.  Part of realizing long-term protocol
   deployment success is the ability to support change.  Change can
   require adjustments such as extension to the protocol, modifying
   usage patterns within the current protocol constraints, or a
   replacement protocol.  This document present considerations for
   protocol designers and implementers about applying techniques such as
   greasing or protocol variability as a means to exercise maintenance
   concepts.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-edm-protocol-greasing-02"/>
        </reference>
      </references>
    </references>
    <?line 197?>

<section anchor="open-questions">
      <name>Open questions</name>
      <t>Do the GREASE EADs add any value that padding does not already add?</t>
      <t>Probably yes, because padding is "special enough" that it could be handled in a hard-coded fashion.
(Then again, there's nothing but the effort stopping anyone else from doing the same with the GREASE EADs, right?)</t>
      <t>Can anything be done about extra methods and COSE headers?</t>
      <t>They would not result in successful operations,
but maybe there is still some value in registering one or two --
using them would mean sacrificing the full connection,
but it may still be possible to conclude that the extension points are in order
from watching the EDHOC exchange fail in the predicted way.</t>
    </section>
    <section anchor="change-log">
      <name>Change log</name>
      <t>Since draft-amsuess-lake-edhoc-grease-01:</t>
      <ul spacing="normal">
        <li>
          <t>Document was adopted in LAKE.</t>
        </li>
        <li>
          <t>Instead of discouraging GREASE around fragmentation limits wholesale, suggest reduced frequency.</t>
        </li>
        <li>
          <t>Editorial fix to fingerprinting section.</t>
        </li>
      </ul>
      <t>Since draft-amsuess-lake-edhoc-grease-00:</t>
      <ul spacing="normal">
        <li>
          <t>Expanded introduction section to just point to the abstract any more.</t>
        </li>
      </ul>
      <t>Since draft-amsuess-core-edhoc-grease-01:</t>
      <ul spacing="normal">
        <li>
          <t>Update references to RFC9528 🎉</t>
        </li>
        <li>
          <t>Change target WG to LAKE, renaming to draft-amsuess-lake-edhoc-grease</t>
        </li>
        <li>
          <t>Process RFC9170
          </t>
          <ul spacing="normal">
            <li>
              <t>Add a section on failure processing</t>
            </li>
            <li>
              <t>Reference where appropriate</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Process draft-edm-protocol-greasing-02
          </t>
          <ul spacing="normal">
            <li>
              <t>Variability outside of extension points</t>
            </li>
            <li>
              <t>Be firmer against recognizing GREASE values</t>
            </li>
            <li>
              <t>Point out that future options may be registered (instead of the suggested algorithmic registrations)</t>
            </li>
          </ul>
        </li>
      </ul>
      <t>Since -00:</t>
      <ul spacing="normal">
        <li>
          <t>Fixed a mix-up between positivity and criticality of options.</t>
        </li>
        <li>
          <t>Adjusted numbers accordingly to once more fit in the <tt>0xa.</tt> pattern
(actually they're using <tt>0x.a</tt>, but that doesn't work the same way with CBOR).</t>
        </li>
        <li>
          <t>Text improvements around recipient side processing.</t>
        </li>
      </ul>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Marco Tiloca pointed out a critical error in the numeric constructions.
Göran Selander provided input to reduce mistakable text.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
