<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.0.40 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY RFC2119 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml">
<!ENTITY RFC4648 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.4648.xml">
<!ENTITY RFC5988 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.5988.xml">
<!ENTITY RFC6347 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.6347.xml">
<!ENTITY RFC7049 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7049.xml">
<!ENTITY RFC7252 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7252.xml">
<!ENTITY RFC7641 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7641.xml">
<!ENTITY RFC7959 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7959.xml">
<!ENTITY RFC8075 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8075.xml">
<!ENTITY RFC8132 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8132.xml">
<!ENTITY RFC8152 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.8152.xml">
<!ENTITY I-D.amsuess-core-repeat-request-tag SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.amsuess-core-repeat-request-tag.xml">
<!ENTITY RFC3986 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.3986.xml">
<!ENTITY RFC5869 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.5869.xml">
<!ENTITY RFC7228 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7228.xml">
<!ENTITY RFC7515 SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7515.xml">
<!ENTITY I-D.ietf-ace-oauth-authz SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-ace-oauth-authz.xml">
<!ENTITY I-D.ietf-core-coap-tcp-tls SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.ietf-core-coap-tcp-tls.xml">
<!ENTITY I-D.bormann-6lo-coap-802-15-ie SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.bormann-6lo-coap-802-15-ie.xml">
<!ENTITY I-D.greevenbosch-appsawg-cbor-cddl SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.greevenbosch-appsawg-cbor-cddl.xml">
<!ENTITY I-D.hartke-core-e2e-security-reqs SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.hartke-core-e2e-security-reqs.xml">
<!ENTITY I-D.mattsson-core-coap-actuators SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.mattsson-core-coap-actuators.xml">
<!ENTITY I-D.seitz-ace-oscoap-profile SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.seitz-ace-oscoap-profile.xml">
<!ENTITY I-D.tiloca-core-multicast-oscoap SYSTEM "https://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.tiloca-core-multicast-oscoap.xml">
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>
<?rfc tocdepth="2"?>

<rfc ipr="trust200902" docName="draft-ietf-core-object-security-05" category="std">

  <front>
    <title>Object Security for Constrained RESTful Environments (OSCORE)</title>

    <author initials="G." surname="Selander" fullname="Göran Selander">
      <organization>Ericsson AB</organization>
      <address>
        <email>goran.selander@ericsson.com</email>
      </address>
    </author>
    <author initials="J." surname="Mattsson" fullname="John Mattsson">
      <organization>Ericsson AB</organization>
      <address>
        <email>john.mattsson@ericsson.com</email>
      </address>
    </author>
    <author initials="F." surname="Palombini" fullname="Francesca Palombini">
      <organization>Ericsson AB</organization>
      <address>
        <email>francesca.palombini@ericsson.com</email>
      </address>
    </author>
    <author initials="L." surname="Seitz" fullname="Ludwig Seitz">
      <organization>SICS Swedish ICT</organization>
      <address>
        <email>ludwig@sics.se</email>
      </address>
    </author>

    <date year="2017" month="September" day="29"/>

    
    <workgroup>CoRE Working Group</workgroup>
    

    <abstract>


<t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE). OSCORE provides end-to-end encryption, integrity and replay protection, as well as a secure message binding. OSCORE is designed for constrained nodes and networks and can be used over any layer and across intermediaries, and also with HTTP. OSCORE may be used to protect group communications as is specified in a separate draft.</t>



    </abstract>


  </front>

  <middle>


<section anchor="intro" title="Introduction">

<t>The Constrained Application Protocol (CoAP) is a web application protocol, designed for constrained nodes and networks <xref target="RFC7228"/>. CoAP specifies the use of proxies for scalability and efficiency, and a mapping to HTTP is also specified <xref target="RFC8075"/>. CoAP <xref target="RFC7252"/> references DTLS <xref target="RFC6347"/> for security. CoAP and HTTP proxies require (D)TLS to be terminated at the proxy. The proxy therefore not only has access to the data required for performing the intended proxy functionality, but is also able to eavesdrop on, or manipulate any part of the message payload and metadata, in transit between the endpoints. The proxy can also inject, delete, or reorder packets since they are no longer protected by (D)TLS.</t>

<t>This document defines the Object Security for Constrained RESTful Environments (OSCORE) security protocol, protecting CoAP and CoAP-mappable HTTP requests and responses end-to-end across intermediary nodes such as CoAP forward proxies and cross-protocol translators including HTTP-to-CoAP proxies <xref target="RFC8075"/>. In addition to the core CoAP features defined in <xref target="RFC7252"/>, OSCORE supports Observe <xref target="RFC7641"/> and Blockwise <xref target="RFC7959"/>. An analysis of end-to-end security for CoAP messages through some types of intermediary nodes is performed in <xref target="I-D.hartke-core-e2e-security-reqs"/>. OSCORE protects the Request/Response layer only, and not the CoAP Messaging Layer (Section 2 of <xref target="RFC7252"/>). Therefore, all the CoAP messages mentioned in this document refer to non-empty CON, NON, and ACK messages. Additionally, since the message formats for CoAP over unreliable transport <xref target="RFC7252"/> and for CoAP over reliable transport <xref target="I-D.ietf-core-coap-tcp-tls"/> differ only in terms of Messaging Layer, OSCORE can be applied to both unreliable and reliable transports.</t>

<t>OSCORE is designed for constrained nodes and networks and provides an in-layer security protocol that does not depend on underlying layers. OSCORE can be used anywhere where CoAP or HTTP can be used, including non-IP transports (e.g., <xref target="I-D.bormann-6lo-coap-802-15-ie"/>). An extension of OSCORE may also be used to protect group communication for CoAP <xref target="I-D.tiloca-core-multicast-oscoap"/>. The use of OSCORE does not affect the URI scheme and OSCORE can therefore be used with any URI scheme defined for CoAP or HTTP. The application decides the conditions for which OSCORE is required.</t>

<t>OSCORE builds on CBOR Object Signing and Encryption (COSE) <xref target="RFC8152"/>, providing end-to-end encryption, integrity, replay protection, and secure message binding. A compressed version of COSE is used, as discussed in <xref target="compression"/>. The use of OSCORE is signaled with the Object-Security CoAP option or HTTP header, defined in <xref target="option"/> and <xref target="http2coap"/>. OSCORE is designed to protect as much information as possible, while still allowing proxy operations (<xref target="proxy-operations"/>). OSCORE provides protection of message payload, almost all CoAP options, and the RESTful method. The solution transforms a message into an “OSCORE message” before sending, and vice versa after receiving. The OSCORE message is related to the original message in the following way: the original message is translated to CoAP (if not already in CoAP) and the resulting message payload (if present), options not processed by a proxy, and the request/response method (CoAP Code) are protected in a COSE object. The message fields of the original messages that are encrypted are not present in the OSCORE message, and instead the Object-Security option/header and the compressed COSE object are included, see <xref target="fig-sketch"/>.</t>

<figure title="Sketch of OSCORE with CoAP" anchor="fig-sketch"><artwork align="center"><![CDATA[
Client                                          Server
   |      OSCORE request - POST example.com:      |   
   |        Header, Token,                        |   
   |        Options: {Object-Security, ...},      |   
   |        Payload: Compressed COSE object       |   
   +--------------------------------------------->|   
   |      OSCORE response - 2.04 (Changed):       |   
   |        Header, Token,                        |   
   |        Options: {Object-Security, ...},      |   
   |        Payload: Compressed COSE object       |   
   |<---------------------------------------------+   
   |                                              | 
]]></artwork></figure>

<t>OSCORE may be used in very constrained settings, thanks to its small message size and the restricted code and memory requirements in addition to what is required by CoAP. OSCORE can be combined with transport layer security such as DTLS or TLS, thereby enabling end-to-end security of e.g. CoAP Payload, Options and Code, in combination with hop-by-hop protection of the Messaging Layer, during transport between end-point and intermediary node. Examples of the use of OSCORE are given in <xref target="examples"/>.</t>

<t>An implementation supporting this specification MAY only implement the client part, MAY only implement the server part, or MAY only implement one of the proxy parts. OSCORE is designed to work with legacy CoAP-to-CoAP forward proxies <xref target="RFC7252"/>, but an OSCORE-aware proxy will be more efficient. HTTP-to-CoAP proxies <xref target="RFC8075"/> and CoAP-to-HTTP proxies need to implement respective parts of this specification to work with OSCORE (see <xref target="proxy-operations"/>).</t>

<section anchor="terminology" title="Terminology">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “MAY”, and “OPTIONAL” in this document are to be interpreted as described in <xref target="RFC2119"/>. These words may also appear in this document in lowercase, absent their normative meanings.</t>

<t>Readers are expected to be familiar with the terms and concepts described in CoAP <xref target="RFC7252"/>, Observe <xref target="RFC7641"/>, Blockwise <xref target="RFC7959"/>, COSE <xref target="RFC8152"/>, CBOR <xref target="RFC7049"/>, CDDL <xref target="I-D.greevenbosch-appsawg-cbor-cddl"/>, and constrained environments <xref target="RFC7228"/>.</t>

<t>The terms Common/Sender/Recipient Context, Master Secret/Salt, Sender ID/Key, Recipient ID/Key, and Common IV are defined in <xref target="context-definition"/>.</t>

</section>
</section>
<section anchor="option" title="The CoAP Object-Security Option">

<t>The CoAP Object-Security option (see <xref target="fig-option"/>) indicates that the CoAP message is an OSCORE message and that it contains a compressed COSE object (see <xref target="cose-object"/> and <xref target="compression"/>). The Object-Security option is critical, safe to forward, part of the cache key, and not repeatable.</t>

<figure title="The Object-Security Option" anchor="fig-option"><artwork align="center"><![CDATA[
+-----+---+---+---+---+-----------------+-----------+--------+---------+
| No. | C | U | N | R | Name            | Format    | Length | Default | 
+-----+---+---+---+---+-----------------+-----------+--------+---------+
| TBD | x |   |   |   | Object-Security | see below | 0-255  | (none)  |
+-----+---+---+---+---+-----------------+-----------+--------+---------+
     C = Critical,   U = Unsafe,   N = NoCacheKey,   R = Repeatable          
]]></artwork></figure>

<t>The Object-Security option contains the OSCORE flag byte and for requests, the Sender ID (see <xref target="compression"/>). If the flag byte is all zero (0x00) the Option value SHALL be empty (Option Length = 0). An endpoint receiving a CoAP message without payload, that also contains an Object-Security option SHALL treat it as malformed and reject it.</t>

<t>A successful response to a request with the Object-Security option SHALL contain the Object-Security option. Whether error responses contain the Object-Security option depends on the error type (see <xref target="processing"/>).</t>

<t>Since the payload and most options are encrypted <xref target="protected-fields"/>, and the corresponding plain text message fields of the original are not included in the OSCORE message, the processing of these fields does not expand the total message size.</t>

<t>A CoAP proxy SHOULD NOT cache a response to a request with an Object-Security option, since the response is only applicable to the original client’s request, see <xref target="coap-coap-proxy"/>. As the compressed COSE Object is included in the cache key, messages with the Object-Security option will never generate cache hits. For Max-Age processing, see <xref target="max-age"/>.</t>

</section>
<section anchor="context" title="The Security Context">

<t>OSCORE requires that client and server establish a shared security context used to process the COSE objects. OSCORE uses COSE with an Authenticated Encryption with Additional Data (AEAD) algorithm for protecting message data between a client and a server. In this section, we define the security context and how it is derived in client and server based on a common shared master secret and a key derivation function (KDF).</t>

<section anchor="context-definition" title="Security Context Definition">

<t>The security context is the set of information elements necessary to carry out the cryptographic operations in OSCORE. For each endpoint, the security context is composed of a “Common Context”, a “Sender Context”, and a “Recipient Context”.</t>

<t>The endpoints protect messages to send using the Sender Context and verify messages received using the Recipient Context, both contexts being derived from the Common Context and other data. Clients and Servers need to be able to retrieve the correct security context to use.</t>

<t>An endpoint uses its Sender ID (SID) to derive its Sender Context, and the other endpoint uses the same ID, now called Recipient ID (RID), to derive its Recipient Context. In communication between two endpoints, the Sender Context of one endpoint matches the Recipient Context of the other endpoint, and vice versa. Thus, the two security contexts identified by the same IDs in the two endpoints are not the same, but they are partly mirrored. Retrieval and use of the security context are shown in <xref target="fig-context"/>.</t>

<figure title="Retrieval and use of the Security Context" anchor="fig-context"><artwork align="center"><![CDATA[
              .-------------.           .-------------.
              |  Common,    |           |  Common,    |
              |  Sender,    |           |  Recipient, |
              |  Recipient  |           |  Sender     |
              '-------------'           '-------------'
                   Client                   Server
                      |                       |
Retrieve context for  | OSCORE request:       |
 target resource      |   Token = Token1,     |
Protect request with  |   kid = SID, ...      |
  Sender Context      +---------------------->| Retrieve context with
                      |                       |  RID = kid
                      |                       | Verify request with
                      |                       |  Recipient Context
                      | OSCORE response:      | Protect response with
                      |   Token = Token1, ... |  Sender Context
Retrieve context with |<----------------------+
 Token = Token1       |                       |
Verify request with   |                       |
 Recipient Context    |                       |
]]></artwork></figure>

<t>The Common Context contains the following parameters:</t>

<t><list style="symbols">
  <t>AEAD Algorithm (alg). The COSE AEAD algorithm to use for encryption. Its value is immutable once the security context is established.</t>
  <t>Key Derivation Function. The HMAC based HKDF <xref target="RFC5869"/> used to derive Sender Key, Recipient Key, and Common IV.</t>
  <t>Master Secret. Variable length, uniformly random byte string containing the key used to derive traffic keys and IVs. Its value is immutable once the security context is established.</t>
  <t>Master Salt (OPTIONAL). Variable length byte string containing the salt used to derive traffic keys and IVs. Its value is immutable once the security context is established.</t>
  <t>Common IV. Byte string derived from Master Secret and Master Salt. Length is determined by the AEAD Algorithm. Its value is immutable once the security context is established.</t>
</list></t>

<t>The Sender Context contains the following parameters:</t>

<t><list style="symbols">
  <t>Sender ID. Non-negative integer used to identify the Sender Context and to assure unique nonces. Length is determined by the AEAD Algorithm. Its value is immutable once the security context is established.</t>
  <t>Sender Key. Byte string containing the symmetric key to protect messages to send. Derived from Common Context and Sender ID. Length is determined by the AEAD Algorithm. Its value is immutable once the security context is established.</t>
  <t>Sender Sequence Number. Non-negative integer used by the sender to protect requests and Observe notifications. Used as “Partial IV” <xref target="RFC8152"/> to generate unique nonces for the AEAD. Maximum value is determined by the AEAD Algorithm.</t>
</list></t>

<t>The Recipient Context contains the following parameters:</t>

<t><list style="symbols">
  <t>Recipient ID. Non-negative integer used to identify the Recipient Context and to assure unique nonces. Length is determined by the AEAD Algorithm. Its value is immutable once the security context is established.</t>
  <t>Recipient Key. Byte string containing the symmetric key to verify messages received. Derived from Common Context and Recipient ID. Length is determined by the AEAD Algorithm. Its value is immutable once the security context is established.</t>
  <t>Replay Window (Server only). The replay window to verify requests received.</t>
</list></t>

<t>An endpoint may free up memory by not storing the Common IV, Sender Key, and Recipient Key, deriving them from the Master Key and Master Salt when needed. Alternatively, an endpoint may free up memory by not storing the Master Secret and Master Salt after the other parameters have been derived.</t>

<t>The endpoints MAY interchange the client and server roles while maintaining the same security context. When this happens, the former server still protects messages to send using its Sender Context, and verifies messages received using its Recipient Context. The same is also true for the former client. The endpoints MUST NOT change the Sender/Recipient ID when changing roles. In other words, changing the roles does not change the set of keys to be used.</t>

</section>
<section anchor="context-derivation" title="Establishment of Security Context Parameters">

<t>The parameters in the security context are derived from a small set of input parameters. The following input parameters SHALL be pre-established:</t>

<t><list style="symbols">
  <t>Master Secret</t>
  <t>Sender ID</t>
  <t>Recipient ID</t>
</list></t>

<t>The following input parameters MAY be pre-established. In case any of these parameters is not pre-established, the default value indicated below is used:</t>

<t><list style="symbols">
  <t>AEAD Algorithm (alg)  <list style="symbols">
      <t>Default is AES-CCM-16-64-128 (COSE algorithm encoding: 10)</t>
    </list></t>
  <t>Master Salt  <list style="symbols">
      <t>Default is the empty string</t>
    </list></t>
  <t>Key Derivation Function (KDF)  <list style="symbols">
      <t>Default is HKDF SHA-256</t>
    </list></t>
  <t>Replay Window Type and Size  <list style="symbols">
      <t>Default is DTLS-type replay protection with a window size of 32 (<xref target="RFC6347"/>)</t>
    </list></t>
</list></t>

<t>All input parameters need to be known to and agreed on by both endpoints, but the replay window may be different in the two endpoints. The replay window type and size is used by the client in the processing of the Request-Tag <xref target="I-D.amsuess-core-repeat-request-tag"/>. How the input parameters are pre-established, is application specific. The ACE framework may be used to establish the necessary input parameters <xref target="I-D.ietf-ace-oauth-authz"/>.</t>

<section anchor="derivation-of-sender-key-recipient-key-and-common-iv" title="Derivation of Sender Key, Recipient Key, and Common IV">

<t>The KDF MUST be one of the HMAC based HKDF <xref target="RFC5869"/> algorithms defined in COSE. HKDF SHA-256 is mandatory to implement. The security context parameters Sender Key, Recipient Key, and Common IV SHALL be derived from the input parameters using the HKDF, which consists of the composition of the HKDF-Extract and HKDF-Expand steps (<xref target="RFC5869"/>):</t>

<figure><artwork><![CDATA[
   output parameter = HKDF(salt, IKM, info, L) 
]]></artwork></figure>

<t>where:</t>

<t><list style="symbols">
  <t>salt is the Master Salt as defined above</t>
  <t>IKM is the Master Secret is defined above</t>
  <t>info is a CBOR array consisting of:</t>
</list></t>

<figure><artwork type="CDDL"><![CDATA[
   info = [
       id : bstr / nil,
       alg : int,
       type : tstr,
       L : uint
   ]
]]></artwork></figure>
<t>where:</t>

<t><list style="symbols">
  <t>id is the Sender ID or Recipient ID when deriving keys and nil when deriving the Common IV. Sender ID and Recipient ID are encoded as described in <xref target="cose-object"/></t>
  <t>type is “Key” or “IV”</t>
  <t>L is the size of the key/IV for the AEAD algorithm used, in octets</t>
</list></t>

<t>For example, if the algorithm AES-CCM-16-64-128 (see Section 10.2 in <xref target="RFC8152"/>) is used, the value for L is 16 for keys and 13 for the Common IV.</t>

</section>
<section anchor="initial-replay" title="Initial Sequence Numbers and Replay Window">

<t>The Sender Sequence Number is initialized to 0.  The supported types of replay protection and replay window length is application specific and depends on the lower layers. The default is DTLS-type replay protection with a window size of 32 initiated as described in Section 4.1.2.6 of <xref target="RFC6347"/>.</t>

</section>
</section>
<section anchor="requirements-on-the-security-context-parameters" title="Requirements on the Security Context Parameters">

<t>As collisions may lead to the loss of both confidentiality and integrity, Sender ID SHALL be unique in the set of all security contexts using the same Master Secret and Master Salt. When a trusted third party assigns identifiers (e.g., using <xref target="I-D.ietf-ace-oauth-authz"/>) or by using a protocol that allows the parties to negotiate locally unique identifiers in each endpoint, the Sender IDs can be very short. The maximum Sender ID is 2^(nonce length in bits - 40) - 1, For AES-CCM-16-64-128 the maximum Sender ID is 2^64 - 1. If Sender ID uniqueness cannot be guaranteed, random Sender IDs MUST be used. Random Sender IDs MUST be long enough so that the probability of collisions is negligible.</t>

<t>To enable retrieval of the right Recipient Context, the Recipient ID SHOULD be unique in the sets of all Recipient Contexts used by an endpoint. The Client MAY provide a Context Hint <xref target="context-hint"/> to help the Server find the right context.</t>

<t>While the triple (Master Secret, Master Salt, Sender ID) MUST be unique, the same Master Salt MAY be used with several Master Secrets and the same Master Secret MAY be used with several Master Salts.</t>

</section>
</section>
<section anchor="protected-fields" title="Protected Message Fields">

<t>OSCORE transforms a CoAP message (which may have been generated from an HTTP message) into an OSCORE message, and vice versa. OSCORE protects as much of the original message as possible while still allowing certain proxy operations (see <xref target="proxy-operations"/>). This section defines how OSCORE protects the message fields and transfers them end-to-end between client and server (in any direction).</t>

<t>The remainder of this section and later sections discuss the behavior in terms of CoAP messages. If HTTP is used for a particular leg in the end-to-end path, then this section applies to the conceptual CoAP message that is mappable to/from the original HTTP message as discussed in <xref target="proxy-operations"/>.  That is, an HTTP message is conceptually transformed to a CoAP message and then to an OSCORE message, and similarly in the reverse direction.  An actual implementation might translate directly from HTTP to OSCORE without the intervening CoAP representation.</t>

<t>Message fields of the CoAP message may be protected end-to-end between CoAP client and CoAP server in different ways:</t>

<t><list style="symbols">
  <t>Class E: encrypted and integrity protected,</t>
  <t>Class I: integrity protected only, or</t>
  <t>Class U: unprotected.</t>
</list></t>

<t>The sending endpoint SHALL transfer Class E message fields in the ciphertext of the COSE object in the OSCORE message. The sending endpoint SHALL include Class I message fields in the Additional Authenticated Data (AAD) of the AEAD algorithm, allowing the receiving endpoint to detect if the value has changed in transfer. Class U message fields SHALL NOT be protected in transfer. Class I and Class U message field values are transferred in the header or options part of the OSCORE message which is visible to proxies.</t>

<t>Message fields not visible to proxies, i.e., transported in the ciphertext of the COSE object, are called “Inner” (Class E). Message fields transferred in the header or options part of the OSCORE message, which is visible to proxies, are called “Outer” (Class I or U).</t>

<t>CoAP message fields are either Inner or Outer: Inner if the value is intended for the destination endpoint, Outer if the value is intended for a proxy. An OSCORE message may contain both an Inner and an Outer message field of certain CoAP message fields. Inner and Outer message fields are processed independently.</t>

<section anchor="coap-payload" title="CoAP Payload">

<t>The CoAP Payload, if present in the original CoAP message, SHALL be encrypted and integrity protected and is thus an Inner message field. The sending endpoint writes the payload of the original CoAP message into the plaintext (<xref target="plaintext"/>) input to the COSE object. The receiving endpoint verifies and decrypts the COSE object, and recreates the payload of the original CoAP message.</t>

</section>
<section anchor="coap-options" title="CoAP Options">

<t>A summary of how options are protected is shown in <xref target="fig-option-protection"/>. Options which require special processing, in particular those which may have both Inner and Outer message fields, are labelled with asterisks.</t>

<figure title="Protection of CoAP Options" anchor="fig-option-protection"><artwork align="center"><![CDATA[
+----+----------------+---+---+---+
| No.| Name           | E | I | U |
+----+----------------+---+---+---+
|  1 | If-Match       | x |   |   |
|  3 | Uri-Host       |   |   | x |
|  4 | ETag           | x |   |   |
|  5 | If-None-Match  | x |   |   |
|  6 | Observe        |   |   | * |
|  7 | Uri-Port       |   |   | x |
|  8 | Location-Path  | x |   |   |
| 11 | Uri-Path       | x |   |   |
| 12 | Content-Format | x |   |   |
| 14 | Max-Age        | * |   | * |
| 15 | Uri-Query      | x |   |   |
| 17 | Accept         | x |   |   |
| 20 | Location-Query | x |   |   |
| 23 | Block2         | * |   | * |
| 27 | Block1         | * |   | * |
| 28 | Size2          | * |   | * |
| 35 | Proxy-Uri      | * |   | * |
| 39 | Proxy-Scheme   |   |   | x |
| 60 | Size1          | * |   | * |
+----+----------------+---+---+---+

 E = Encrypt and Integrity Protect (Inner)
 I = Integrity Protect only (Outer)
 U = Unprotected (Outer)
 * = Special
]]></artwork></figure>

<t>Unknown CoAP options SHALL be processed as class E (and no special processing). Specifications of new CoAP options SHOULD define how they are processed with OSCORE. A new COAP option SHOULD be of class E unless it requires proxy processing.</t>

<section anchor="inner-options" title="Inner Options">

<t>When using OSCORE, Inner option message fields (marked in column E of <xref target="fig-option-protection"/>) are sent in a way analogous to communicating in a protected manner directly with the other endpoint.</t>

<t>The sending endpoint SHALL write the Inner option message fields present in the original CoAP message into the plaintext of the COSE object <xref target="plaintext"/>, and then remove the Inner option message fields from the OSCORE message.</t>

<t>The processing of Inner option message fields by the receiving endpoint is specified in <xref target="ver-req"/> and <xref target="ver-res"/>.</t>

</section>
<section anchor="outer-options" title="Outer Options">

<t>Outer option message fields (marked in column U or I of <xref target="fig-option-protection"/>) are used to support proxy operations.</t>

<t>The sending endpoint SHALL include the Outer option message field present in the original message in the options part of the OSCORE message. All Outer option message fields, including Object-Security, SHALL be encoded as described in Section 3.1 of <xref target="RFC7252"/>, where the delta is the difference to the previously included Outer option message field.</t>

<t>The processing of Outer options by the receiving endpoint is specified in <xref target="ver-req"/> and <xref target="ver-res"/>.</t>

<t>A procedure for integrity-protection-only of Class I option message fields is specified in <xref target="AAD"/>.</t>

<t>Note: There are currently no Class I option message fields defined.</t>

</section>
<section anchor="special-options" title="Special Options">

<t>Some options require special processing, marked with an asterisk ‘*’ in <xref target="fig-option-protection"/>. An asterisk in the columns E and U indicate that the option may be added as an Inner and/or Outer message by the sending endpoint; the processing is specified in this section.</t>

<section anchor="max-age" title="Max-Age">

<t>The Inner Max-Age option is used to specify the freshness (as defined in <xref target="RFC7252"/>) of the resource, end-to-end from the server to the client, taking into account that the option is not accessible to proxies. The Inner Max-Age SHALL be processed by OSCORE as specified in <xref target="inner-options"/>.</t>

<t>The Outer Max-Age option is used to avoid unnecessary caching of OSCORE responses at OSCORE unaware intermediary nodes. A server MAY set a Class U Max-Age option with value zero to Observe responses (see Section 5.6.1 of <xref target="RFC7252"/>) which is then processed according to <xref target="outer-options"/>. The Outer Max-Age option value SHALL be discarded by the OSCORE client.</t>

<t>Non-Observe OSCORE responses do not need to include a Max-Age option since the responses are non-cacheable by construction (see <xref target="coap-header"/>).</t>

</section>
<section anchor="block-options" title="The Block Options">

<t>Blockwise <xref target="RFC7959"/> is an optional feature. An implementation MAY support <xref target="RFC7252"/> and the Object-Security option without supporting <xref target="RFC7959"/>. The Block options are used to secure message fragmentation end-to-end (Inner options) or for proxies to fragment the OSCORE message for the next hop (Outer options). Inner and Outer block processing may have different performance properties depending on the underlying transport. The integrity of the message can be verified end-to-end both in case of Inner and Outer Blockwise provided all blocks are received (see <xref target="outer-block-options"/>).</t>

<section anchor="inner-block-options" title="Inner Block Options">

<t>The sending CoAP endpoint MAY fragment a CoAP message as defined in <xref target="RFC7959"/> before the message is processed by OSCORE. In this case the Block options SHALL be processed by OSCORE as Inner options (<xref target="inner-options"/>). The receiving CoAP endpoint SHALL process the OSCORE message according to <xref target="inner-options"/> before processing blockwise as defined in <xref target="RFC7959"/>.</t>

<t>For blockwise request operations using Block1, an endpoint MUST comply with the Request-Tag processing defined in Section 3 of <xref target="I-D.amsuess-core-repeat-request-tag"/>. In particular, the rules in section 3.3.1 of <xref target="I-D.amsuess-core-repeat-request-tag"/> MUST be followed, which guarantee that a specific request body is assembled only from the corresponding request blocks.</t>

<t>For blockwise response operations using Block2, an endpoint MUST comply with the ETag processing defined in Section 4 of <xref target="I-D.amsuess-core-repeat-request-tag"/>.</t>

</section>
<section anchor="outer-block-options" title="Outer Block Options">

<t>Proxies MAY fragment an OSCORE message using <xref target="RFC7959"/>, which then introduces Outer Block options not generated by the sending endpoint. Note that the Outer Block options are neither encrypted nor integrity protected. As a consequence, a proxy can maliciously inject block fragments indefinitely, since the receiving endpoint needs to receive the last block (see <xref target="RFC7959"/>) to be able to compose the OSCORE message and verify its integrity. Therefore, applications supporting OSCORE and <xref target="RFC7959"/> MUST specify a security policy defining a maximum unfragmented message size (MAX_UNFRAGMENTED_SIZE) considering the maximum size of message which can be handled by the endpoints. Messages exceeding this size SHOULD be fragmented by the sending endpoint using Inner Block options (<xref target="inner-block-options"/>).</t>

<t>An endpoint receiving an OSCORE message with an Outer Block option SHALL first process this option according to <xref target="RFC7959"/>, until all blocks of the OSCORE message have been received, or the cumulated message size of the blocks exceeds MAX_UNFRAGMENTED_SIZE.  In the former case, the processing of the OSCORE message continues as defined in this document. In the latter case the message SHALL be discarded.</t>

<t>To allow multiple concurrent request operations to the same server (not only same resource), a CoAP proxy SHOULD follow the Request-Tag processing specified in section 3.3.2 of <xref target="I-D.amsuess-core-repeat-request-tag"/>.</t>

</section>
</section>
<section anchor="proxy-uri" title="Proxy-Uri">

<t>Proxy-Uri, when present, is split by OSCORE into class U options and class E options, which are processed accordingly. When Proxy-Uri is used in the original CoAP message, Uri-* are not present <xref target="RFC7252"/>.</t>

<t>The sending endpoint SHALL first decompose the Proxy-Uri value of the original CoAP message into the Proxy-Scheme, Uri-Host, Uri-Port, Uri-Path, and Uri-Query options (if present) according to section 6.4 of <xref target="RFC7252"/>.</t>

<t>Uri-Path and Uri-Query are class E options and SHALL be protected and processed as Inner options (<xref target="inner-options"/>).</t>

<t>The Proxy-Uri option of the OSCORE message SHALL be set to the composition of Proxy-Scheme, Uri-Host and Uri-Port options (if present) as specified in section 6.5 of <xref target="RFC7252"/>, and processed as an Outer option of Class U (<xref target="outer-options"/>).</t>

<t>Note that replacing the Proxy-Uri value with the Proxy-Scheme and Uri-* options works by design for all CoAP URIs (see Section 6 of <xref target="RFC7252"/>. OSCORE-aware HTTP servers should not use the userinfo component of the HTTP URI (as defined in section 3.2.1. of <xref target="RFC3986"/>), so that this type of replacement is possible in the presence of CoAP-to-HTTP proxies. In other documents specifying cross-protocol proxying behavior using different URI structures, it is expected that the authors will create Uri-* options that allow decomposing the Proxy-Uri, and specify in which OSCORE class they belong.</t>

<t>An example of how Proxy-Uri is processed is given here. Assume that the original CoAP message contains:</t>

<t><list style="symbols">
  <t>Proxy-Uri = “coap://example.com/resource?q=1”</t>
</list></t>

<t>During OSCORE processing, Proxy-Uri is split into:</t>

<t><list style="symbols">
  <t>Proxy-Scheme = “coap”</t>
  <t>Uri-Host = “example.com”</t>
  <t>Uri-Port = “5683”</t>
  <t>Uri-Path = “resource”</t>
  <t>Uri-Query = “q=1”</t>
</list></t>

<t>Uri-Path and Uri-Query follow the processing defined in <xref target="inner-options"/>, and are thus encrypted and transported in the COSE object. The remaining options are composed into the Proxy-Uri included in the options part of the OSCORE message, which has value:</t>

<t><list style="symbols">
  <t>Proxy-Uri = “coap://example.com”</t>
</list></t>

<t>See Section 6.1 and 12.6 of <xref target="RFC7252"/> for more information.</t>

</section>
<section anchor="observe" title="Observe">

<t>Observe <xref target="RFC7641"/> is an optional feature. An implementation MAY support <xref target="RFC7252"/> and the Object-Security option without supporting <xref target="RFC7641"/>. The Observe option as used here targets the requirements on forwarding of <xref target="I-D.hartke-core-e2e-security-reqs"/> (Section 2.2.1.2).</t>

<t>In order for an OSCORE-unaware proxy to support forwarding of Observe messages (<xref target="RFC7641"/>), there SHALL be an Outer Observe option, i.e., present in the options part of the OSCORE message. The processing of the CoAP Code for Observe messages is described in <xref target="coap-header"/>.</t>

<t>To secure the order of notifications, the client SHALL maintain a Notification Number for each Observation it registers. The Notification Number is a non-negative integer containing the largest Partial IV of the successfully received notifications for the associated Observe registration, see <xref target="replay-protection"/>. The Notification Number is initialized to the Partial IV of the first successfully received notification response to the registration request. In contrast to <xref target="RFC7641"/>, the received Partial IV MUST always be compared with the Notification Number, which thus MUST NOT be forgotten after 128 seconds.</t>

<t>If the verification fails, the client SHALL stop processing the response, and in the case of CON respond with an empty ACK. The client MAY ignore the Observe option value.</t>

<t>The Observe option in the CoAP request may be legitimately removed by a proxy. If the Observe option is removed from a CoAP request by a proxy, then the server can still verify the request (as a non-Observe request), and produce a non-Observe response. If the OSCORE client receives a response to an Observe request without an outer Observe value, then it MUST verify the response as a non-Observe response. (The reverse case is covered in the verification of the response, see <xref target="processing"/>.)</t>

</section>
</section>
</section>
<section anchor="coap-header" title="CoAP Header">

<t>Most CoAP header fields are required to be read and/or changed by CoAP proxies and thus cannot in general be protected end-to-end between the endpoints. As mentioned in <xref target="intro"/>, OSCORE protects the CoAP Request/Response layer only, and not the Messaging Layer (Section 2 of <xref target="RFC7252"/>), so fields such as Type and Message ID are not protected with OSCORE.</t>

<t>The CoAP header field Code is protected by OSCORE. Code SHALL be encrypted and integrity protected (Class E) to prevent an intermediary from eavesdropping or manipulating the Code (e.g., changing from GET to DELETE).</t>

<t>The sending endpoint SHALL write the Code of the original CoAP message into the plaintext of the COSE object <xref target="plaintext"/>. After that, the Outer Code of the OSCORE message SHALL be set to 0.02 (POST) for requests and to 2.04 (Changed) for responses, except for Observe messages. For Observe messages, the Outer Code of the OSCORE message SHALL be set to 0.05 (FETCH) for requests and to 2.05 (Content) for responses. This exception allows OSCORE to be compliant with the Observe processing in OSCORE-unaware proxies. The choice of POST and FETCH (<xref target="RFC8132"/>) allows all OSCORE messages to have payload.</t>

<t>The receiving endpoint SHALL discard the Code in the OSCORE message and write the Code of the Plaintext in the COSE object (<xref target="plaintext"/>) into the decrypted CoAP message.</t>

<t>The other CoAP header fields are Unprotected (Class U). The sending endpoint SHALL write all other header fields of the original message into the header of the OSCORE message. The receiving endpoint SHALL write the header fields from the received OSCORE message into the header of the decrypted CoAP message.</t>

</section>
</section>
<section anchor="cose-object" title="The COSE Object">

<t>This section defines how to use COSE <xref target="RFC8152"/> to wrap and protect data in the original message. OSCORE uses the untagged COSE_Encrypt0 structure with an Authenticated Encryption with Additional Data (AEAD) algorithm. The key lengths, IV length, nonce length, and maximum Sender Sequence Number are algorithm dependent.</t>

<t>The AEAD algorithm AES-CCM-16-64-128 defined in Section 10.2 of <xref target="RFC8152"/> is mandatory to implement. For AES-CCM-16-64-128 the length of Sender Key and Recipient Key is 128 bits, the length of nonce and Common IV is 13 bytes. The maximum Sender Sequence Number is specified in <xref target="sec-considerations"/>.</t>

<t>We denote by Plaintext the data that is encrypted and integrity protected, and by Additional Authenticated Data (AAD) the data that is integrity protected only.</t>

<t>The COSE Object SHALL be a COSE_Encrypt0 object with fields defined as follows</t>

<t><list style="symbols">
  <t>The “protected” field is empty.</t>
  <t>The “unprotected” field includes:  <list style="symbols">
      <t>The “Partial IV” parameter. The value is set to the Sender Sequence Number. All leading zeroes SHALL be removed when encoding the Partial IV, i.e. the first byte (if any) SHALL never be zero. This parameter SHALL be present in requests. In case of Observe (<xref target="observe"/>) the Partial IV SHALL be present in responses, and otherwise the Partial IV SHALL NOT be present in responses.</t>
      <t>The “kid” parameter. The value is set to the Sender ID (see <xref target="context"/>). All leading zeroes SHALL be removed when encoding the Partial IV, i.e. the first byte (if any) SHALL never be zero. This parameter SHALL be present in requests and SHALL NOT be present in responses.</t>
    </list></t>
  <t>The “ciphertext” field is computed from the secret key (Sender Key or Recipient Key), Nonce (see <xref target="nonce"/>), Plaintext (see <xref target="plaintext"/>), and the Additional Authenticated Data (AAD) (see <xref target="AAD"/>) following Section 5.2 of <xref target="RFC8152"/>.</t>
</list></t>

<t>The encryption process is described in Section 5.3 of <xref target="RFC8152"/>.</t>

<section anchor="nonce" title="Nonce">

<t>The nonce is constructed by left-padding the Partial IV (in network byte order) with zeroes to exactly 5 bytes, left-padding the Sender ID of the endpoint that generated the Partial IV (in network byte order) with zeroes to exactly nonce length – 5 bytes, concatenating the padded Partial IV with the padded ID, and then XORing with the Common IV.</t>

<t>When observe is not used, the request and the response uses the same nonce. In this way, the Partial IV does not have to be sent in responses, which reduces the size. For processing instructions, see <xref target="processing"/>.</t>

<figure title="AEAD Nonce Formation" anchor="fig-nonce"><artwork align="center"><![CDATA[
+--------------------------+--+--+--+--+--+
|    ID of PIV generator   |  Partial IV  |---+ 
+--------------------------+--+--+--+--+--+   | 
                                              | 
+-----------------------------------------+   | 
|                Common IV                |->(+)
+-----------------------------------------+   | 
                                              | 
+-----------------------------------------+   | 
|                  Nonce                  |<--+ 
+-----------------------------------------+     
]]></artwork></figure>

</section>
<section anchor="plaintext" title="Plaintext">

<t>The Plaintext is formatted as a CoAP message without Header (see <xref target="fig-plaintext"/>) consisting of:</t>

<t><list style="symbols">
  <t>the Code of the original CoAP message as defined in Section 3 of <xref target="RFC7252"/>; and</t>
  <t>all Inner option message fields (see <xref target="inner-options"/>) present in the original CoAP message (see <xref target="coap-options"/>). The options are encoded as described in Section 3.1 of <xref target="RFC7252"/>, where the delta is the difference to the previously included Class E option; and</t>
  <t>the Payload of original CoAP message, if present, and in that case prefixed by the one-byte Payload Marker (0xFF).</t>
</list></t>

<figure title="Plaintext" anchor="fig-plaintext"><artwork align="center"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|     Code      |    Class E options (if any) ...                             
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|1 1 1 1 1 1 1 1|    Payload (if any) ...                        
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
 (only if there 
   is payload)
]]></artwork></figure>

</section>
<section anchor="AAD" title="Additional Authenticated Data">

<t>The external_aad SHALL be a CBOR array as defined below:</t>

<figure><artwork type="CDDL"><![CDATA[
external_aad = [
   version : uint,
   alg : int,
   request_kid : bstr,
   request_piv : bstr,
   options : bstr
]
]]></artwork></figure>

<t>where:</t>

<t><list style="symbols">
  <t>version: contains the OSCORE version number. Implementations of this specification MUST set this field to 1. Other values are reserved for future versions.</t>
  <t>alg: contains the AEAD Algorithm from the security context used for the exchange (see <xref target="context-definition"/>).</t>
  <t>request_kid: contains the value of the ‘kid’ in the COSE object of the request (see <xref target="cose-object"/>).</t>
  <t>request_piv: contains the value of the ‘Partial IV’ in the COSE object of the request (see <xref target="cose-object"/>).</t>
  <t>options: contains the (non-special) Class I options (see <xref target="outer-options"/>) present in the original CoAP message encoded as described in Section 3.1 of <xref target="RFC7252"/>, where the delta is the difference to the previously included class I option.</t>
</list></t>

</section>
</section>
<section anchor="sequence-numbers" title="Sequence Numbers, Replay, Message Binding, and Freshness">

<section anchor="message-binding" title="Message Binding">

<t>In order to prevent response delay and mismatch attacks <xref target="I-D.mattsson-core-coap-actuators"/> from on-path attackers and compromised proxies, OSCORE binds responses to the request by including the request’s ID (Sender ID or Recipient ID) and Partial IV in the AAD of the response. The server therefore needs to store the request’s ID (Sender ID or Recipient ID) and Partial IV until all responses have been sent.</t>

</section>
<section anchor="nonce-uniqueness" title="AEAD Nonce Uniqueness">

<t>An AEAD nonce MUST NOT be used more than once per AEAD key. In order to assure unique nonces, each Sender Context contains a Sender Sequence Number used to protect requests, and - in case of Observe - responses. If messages are processed concurrently, the operation of reading and increasing the Sender Sequence Number MUST be atomic.</t>

<t>The maximum Sender Sequence Number is algorithm dependent, see <xref target="sec-considerations"/>. If the Sender Sequence Number exceeds the maximum, the endpoint MUST NOT process any more messages with the given Sender Context. The endpoint SHOULD acquire a new security context (and consequently inform the other endpoint) before this happens. The latter is out of scope of this document.</t>

</section>
<section anchor="freshness" title="Freshness">

<t>For requests, OSCORE provides weak absolute freshness as the only guarantee is that the request is not older than the security context. For applications having stronger demands on request freshness (e.g., control of actuators), OSCORE needs to be augmented with mechanisms providing freshness <xref target="I-D.amsuess-core-repeat-request-tag"/>.</t>

<t>For responses, the message binding guarantees that a response is not older than its request. For responses without Observe, this gives strong absolute freshness. For responses with Observe, the absolute freshness gets weaker with time, and it is RECOMMENDED that the client regularly restart the observation.</t>

<t>For requests, and responses with Observe, OSCORE also provides relative freshness in the sense that the received Partial IV allows a recipient to determine the relative order of responses.</t>

</section>
<section anchor="replay-protection" title="Replay Protection">

<t>In order to protect from replay of requests, the server’s Recipient Context includes a Replay Window. A server SHALL verify that a Partial IV received in the COSE object has not been received before. If this verification fails and the message received is a CON message, the server SHALL respond with a 5.03 Service Unavailable error message with the inner Max-Age option set to 0. The diagnostic payload MAY contain the “Replay protection failed” string. The size and type of the Replay Window depends on the use case and lower protocol layers. In case of reliable and ordered transport from endpoint to endpoint, the server MAY just store the last received Partial IV and require that newly received Partial IVs equals the last received Partial IV + 1.</t>

<t>Responses to non-Observe requests are protected against replay as they are cryptographically bound to the request.</t>

<t>In the case of Observe, a client receiving a notification SHALL verify that the Partial IV of a received notification is greater than the Notification Number bound to that Observe registration. If the verification fails, the client SHALL stop processing the response, and in the case of CON respond with an empty ACK. If the verification succeeds, the client SHALL overwrite the corresponding Notification Number with the received Partial IV.</t>

<t>If messages are processed concurrently, the Partial IV needs to be validated a second time after decryption and before updating the replay protection data. The operation of validating the Partial IV and updating the replay protection data MUST be atomic.</t>

</section>
<section anchor="context-state" title="Losing Part of the Context State">

<t>To prevent reuse of the Nonce with the same key, or from accepting replayed messages, a node needs to handle the situation of losing rapidly changing parts of the context, such as the request Token, Sender Sequence Number, Replay Window, and Nofitifcation Numbers. These are typically stored in RAM and therefore lost in the case of an unplanned reboot.</t>

<t>After boot, a node MAY reject to use existing security contexts from before it booted and MAY establish a new security context with each party it communicates. However, establishing a fresh security context may have a non-negligible cost in terms of, e.g., power consumption.</t>

<t>After boot, a node MAY use a partly persistently stored security context, but then the node MUST NOT reuse a previous Sender Sequence Number and MUST NOT accept previously accepted messages. Some ways to achieve this is described below:</t>

<section anchor="sequence-number" title="Sequence Number">

<t>To prevent reuse of Sender Sequence Numbers, a node MAY perform the following procedure during normal operations:</t>

<t><list style="symbols">
  <t>Each time the Sender Sequence Number is evenly divisible by K, where K is a positive integer, store the Sender Sequence Number in persistent memory. After boot, the node initiates the Sender Sequence Number to the value stored in persistent memory + K - 1. Storing to persistent memory can be costly. The value K gives a trade-off between the number of storage operations and efficient use of Sender Sequence Numbers.</t>
</list></t>

</section>
<section anchor="replay-window" title="Replay Window">

<t>To prevent accepting replay of previously received requests, the server MAY perform the following procedure after boot:</t>

<t><list style="symbols">
  <t>For each stored security context, the first time after boot the server receives an OSCORE request, the server uses the Repeat option <xref target="I-D.amsuess-core-repeat-request-tag"/> to get a request with verifiable freshness and uses that to synchronize the replay window. If the server can verify the fresh request, the Partial IV in the fresh request is set as the lower limit of the replay window.</t>
</list></t>

</section>
<section anchor="replay-protection-of-observe-notifications" title="Replay Protection of Observe Notifications">

<t>To prevent accepting replay of previously received notification responses, the client MAY perform the following procedure after boot:</t>

<t><list style="symbols">
  <t>The client rejects notifications bound to the earlier registration, removes all Notification Numbers and re-register using Observe.</t>
</list></t>

</section>
</section>
</section>
<section anchor="processing" title="Processing">

<t>This section describes the OSCORE message processing.</t>

<section anchor="prot-req" title="Protecting the Request">

<t>Given a CoAP request, the client SHALL perform the following steps to create an OSCORE request:</t>

<t><list style="numbers">
  <t>Retrieve the Sender Context associated with the target resource.</t>
  <t>Compose the Additional Authenticated Data, as described in <xref target="cose-object"/>.</t>
  <t>Compute the AEAD nonce from the Sender ID, Common IV, and Partial IV (Sender Sequence Number in network byte order). Then (in one atomic operation, see <xref target="nonce-uniqueness"/>) increment the Sender Sequence Number by one.</t>
  <t>Encrypt the COSE object using the Sender Key. Compress the COSE Object as specified in <xref target="compression"/>.</t>
  <t>Format the OSCORE message according to <xref target="protected-fields"/>. The Object-Security option is added, see <xref target="outer-options"/>.</t>
  <t>Store the association Token - Security Context. The client SHALL be able to find the Recipient Context from the Token in the response.</t>
</list></t>

</section>
<section anchor="ver-req" title="Verifying the Request">

<t>A server receiving a request containing the Object-Security option SHALL perform the following steps:</t>

<t><list style="numbers">
  <t>Process outer Block options according to <xref target="RFC7959"/>, until all blocks of the request have been received, see <xref target="block-options"/>.</t>
  <t>Discard the message Code and all non-special Inner option message fields (marked with ‘x’ in column E of <xref target="fig-option-protection"/>) present in the received message. For example, an If-Match Outer option is discarded, but an Uri-Host Outer option is not discarded.</t>
  <t>Decompress the COSE Object (<xref target="compression"/>) and retrieve the Recipient Context associated with the Recipient ID in the ‘kid’ parameter. If the request is a NON message and either the decompression or the COSE message fails to decode, or the server fails to retrieve a Recipient Context with Recipient ID corresponding to the ‘kid’ parameter received, then the server SHALL stop processing the request. If the request is a CON message, and:  <list style="symbols">
      <t>either the decompression or the COSE message fails to decode, the server SHALL respond with a 4.02 Bad Option error message. The diagnostic payload SHOULD contain the string “Failed to decode COSE”.</t>
      <t>the server fails to retrieve a Recipient Context with Recipient ID corresponding to the ‘kid’ parameter received, the server SHALL respond with a 4.01 Unauthorized error message. The diagnostic payload MAY contain the string “Security context not found”.</t>
    </list></t>
  <t>Verify the ‘Partial IV’ parameter using the Replay Window, as described in <xref target="sequence-numbers"/>.</t>
  <t>Compose the Additional Authenticated Data, as described in <xref target="cose-object"/>.</t>
  <t>Compute the AEAD nonce from the Recipient ID, Common IV, and the ‘Partial IV’ parameter, received in the COSE Object.</t>
  <t>Decrypt the COSE object using the Recipient Key.  <list style="symbols">
      <t>If decryption fails, the server MUST stop processing the request and, if the request is a CON message, the server MUST respond with a 4.00 Bad Request error message. The diagnostic payload MAY contain the “Decryption failed” string.</t>
      <t>If decryption succeeds, update the Replay Window, as described in <xref target="sequence-numbers"/>.</t>
    </list></t>
  <t>For each decrypted option, check if the option is also present as an Outer option: if it is, discard the Outer. For example: the message contains a Max-Age Inner and a Max-Age Outer option. The Outer Max-Age is discarded.</t>
  <t>Add decrypted code, options and payload to the decrypted request. The Object-Security option is removed.</t>
  <t>The decrypted CoAP request is processed according to <xref target="RFC7252"/></t>
</list></t>

</section>
<section anchor="prot-res" title="Protecting the Response">

<t>Given a CoAP response, the server SHALL perform the following steps to create an OSCORE response. Note that CoAP error responses derived from CoAP processing (point 10. in <xref target="ver-req"/>) are protected, as well as successful CoAP responses, while the OSCORE errors (point 3., 4., 7. in <xref target="ver-req"/>) do not follow the processing below, but are sent as simple CoAP responses, without OSCORE processing.</t>

<t><list style="numbers">
  <t>Retrieve the Sender Context in the Security Context used to verify the request.</t>
  <t>Compose the Additional Authenticated Data, as described in <xref target="cose-object"/>.</t>
  <t>Compute the AEAD nonce  <list style="symbols">
      <t>If Observe is not used, the nonce from the request is used.</t>
      <t>If Observe is used, Compute the AEAD nonce from the Sender ID, Common IV, and Partial IV (Sender Sequence Number in network byte order). Then (in one atomic operation, see <xref target="nonce-uniqueness"/>) increment the Sender Sequence Number by one.</t>
    </list></t>
  <t>Encrypt the COSE object using the Sender Key. Compress the COSE Object as specified in <xref target="compression"/>.</t>
  <t>Format the OSCORE message according to <xref target="protected-fields"/>. The Object-Security option is added, see <xref target="outer-options"/>.</t>
</list></t>

</section>
<section anchor="ver-res" title="Verifying the Response">

<t>A client receiving a response containing the Object-Security option SHALL perform the following steps:</t>

<t><list style="numbers">
  <t>Process outer Block options according to <xref target="RFC7959"/>, until all blocks of the OSCORE message have been received, see <xref target="block-options"/>.</t>
  <t>Discard the message Code and all non-special Class E options from the message. For example, ETag Outer option is discarded, Max-Age Outer option is not discarded.</t>
  <t>Retrieve the Recipient Context associated with the Token. Decompress the COSE Object (<xref target="compression"/>). If either the decompression or the COSE message fails to decode, then go to 11.</t>
  <t>For Observe notifications, verify the received ‘Partial IV’ parameter against the corresponding Notification Number as described in <xref target="sequence-numbers"/>. If the client receives a notification for which no Observe request was sent, then go to 11.</t>
  <t>Compose the Additional Authenticated Data, as described in <xref target="cose-object"/>.</t>
  <t>Compute the AEAD nonce  <list style="symbols">
      <t>If the Observe option is not present in the response, the nonce from the request is used.</t>
      <t>If the Observe option is present in the response, compute the AEAD nonce from the Recipient ID, Common IV, and the ‘Partial IV’ parameter, received in the COSE Object.</t>
    </list></t>
  <t>Decrypt the COSE object using the Recipient Key.  <list style="symbols">
      <t>If decryption fails, then go to 11.</t>
      <t>If decryption succeeds and Observe is used, update the corresponding Notification Number, as described in <xref target="sequence-numbers"/>.</t>
    </list></t>
  <t>For each decrypted option, check if the option is also present as an Outer option: if it is, discard the Outer. For example: the message contains a Max-Age Inner and a Max-Age Outer option. The Outer Max-Age is discarded.</t>
  <t>Add decrypted code, options and payload to the decrypted request. The Object-Security option is removed.</t>
  <t>The decrypted CoAP response is processed according to <xref target="RFC7252"/></t>
  <t>(Optional) In case any of the previous erroneous conditions apply: if the response is a CON message, then the client SHALL send an empty ACK back and stop processing the response; if the response is a ACK or a NON message, then the client SHALL simply stop processing the response.</t>
</list></t>

</section>
</section>
<section anchor="compression" title="OSCORE Compression">

<t>The Concise Binary Object Representation (CBOR) <xref target="RFC7049"/> combines very small message sizes with extensibility. The CBOR Object Signing and Encryption (COSE) <xref target="RFC8152"/> uses CBOR to create compact encoding of signed and encrypted data. COSE is however constructed to support a large number of different stateless use cases, and is not fully optimized for use as a stateful security protocol, leading to a larger than necessary message expansion. In this section, we define a simple stateless compression mechanism for OSCORE called the “compressed COSE object”, which significantly reduces the per-packet overhead.</t>

<section anchor="obj-sec-value" title="Encoding of the Object-Security Value">

<t>The value of the Object-Security option SHALL contain the OSCORE flag byte and the kid parameter as follows:</t>

<figure title="Object-Security Value" anchor="fig-option-value"><artwork align="center"><![CDATA[
 0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|0 0 0|h|k|  n  |    kid (if any) ...                             
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t><list style="symbols">
  <t>The first byte (= the OSCORE flag byte) encodes a set of flags and the length of the Partial IV parameter.
  <list style="symbols">
      <t>The three least significant bits, n, encode the Partial IV length + 1. If n = 0 then the Partial IV is not present in the compressed COSE object. The value n = 7 is reserved.</t>
      <t>The fourth least significant bit is the kid flag, k: it is set to 1 if the kid is present in the compressed COSE object.</t>
      <t>The fifth least significant bit is the Context Hint flag, h: it is set to 1 if the compressed COSE object contains a Context Hint, see <xref target="context-hint"/>.</t>
      <t>The sixth-eighth least significant bits are reserved and SHALL be set to zero when not in use.</t>
    </list></t>
  <t>The remaining bytes encode the value of the kid, if the kid is present (k = 1)</t>
</list></t>

<t>The presence of Partial IV and kid in requests and responses is specified in <xref target="cose-object"/>, and summarized in <xref target="fig-byte-flag"/>.</t>

<figure title="Presence of data fields in OSCORE flag byte" anchor="fig-byte-flag"><artwork align="center"><![CDATA[
+--------------------------+-----+-----+
|                          |  k  |  n  |
+--------------------------+-----+-----+
| Request                  |  1  | > 0 |
| Response without Observe |  0  |   0 |
| Response with Observe    |  0  | > 0 |
+--------------------------+-----+-----+
]]></artwork></figure>

</section>
<section anchor="oscore-payl" title="Encoding of the OSCORE Payload">

<t>The payload of the OSCORE message SHALL be encoded as follows:</t>

<t><list style="symbols">
  <t>The first n - 1 bytes encode the value of the Partial IV, if the Partial IV is present (n &gt; 0).</t>
  <t>The following 1 byte encode the length of the Context Hint (<xref target="context-hint"/>), s, if the Context Hint flag is set (h = 1).</t>
  <t>The following s bytes encode the Context Hint, if the Context Hint flag is set (h = 1).</t>
  <t>The remaining bytes encode the ciphertext.</t>
</list></t>

</section>
<section anchor="context-hint" title="Context Hint">

<t>For certain use cases, e.g. deployments where the same Recipient ID is used with multiple contexts, it is necessary or favorable for the sending endpoint to provide a Context Hint in order for the receiving endpoint to retrieve the recipient context. The Context Hint is implicitly integrity protected, as a manipulation leads to the wrong or no context being retrieved resulting in a verification error.</t>

<t>Examples:</t>

<t><list style="symbols">
  <t>If the sending endpoint has an identifier in some other namespace which can be used by the recipient endpoint to retrieve or establish the security context, then that identifier can be used as Context Hint.</t>
  <t>In case of a group communication scenario <xref target="I-D.tiloca-core-multicast-oscoap"/>, if the recipient endpoint belongs to multiple groups, involving the same endpoints, then a group identifier can be used as Context Hint to enable the receiving endpoint to find the right group security context.</t>
</list></t>

</section>
<section anchor="compression-examples" title="Compression Examples">

<t>This section provides examples of COSE Objects before and after OSCORE compression.</t>

<section anchor="example-request" title="Example: Request">

<t>Before compression:</t>

<figure><artwork><![CDATA[
[
h'',
{ 4:h'25', 6:h'05' },
h'aea0155667924dff8a24e4cb35b9'
]

0x83 40 a2 04 41 25 06 41 05 4e ae a0 15 56 67 92
4d ff 8a 24 e4 cb 35 b9 (24 bytes)
]]></artwork></figure>

<t>After compression:</t>

<figure><artwork><![CDATA[
Flag byte: 0b00001010 = 0x0a

Option Value: 0a 25 (2 bytes)

Payload: 05 ae a0 15 56 67 92 4d ff 8a 24 e4 cb 35 b9 (15 bytes)
]]></artwork></figure>

</section>
<section anchor="example-request-2" title="Example: Request 2">

<t>Before compression:</t>

<figure><artwork><![CDATA[
[
h'',
{ 4:h'00', 6:h'00' },
h'aea0155667924dff8a24e4cb35b9'
]

0x83 40 a2 04 41 00 06 41 00 4e ae a0 15 56 67 92
4d ff 8a 24 e4 cb 35 b9 (24 bytes)
]]></artwork></figure>

<t>After compression:</t>

<figure><artwork><![CDATA[
Flag byte: 0b00001001 = 0x09

Option Value: 09 (1 bytes)

Payload: ae a0 15 56 67 92 4d ff 8a 24 e4 cb 35 b9 (14 bytes)
]]></artwork></figure>

</section>
<section anchor="example-response-without-observe" title="Example: Response (without Observe)">

<t>Before compression:</t>

<figure><artwork><![CDATA[
[
h'',
{},
h'aea0155667924dff8a24e4cb35b9'
]

0x83 40 a0 4e ae a0 15 56 67 92 4d ff 8a 24 e4 cb
35 b9 (18 bytes)
]]></artwork></figure>

<t>After compression:</t>

<figure><artwork><![CDATA[
Flag byte: 0b00000000 = 0x00

Option Value: (0 bytes)

Payload: ae a0 15 56 67 92 4d ff 8a 24 e4 cb 35 b9 (14 bytes)
]]></artwork></figure>

</section>
<section anchor="example-response-with-observe" title="Example: Response (with Observe)">

<t>Before compression:</t>

<figure><artwork><![CDATA[
[
h'',
{ 6:h'07' },
h'aea0155667924dff8a24e4cb35b9'
]

0x83 40 a1 06 41 07 4e ae a0 15 56 67 92 4d ff
8a 24 e4 cb 35 b9 (21 bytes)
]]></artwork></figure>

<t>After compression:</t>

<figure><artwork><![CDATA[
Flag byte: 0b00000010 = 0x02

Option Value: 02 (1 bytes)

Payload: 07 ae a0 15 56 67 92 4d ff 8a 24 e4 cb 35 b9 (15 bytes)
]]></artwork></figure>

</section>
</section>
</section>
<section anchor="web-linking" title="Web Linking">

<t>The use of OSCORE MAY be indicated by a target attribute “osc” in a web link <xref target="RFC5988"/> to a resource. This attribute is a hint indicating that the destination of that link is to be accessed using OSCORE. Note that this is simply a hint, it does not include any security context material or any other information required to run OSCORE.</t>

<t>A value MUST NOT be given for the “osc” attribute; any present value MUST be ignored by parsers. The “osc” attribute MUST NOT appear more than once in a given link-value; occurrences after the first MUST be ignored by parsers.</t>

</section>
<section anchor="proxy-operations" title="Proxy Operations">

<t>RFC 7252 defines operations for a CoAP-to-CoAP proxy (see Section 5.7 of <xref target="RFC7252"/>) and for proxying between CoAP and HTTP (Section 10 of <xref target="RFC7252"/>). A more detailed description of the HTTP-to-CoAP mapping is provided by <xref target="RFC8075"/>.
This section describes the operations of OSCORE-aware proxies.</t>

<section anchor="coap-coap-proxy" title="CoAP-to-CoAP Forwarding Proxy">

<t>OSCORE is designed to work with legacy CoAP-to-CoAP forward proxies <xref target="RFC7252"/>, but OSCORE-aware proxies provide certain simplifications as specified in this section.</t>

<t>The targeted proxy operations are specified in Section 2.2.1 of <xref target="I-D.hartke-core-e2e-security-reqs"/>. In particular caching is disabled since the CoAP response is only applicable to the original client’s CoAP request. An OSCORE-aware proxy SHALL NOT cache a response to a request with an Object-Security option. As a consequence, the search for cache hits and CoAP freshness/Max-Age processing can be omitted.</t>

<t>Proxy processing of the (Outer) Proxy-Uri option is as defined in <xref target="RFC7252"/>.</t>

<t>Proxy processing of the (Outer) Block options is as defined in <xref target="RFC7959"/> and <xref target="I-D.amsuess-core-repeat-request-tag"/>.</t>

<t>Proxy processing of the (Outer) Observe option is as defined in <xref target="RFC7641"/>. OSCORE-aware proxies MAY look at the Partial IV value instead of the Outer Observe option.</t>

</section>
<section anchor="http2coap" title="HTTP-to-CoAP Translation Proxy">

<t>Section 10.2 of <xref target="RFC7252"/> and <xref target="RFC8075"/> specify the behavior of an HTTP-to-CoAP proxy.
As requested in Section 1 of <xref target="RFC8075"/>, this section describes the HTTP mapping for the OSCORE protocol extension of CoAP.</t>

<t>The presence of the Object-Security option, both in requests and responses, is expressed in an HTTP header field named Object-Security in the mapped request or response. The value of the field is the value of the Object-Security option <xref target="obj-sec-value"/> in base64url encoding (Section 5 of <xref target="RFC4648"/>) without padding (see <xref target="RFC7515"/> Appendix C for implementation notes for this encoding). The value of the payload is the OSCORE payload <xref target="oscore-payl"/>, also base64url-encoded without padding.</t>

<t>Example:</t>

<t>Mapping and notation here is based on “Simple Form” (Section 5.4.1.1 of <xref target="RFC8075"/>).</t>

<figure><artwork><![CDATA[
[HTTP request -- Before object security processing]

  GET http://proxy.url/hc/?target_uri=coap://device.url/orders HTTP/1.1
 
[HTTP request -- HTTP Client to Proxy]

  POST http://proxy.url/hc/?target_uri=coap://device.url/ HTTP/1.1
  Object-Security: 0b 25
  Body: 09 07 01 13 61 f7 0f d2 97 b1 [binary]
  
[CoAP request -- Proxy to CoAP Server]

  POST coap://device.url/
  Object-Security: 0b 25
  Payload: 09 07 01 13 61 f7 0f d2 97 b1 [binary]

[CoAP response -- CoAP Server to Proxy]

  2.04 Changed
  Object-Security: [empty]
  Payload: 00 31 d1 fc f6 70 fb 0c 1d d5 ... [binary]

[HTTP response -- Proxy to HTTP Client]

  HTTP/1.1 200 OK
  Object-Security: [empty]
  Body: 00 31 d1 fc f6 70 fb 0c 1d d5 ... [binary]

[HTTP response -- After object security processing]

  HTTP/1.1 200 OK
  Body: Exterminate! Exterminate!
]]></artwork></figure>

<t>Note that the HTTP Status Code 200 in the next-to-last message is the mapping of CoAP Code 2.04 (Changed), whereas the HTTP Status Code 200 in the last message is the mapping of the CoAP Code 2.05 (Content), which was encrypted within the compressed COSE object carried in the Body of the HTTP response.</t>

</section>
<section anchor="coap2http" title="CoAP-to-HTTP Translation Proxy">

<t>Section 10.1 of <xref target="RFC7252"/> describes the behavior of a CoAP-to-HTTP proxy.  RFC 8075 <xref target="RFC8075"/> does not cover this direction in any more detail and so an example instantiation of Section 10.1 of <xref target="RFC7252"/> is used below.</t>

<t>Example:</t>

<figure><artwork><![CDATA[
[CoAP request -- Before object security processing]

  GET coap://proxy.url/
  Proxy-Uri=http://device.url/orders

[CoAP request -- CoAP Client to Proxy]

  POST coap://proxy.url/
  Proxy-Uri=http://device.url/
  Object-Security: 0b 25
  Payload: 09 07 01 13 61 f7 0f d2 97 b1 [binary]

[HTTP request -- Proxy to HTTP Server]

  POST http://device.url/ HTTP/1.1
  Object-Security: 0b 25
  Body: 09 07 01 13 61 f7 0f d2 97 b1 [binary]

[HTTP response -- HTTP Server to Proxy]

  HTTP/1.1 200 OK
  Object-Security: [empty]
  Body: 00 31 d1 fc f6 70 fb 0c 1d d5 ... [binary]

[CoAP response -- CoAP Server to Proxy]

  2.04 Changed
  Object-Security: [empty]
  Payload: 00 31 d1 fc f6 70 fb 0c 1d d5 ... [binary]

[CoAP response -- After object security processing]

  2.05 Content
  Payload: Exterminate! Exterminate!
]]></artwork></figure>

<t>Note that the HTTP Code 2.04 (Changed) in the next-to-last message is the mapping of HTTP Status Code 200, whereas the CoAP Code 2.05 (Content) in the last message is the value that was encrypted within the compressed COSE object carried in the Body of the HTTP response.</t>

</section>
</section>
<section anchor="sec-considerations" title="Security Considerations">

<t>In scenarios with intermediary nodes such as proxies or brokers, transport layer security such as (D)TLS only protects data hop-by-hop. As a consequence, the intermediary nodes can read and modify information. The trust model where all intermediate nodes are considered trustworthy is problematic, not only from a privacy perspective, but also from a security perspective, as the intermediaries are free to delete resources on sensors and falsify commands to actuators (such as “unlock door”, “start fire alarm”, “raise bridge”). Even in the rare cases, where all the owners of the intermediary nodes are fully trusted, attacks and data breaches make such an architecture brittle.</t>

<t>(D)TLS protects hop-by-hop the entire message, including header, options, and payload. OSCORE protects end-to-end the payload, and all information in the options and header, that is not required for proxy operations (see <xref target="protected-fields"/>). (D)TLS and OSCORE can be combined, thereby enabling end-to-end security of the message payload, in combination with hop-by-hop protection of the entire message, during transport between end-point and intermediary node. The message layer, however, cannot be protected end-to-end through intermediary devices since, even if the protocol itself isn’t translated, the parameters Type, Message ID, Token, and Token Length may be changed by a proxy.</t>

<t>The use of COSE to protect messages as specified in this document requires an established security context. The method to establish the security context described in <xref target="context-derivation"/> is based on a common shared secret material in client and server, which may be obtained, e.g., by using the ACE framework <xref target="I-D.ietf-ace-oauth-authz"/>. An OSCORE profile of ACE is described in <xref target="I-D.seitz-ace-oscoap-profile"/>.</t>

<t>Most AEAD algorithms require a unique nonce for each message, for which the sender sequence numbers in the COSE message field “Partial IV” is used. If the recipient accepts any sequence number larger than the one previously received, then the problem of sequence number synchronization is avoided. With reliable transport, it may be defined that only messages with sequence number which are equal to previous sequence number + 1 are accepted. The alternatives to sequence numbers have their issues: very constrained devices may not be able to support accurate time, or to generate and store large numbers of random nonces. The requirement to change key at counter wrap is a complication, but it also forces the user of this specification to think about implementing key renewal.</t>

<t>The maximum sender sequence number is dependent on the AEAD algorithm. The maximum sender sequence number SHALL be 2^40 - 1, or any algorithm specific lower limit. The compression mechanism (<xref target="compression"/>) assumes that the Partial IV is 40 bits or less. The mandatory-to-implement AEAD algorithm AES-CCM-16-64-128 is selected for compatibility with CCM*.</t>

<t>The inner block options enable the sender to split large messages into OSCORE-protected blocks such that the receiving node can verify blocks before having received the complete message. The outer block options allow for arbitrary proxy fragmentation operations that cannot be verified by the endpoints, but can by policy be restricted in size since the encrypted options allow for secure fragmentation of very large messages. A maximum message size (above which the sending endpoint fragments the message and the receiving endpoint discards the message, if complying to the policy) may be obtained as part of normal resource discovery.</t>

</section>
<section anchor="privacy-considerations" title="Privacy Considerations">

<t>Privacy threats executed through intermediate nodes are considerably reduced by means of OSCORE. End-to-end integrity protection and encryption of the message payload and all options that are not used for proxy operations, provide mitigation against attacks on sensor and actuator communication, which may have a direct impact on the personal sphere.</t>

<t>The unprotected options (<xref target="fig-option-protection"/>) may reveal privacy sensitive information. In particular Uri-Host SHOULD NOT contain privacy sensitive information.</t>

<t>CoAP headers sent in plaintext allow for example matching of CON and ACK (CoAP Message Identifier), matching of request and responses (Token) and traffic analysis.</t>

<t>Using the mechanisms described in <xref target="context-state"/> may reveal when a device goes through a reboot. This can be mitigated by the device storing the precise state of sender sequence number and replay window on a clean shutdown.</t>

<t>The length of message fields can reveal information about the message. Applications may use a padding scheme to protect against traffic analysis. As an example, the strings “YES” and “NO” even if encrypted can be distinguished from each other as there is no padding supplied by the current set of encryption algorithms. Some information can be determined even from looking at boundary conditions. An example of this would be returning an integer between 0 and 100 where lengths of 1, 2 and 3 will provide information about where in the range things are. Three different methods to deal with this are: 1) ensure that all messages are the same length. For example, using 0 and 1 instead of ‘yes’ and ‘no’. 2) Use a character which is not part of the responses to pad to a fixed length. For example, pad with a space to three characters. 3) Use the PKCS #7 style padding scheme where m bytes are appended each having the value of m. For example, appending a 0 to “YES” and two 1’s to “NO”. This style of padding means that all values need to be padded. Similar arguments apply to other message fields such as resource names.</t>

</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>Note to RFC Editor: Please replace all occurrences of “[[this document]]” with the RFC number of this specification.</t>

<section anchor="coap-option-numbers-registry" title="CoAP Option Numbers Registry">

<t>The Object-Security option is added to the CoAP Option Numbers registry:</t>

<figure><artwork align="center"><![CDATA[
+--------+-----------------+-------------------+
| Number | Name            | Reference         |
+--------+-----------------+-------------------+
|  TBD   | Object-Security | [[this document]] |
+--------+-----------------+-------------------+
]]></artwork></figure>

</section>
<section anchor="header-field-registrations" title="Header Field Registrations">

<t>The HTTP header field Object-Security is added to the Message Headers registry:</t>

<figure><artwork align="center"><![CDATA[
+-------------------+----------+----------+-------------------+
| Header Field Name | Protocol | Status   | Reference         |
+-------------------+----------+----------+-------------------+
| Object-Security   | http     | standard | [[this document]] |
+-------------------+----------+----------+-------------------+
]]></artwork></figure>

</section>
</section>
<section anchor="acknowledgments" title="Acknowledgments">

<t>The following individuals provided input to this document: Christian Amsüss, Tobias Andersson, Carsten Bormann, Joakim Brorsson, Thomas Fossati, Martin Gunnarsson, Klaus Hartke, Jim Schaad, Dave Thaler, Marco Tiloca, and Mališa Vučinić.</t>

<t>Ludwig Seitz and Göran Selander worked on this document as part of the CelticPlus project CyberWI, with funding from Vinnova.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>

&RFC2119;
&RFC4648;
&RFC5988;
&RFC6347;
&RFC7049;
&RFC7252;
&RFC7641;
&RFC7959;
&RFC8075;
&RFC8132;
&RFC8152;
&I-D.amsuess-core-repeat-request-tag;


    </references>

    <references title='Informative References'>

&RFC3986;
&RFC5869;
&RFC7228;
&RFC7515;
&I-D.ietf-ace-oauth-authz;
&I-D.ietf-core-coap-tcp-tls;
&I-D.bormann-6lo-coap-802-15-ie;
&I-D.greevenbosch-appsawg-cbor-cddl;
&I-D.hartke-core-e2e-security-reqs;
&I-D.mattsson-core-coap-actuators;
&I-D.seitz-ace-oscoap-profile;
&I-D.tiloca-core-multicast-oscoap;


    </references>


<section anchor="test-vectors" title="Test Vectors">

<t>TODO: This section needs to be updated.</t>

</section>
<section anchor="examples" title="Examples">

<t>This section gives examples of OSCORE. The message exchanges are made, based on the assumption that there is a security context established between client and server. For simplicity, these examples only indicate the content of the messages without going into detail of the COSE message format.</t>

<section anchor="secure-access-to-sensor" title="Secure Access to Sensor">

<t>This example targets the scenario in Section 3.1 of <xref target="I-D.hartke-core-e2e-security-reqs"/> and illustrates a client requesting the alarm status from a server.</t>

<figure title="Secure Access to Sensor. Square brackets [ ... ] indicate a COSE object. Curly brackets { ... } indicate encrypted data." anchor="fig-alarm"><artwork align="center"><![CDATA[
Client  Proxy  Server
  |       |       |
  +------>|       |            Code: 0.02 (POST)
  | POST  |       |           Token: 0x8c
  |       |       | Object-Security: [kid:5f]
  |       |       |         Payload: [Partial IV:42,
  |       |       |                  {Code:0.01,
  |       |       |                   Uri-Path:"alarm_status"}]
  |       |       |
  |       +------>|            Code: 0.02 (POST)
  |       | POST  |           Token: 0x7b
  |       |       | Object-Security: [kid:5f]
  |       |       |         Payload: [Partial IV:42,
  |       |       |                  {Code:0.01,
  |       |       |                   Uri-Path:"alarm_status"}]
  |       |       |
  |       |<------+            Code: 2.04 (Changed)
  |       |  2.04 |           Token: 0x7b
  |       |       | Object-Security: -
  |       |       |         Payload: [{Code:2.05, "OFF"}]
  |       |       |
  |<------+       |            Code: 2.04 (Changed)
  |  2.04 |       |           Token: 0x8c
  |       |       | Object-Security: -
  |       |       |         Payload: [{Code:2.05, "OFF"}]
  |       |       |
]]></artwork></figure>

<t>The request/response Codes are encrypted by OSCORE and only dummy Codes (POST/Changed) are visible in the header of the OSCORE message. The option Uri-Path (“alarm_status”) and payload (“OFF”) are encrypted.</t>

<t>The COSE header of the request contains an identifier (5f), indicating which security context was used to protect the message and a Partial IV (42).</t>

<t>The server verifies that the Partial IV has not been received before. The client verifies that the response is bound to the request.</t>

</section>
<section anchor="secure-subscribe-to-sensor" title="Secure Subscribe to Sensor">

<t>This example targets the scenario in Section 3.2 of <xref target="I-D.hartke-core-e2e-security-reqs"/> and illustrates a client requesting subscription to a blood sugar measurement resource (GET /glucose), first receiving the value 220 mg/dl and then a second value 180 mg/dl.</t>

<figure title="Secure Subscribe to Sensor. Square brackets [ ... ] indicate a COSE object. Curly brackets { ... } indicate encrypted data." anchor="fig-blood-sugar"><artwork align="center"><![CDATA[
Client  Proxy  Server
  |       |       |
  +------>|       |            Code: 0.05 (FETCH)
  | FETCH |       |           Token: 0x83
  |       |       |         Observe: 0
  |       |       | Object-Security: [kid:ca]
  |       |       |         Payload: [Partial IV:15,
  |       |       |                  {Code:0.01,
  |       |       |                   Uri-Path:"glucose"}]
  |       |       |
  |       +------>|            Code: 0.05 (FETCH)
  |       | FETCH |           Token: 0xbe
  |       |       |         Observe: 0
  |       |       | Object-Security: [kid:ca]
  |       |       |         Payload: [Partial IV:15,
  |       |       |                  {Code:0.01,
  |       |       |                   Uri-Path:"glucose"}]
  |       |       |
  |       |<------+            Code: 2.05 (Content)
  |       |  2.05 |           Token: 0xbe
  |       |       |         Observe: 7
  |       |       | Object-Security: -
  |       |       |         Payload: [Partial IV:32,
  |       |       |                  {Code:2.05,   
  |       |       |                   Content-Format:0, "220"}]
  |       |       |
  |<------+       |            Code: 2.05 (Content)
  |  2.05 |       |           Token: 0x83
  |       |       |         Observe: 7
  |       |       | Object-Security: -
  |       |       |         Payload: [Partial IV:32,
  |       |       |                  {Code:2.05,   
  |       |       |                   Content-Format:0, "220"}]
 ...     ...     ...
  |       |       |
  |       |<------+            Code: 2.05 (Content)
  |       |  2.05 |           Token: 0xbe
  |       |       |         Observe: 8
  |       |       | Object-Security: -
  |       |       |         Payload: [Partial IV:36,
  |       |       |                  {Code:2.05,
  |       |       |                   Content-Format:0, "180"}]
  |       |       |
  |<------+       |            Code: 2.05 (Content)
  |  2.05 |       |           Token: 0x83
  |       |       |         Observe: 8
  |       |       | Object-Security: -
  |       |       |         Payload: [Partial IV:36,
  |       |       |                  {Code:2.05,
  |       |       |                   Content-Format:0, "180"}]
  |       |       |
]]></artwork></figure>

<t>The request/response Codes are encrypted by OSCORE and only dummy Codes (FETCH/Content) are visible in the header of the OSCORE message. The options Content-Format (0) and the payload (“220” and “180”), are encrypted.</t>

<t>The COSE header of the request contains an identifier (ca), indicating the security context used to protect the message and a Partial IV (15). The COSE headers of the responses contains Partial IVs (32 and 36).</t>

<t>The server verifies that the Partial IV has not been received before. The client verifies that the responses are bound to the request and that the Partial IVs are greater than any Partial IV previously received in a response bound to the request.</t>

</section>
</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

