diff --git a/artart-review/draft-ietf-ace-key-groupcomm.html b/artart-review/draft-ietf-ace-key-groupcomm.html index b003b1c..06a2ad5 100644 --- a/artart-review/draft-ietf-ace-key-groupcomm.html +++ b/artart-review/draft-ietf-ace-key-groupcomm.html @@ -1482,10 +1482,11 @@

This document builds on the Authentication and Authorization for Constrained Environments (ACE) framework and defines how to request, distribute, and renew keying material and configuration parameters to protect message exchanges in a group communication environment.

Candidate group members acting as ACE Clients and authorized to join a group can interact with the Key Distribution Center (KDC) acting as ACE Resource Server and responsible for that group, in order to obtain the necessary keying material and parameters to communicate with other group members.

In particular, this document defines the operations and interface available at the KDC, as well as general message formats for the interactions between Clients and KDC. At the same time, communications in the group can rely on different approaches, e.g., based on multicast [I-D.ietf-core-groupcomm-bis] or on publish-subscribe messaging [I-D.ietf-core-coap-pubsub], and can be protected in different ways.

-

Therefore, this document delegates details on the communication and security approaches used in a group to separate application profiles. These are specialized instances of this document, targeting a particular group communication approach and defining how communications in the group are protected, as well as the specific keying material and configuration parameters provided to group members. In order to ensure consistency and aid the development of such application profiles, this document defines a number of related compliance requirements (see Appendix A).

-

New keying material is generated and distributed to the group upon membership changes (rekeying), if the application requires backward security (i.e., new group members must be prevented from accessing communications in the group prior to their joining) and forward security (i.e., former group members must be prevented from accessing communications in the group after their leaving).

-

A group rekeying scheme performs the actual distribution of the new keying material, by rekeying the current group members when a new Client joins the group, and the remaining group members when a Client leaves the group. This can rely on different approaches, including efficient group rekeying schemes such as [RFC2093], [RFC2094], and [RFC2627].

-

Consistently with what is recommended in the ACE framework, this document uses CBOR [RFC8949] for data encoding. However, using JSON [RFC8259] instead of CBOR is possible, by relying on the conversion method specified in Sections 6.1 and 6.2 of [RFC8949].

+

Therefore, this document delegates details on the communication and security approaches used in a group to separate application profiles. These are specialized instances of this document, targeting a particular group communication approach and defining how communications in the group are protected, as well as the specific keying material and configuration parameters provided to group members.

+

In order to ensure consistency and aid the development of such application profiles, Appendix A of this document defines a number of related compliance requirements. In particular, Appendix A.1 compiles the requirements that application profiles are REQUIRED to fulfill; these are referred to by an identifier that starts with "REQ". Instead, Appendix A.2 compiles the requirements that application profiles MAY fulfill; these are referred to by an identifier that starts with "OPT".

+

New keying material is generated and distributed to the group upon membership changes (rekeying), if the application requires backward security (i.e., new group members must be prevented from accessing communications in the group prior to their joining) and forward security (i.e., former group members must be prevented from accessing communications in the group after their leaving).

+

A group rekeying scheme performs the actual distribution of the new keying material, by rekeying the current group members when a new Client joins the group, and the remaining group members when a Client leaves the group. This can rely on different approaches, including efficient group rekeying schemes such as [RFC2093], [RFC2094], and [RFC2627].

+

Consistently with what is recommended in the ACE framework, this document uses CBOR [RFC8949] for data encoding. However, using JSON [RFC8259] instead of CBOR is possible, by relying on the conversion method specified in Sections 6.1 and 6.2 of [RFC8949].

@@ -3847,7 +3848,7 @@

- + @@ -3904,9 +3905,9 @@

[TO BE EVICTED] - | + | | - \ + \ Stored group keying @@ -4881,7 +4882,7 @@

Appendix A. Requirements on Application Profiles

This section lists the requirements on application profiles of this specification, for the convenience of application profile designers.

-
+ -
+

A.2. Optional-to-Address Requirements diff --git a/artart-review/draft-ietf-ace-key-groupcomm.txt b/artart-review/draft-ietf-ace-key-groupcomm.txt index 2af6cf6..e74a0e6 100644 --- a/artart-review/draft-ietf-ace-key-groupcomm.txt +++ b/artart-review/draft-ietf-ace-key-groupcomm.txt @@ -193,9 +193,16 @@ Table of Contents particular group communication approach and defining how communications in the group are protected, as well as the specific keying material and configuration parameters provided to group - members. In order to ensure consistency and aid the development of - such application profiles, this document defines a number of related - compliance requirements (see Appendix A). + members. + + In order to ensure consistency and aid the development of such + application profiles, Appendix A of this document defines a number of + related compliance requirements. In particular, Appendix A.1 + compiles the requirements that application profiles are REQUIRED to + fulfill; these are referred to by an identifier that starts with + "REQ". Instead, Appendix A.2 compiles the requirements that + application profiles MAY fulfill; these are referred to by an + identifier that starts with "OPT". New keying material is generated and distributed to the group upon membership changes (rekeying), if the application requires backward @@ -3536,8 +3543,8 @@ Table of Contents | C1 | | C2 | | C3 | | C4 | '--------' '--------' '-----------' '---------------------------' [TO BE EVICTED] - | | - \______________ Stored group keying material (num=5) ________________/ + | | + \_______________ Stored group keying material (num=5) ________________/ Figure 38: Example of Message Exchanges for a One-to-Many Group Rekeying