Internet-Draft | CAT-4-MOQT | March 2025 |
Law & Nandakumar | Expires 14 September 2025 | [Page] |
A token-based authentication scheme for use with Media Over QUIC Transport.¶
This note is to be removed before publishing as an RFC.¶
The latest revision of this draft can be found at https://wilaw.github.io/CAT-4-MOQT/draft-law-moq-cat4moqt.html. Status information for this document may be found at https://datatracker.ietf.org/doc/draft-law-moq-cat4moqt/.¶
Discussion of this document takes place on the Media Over QUIC mailing list (mailto:moq@ietf.org), which is archived at https://mailarchive.ietf.org/arch/browse/moq/. Subscribe at https://www.ietf.org/mailman/listinfo/moq/.¶
Source for this draft and an issue tracker can be found at https://github.com/wilaw/CAT-4-MOQT.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 14 September 2025.¶
Copyright (c) 2025 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
This draft introduces a token-based authentication scheme for use with MOQT [MoQTransport]. The scheme protects access to the relay during session establishment and also contrains the actions which the client may take once connected.¶
This draft defines version 1 of this specification.¶
An end-user logs-in to a distribution service. The service authenticates the user (via username/password, OAuth, 2FA or another method). The methods involved in this authentication step lie outside the scope of this draft.¶
Based upon the identity and permissions granted to that end-user, the service generates a token. A token is a data structure that has been serialized into a byte array. The token encodes information such as the user's ID, constraints on how and when they can access the MOQT distribution network and contraints on the actions they can take once connected. The token may be signed to make it tamper-resistent.¶
The token is given in the clear to the end-user, along with a URL to connect to the edge relay of a MOQT distribution network.¶
The end-user client application provides the token to the MOQT distribution relay when it connects. This connection may be established over WebTransport or raw QUIC.¶
The relay decrypts the token upon receipt and validates the signature, using secrets previously shared between the content distributor and the distribution network. Based upon claims conveyed in the token, relay will accept or reject the conneciton.¶
If the relay accepts the connection, then the client will take a series of MOQT actions: ANNOUNCE, SUBSCRIBE_ANNOUNCES, SUBSCRIBE or FETCH. For each of these, it will supply the token it received using the AUTHENTICATION parameter.¶
As an alternative to this workflow, the distribution service may vend multiple tokens to the client. The client may use one of those tokens to establish the initial conneciton and others to authenticate its actions.¶
This draft uses a single token format, namely the Common Access Token (CAT) [CAT]. The token is supplied as a byte array. When it must be cast to a string for inclusion in a URL, it is Base64 encoded [BASE64].¶
To provide control over the MOQT actions, this draft defines a new CBOR Web Token (CWT) Claim called "moqt". Use of the moqt claim is optional for clients. Support for processing the moqt claim is mandatory for relays.¶
The default for all actions is "Blocked" and this does not need to be communicated in the token. As soon as a token is provided, all actions are explicitly blocked unless explicitly enabled.¶
The "moqt" claim is defined by the following CDDL:¶
$$Claims-Set-Claims //= (moqt-label => moqt-value) moqt-label = XXX TODO - how do we register this? moqt-value = [ + moqt-object ]¶
TODO - need CDDL valid definition. The moqt token needs to encode multiple instances of 4 actions, currently¶
For each action, we need to communicate the permission¶
0 - Allowed for all Namespaces and Names¶
1 - Allowed with an exact match¶
2 - Allowed with a prefix match¶
For permissions options 1 & 2, we also need to specify the prefix as a byte string.¶
Prefix - byte string¶
Specifying a permission type of 2 or 3 and then not supplying a byte string, or supplying a 0 length byte string is equivalent to Blocking that action.¶
As an alternative to carrying two attributes values for each action, we could code these into a single number to save wire size.¶
Code Point | Definition |
---|---|
0x01 | ANNOUNCE - Allowed for all Namespaces/Names |
0x02 | ANNOUNCE - Allowed with an exact match |
0x03 | ANNOUNCE - Allowed with a prefix match |
0x04 | SUBSCRIBE_ANNOUNCES - Allowed for all Namespaces/Names |
0x05 | SUBSCRIBE_ANNOUNCES - Allowed with an exact match |
0x06 | SUBSCRIBE_ANNOUNCES - Allowed with a prefix match |
0x07 | PUBLISH - Allowed for all Namespaces/Names |
0x08 | PUBLISH - Allowed with an exact match |
0x09 | PUBLISH - Allowed with a prefix match |
0x0A | FETCH - Allowed for all Namespaces/Names |
0x0B | FETCH - Allowed with an exact match |
0x0C | FETCH - Allowed with a prefix match |
Example: Allow with an exact match "example.com/bob"¶
Permits * example.com/bob Prohibits * example.com * example.com/bob/123 * example.com/alice * example.com/bob/logs * alternate/example.com/bob * 12345¶
Example: Allow with a prefix match "example.com/bob"¶
Permits * example.com/bob * example.com/bob/123 * example.com/bob/logs Prohibits * example.com * example.com/alice * alternate/example.com/bob * 12345¶
Multiple actions may be communicated within the same token, with different permissions. The order in which Action/Permission tuples are declared and evaluated is unimportant. The evaluation stops after the first Permitted result is discovered.¶
(1) PUBLISH (Allow with a prefix match) example.com/bob¶
(2) PUBLISH (Allow with an exact match) example.com/logs/12345/bob¶
Evaluating "example.com/bob/123" would succeed on test 1 and test 2 would never be evaluated. Evaluating "example.com/logs/12345/bob" would fail on test 1 but then succeed on test 2. Evaluating "example.com" would fail on test 1 and on test 2.¶
The connection to a MOQT distribution realy can take place over a WebTransport or native QUIC connection. In both cases, the token is transferred as a query parameter or else embedded in the URI PATH.¶
The query parameter name SHOULD be "CAT" (case-sensitive) and the query parameter value SHOULD be the Base64 encoded [BASE64] token. If more than one token is transferred, then the sequential query parameter names "CAT1", "CAT2" .. "CATN" SHOULD be used.¶
The token SHOULD span only a single PATH component and the component SHOULD be prefixed with the string "CAT-". If more than one token is transferred, then they SHOULD occupy different components and SHOULD carry sequential prefixes of "CAT1", "CAT2" .. "CATN".¶
With a WebTransport connection, the token can be transferred as a query parameter or as part of the PATH.¶
Example of a single token in a query arg:¶
https://example.com/service?CAT=oRkBDqMAoQBlaHR0cHMDoQFoL2NvbnRlbnQIoQBlLm0zdTg=¶
Example of multiple tokens in query args:¶
https://example.com/service?CAT1=oRkBDqMAoQBlaHR0cHMDoQFoL2NvbnRlbnQIoQBlLm0zdTg= &CAT2=IHNramRoZmtjc2pkaGYgc2pkaCBhaCBzIGFzS0pEIDthbGtqIA==¶
Example of a single token in the PATH¶
https://example.com/service/CAT-oRkBDqMAoQBlaHR0cHMDoQFoL2NvbnRlbnQIoQBlLm0zdTg=/¶
Example of multiple tokens in the PATH:¶
https://example.com/service/CAT1-oRkBDqMAoQBlaHR0cHMDoQFoL2NvbnRlbnQIoQBlLm0zdTg=/CAT2-IHN ramRoZmtjc2pkaGYgc2pkaCBhaCBzIGFzS0pEIDthbGtqIA==/¶
With a native QUIC connection, the query components and PATH are transmitted via the "PATH" parameter in the CLIENT_SETUP message.¶
Example of a single token in a query arg:¶
moqt://203.0.113.0:4443 PATH parameter in the CLIENT_SETUP message = "service?CAT=oRkBDqMAoQBlaHR0cHMDoQFoL2NvbnRlbnQIoQBlLm0zdTg="¶
Example of multiple tokens in query args:¶
moqt://203.0.113.0:4443 PATH parameter in the CLIENT_SETUP message = "service?CAT1=oRkBDqMAoQBlaHR0cHMDoQFoL2NvbnRlbnQIoQBlLm0zdTg= &CAT2=IHNramRoZmtjc2pkaGYgc2pkaCBhaCBzIGFzS0pEIDthbGtqIA=="¶
Example of a single token in the PATH¶
moqt://203.0.113.0:4443 PATH parameter in the CLIENT_SETUP message = "service/CAT-oRkBDqMAoQBlaHR0cHMDoQFoL2NvbnRlbnQIoQBlLm0zdTg=/"¶
Example of multiple tokens in the PATH:¶
moqt://203.0.113.0:4443 PATH parameter in the CLIENT_SETUP message = "service/CAT1-oRkBDqMAoQBlaHR0cHMDoQFoL2NvbnRlbnQIoQBlLm0zdTg=/CAT2-IHN ramRoZmtjc2pkaGYgc2pkaCBhaCBzIGFzS0pEIDthbGtqIA==/"¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.¶
TODO Security¶
TODO We need to register the "moqt" claim in the IANA "CBOR Web Token (CWT) Claim" table.¶
The IETF moq workgroup¶