<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version  -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-amsuess-core-cachable-oscore-04" category="std" consensus="true" obsoletes="" updates="" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.2 -->
  <front>
    <title>Cacheable OSCORE</title>
    <seriesInfo name="Internet-Draft" value="draft-amsuess-core-cachable-oscore-04"/>
    <author initials="C." surname="Amsüss" fullname="Christian Amsüss">
      <organization/>
      <address>
        <postal>
          <country>Austria</country>
        </postal>
        <email>christian@amsuess.com</email>
      </address>
    </author>
    <author initials="M." surname="Tiloca" fullname="Marco Tiloca">
      <organization>RISE AB</organization>
      <address>
        <postal>
          <street>Isafjordsgatan 22</street>
          <city>Kista</city>
          <code>16440 Stockholm</code>
          <country>Sweden</country>
        </postal>
        <email>marco.tiloca@ri.se</email>
      </address>
    </author>
    <date year="2022" month="March" day="07"/>
    <workgroup>CoRE Working Group</workgroup>
    <keyword>CoAP, OSCORE, multicast, caching, proxy</keyword>
    <abstract>
      <t>Group communication with the Constrained Application Protocol (CoAP) can be secured end-to-end using Group Object Security for Constrained RESTful Environments (Group OSCORE), also across untrusted intermediary proxies. However, this sidesteps the proxies' abilities to cache responses from the origin server(s). This specification restores cacheability of protected responses at proxies, by introducing consensus requests which any client in a group can send to one server or multiple servers in the same group.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
  CORE Working Group mailing list (core@ietf.org),
  which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/core/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
  <eref target="https://gitlab.com/chrysn/core-cachable-oscore/"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>The Constrained Application Protocol (CoAP) <xref target="RFC7252" format="default"/> supports also group communication, for instance over UDP and IP multicast <xref target="I-D.ietf-core-groupcomm-bis" format="default"/>. In a group communication environment, exchanged messages can be secured end-to-end by using Group Object Security for Constrained RESTful Environments (Group OSCORE) <xref target="I-D.ietf-core-oscore-groupcomm" format="default"/>.</t>
      <t>Requests and responses protected with the group mode of Group OSCORE can be read by all group members, i.e., not only by the intended recipient(s), thus achieving group-level confidentiality.</t>
      <t>This allows a trusted intermediary proxy which is also a member of the OSCORE group to populate its cache with responses from origin servers. Later on, the proxy can possibly reply to a request in the group with a response from its cache, if recognized as an eligible server by the client.</t>
      <t>However, an untrusted proxy which is not member of the OSCORE group only sees protected responses as opaque, uncacheable ciphertext. In particular, different clients in the group that originate a same plain CoAP request would send different protected requests, as a result of their Group OSCORE processing. Such protected requests cannot yield a cache hit at the proxy, which makes the whole caching of protected responses pointless.</t>
      <t>This document addresses this complication and enables cacheability of protected responses, also for proxies that are not members of the OSCORE group and are unaware of OSCORE in general. To this end, it builds on the concept of "consensus request" initially considered in <xref target="I-D.ietf-core-observe-multicast-notifications" format="default"/>, and defines "deterministic request" as a convenient incarnation of such concept.</t>
      <t>All clients wishing to send a particular GET or FETCH request are able to deterministically compute the same protected request, using a variation on the pairwise mode of Group OSCORE. It follows that cache hits become possible at the proxy, which can thus serve clients in the group from its cache. Like in <xref target="I-D.ietf-core-observe-multicast-notifications" format="default"/>, this requires that clients and servers are already members of a suitable OSCORE group.</t>
      <t>Cacheability of protected responses is useful also in applications where several clients wish to retrieve the same object from a single server.
Some security properties of OSCORE are dispensed with to gain other desirable properties.</t>
      <t>In order to clearly handle the protocol's security properties,
and to broaden applicability to group situations outside the deterministic case,
the technical implementation is split in two halves:</t>
      <ul spacing="normal">
        <li>maintaining request-response bindings in absence of request source authentication, and</li>
        <li>building and processing of deterministic requests
(which have no source authentication, and thus require the former).</li>
      </ul>
      <section anchor="use-cases" numbered="true" toc="default">
        <name>Use cases</name>
        <t>When firmware updates are delivered using CoAP,
many similar devices fetch large representations at the same time.
Collecting them at a proxy not only keeps the traffic low,
but also lets the clients ride single file to hide their numbers<xref target="SW-EPIV" format="default"/> and identities.</t>
        <t>When relying on intermediaries to fan out the delivery of multicast data protected end-to-end as in <xref target="I-D.ietf-core-observe-multicast-notifications" format="default"/>, deterministic requests allow for a more efficient setup, by reducing the amount of message exchanges and enabling early population of cache entries (see <xref target="det-requests-for-notif" format="default"/>).</t>
      </section>
      <section anchor="terminology" numbered="true" toc="default">
        <name>Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default"/> when, and only when, they appear in all capitals, as shown here.</t>
        <t>Readers are expected to be familiar with terms and concepts of CoAP <xref target="RFC7252" format="default"/> and its method FETCH <xref target="RFC8132" format="default"/>, group communication for CoAP <xref target="I-D.ietf-core-groupcomm-bis" format="default"/>, COSE <xref target="I-D.ietf-cose-rfc8152bis-struct" format="default"/><xref target="I-D.ietf-cose-rfc8152bis-algs" format="default"/>, OSCORE <xref target="RFC8613" format="default"/>, and Group OSCORE <xref target="I-D.ietf-core-oscore-groupcomm" format="default"/>.</t>
        <t>This document introduces the following new terms.</t>
        <ul spacing="normal">
          <li>
            <t>Consensus Request: a CoAP request that multiple clients use to repeatedly access a particular resource.
In this document, it exclusively refers to requests protected with Group OSCORE to a resource hosted at one or more servers in the OSCORE group.  </t>
            <t>
A Consensus Request has all the properties relevant to caching, but its transport dependent properties (e.g., Token or Message ID) are not defined. Thus, different requests on the wire can be said to "be the same Consensus Request" even if they have different Tokens or source addresses.  </t>
            <t>
The Consensus Request is the reference for request-response binding.
 In general, a client processing a response to a consensus request did not generate (and thus sign) the consensus request.
 The client not only needs to decrypt the Consensus Request to understand a response to it (for example to tell which path was requested),
 it also needs to verify that this is the only Consensus Request that could elicit this response.</t>
          </li>
          <li>
            <t>Deterministic Client: a fictitious member of an OSCORE group, having no Sender Sequence Number, no asymmetric key pair, and no Recipient Context.  </t>
            <t>
The Group Manager sets up the Deterministic Client, and assigns it a unique Sender ID as for other group members. Furthermore, the Deterministic Client has only the minimum common set of privileges shared by all group members.</t>
          </li>
          <li>Deterministic Request: a Consensus Request generated by the Deterministic Client. The use of Deterministic Requests is defined in <xref target="sec-deterministic-requests" format="default"/>.</li>
          <li>
            <t>Ticket Request: a Consensus Request generated by the server itself.  </t>
            <t>
This term is not used in the main document, but is useful in comparison with other applications of consensus requests
that are generated in a different way than as a Deterministic Request.
The prototypical Ticket Request is the Phantom Request defined in <xref target="I-D.ietf-core-observe-multicast-notifications" format="default"/>.  </t>
            <t>
In <xref target="sec-ticket-requests" format="default"/>, the term is used to bridge the gap to that draft.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="oscore-nosourceauth" numbered="true" toc="default">
      <name>OSCORE processing without source authentication</name>
      <t>The request-response binding of OSCORE is achieved by the request_kid / request_piv items
(and, in group OSCORE, request_kid_context)
present in the response's AAD.
Its security depends on the server obtaining source authentication for the request:
Without, a malicious group member could alter a request to the server (without altering the request_ details above),
and the client would still accept the response as if it were a response to its request.</t>
      <t>Source authentication is thus a precondition to secure use of OSCORE.
However, it is hard to provide when:</t>
      <ul spacing="normal">
        <li>Requests are built exclusively using shared key material (as in a Deterministic Client).</li>
        <li>Requests are sent without source authentication, or where the source authentication is not checked. (This was part of <xref target="I-D.ietf-core-oscore-groupcomm" format="default"/> in revisions before -12).</li>
      </ul>
      <t>This document does not [ yet? ] give full guidance on how to restore request-response binding for the general case,
but currently only offers suggestions:</t>
      <ul spacing="normal">
        <li>The response can contain the full request. An option that allows doing that was presented in <xref target="I-D.bormann-core-responses" format="default"/>.</li>
        <li>The response can contain a cryptographic hash of the full request. This is used in <xref target="ssec-request-hash-option" format="default"/>.</li>
        <li>The above details can be transported in a Class E option (encrypted) or a a Class I option (unencrypted but part of the AAD).
The latter has the advantage that it can be removed in transit and reconstructed at the receiver.</li>
        <li>Alternatively, the agreed-on request data can be placed in a different position in the AAD,
or be part of the security context derivation.
In the latter case, care needs to be taken to never initialize a security context twice with the same input,
as that would lead to nonce reuse.</li>
      </ul>
      <t>[ Suggestion for any OSCORE v2: avoid request details in the request's AAD as individual elements. Rather than having 'request_kid', 'request_piv' and (in Group OSCORE) 'request_kid_context' as separate fields, they can better be something more pluggable.
This would avoid the need to make up an option before processing, and would allow just plugging in the hash or request in there replacing the request_ items. ]</t>
      <t>Additional care has to be taken that details not expressed in the request itself
(like the security context from which it is assumed to have originated) are captured.</t>
      <t>Processing of requests without source authentication has to be done assuming only the minimal possible privilege of the requester
[ which currently described as the authorization of the Deterministic Client, and may be moved up here in later versions of this document ].
If a response is built to such a request that contains data more sensitive than that
(which might be justified if the response is protected for an authorized group member in pairwise response mode),
special consideration for any side channels like response size or timing is required.</t>
    </section>
    <section anchor="sec-deterministic-requests" numbered="true" toc="default">
      <name>Deterministic Requests</name>
      <t>This section defines a method for clients starting from a same plain CoAP request to independently arrive at a same Deterministic Request protected with Group OSCORE.</t>
      <section anchor="sec-deterministic-requests-unprotected" numbered="true" toc="default">
        <name>Deterministic Unprotected Request</name>
        <t>Clients build the unprotected Deterministic Request in a way which is as much reproducible as possible.
This document does not set out full guidelines for minimizing the variation,
but considered starting points are:</t>
        <ul spacing="normal">
          <li>
            <t>Set the inner Observe option to 0 even if no observation is intended (and hence no outer Observe is set). Thus, both observing and non-observing requests can be aggregated into a single request, that is upstreamed as an observation at the latest when any observing request reaches a caching proxy.  </t>
            <t>
In this case, following a Deterministic Request that includes only an inner Observe option, servers include an inner Observe option (but no outer Observe option) in a successful response sent as reply. Also, when receiving a response to such a Deterministic Request previously sent, clients have to silently ignore the inner Observe option in that response.</t>
          </li>
          <li>Avoid setting the ETag option in requests on a whim.
Only set it when there was a recent response with that ETag.
When obtaining later blocks, do not send the known-stale ETag.</li>
          <li>In block-wise transfer, maximally sized large inner blocks (szx=6) should be selected.
This serves not only to align the clients on consistent cache entries,
but also helps amortize the additional data transferred in the per-message signatures.</li>
        </ul>
        <!--
MT: proposed  s/should be selected/SHOULD be selected
-->

<t>Outer block-wise transfer can then be used if these messages excede a hop's efficiently usable MTU size.</t>
        <t>(If BERT <xref target="RFC8323" format="default"/> is usable with OSCORE, its use is fine as well;
  in that case, the server picks a consistent block size for all clients anyway).</t>
        <ul spacing="normal">
          <li>The Padding option defined in <xref target="sec-padding" format="default"/> can be used to limit an adversary's ability to deduce the content and the target resource of Deterministic Requests from their length. In particular, all Deterministic Requests of the same class (ideally, all requests to a particular server) can be padded to reach the same total length, that should be agreed on among all users of the same OSCORE Security Context.</li>
        </ul>
        <!--
MT: proposed  s/should be agreed/SHOULD be agreed
-->

<ul spacing="normal">
          <li>
            <t>Clients should not send any inner Echo options <xref target="RFC9175" format="default"/> in deterministic requests.  </t>
            <t>
This limits the use of the Echo option in combination with deterministic requests to unprotected (outer) options,
and thus is limited to testing the reachability of the client.
This is not practically limiting, as the use as an inner option would be to prove freshness,
which is something deterministic requests simply cannot provide anyway.</t>
          </li>
        </ul>
        <t>These only serve to ensure that cache entries are utilized; failure to follow them has no more severe consequences than decreasing the utility and effectiveness of a cache.</t>
      </section>
      <section anchor="ssec-deterministic-requests-design" numbered="true" toc="default">
        <name>Design Considerations</name>
        <t>The hard part is arriving at a consensus pair (key, nonce) to be used with the AEAD cipher for encrypting the Deterministic Request, while also avoiding reuse of the same (key, nonce) pair across different requests.</t>
        <t>Diversity can conceptually be enforced by applying a cryptographic hash function to the complete input of the encryption operation over the plain CoAP request (i.e., the AAD and the plaintext of the COSE object), and then using the result as source of uniqueness.
Any non-malleable cryptographically secure hash of sufficient length to make collisions sufficiently unlikely is suitable for this purpose.</t>
        <t>A tempting possibility is to use a fixed (group) key, and use the hash as a deterministic AEAD nonce for each Deterministic Request throught the Partial IV component (see <xref section="5.2" sectionFormat="of" target="RFC8613" format="default"/>). However, the 40 bit available for the Partial IV are by far insufficient to ensure that the deterministic nonce is not reused across different Deterministic Requests. Even if the full deterministic AEAD nonce could be set, the sizes used by common algorithms would still be too small.</t>
        <t>As a consequence, the proposed method takes the opposite approach, by considering a fixed deterministic AEAD nonce, while generating a different deterministic encryption key for each Deterministic Request. That is, the hash computed over the plain CoAP request is taken as input to the key generation. As an advantage, this approach does not require to transport the computed hash in the OSCORE option.</t>
        <t>[ Note: This has a further positive side effect arising with version -11 of Group OSCORE. That is, since the full encoded OSCORE option is part of the AAD, it avoids a circular dependency from feeding the AAD into the hash computation, which in turn needs crude workarounds like building the full AAD twice, or zeroing out the hash-to-be. ]</t>
      </section>
      <section anchor="ssec-request-hash-option" numbered="true" toc="default">
        <name>Request-Hash</name>
        <t>In order to transport the hash of the plain CoAP request, a new CoAP option is defined, which MUST be supported by clients and servers that support Deterministic Requests.</t>
        <t>The option is called Request-Hash. As summarized in <xref target="request-hash-table" format="default"/>, the Request-Hash option is elective, safe to forward, part of the cache key and repeatable.</t>
        <figure anchor="request-hash-table">
          <name>Request-Hash Option</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
+------+---+---+---+---+--------------+--------+--------+---------+
| No.  | C | U | N | R |     Name     | Format | Length | Default |
+------+---+---+---+---+--------------+--------+--------+---------+
| TBD1 |   |   |   | x | Request-Hash | opaque |  any   | (none)  |
+------+---+---+---+---+--------------+--------+--------+---------+
]]></artwork>
        </figure>
        <t>The Request-Hash option is identical in all its properties to the Request-Tag option defined in <xref target="RFC9175" format="default"/>, with the following exceptions:</t>
        <ul spacing="normal">
          <li>
            <t>It may be arbitrarily long.  </t>
            <t>
Implementations can limit its length to that of the longest output of the supported hash functions.</t>
          </li>
          <li>
            <t>It may be present in responses (TBD: Does this affect any other properties?).  </t>
            <t>
A response's Request-Hash is, as a matter of default value,
equal to the request's.
The response is only valid if its Request-Hash is equal to the matching request's.  </t>
            <t>
Servers (including proxies) thus generally SHOULD NOT need to send the Request-Hash option explicitly in responses,
especially as a matter of bandwidth efficiency.  </t>
            <t>
A reason (and, currently, the only known) to actually send a Request-Hash in a response
are non-traditional responses as described in <xref target="I-D.bormann-core-responses" format="default"/>,
which in terms of that document are non-matching to the request (and thus easily usable);
the request hash in the response allows populating caches (see below) and decryption of the response in deterministic request contexts.
In the context of non-traditional responses, a matching request's Request-Hash can be inferred from its value in the response.</t>
          </li>
          <li>
            <t>A proxy MAY use any fresh cached response from the selected server to respond to a request with the same Request-Hash;
this may save it some memory.  </t>
            <t>
A proxy can add or remove the request's Request-Tag value to / from a response.</t>
          </li>
          <li>When used with a Deterministic Request, this option is created at message protection time by the sender, and used before message unprotection by the recipient. Therefore, in this use case, it is treated as Class U for OSCORE <xref target="RFC8613" format="default"/> in requests. In the same application, for responses, it is treated as Class I, and often elided from sending (but reconstructed at the receiver). Other uses of this option can put it into different classes for the OSCORE processing.</li>
        </ul>
        <t>This option achieves request-response binding described in <xref target="oscore-nosourceauth" format="default"/>.</t>
      </section>
      <section anchor="ssec-use-deterministic-requests" numbered="true" toc="default">
        <name>Use of Deterministic Requests</name>
        <t>This section defines how a Deterministic Request is built on the client side and then processed on the server side.</t>
        <section anchor="sssec-use-deterministic-requests-pre-conditions" numbered="true" toc="default">
          <name>Pre-Conditions</name>
          <t>The use of Deterministic Requests in an OSCORE group requires that the interested group members are aware of the Deterministic Client in the group. In particular, they need to know:</t>
          <ul spacing="normal">
            <li>
              <t>The Sender ID of the Deterministic Client, to be used as 'kid' parameter for the Deterministic Requests. This allows all group members to compute the Sender Key of the Deterministic Client.  </t>
              <t>
The Sender ID of the Deterministic Client is immutable throughout the lifetime of the OSCORE group. That is, it is not relinquished and it does not change upon changes of the group keying material following a group rekeying performed by the Group Manager.</t>
            </li>
            <li>The hash algorithm to use for computing the hash of a plain CoAP request, when producing the associated Deterministic Request.</li>
          </ul>
          <t>Group members have to obtain this information from the Group Manager. A group member can do that, for instance, when obtaining the group keying material upon joining the OSCORE group, or later on as an active member by sending a request to a dedicated resource at the Group Manager.</t>
          <t>The joining process based on the Group Manager defined in <xref target="I-D.ietf-ace-key-groupcomm-oscore" format="default"/> can be easily extended to support the provisioning of information about the Deterministic Client. Such an extension is defined in <xref target="sec-obtaining-info" format="default"/> of this document.</t>
        </section>
        <section anchor="sssec-use-deterministic-requests-client-req" numbered="true" toc="default">
          <name>Client Processing of Deterministic Request</name>
          <t>In order to build a Deterministic Request, the client protects the plain CoAP request using the pairwise mode of Group OSCORE (see <xref section="9" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm" format="default"/>), with the following alterations.</t>
          <ol spacing="normal" type="1"><li>
              <t>When preparing the OSCORE option, the external_aad and the AEAD nonce:  </t>
              <ul spacing="normal">
                <li>The used Sender ID is the Deterministic Client's Sender ID.</li>
                <li>The used Partial IV is 0.</li>
              </ul>
              <t>
When preparing the external_aad, the element 'sender_public_key' in the aad_array takes the empty CBOR byte string.</t>
            </li>
            <li>
              <t>The client uses the hash function indicated for the Deterministic Client, and computes a hash H over the following input: the Sender Key of the Deterministic Client, concatenated with the external_aad from step 1, concatenated with the COSE plaintext.  </t>
              <t>
Note that the payload of the plain CoAP request (if any) is not self-delimiting, and thus hash functions are limited to non-malleable ones.</t>
            </li>
            <li>
              <t>The client derives the deterministic Pairwise Sender Key K as defined in <xref section="2.3.1" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm" format="default"/>, with the following differences:  </t>
              <ul spacing="normal">
                <li>The Sender Key of the Deterministic Client is used as first argument of the HKDF.</li>
                <li>
                  <t>The hash H from step 2 is used as second argument of the HKDF, i.e., as a pseudo IKM-Sender computable by all the group members.      </t>
                  <t>
Note that an actual IKM-Sender cannot be obtained, since there is no authentication credential (and public key included therein) associated with the Deterministic Client, to be used as Sender Authentication Credential and for computing an actual Diffie-Hellman Shared Secret.</t>
                </li>
                <li>The Sender ID of the Deterministic Client is used as value for the 'id' element of the 'info' parameter used as third argument of the HKDF.</li>
              </ul>
            </li>
            <li>The client includes a Request-Hash option in the request to protect, with value set to the hash H from Step 2.</li>
            <li>The client MAY include an inner Observe option set to 0 to be protected with OSCORE, even if no observation is intended (see <xref target="sec-deterministic-requests-unprotected" format="default"/>).</li>
            <li>The client protects the request using the pairwise mode of Group OSCORE as defined in <xref section="9.3" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm" format="default"/>, using the AEAD nonce from step 1, the deterministic Pairwise Sender Key K from step 3 as AEAD encryption key, and the finalized AAD.</li>
            <li>The client MUST NOT include an unprotected (outer) Observe option if no observation is intended, even in case an inner Observe option was included at step 5 above.</li>
            <li>The client sets FETCH as the outer code of the protected request to make it usable for a proxy's cache, even if no observation is requested <xref target="RFC7641" format="default"/>.</li>
          </ol>
          <t>The result is the Deterministic Request to be sent.</t>
          <t>Since the encryption key K is derived using material from the whole plain CoAP request, this (key, nonce) pair is only used for this very message, which is deterministically encrypted unless there is a hash collision between two Deterministic Requests.</t>
          <t>The deterministic encryption requires the used AEAD algorithm to be deterministic in itself. This is the case for all the AEAD algorithms currently registered with COSE in <xref target="COSE.Algorithms" format="default"/>. For future algorithms, a flag in the COSE registry is to be added.</t>
          <t>Note that, while the process defined above is based on the pairwise mode of Group OSCORE, no information about the server takes part to the key derivation or is included in the AAD. This is intentional, since it allows for sending a deterministic request to multiple servers at once (see <xref target="det-req-one-to-many" format="default"/>). On the other hand, it requires later checks at the client when verifying a response to a Deterministic Request (see <xref target="ssec-use-deterministic-requests-response" format="default"/>).</t>
        </section>
        <section anchor="sssec-use-deterministic-requests-server-req" numbered="true" toc="default">
          <name>Server Processing of Deterministic Request</name>
          <t>Upon receiving a Deterministic Request, a server performs the following actions.</t>
          <t>A server that does not support Deterministic Requests would not be able to create the necessary Recipient Context, and thus will fail decrypting the request.</t>
          <ol spacing="normal" type="1"><li>If not already available, the server retrieves the information about the Deterministic Client from the Group Manager, and derives the Sender Key of the Deterministic Client.</li>
            <li>
              <t>The server actually recognizes the request to be a Deterministic Request, due to the presence of the Request-Hash option and to the 'kid' parameter of the OSCORE option set to the Sender ID of the Deterministic Client.  </t>
              <t>
If the 'kid' parameter of the OSCORE option specifies a different Sender ID than the one of the Deterministic Client, the server MUST NOT take the following steps, and instead processes the request as per <xref section="9.4" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm" format="default"/>.</t>
            </li>
            <li>The server retrieves the hash H from the Request-Hash option.</li>
            <li>
              <t>The server derives a Recipient Context for processing the Deterministic Request. In particular:  </t>
              <ul spacing="normal">
                <li>The Recipient ID is the Sender ID of the Deterministic Client.</li>
                <li>The Recipient Key is derived as the key K in step 3 of <xref target="sssec-use-deterministic-requests-client-req" format="default"/>, with the hash H retrieved at the previous step.</li>
              </ul>
            </li>
            <li>The server verifies the request using the pairwise mode of Group OSCORE, as defined in <xref section="9.4" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm" format="default"/>, using the Recipient Context from step 4, with the difference that the server does not perform replay checks against a Replay Window (see below).</li>
          </ol>
          <t>In case of successful verification, the server MUST also perform the following actions, before possibly delivering the request to the application.</t>
          <ul spacing="normal">
            <li>
              <t>Starting from the recovered plain CoAP request, the server MUST recompute the same hash that the client computed at step 2 of <xref target="sssec-use-deterministic-requests-client-req" format="default"/>.  </t>
              <t>
If the recomputed hash value differs from the value retrieved from the Request-Hash option at step 3, the server MUST treat the request as invalid and MAY reply with an unprotected 4.00 (Bad Request) error response. The server MAY set an Outer Max-Age option with value zero. The diagnostic payload MAY contain the string "Decryption failed".  </t>
              <t>
This prevents an attacker that guessed a valid authentication tag for a given Request-Hash value to poison caches with incorrect responses.</t>
            </li>
            <li>
              <t>The server MUST verify that the unprotected request is safe to be processed in the REST sense, i.e., that it has no side effects. If verification fails, the server MUST discard the message and SHOULD reply with a protected 4.01 (Unauthorized) error response.  </t>
              <t>
Note that some CoAP implementations may not be able to prevent that an application produces side effects from a safe request. This may incur checking whether the particular resource handler is explicitly marked as eligible for processing deterministic requests. An implementation may also have a configured list of requests that are known to be side effect free, or even a pre-built list of valid hashes for all sensible requests for them, and reject any other request.  </t>
              <t>
These checks replace the otherwise present requirement that the server needs to check the Replay Window of the Recipient Context (see step 5 above), which is inapplicable with the Recipient Context derived at step 4 from the value of the Request-Hash option. The reasoning is analogous to the one in <xref target="I-D.amsuess-lwig-oscore" format="default"/> to treat the potential replay as answerable, if the handled request is side effect free.</t>
            </li>
          </ul>
        </section>
        <section anchor="ssec-use-deterministic-requests-response" numbered="true" toc="default">
          <name>Response to a Deterministic Request</name>
          <t>When treating a response to a deterministic request, the Request-Hash option is treated as a Class I option (but usually not sent). This creates the request-response binding ensuring that no mismatched responses can be successfully unprotected (see <xref target="oscore-nosourceauth" format="default"/>).
The client MUST reject responses with a Request-Hash not matching the one it sent in the request.</t>
          <!--
MT: Is there any possible reason in this application of the Request-Hash option to not elide it the from the response?
-->

<t>When preparing the response, the server performs the following actions.</t>
          <ol spacing="normal" type="1"><li>The server sets a non-zero Max-Age option, thus making the Deterministic Request usable for the proxy cache.</li>
            <li>The server preliminarily sets the Request-Hash option with the full request hash.</li>
            <li>If the Deterministic Request included an inner Observe option but not an outer Observe option, the server MUST include an inner Observe option in the response.</li>
            <li>
              <t>The server MUST protect the response using the group mode of Group OSCORE, as defined in <xref section="8.3" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm" format="default"/>. This is required to ensure that the client can verify source authentication of the response, since the "pairwise" key used for the Deterministic Request is actually shared among all the group members.  </t>
              <t>
Note that the Request-Hash option is treated as Class I here.</t>
            </li>
            <li>The server MUST use its own Sender Sequence Number as Partial IV to protect the response, and include it as Partial IV in the OSCORE option of the response. This is required since the server does not perform replay protection on the Deterministic Request (see <xref target="ssec-use-deterministic-requests-response" format="default"/>).</li>
            <li>The server uses 2.05 (Content) as outer code even though it is not necessarily an Observe notification <xref target="RFC7641" format="default"/>, in order to make the response cacheable.</li>
            <li>The server SHOULD remove the Request-Hash option from the message before sending
  as per the general option mechanism of <xref target="ssec-request-hash-option" format="default"/>.</li>
            <li>If the Deterministic Request included an inner Observe option but not an outer Observe option, the server MUST NOT include an outer Observe option in the response.</li>
          </ol>
          <t>Upon receiving the response, the client performs the following actions.</t>
          <ol spacing="normal" type="1"><li>In case the response includes a 'kid' in the OSCORE option and unless responses from multiple servers are expected (see <xref target="det-req-one-to-many" format="default"/>), the client MUST verify it to be exactly the 'kid' of the server to which the Deterministic Request was sent.</li>
            <li>The client sets the Request-Hash option with the full request hash on the reponse.
  If an option of a different value is already present, it rejects the response.</li>
            <li>The client verifies the response using the group mode of Group OSCORE, as defined in <xref section="8.4" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm" format="default"/>. In particular, the client verifies the counter signature in the response, based on the 'kid' of the server it sent the request to. When verifying the response, the Request-Hash option is treated as a Class I option.</li>
            <li>If the Deterministic Request included an inner Observe option but not an outer Observe option (see <xref target="sec-deterministic-requests-unprotected" format="default"/>), the client MUST silently ignore the inner Observe option in the response and MUST NOT stop processing the response.</li>
          </ol>
          <t>[ Note: This deviates from Section 4.1.3.5.2 of RFC 8613, but it is limited to a very specific situation, where the client and server both know exactly what happens. This does not affect the use of OSCORE in other situations. ]</t>
        </section>
        <section anchor="det-req-one-to-many" numbered="true" toc="default">
          <name>Deterministic Requests to Multiple Servers</name>
          <t>A Deterministic Request <em>can</em> be sent to a CoAP group, e.g., over UDP and IP multicast <xref target="I-D.ietf-core-groupcomm-bis" format="default"/>, thus targeting multiple servers at once.</t>
          <t>To simplify key derivation, such a Deterministic Request is still created in the same way as a one-to-one request and still protected with the pairwise mode of Group OSCORE, as defined in <xref target="sssec-use-deterministic-requests-client-req" format="default"/>.</t>
          <t>[ Note: If it was protected with the group mode, the request hash would need to be fed into a group key derivation just for this corner case. Furthermore, there would need to be a signature in spite of no authentication credential (and public key included therein) associated with the Deterministic Client. ]</t>
          <t>When a server receives a request from the Deterministic Client as addressed to a CoAP group, the server proceeds as defined in <xref target="sssec-use-deterministic-requests-server-req" format="default"/>, with the difference that it MUST include its own Sender ID in the response, as 'kid' parameter of the OSCORE option.</t>
          <t>Although it is normally optional for the server to include its Sender ID when replying to a request protected in pairwise mode, it is required in this case for allowing the client to retrieve the Recipient Context associated with the server originating the response.</t>
        </section>
      </section>
    </section>
    <section anchor="sec-obtaining-info" numbered="true" toc="default">
      <name>Obtaining Information about the Deterministic Client</name>
      <t>This section extends the Joining Process defined in <xref target="I-D.ietf-ace-key-groupcomm-oscore" format="default"/>, and based on the ACE framework for Authentication and Authorization <xref target="I-D.ietf-ace-oauth-authz" format="default"/>. Upon joining the OSCORE group, this enables a new group member to obtain from the Group Manager the required information about the Deterministic Client (see <xref target="sssec-use-deterministic-requests-pre-conditions" format="default"/>).</t>
      <t>With reference to the 'key' parameter of the Joining Response defined in <xref section="6.4" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm-oscore" format="default"/>, the Group_OSCORE_Input_Material object specified as its value contains also the two additional parameters 'det_senderId' and 'det_hash_alg'. These are defined in <xref target="ssec-iana-security-context-parameter-registry" format="default"/> of this document. In particular:</t>
      <ul spacing="normal">
        <li>The 'det_senderId' parameter, if present, has as value the OSCORE Sender ID assigned to the Deterministic Client by the Group Manager. This parameter MUST be present if the OSCORE group uses deterministic requests as defined in this document. Otherwise, this parameter MUST NOT be present.</li>
        <li>The 'det_hash_alg' parameter, if present, has as value the hash algorithm to use for computing the hash of a plain CoAP request, when producing the associated Deterministic Request. This parameter takes values from the "Value" column of the "COSE Algorithms" Registry <xref target="COSE.Algorithms" format="default"/>. This parameter MUST be present if the OSCORE group uses deterministic requests as defined in this document. Otherwise, this parameter MUST NOT be present.</li>
      </ul>
      <t>The same extension above applies also to the 'key' parameter when included in a Key Distribution Response (see Sections <xref target="I-D.ietf-ace-key-groupcomm-oscore" section="8.1" sectionFormat="bare" format="default"/> and <xref target="I-D.ietf-ace-key-groupcomm-oscore" section="8.2" sectionFormat="bare" format="default"/> of <xref target="I-D.ietf-ace-key-groupcomm-oscore" format="default"/>) and in a Signature Verification Data Response (see <xref section="13" sectionFormat="of" target="I-D.ietf-ace-key-groupcomm-oscore" format="default"/>).</t>
    </section>
    <section anchor="sec-security-considerations" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>The same security considerations from <xref target="RFC7252" format="default"/><xref target="I-D.ietf-core-groupcomm-bis" format="default"/><xref target="RFC8613" format="default"/><xref target="I-D.ietf-core-oscore-groupcomm" format="default"/> hold for this document.</t>
      <t>Compared to Group OSCORE,
deterministic requests dispense with some of OSCORE's security properties
by just so much as to make caching possible:</t>
      <ul spacing="normal">
        <li>
          <t>Receiving a response to a deterministic request does not mean that the response was generated after the request was sent.  </t>
          <t>
It still contains two freshness statements, though:  </t>
          <ul spacing="normal">
            <li>It is more recent than any other response from the same group member that has a smaller sequence number.</li>
            <li>It is more recent than the original creation of the deterministic security context's key material.</li>
          </ul>
        </li>
        <li>
          <t>Request privacy is limited.  </t>
          <t>
An intermediary can determine that two requests from different clients
are identical, and associate the different responses generated for them.
A server producing responses of varying size to a request
can use the Padding option to hide when the response is changing.</t>
        </li>
        <li>
          <t>Source authentication for requests is lost.  </t>
          <t>
Instead, the server must verify that the request (precisely: its handler) is side effect free.
The distinct semantics of the CoAP request codes can help the server make that assessment.</t>
        </li>
      </ul>
      <t>[ More on the verification of the Deterministic Request ]</t>
    </section>
    <section anchor="iana" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>This document has the following actions for IANA.</t>
      <section anchor="iana-coap-options" numbered="true" toc="default">
        <name>CoAP Option Numbers Registry</name>
        <t>IANA is asked to enter the following option numbers to the "CoAP Option Numbers" registry defined in <xref target="RFC7252" format="default"/> within the "CoRE Parameters" registry.</t>
        <figure>
          <name>CoAP Option Numbers</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
+--------+--------------+-------------------+
| Number |     Name     |     Reference     |
+--------+--------------+-------------------+
|  TBD1  | Request-Hash | [[this document]] |
+--------+--------------+-------------------+
|  TBD2  | Padding      | [[this document]] |
+--------+--------------+-------------------+
]]></artwork>
        </figure>
        <t>[</t>
        <t>For the Request-Hash option, the number suggested to IANA is 548.</t>
        <t>For the Padding option, the option number is picked to be the highest number in the Experts Review range; the high option number allows it to follow practically all other options, and thus to be set when the final unpadded message length including all options is known. Therefore, the number suggested to IANA is 64988.</t>
        <t>Applications that make use of the "Experimental use" range and want to preserve that property are invited to pick the largest suitable experimental number (65532)</t>
        <t>Note that unless other high options are used, this means that padding a message adds an overhead of at least 3 bytes, i.e., 1 byte for option delta/length and two more bytes of extended option delta. This is considered acceptable overhead, given that the application has already chosen to prefer the privacy gains of padding over wire transfer length.</t>
        <t>]</t>
      </section>
      <section anchor="ssec-iana-security-context-parameter-registry" numbered="true" toc="default">
        <name>OSCORE Security Context Parameters Registry</name>
        <t>IANA is asked to register the following entries in the "OSCORE Security Context Parameters" Registry defined in <xref section="9.4" sectionFormat="of" target="I-D.ietf-ace-oscore-profile" format="default"/>.</t>
        <ul spacing="normal">
          <li>Name: det_senderId</li>
          <li>CBOR Label: TBD3</li>
          <li>CBOR Type: bstr</li>
          <li>Registry: -</li>
          <li>Description: OSCORE Sender ID assigned to the Deterministic Client of an OSCORE group</li>
          <li>Reference: [[this document]] (<xref target="sec-obtaining-info" format="default"/>)</li>
        </ul>
        <t> </t>
        <ul spacing="normal">
          <li>Name: det_hash_alg</li>
          <li>CBOR Label: TBD4</li>
          <li>CBOR Type: int / tstr</li>
          <li>Registry: -</li>
          <li>Description: Hash algorithm to use in an OSCORE group when producing a Deterministic Request</li>
          <li>Reference: [[this document]] (<xref target="sec-obtaining-info" format="default"/>)</li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="I-D.ietf-core-groupcomm-bis">
          <front>
            <title>Group Communication for the Constrained Application Protocol (CoAP)</title>
            <author fullname="Esko Dijk">
              <organization>IoTconsultancy.nl</organization>
            </author>
            <author fullname="Chonggang Wang">
              <organization>InterDigital</organization>
            </author>
            <author fullname="Marco Tiloca">
              <organization>RISE AB</organization>
            </author>
            <date day="25" month="October" year="2021"/>
            <abstract>
              <t>   This document specifies the use of the Constrained Application
   Protocol (CoAP) for group communication, including the use of UDP/IP
   multicast as the default underlying data transport.  Both unsecured
   and secured CoAP group communication are specified.  Security is
   achieved by use of the Group Object Security for Constrained RESTful
   Environments (Group OSCORE) protocol.  The target application area of
   this specification is any group communication use cases that involve
   resource-constrained devices or networks that support CoAP.  This
   document replaces RFC 7390, while it updates RFC 7252 and RFC 7641.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-groupcomm-bis-05"/>
        </reference>
        <reference anchor="I-D.ietf-core-oscore-groupcomm">
          <front>
            <title>Group OSCORE - Secure Group Communication for CoAP</title>
            <author fullname="Marco Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Göran Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Francesca Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="John Preuss Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Jiye Park">
              <organization>Universitaet Duisburg-Essen</organization>
            </author>
            <date day="25" month="October" year="2021"/>
            <abstract>
              <t>   This document defines Group Object Security for Constrained RESTful
   Environments (Group OSCORE), providing end-to-end security of CoAP
   messages exchanged between members of a group, e.g., sent over IP
   multicast.  In particular, the described approach defines how OSCORE
   is used in a group communication setting to provide source
   authentication for CoAP group requests, sent by a client to multiple
   servers, and for protection of the corresponding CoAP responses.
   Group OSCORE also defines a pairwise mode where each member of the
   group can efficiently derive a symmetric pairwise key with any other
   member of the group for pairwise OSCORE communication.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-oscore-groupcomm-13"/>
        </reference>
        <reference anchor="I-D.ietf-cose-rfc8152bis-struct">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="Jim Schaad">
              <organization>August Cellars</organization>
            </author>
            <date day="1" month="February" year="2021"/>
            <abstract>
              <t>   Concise Binary Object Representation (CBOR) is a data format designed
   for small code size and small message size.  There is a need for the
   ability to have basic security services defined for this data format.
   This document defines the CBOR Object Signing and Encryption (COSE)
   protocol.  This specification describes how to create and process
   signatures, message authentication codes, and encryption using CBOR
   for serialization.  This specification additionally describes how to
   represent cryptographic keys using CBOR.

   This document along with [I-D.ietf-cose-rfc8152bis-algs] obsoletes
   RFC8152.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-rfc8152bis-struct-15"/>
        </reference>
        <reference anchor="I-D.ietf-cose-rfc8152bis-algs">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Initial Algorithms</title>
            <author fullname="Jim Schaad">
              <organization>August Cellars</organization>
            </author>
            <date day="24" month="September" year="2020"/>
            <abstract>
              <t>   Concise Binary Object Representation (CBOR) is a data format designed
   for small code size and small message size.  There is a need for the
   ability to have basic security services defined for this data format.
   THis document defines a set of algorithms that can be used with the
   CBOR Object Signing and Encryption (COSE) protocol RFC XXXX.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cose-rfc8152bis-algs-12"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby">
              <organization/>
            </author>
            <author fullname="K. Hartke" initials="K." surname="Hartke">
              <organization/>
            </author>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks.  The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s.  The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types.  CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC8132">
          <front>
            <title>PATCH and FETCH Methods for the Constrained Application Protocol (CoAP)</title>
            <author fullname="P. van der Stok" initials="P." surname="van der Stok">
              <organization/>
            </author>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <author fullname="A. Sehgal" initials="A." surname="Sehgal">
              <organization/>
            </author>
            <date month="April" year="2017"/>
            <abstract>
              <t>The methods defined in RFC 7252 for the Constrained Application Protocol (CoAP) only allow access to a complete resource, not to parts of a resource.  In case of resources with larger or complex data, or in situations where resource continuity is required, replacing or requesting the whole resource is undesirable.  Several applications using CoAP need to access parts of the resources.</t>
              <t>This specification defines the new CoAP methods, FETCH, PATCH, and iPATCH, which are used to access and update parts of a resource.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8132"/>
          <seriesInfo name="DOI" value="10.17487/RFC8132"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8613">
          <front>
            <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="G. Selander" initials="G." surname="Selander">
              <organization/>
            </author>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson">
              <organization/>
            </author>
            <author fullname="F. Palombini" initials="F." surname="Palombini">
              <organization/>
            </author>
            <author fullname="L. Seitz" initials="L." surname="Seitz">
              <organization/>
            </author>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE).  OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
              <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration.  Therefore, this document updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8613"/>
          <seriesInfo name="DOI" value="10.17487/RFC8613"/>
        </reference>
        <reference anchor="COSE.Algorithms" target="https://www.iana.org/assignments/cose/cose.xhtml#algorithms">
          <front>
            <title>COSE Algorithms</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date/>
          </front>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC7641">
          <front>
            <title>Observing Resources in the Constrained Application Protocol (CoAP)</title>
            <author fullname="K. Hartke" initials="K." surname="Hartke">
              <organization/>
            </author>
            <date month="September" year="2015"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a RESTful application protocol for constrained nodes and networks.  The state of a resource on a CoAP server can change over time.  This document specifies a simple protocol extension for CoAP that enables CoAP clients to "observe" resources, i.e., to retrieve a representation of a resource and keep this representation updated by the server over a period of time.  The protocol follows a best-effort approach for sending new representations to clients and provides eventual consistency between the state observed by each client and the actual resource state at the server.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7641"/>
          <seriesInfo name="DOI" value="10.17487/RFC7641"/>
        </reference>
        <reference anchor="RFC9175">
          <front>
            <title>Constrained Application Protocol (CoAP): Echo, Request-Tag, and Token Processing</title>
            <author fullname="C. Amsüss" initials="C." surname="Amsüss">
              <organization/>
            </author>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson">
              <organization/>
            </author>
            <author fullname="G. Selander" initials="G." surname="Selander">
              <organization/>
            </author>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document specifies enhancements to the Constrained Application Protocol (CoAP) that mitigate security issues in particular use cases. The Echo option enables a CoAP server to verify the freshness of a request or to force a client to demonstrate reachability at its claimed network address. The Request-Tag option allows the CoAP server to match block-wise message fragments belonging to the same request. This document updates RFC 7252 with respect to the following: processing requirements for client Tokens, forbidding non-secure reuse of Tokens to ensure response-to-request binding when CoAP is used with a security protocol, and amplification mitigation (where the use of the Echo option is now recommended).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9175"/>
          <seriesInfo name="DOI" value="10.17487/RFC9175"/>
        </reference>
        <reference anchor="I-D.ietf-ace-key-groupcomm-oscore">
          <front>
            <title>Key Management for OSCORE Groups in ACE</title>
            <author fullname="Marco Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Jiye Park">
              <organization>Universitaet Duisburg-Essen</organization>
            </author>
            <author fullname="Francesca Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <date day="25" month="October" year="2021"/>
            <abstract>
              <t>   This document defines an application profile of the ACE framework for
   Authentication and Authorization, to request and provision keying
   material in group communication scenarios that are based on CoAP and
   secured with Group Object Security for Constrained RESTful
   Environments (OSCORE).  This application profile delegates the
   authentication and authorization of Clients that join an OSCORE group
   through a Resource Server acting as Group Manager for that group.
   This application profile leverages protocol-specific transport
   profiles of ACE to achieve communication security, server
   authentication and proof-of-possession for a key owned by the Client
   and bound to an OAuth 2.0 Access Token.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-key-groupcomm-oscore-12"/>
        </reference>
        <reference anchor="I-D.amsuess-lwig-oscore">
          <front>
            <title>OSCORE Implementation Guidance</title>
            <author fullname="Christian Amsüss">
	 </author>
            <date day="29" month="April" year="2020"/>
            <abstract>
              <t>   Object Security for Constrained RESTful Environments (OSCORE) is a
   means of end-to-end protection of short request/response exchanges
   for tiny devices, typically transported using the Constrained
   Application Protocol (CoAP).  This document aims to assist
   implementers in leveraging the optimizations catered for by the
   combination of CoAP and OSCORE, and by generally providing experience
   from earlier implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-amsuess-lwig-oscore-00"/>
        </reference>
        <reference anchor="I-D.ietf-core-observe-multicast-notifications">
          <front>
            <title>Observe Notifications as CoAP Multicast Responses</title>
            <author fullname="Marco Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Rikard Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Christian Amsüss">
	 </author>
            <author fullname="Francesca Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <date day="25" month="October" year="2021"/>
            <abstract>
              <t>   The Constrained Application Protocol (CoAP) allows clients to
   "observe" resources at a server, and receive notifications as unicast
   responses upon changes of the resource state.  In some use cases,
   such as based on publish-subscribe, it would be convenient for the
   server to send a single notification addressed to all the clients
   observing a same target resource.  This document updates RFC7252 and
   RFC7641, and defines how a server sends observe notifications as
   response messages over multicast, synchronizing all the observers of
   a same resource on a same shared Token value.  Besides, this document
   defines how Group OSCORE can be used to protect multicast
   notifications end-to-end between the server and the observer clients.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-observe-multicast-notifications-02"/>
        </reference>
        <reference anchor="I-D.ietf-ace-oauth-authz">
          <front>
            <title>Authentication and Authorization for Constrained Environments (ACE) using the OAuth 2.0 Framework (ACE-OAuth)</title>
            <author fullname="Ludwig Seitz">
              <organization>Combitech</organization>
            </author>
            <author fullname="Goeran Selander">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Erik Wahlstroem">
	 </author>
            <author fullname="Samuel Erdtman">
              <organization>Spotify AB</organization>
            </author>
            <author fullname="Hannes Tschofenig">
              <organization>Arm Ltd.</organization>
            </author>
            <date day="8" month="November" year="2021"/>
            <abstract>
              <t>   This specification defines a framework for authentication and
   authorization in Internet of Things (IoT) environments called ACE-
   OAuth.  The framework is based on a set of building blocks including
   OAuth 2.0 and the Constrained Application Protocol (CoAP), thus
   transforming a well-known and widely used authorization solution into
   a form suitable for IoT devices.  Existing specifications are used
   where possible, but extensions are added and profiles are defined to
   better serve the IoT use cases.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-oauth-authz-46"/>
        </reference>
        <reference anchor="I-D.ietf-ace-oscore-profile">
          <front>
            <title>OSCORE Profile of the Authentication and Authorization for Constrained Environments Framework</title>
            <author fullname="Francesca Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Ludwig Seitz">
              <organization>Combitech</organization>
            </author>
            <author fullname="Göran Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Martin Gunnarsson">
              <organization>RISE</organization>
            </author>
            <date day="6" month="May" year="2021"/>
            <abstract>
              <t>   This document specifies a profile for the Authentication and
   Authorization for Constrained Environments (ACE) framework.  It
   utilizes Object Security for Constrained RESTful Environments
   (OSCORE) to provide communication security and proof-of-possession
   for a key owned by the client and bound to an OAuth 2.0 access token.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-oscore-profile-19"/>
        </reference>
        <reference anchor="SW-EPIV">
          <front>
            <title>Star Wars</title>
            <author initials="G." surname="Lucas" fullname="George Lucas">
              <organization/>
            </author>
            <date year="1977"/>
          </front>
          <seriesInfo name="Lucasfilm Ltd." value=""/>
        </reference>
        <reference anchor="I-D.bormann-core-responses">
          <front>
            <title>CoAP: Non-traditional response forms</title>
            <author fullname="Carsten Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Christian Amsüss">
	 </author>
            <date day="3" month="February" year="2022"/>
            <abstract>
              <t>   In CoAP as defined by RFC 7252, responses are always unicast back to
   a client that posed a request.  The present memo describes two forms
   of responses that go beyond that model.  These descriptions are not
   intended as advocacy for adopting these approaches immediately, they
   are provided to point out potential avenues for development that
   would have to be carefully evaluated.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-bormann-core-responses-01"/>
        </reference>
        <reference anchor="RFC8323">
          <front>
            <title>CoAP (Constrained Application Protocol) over TCP, TLS, and WebSockets</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann">
              <organization/>
            </author>
            <author fullname="S. Lemay" initials="S." surname="Lemay">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <author fullname="K. Hartke" initials="K." surname="Hartke">
              <organization/>
            </author>
            <author fullname="B. Silverajan" initials="B." surname="Silverajan">
              <organization/>
            </author>
            <author fullname="B. Raymor" initials="B." role="editor" surname="Raymor">
              <organization/>
            </author>
            <date month="February" year="2018"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP), although inspired by HTTP, was designed to use UDP instead of TCP.  The message layer of CoAP over UDP includes support for reliable delivery, simple congestion control, and flow control.</t>
              <t>Some environments benefit from the availability of CoAP carried over reliable transports such as TCP or Transport Layer Security (TLS). This document outlines the changes required to use CoAP over TCP, TLS, and WebSockets transports.  It also formally updates RFC 7641 for use with these transports and RFC 7959 to enable the use of larger messages over a reliable transport.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8323"/>
          <seriesInfo name="DOI" value="10.17487/RFC8323"/>
        </reference>
      </references>
    </references>
    <section anchor="change-log" numbered="true" toc="default">
      <name>Change log</name>
      <t>Since -03:</t>
      <ul spacing="normal">
        <li>Processing steps in case only inner Observe is included.</li>
        <li>Clarified preserving/eliding the Request-Hash option in responses.</li>
        <li>Clarified limited use of the Echo option.</li>
        <li>Clarifications on using the Padding option.</li>
      </ul>
      <t>Since -02:</t>
      <ul spacing="normal">
        <li>Separate parts needed to respond to unauthenticated requests from the remaining deterministic response part.
(Currently this is mainly an addition; the document will undergo further refactoring if that split proves helpful).</li>
        <li>Inner Observe is set unconditionally in deterministic requests.</li>
        <li>Clarifications around padding and security considerations.</li>
      </ul>
      <t>Since -01:</t>
      <ul spacing="normal">
        <li>
          <t>Not meddling with request_kid any more.  </t>
          <t>
Instead, Request-Hash in responses is treated as Class I, but typically elided.  </t>
          <t>
In requests, this removes the need to compute the external_aad twice.</t>
        </li>
        <li>Derivation of the hash now uses the external_aad, rather than the full AAD. This is good enough because AAD is a function only of the external_aad, and the external_aad is easier to get your hands on if COSE manages all the rest.</li>
        <li>The Sender ID of the Deterministic Client is immutable throughout the group lifetime. Hence, no need for any related expiration/creation time and mechanisms to perform its update in the group.</li>
        <li>Extension to the ACE Group Manager of ace-key-groupcomm-oscore to provide required info about the Deterministic Client to new group members when joining the group.</li>
        <li>Alignment with changes in core-oscore-groupcomm-12.</li>
        <li>Editorial improvements.</li>
      </ul>
      <t>Since -00:</t>
      <ul spacing="normal">
        <li>More precise specification of the hashing (guided by first implementations)</li>
        <li>Focus shifted to deterministic requests (where it should have been in the first place; all the build-up of Token Requests was moved to a motivating appendix)</li>
        <li>Aligned with draft-tiloca-core-observe-responses-multicast-05 (not submitted at the time of submission)</li>
        <li>List the security properties lost compared to OSCORE</li>
      </ul>
    </section>
    <section anchor="sec-padding" numbered="true" toc="default">
      <name>Padding</name>
      <t>As discussed in <xref target="sec-security-considerations" format="default"/>, information can be leaked by the length of a response or, in different contexts, of a request.</t>
      <t>In order to hide such information and mitigate the impact on privacy, the following Padding option is defined, to allow increasing a message's length without changing its meaning.</t>
      <t>The option can be used with any CoAP transport, but is especially useful with OSCORE as that does not provide any padding of its own.</t>
      <t>Before choosing to pad a message by using the Padding option, application designers should consider whether they can arrange for common message variants to have the same length by picking a suitable content representation; the canonical example here is expressing "yes" and "no" with "y" and "n", respectively.</t>
      <section anchor="definition-of-the-padding-option" numbered="true" toc="default">
        <name>Definition of the Padding Option</name>
        <t>As summarized in <xref target="padding-table" format="default"/>, the Padding option is elective, safe to forward and not part of the cache key; these follow from the usage instructions. The option may be repeated, as that may be the only way to achieve a certain total length for the padded message.</t>
        <figure anchor="padding-table">
          <name>Padding Option</name>
          <artwork align="center" name="" type="" alt=""><![CDATA[
+------+---+---+---+---+---------+--------+--------+---------+
| No.  | C | U | N | R |  Name   | Format | Length | Default |
+------+---+---+---+---+---------+--------+--------+---------+
| TBD2 |   |   | x | x | Padding | opaque | any    | (none)  |
+------+---+---+---+---+---------+--------+--------+---------+
]]></artwork>
        </figure>
        <t>When used with OSCORE, the Padding option is of Class E,
this makes it indistinguishable from other Class E options or the payload to third parties.</t>
      </section>
      <section anchor="using-and-processing-the-padding-option" numbered="true" toc="default">
        <name>Using and processing the Padding option</name>
        <t>When a server produces different responses of different length for a given class of requests
but wishes to produce responses of consistent length
(typically to hide the variation from anyone but the intended recipient),
the server can pick a length that all possible responses can be padded to,
and set the Padding option with a suitable all-zero option value in all responses to that class of requests.</t>
        <t>Likewise, a client can decide on a class of requests that it pads to consistent length. This has considerably less efficacy and applicability when applied to Deterministic Requests. That is: an external observer can group requests even if they are of the same length; and padding would hinder convergence on a single Consensus Request, thus requiring all users of the same OSCORE Security Context to agree on the same total length in advance.</t>
        <t>Any party receiving a Padding option MUST ignore it.
In particular, a server MUST NOT make its choice of padding dependent on any padding present in the request.
(An option to coordinate response padding driven by the client is out of scope for this document).</t>
        <t>Proxies that see a padding option MAY discard it.</t>
      </section>
    </section>
    <section anchor="sec-ticket-requests" numbered="true" toc="default">
      <name>Simple Cacheability using Ticket Requests</name>
      <t>Building on the concept of Phantom Requests and Informative Responses defined in <xref target="I-D.ietf-core-observe-multicast-notifications" format="default"/>,
basic caching is already possible without building a Deterministic Request.</t>
      <t>The approach discussed in this appendix is not provided for application. In fact, it is efficient only when dealing with very large representations and no OSCORE inner Block-Wise mode (which is inefficient for other reasons), or when dealing with observe notifications (which are already well covered in <xref target="I-D.ietf-core-observe-multicast-notifications" format="default"/>).</t>
      <t>Rather, it is more provided as a "mental exercise" for the authors and interested readers to bridge the gap between this document and <xref target="I-D.ietf-core-observe-multicast-notifications" format="default"/>.</t>
      <t>That is, instead of replying to a client with a regular response, a server can send an Informative Response, defined as a protected 5.03 (Service Unavailable) error message. The payload of the Informative Response contains the Phantom Request, which is a Ticket Request in this document's broader terminology.</t>
      <t>Unlike a Deterministic Request, a Phantom Request is protected in Group Mode.
Instead of verifying a hash, the client can see from the signature that this was indeed the request the server is answering.
The client also verifies that the request URI is identical between the original request and the Ticket Request.</t>
      <t>The remaining exchange largely plays out like in <xref target="I-D.ietf-core-observe-multicast-notifications" format="default"/>'s "Example with a Proxy and Group OSCORE":
The client sends the Phantom Request to the proxy (but, lacking a <tt>tp_info</tt>, without a Listen-To-Multicast-Responses option),
which forwards it to the server for lack of the option.</t>
      <t>The server then produces a regular response and includes a non-zero Max-Age option as an outer CoAP option. Note that there is no point in including an inner Max-Age option, as the client could not pin it in time.</t>
      <t>When a second, different client later asks for the same resource at the same server, its new request uses a different 'kid' and 'Partial IV' than the first client's. Thus, the new request produces a cache miss at the proxy and is forwarded to the server, which responds with the same Ticket Request provided to the first client. After that, when the second client sends the Ticket Request, a cache hit at the proxy will be produced, and the Ticket Request can be served from the proxy's cache.</t>
      <t>When multiple proxies are in use, or the response has expired from the proxy's cache, the server receives the Ticket Request multiple times. It is a matter of perspective whether the server treats that as an acceptable replay (given that this whole mechansim only makes sense on requests free of side effects), or whether it is conceptualized as having an internal proxy where the request produces a cache hit.</t>
    </section>
    <section anchor="det-requests-for-notif" numbered="true" toc="default">
      <name>Application for More Efficient End-to-End Protected Multicast Notifications</name>
      <t><xref target="I-D.ietf-core-observe-multicast-notifications" format="default"/> defines how a CoAP server can serve all clients observing a same resource at once, by sending notifications over multicast. The approach supports the possible presence of intermediaries such as proxies, also if Group OSCORE is used to protect notifications end-to-end.</t>
      <t>However, comparing the "Example with a Proxy" in <xref section="A" sectionFormat="of" target="I-D.ietf-core-observe-multicast-notifications" format="default"/> and the "Example with a Proxy and Group OSCORE" in <xref section="B" sectionFormat="of" target="I-D.ietf-core-observe-multicast-notifications" format="default"/> shows that, when using Group OSCORE, more requests need to hit the server. This is because every client originally protects its Observation request individually, and thus needs a custom response served to obtain the Phantom Request as a Ticket Request.</t>
      <t>If the clients send their requests as the same deterministic request, the server can use these requests as Ticket Requests as well. Thus, there is no need for the server to provide a same Phantom Request to each client.</t>
      <t>Instead, the server can send a single unprotected Informative Response - very much like in the example without Group OSCORE - hence setting the proxy up and optionally providing also the latest notification along the way.</t>
      <t>The proxy can thus be configured by the server following the first request from the clients, after which it has an active observation and a fresh cache entry in time for the second client to arrive.</t>
    </section>
    <section anchor="open-questions" numbered="true" toc="default">
      <name>Open questions</name>
      <ul spacing="normal">
        <li>
          <t>Is "deterministic encryption" something worthwhile to consider in COSE?  </t>
          <t>
COSE would probably specify something more elaborate for the KDF
(the current KDF round is the pairwise mode's;
COSE would probably run through KDF with a KDF context structure).  </t>
          <t>
COSE would give a header parameter name to the Request-Hash
(which for the purpose of OSCORE deterministic requests would put back into Request-Hash by extending the option compression function across the two options).  </t>
          <t>
Conceptually, they should align well, and the implementation changes are likely limited to how the KDF is run.</t>
        </li>
        <li>
          <t>An unprotection failure from a mismatched hash will not be part of the ideally constant-time code paths that otherwise lead to AEAD unprotect failures. Is that a problem?  </t>
          <t>
After all, it does tell the attacker that they did succeed in producing a valid MAC (it's just not doing it any good, because this key is only used for deterministic requests and thus also needs to pass the Request-Hash check).</t>
        </li>
      </ul>
      <!--
MT: This second bullet point seems something that can already be said in the Security Considerations section.
-->

</section>
    <section anchor="unsorted-further-ideas" numbered="true" toc="default">
      <name>Unsorted further ideas</name>
      <ul spacing="normal">
        <li>All or none of the deterministic requests should have an inner observe option.
Preferably none -- that makes messages shorter, and clients need to ignore that option either way when checking whether a Consensus Request matches their intended request.</li>
      </ul>
      <!--
MT: How can clients start an observation then? That would require an inner Observe option, right?

Also the guidelines in Section 2 suggest to have an inner observe option, regardless the resource being actually observable.
-->

<ul spacing="normal">
        <li>
          <t>We could allows clients to elide all other options than Request-Hash, and elide the payload,
if it has reason to believe that it can produce a cache hit with the abbreviated request alone.  </t>
          <t>
This may prove troublesome in terms of cache invalidation
(the server would have to use short-lived responses to indicate that it does need the full request,
or we'd need special handling for error responses,
or criteria by which proxies don't even forward these if they don't have a response at hand).  </t>
          <t>
That may be more trouble than it's worth without a strong use case (say, of complex but converging FETCH requests).  </t>
          <t>
Hashes could also be used in truncated form for that.</t>
        </li>
      </ul>
    </section>
    <section numbered="false" anchor="acknowldegment" toc="default">
      <name>Acknowledgments</name>
      <t>The authors sincerely thank Michael Richardson, Jim Schaad and Goeran Selander for their comments and feedback.</t>
      <t>The work on this document has been partly supported by VINNOVA and the Celtic-Next project CRITISEC; and by the H2020 project SIFIS-Home (Grant agreement 952652).</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
