<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lake-edhoc-grease-01" category="info" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title>Applying Generate Random Extensions And Sustain Extensibility (GREASE) to EDHOC Extensibility</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lake-edhoc-grease-01"/>
    <author initials="C." surname="Amsüss" fullname="Christian Amsüss">
      <organization/>
      <address>
        <postal>
          <country>Austria</country>
        </postal>
        <email>christian@amsuess.com</email>
      </address>
    </author>
    <date year="2026" month="March" day="02"/>
    <workgroup>LAKE</workgroup>
    <abstract>
      <?line 20?>

<t>This document applies the extensibility mechanism GREASE (Generate Random Extensions And Sustain Extensibility),
which was pioneered for TLS,
to the EDHOC ecosystem.
It reserves a set of non-critical EAD labels and unusable cipher suites
that may be included in messages
to ensure peers correctly handle unknown values.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Lightweight Authenticated Key Exchange Working Group mailing list (lake@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/lake/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/lake-wg/grease"/>.</t>
    </note>
  </front>
  <middle>
    <?line 29?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document applies the extensibility mechanism GREASE (Generate Random Extensions And Sustain Extensibility),
which was pioneered for TLS in <xref target="RFC8701"/>,
to the EDHOC <xref target="RFC9528"/> ecosystem.</t>
      <t>The introduction of <xref target="RFC8701"/> and <xref section="3.3" sectionFormat="of" target="RFC9170"/> provide comprehensive motivation for adding such extensions;
<xref target="I-D.edm-protocol-greasing-02"/> provides additional background that influenced this document.</t>
      <t>The extension points of the EDHOC protocol (<xref target="RFC9528"/>) are
cipher suites,
methods,
EADs (External Authorization Data items)
and COSE headers.
This document utilizes the cipher suite and EAD extension points.</t>
      <t>Unlike in TLS GREASE <xref target="RFC8701"/>,
EDHOC is operating on tight bandwidth and message size budget,
with some messages just barely fitting within relevant networks' fragmentation limits.
Thus,
more than with TLS GREASE,
it is up to implementations to decide
whether in their particular use case
they can afford to send addtional data.</t>
      <section anchor="variability-in-other-extension-points">
        <name>Variability in other extension points</name>
        <t>If the selected method is unsupported by the peer,
EDHOC does not conclude successfully.
While values could be reserved for these for use as GREASE,
these failed attempts would not be verified between the EDHOC participants
without maintaining state between attempted EDHOC sessions.
Such an addition is considered impractical for constrained devices,
and thus out of scope for this document.</t>
        <t>Recommendations for GREASE <xref section="4" sectionFormat="of" target="I-D.edm-protocol-greasing-02"/>
also include varying other aspects of the protocol,
such as varying sequences of elements.
EDHOC has little known variability,
and intentionally limits choice at times
(for example, <xref section="3.3.2" sectionFormat="of" target="RFC9528"/> allows only the numeric identifier form where that is possible).
Where variation is allowed,
e.g. in padding or in the ordering of EAD options,
applications are encouraged to exercise it.</t>
        <t>The extension point of COSE headers
(identifying other ID_CRED_x types)
is beyond the scope of this document,
and might be addressed orthogonally in the COSE header registry.</t>
      </section>
    </section>
    <section anchor="the-grease-ead-labels">
      <name>The GREASE EAD labels</name>
      <t>This document registers the following EAD labels as GREASE EADs:</t>
      <t>160, 41120, 43690, 44975</t>
      <t>These EADs are available in all EDHOC messages.
The EADs are used in their positive (non-critical) form.</t>
      <t>It is expected that future documents register additional values with the same semantics.</t>
      <section anchor="use-of-grease-eads-by-message-senders">
        <name>Use of GREASE EADs by message senders</name>
        <t>A sender of an EDHOC message MAY send a GREASE EAD using the non-critical (positive) form at any time,
with any or no EAD value (that is, with or without a byte string of any usable length),
in any message.</t>
        <t>Senders SHOULD consider the properties of the network their messages are sent over,
and refrain from adding GREASE when its use would be detrimental to the network
(for example, they might use it less frequently when the added size causes fragmentation of the message).</t>
        <t>On networks where the data added by the grease EADs does not significantly impact the network,
senders SHOULD irregularly send arbitrary (possibly random) GREASE EADs with their messages
to ensure that errors resulting from the use of GREASE are detected.</t>
        <t>The GREASE EADs MAY be used as an alternative form of padding.</t>
        <section anchor="suggested-pattern">
          <name>Pattern for limited fingerprinting</name>
          <t>A method of applying GREASE is suggested as follows:</t>
          <ul spacing="normal">
            <li>
              <t>For every message, use GREASE with a random probability of 1 in 64.</t>
            </li>
            <li>
              <t>Pick a random GREASE label out of the uniform distribution of available options.</t>
            </li>
            <li>
              <t>Pick a random length from the uniformly distributed interval 9 to 40 (inclusive).</t>
            </li>
            <li>
              <t>Add the selected GREASE label with a value of the selected length,
filled with random bytes.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="use-of-grease-eads-by-message-recipients">
        <name>Use of GREASE EADs by message recipients</name>
        <t>A party receiving a GREASE EAD MUST NOT alter its behavior
in any way that would allow random GREASE EADs
to alter the security context that gets established.</t>
        <t>It MAY alter its behavior in other ways;
in particular, it SHOULD randomly insert GREASE EADs
in later messages of an exchange in which unprocessed EADs (including GREASE EADs) were present.</t>
        <t>Implementations SHOULD NOT attempt to recognize GREASE EADs,
and apply the default processing rules.</t>
      </section>
    </section>
    <section anchor="grease-cipher-suites">
      <name>GREASE cipher suites</name>
      <t>This document registers the following cipher suites:</t>
      <t>160, 41120, -41121, 43690</t>
      <t>It is expected that future documents register additional values with the same semantics.</t>
      <t>An initiator may insert a GREASE cipher suite
at any position in its sequence of preferred cipher suites.</t>
      <t>A responder MUST NOT support any of these cipher suites,
and MUST treat them like any other cipher suite it does not support.</t>
      <t>Thus, these cipher suites never occur as the selected cipher suite.
An initiator whose choice of a GREASE cipher suite is accepted
needs to discontinue the protocol.</t>
    </section>
    <section anchor="processing-of-grease-related-failures">
      <name>Processing of GREASE related failures</name>
      <t>It is RECOMMENDED that any counters or statistics about successful and failed connections
distinguish between connections in which GREASE was applied and those in which it was not applied.
Any operator feedback channel, be it immediately to the user or through network monitoring,
SHOULD warn the operator if there are errors that were determined to originate from the use of GREASE
or that are significantly likely to originate from there.
This provides a feedback path as described in <xref section="4.4" sectionFormat="of" target="RFC9170"/>.</t>
      <t>Whether logging of GREASE related failed connection details is appropriate
depends on the privacy policies of the application.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy considerations</name>
      <t>The way in which GREASE is applied
can contribute to identifying which implementation of EDHOC
is being used.
Implementers of EDHOC are encouraged to use the algorithm described in <xref target="suggested-pattern"/>,
both to reduce the likelihood of their implementation to be identified through the use of GREASE
and to increase the anonymity set of other users of the same algorithm.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The use of the GREASE option has no impact on security
in a correct EDHOC implementation.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA considerations</name>
      <section anchor="edhoc-eads">
        <name>EDHOC EADs</name>
        <t>IANA is requested to register
four new entries into the EDHOC External Authorization Data Registry
established in <xref target="RFC9528"/>:</t>
        <t>160, 41120, 43690, 44975</t>
        <t>All share the name "GREASE",
the description "Arbitrary data to ensure extensibility",
and this document as a reference.</t>
      </section>
      <section anchor="edhoc-cipher-suites">
        <name>EDHOC cipher suites</name>
        <t>IANA is requested to register
four new values into the EDHOC Cipher Suites Registry
established in <xref target="RFC9528"/>:</t>
        <t>160, 41120, -41121, 43690</t>
        <t>All share the name "GREASE",
the array N/A,
the description "Unimplementable cipher suite to ensure extensibility",
and this document as a reference.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC9528">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a very compact and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys. EDHOC provides mutual authentication, forward secrecy, and identity protection. EDHOC is intended for usage in constrained scenarios, and a main use case is to establish an Object Security for Constrained RESTful Environments (OSCORE) security context. By reusing CBOR Object Signing and Encryption (COSE) for cryptography, Concise Binary Object Representation (CBOR) for encoding, and Constrained Application Protocol (CoAP) for transport, the additional code size can be kept very low.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9528"/>
          <seriesInfo name="DOI" value="10.17487/RFC9528"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC8701">
          <front>
            <title>Applying Generate Random Extensions And Sustain Extensibility (GREASE) to TLS Extensibility</title>
            <author fullname="D. Benjamin" initials="D." surname="Benjamin"/>
            <date month="January" year="2020"/>
            <abstract>
              <t>This document describes GREASE (Generate Random Extensions And Sustain Extensibility), a mechanism to prevent extensibility failures in the TLS ecosystem. It reserves a set of TLS protocol values that may be advertised to ensure peers correctly handle unknown values.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8701"/>
          <seriesInfo name="DOI" value="10.17487/RFC8701"/>
        </reference>
        <reference anchor="RFC9170">
          <front>
            <title>Long-Term Viability of Protocol Extension Mechanisms</title>
            <author fullname="M. Thomson" initials="M." surname="Thomson"/>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>The ability to change protocols depends on exercising the extension and version-negotiation mechanisms that support change. This document explores how regular use of new protocol features can ensure that it remains possible to deploy changes to a protocol. Examples are given where lack of use caused changes to be more difficult or costly.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9170"/>
          <seriesInfo name="DOI" value="10.17487/RFC9170"/>
        </reference>
        <reference anchor="I-D.edm-protocol-greasing-02">
          <front>
            <title>Maintaining Protocols Using Grease and Variability</title>
            <author fullname="Lucas Pardue" initials="L." surname="Pardue">
              <organization>Cloudflare</organization>
            </author>
            <date day="10" month="July" year="2023"/>
            <abstract>
              <t>   Long-term interoperability of protocols is an important goal of the
   network standards process.  Part of realizing long-term protocol
   deployment success is the ability to support change.  Change can
   require adjustments such as extension to the protocol, modifying
   usage patterns within the current protocol constraints, or a
   replacement protocol.  This document present considerations for
   protocol designers and implementers about applying techniques such as
   greasing or protocol variability as a means to exercise maintenance
   concepts.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-edm-protocol-greasing-02"/>
        </reference>
      </references>
    </references>
    <?line 202?>

<section anchor="using-extension-points-beyond-successful-edhoc-runs">
      <name>Using extension points beyond successful EDHOC runs</name>
      <t>Some ways of using the extension points, in particular
the critical (negative) use of the GREASE EAD labels
and
placing a GREASE cipher suite in the selected position
do not result in the successful continuation of the EDHOC session.</t>
      <t>They can be useful during testing
(e.g. to verify that a peer does indeed implement the correct behavior of not silently tolerating critical EAD items it can not process),
particulary when they allow a testing system to provoke an error response from the implementation under test.
However,
this document is concerned with test performed during successful operation,
therefore that application is out of scope.</t>
    </section>
    <section anchor="change-log">
      <name>Change log</name>
      <t>Since draft-ietf-lake-edhoc-grease-00: Resolve all open issues.</t>
      <ul spacing="normal">
        <li>
          <t>Question on "is this better than padding" removed. (There are currently implementations of EDHOC that can't use all EAD values but can do padding).</t>
        </li>
        <li>
          <t>Question of COSE header extension deferred to COSE maintenance.</t>
        </li>
        <li>
          <t>Use of GREASE values in critical form is out of scope, but appendix illustrates that it can make sense to do, and emphasizes that indeed those options do cause errors when used with negative sign.</t>
        </li>
      </ul>
      <t>Since draft-amsuess-lake-edhoc-grease-01:</t>
      <ul spacing="normal">
        <li>
          <t>Document was adopted in LAKE.</t>
        </li>
        <li>
          <t>Instead of discouraging GREASE around fragmentation limits wholesale, suggest reduced frequency.</t>
        </li>
        <li>
          <t>Editorial fix to fingerprinting section.</t>
        </li>
      </ul>
      <t>Since draft-amsuess-lake-edhoc-grease-00:</t>
      <ul spacing="normal">
        <li>
          <t>Expanded introduction section to just point to the abstract any more.</t>
        </li>
      </ul>
      <t>Since draft-amsuess-core-edhoc-grease-01:</t>
      <ul spacing="normal">
        <li>
          <t>Update references to RFC9528 🎉</t>
        </li>
        <li>
          <t>Change target WG to LAKE, renaming to draft-amsuess-lake-edhoc-grease</t>
        </li>
        <li>
          <t>Process RFC9170
          </t>
          <ul spacing="normal">
            <li>
              <t>Add a section on failure processing</t>
            </li>
            <li>
              <t>Reference where appropriate</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Process draft-edm-protocol-greasing-02
          </t>
          <ul spacing="normal">
            <li>
              <t>Variability outside of extension points</t>
            </li>
            <li>
              <t>Be firmer against recognizing GREASE values</t>
            </li>
            <li>
              <t>Point out that future options may be registered (instead of the suggested algorithmic registrations)</t>
            </li>
          </ul>
        </li>
      </ul>
      <t>Since -00:</t>
      <ul spacing="normal">
        <li>
          <t>Fixed a mix-up between positivity and criticality of options.</t>
        </li>
        <li>
          <t>Adjusted numbers accordingly to once more fit in the <tt>0xa.</tt> pattern
(actually they're using <tt>0x.a</tt>, but that doesn't work the same way with CBOR).</t>
        </li>
        <li>
          <t>Text improvements around recipient side processing.</t>
        </li>
      </ul>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Marco Tiloca pointed out a critical error in the numeric constructions.
Göran Selander provided input to reduce mistakable text.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
