Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Multipart for voucher response? #42

Open
csosto-pk opened this issue Jul 6, 2019 · 5 comments
Open

Multipart for voucher response? #42

csosto-pk opened this issue Jul 6, 2019 · 5 comments
Labels
future Any topic that is postponed to a new draft/document or a future version question

Comments

@csosto-pk
Copy link
Contributor

csosto-pk commented Jul 6, 2019

This was first described by Michael in https://bitbucket.org/6tisch/draft-richardson-6tisch-dtsecurity-secure-join/commits/a2c01d7800509418957f7ce05a298a753758146f

The draft says

The CMS structure SHOULD also contain all the certificates leading up to and 
including the signer's trust anchor certificate known to the recipient.

When the voucher response include the rw public key or cert for the recipient to verify. Does that need to be done with a multipart response as we do with server side key generation in EST-coaps by referencing https://tools.ietf.org/html/draft-ietf-core-multipart-ct-03? Should that be stated in the document?

@mcr
Copy link
Member

mcr commented Jul 6, 2019 via email

@csosto-pk
Copy link
Contributor Author

Gotcha @mcr . Yes, HTTP mixed is what I meant. Agreed. I think it should be mentioned in the draft.

About the pledge, gotcha. I think this should be spelled out a little better even your BRSKI or Voucher drafts, but that is not important right now.

@EskoDijk
Copy link
Collaborator

The above multipart discussion seems to be applicable only between Registrar and MASA, so it would fall outside the current scope of constrained-voucher! This seems more like an update to BRSKI - so we should move this issue to BRSKI-bis , in any case close it here. If I don't hear an objection I will close it in 2 weeks ;-)

@EskoDijk EskoDijk added the future Any topic that is postponed to a new draft/document or a future version label Apr 15, 2021
@mcr
Copy link
Member

mcr commented Apr 29, 2021

The reason it is withing constrained-voucher is because the issue arises when sending a constrained-voucher from MASA->Registrar.

@EskoDijk
Copy link
Collaborator

Ah ok, then it seems relevant indeed.

  1. If the additional certs are needed for the Pledge, it would need to be included in the constrained voucher COSE structure (x5bag?) as mentioned in above comments.
  2. If there's also a scenario where the Pledge does not need any additional certs (so no x5bag) but the Registrar needs the additional certs to validate something, then it would make sense to use Multipart response to the Registrar. Then the Registrar "splits" the multipart response into the Voucher part (to send to the Pledge) and the Registrar part with info for the Registrar to use but not relevant for the Pledge.

In case 1) I think we do not need multipart or I can't see a use for it since the preference is to include any additional information in the Voucher structure.
In case 2) there can be, however this requires updating BRSKI with a part "information from MASA for the Registrar only" . Which may be useful but is currently not standardized. No need to consider this for constrained-voucher I think.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
future Any topic that is postponed to a new draft/document or a future version question
Projects
None yet
Development

No branches or pull requests

3 participants