Re: [6lo] Comments needed for Security Bootstrapping of IEEE 802.15.4 based Internet of Things

"Hedanping (Ana)" <ana.hedanping@huawei.com> Wed, 25 February 2015 14:49 UTC

Return-Path: <ana.hedanping@huawei.com>
X-Original-To: 6lo@ietfa.amsl.com
Delivered-To: 6lo@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 876EF1A802E; Wed, 25 Feb 2015 06:49:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.211
X-Spam-Level:
X-Spam-Status: No, score=-4.211 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fEFCFmJGKNZr; Wed, 25 Feb 2015 06:49:18 -0800 (PST)
Received: from lhrrgout.huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4DB3E1A802A; Wed, 25 Feb 2015 06:49:17 -0800 (PST)
Received: from 172.18.7.190 (EHLO lhreml404-hub.china.huawei.com) ([172.18.7.190]) by lhrrg02-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id BPP84944; Wed, 25 Feb 2015 14:49:15 +0000 (GMT)
Received: from SZXEML426-HUB.china.huawei.com (10.82.67.181) by lhreml404-hub.china.huawei.com (10.201.5.218) with Microsoft SMTP Server (TLS) id 14.3.158.1; Wed, 25 Feb 2015 14:49:14 +0000
Received: from szxeml557-mbs.china.huawei.com ([169.254.6.208]) by szxeml426-hub.china.huawei.com ([10.82.67.181]) with mapi id 14.03.0158.001; Wed, 25 Feb 2015 22:48:56 +0800
From: "Hedanping (Ana)" <ana.hedanping@huawei.com>
To: "robert.cragie@gridmerge.com" <robert.cragie@gridmerge.com>, Michael Richardson <mcr+ietf@sandelman.ca>, Behcet Sarikaya <behcet.sarikaya@huawei.com>
Thread-Topic: [6lo] Comments needed for Security Bootstrapping of IEEE 802.15.4 based Internet of Things
Thread-Index: AdBRAvGc69BnJhn/Q3CGDKBvEioXpgAAaKNQ
Date: Wed, 25 Feb 2015 14:48:56 +0000
Message-ID: <77FA386512F0D748BC7C02C36EB1106D92F887@szxeml557-mbs.china.huawei.com>
References: <77FA386512F0D748BC7C02C36EB1106D92F855@szxeml557-mbs.china.huawei.com>
In-Reply-To: <77FA386512F0D748BC7C02C36EB1106D92F855@szxeml557-mbs.china.huawei.com>
Accept-Language: en-US
Content-Language: zh-CN
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.45.27.114]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <http://mailarchive.ietf.org/arch/msg/6lo/tTzSxdoFZjFAeQUOenOt9yEVCqo>
Cc: "anima@ietf.org" <anima@ietf.org>, "6tisch-security@ietf.org" <6tisch-security@ietf.org>, "6lo@ietf.org" <6lo@ietf.org>
Subject: Re: [6lo] Comments needed for Security Bootstrapping of IEEE 802.15.4 based Internet of Things
X-BeenThere: 6lo@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Mailing list for the 6lo WG for Internet Area issues in IPv6 over constrained node networks." <6lo.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/6lo>, <mailto:6lo-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/6lo/>
List-Post: <mailto:6lo@ietf.org>
List-Help: <mailto:6lo-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/6lo>, <mailto:6lo-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 25 Feb 2015 14:49:25 -0000

Hi Robert,
Thank you very much for the comments, please see my reply inline.

  > -----Original Message-----
  > From: Robert Cragie [mailto:robert.cragie@gridmerge.com]
  > Sent: Friday, February 20, 2015 7:59 PM
  > To: Hedanping (Ana); Michael Richardson
  > Cc: 6tisch-security@ietf.org; anima@ietf.org; 6lo@ietf.org
  > Subject: Re: [6lo] Comments needed for Security Bootstrapping of IEEE
  > 802.15.4 based Internet of Things
  > 
  > Hi Danping,
  > 
  > I have some general comments on the draft and some additional comments
  > inline, bracketed by <RCC></RCC>
  > 
  > General comments:
  > 
  > I think the general model is good but could be simplified to two cases:
  > 
  > 1) Where the authenticator is in direct communication
  > 2) Where the authenticator is not in direct communication (relay case)
  > 
  > My reasoning is because:
  > 
  > a) There isn't much distinction between RFD and FFD from an authentication
  > perspective
  > b) There isn't much distinction between joining an existing network and initial
  > joining
  > 
  > If you think there are distinctions, then they need clarifying.
  > 

<A>
IMHO, there are distinctions between the network level bootstrapping and joining device level bootstrapping. Network level bootstrapping includes at least two cases: network start-up case and re-commissioning case. The bootstrapping network level bootstrapping request should be different from that of joining device level request in order to converge efficiently. I agree that they need to be clarified.

>From authentication messaging point of view, there is no much distinction between RFD and FFD. This feature allows scalability and we don't need to reinvent the wheel and develop different authentication message for different types of devices.
</A>

  > Other points:
  > * "Because IEEE 802.15.4 maximum payload size is 128 Bytes, a standard
  > security bootstrapping protocol should be light-weight with low complexity.":
  > I think it would be better to say "should ideally be light-weight with low
  > complexity". There may be requirements where high security strength is
  > required and therefore this will necessarily involve more communication
  > overhead and processing.
  > * I think the hierarchical joining description is generally useful.
  > * It is conceivable for an RFD to communicate directly with a 6LBR so I don't
  > think that should be excluded from Figure 1 *
  > "[I-D.pritikin-anima-bootstrapping-keyinfra] proposes a zero-touch
  > bootstrapping key infrastructure to allow joining device securely and
  > automatically bootstraps itself based on 802.1AR certificate.  It can't be
  > directly used in 802.15.4 devices due to the high security complexity and
  > heavy communication overhead.": I disagree with this statement. We used
  > this approach in ZigBee IP. I agree some may think the communication
  > overhead "heavy" but that doesn't mean it can't be done. The associated
  > security complexity is also becoming less onerous as crypto accelerators
  > become built into hardware and cores.

<A>
 ' can't be directly used' means that fragmentation is needed and certificate management is needed once 802.1AR is applied.
Thank you for providing this application information, the expression will be modified in the next version.
</A>

  > * The document mentions a couple of protocols (EAP and PANA) but doesn't
  > go into enough detail on how those are deployed. 

<A>This is the initial version, we expect to reach consensus on the mechanism and architecture at first.</A>

  >Also, there are other
  > choices. The document could give generic names to the particular
  > communications and then add a section to give examples.

<A>Good point. We are preparing to do so. The certificate approach you implemented is useful, are you willing to contribute to the new section?</A>

  > Robert
  > On 02/02/2015 08:13, Hedanping (Ana) wrote:
  > Hi Michael,
  > Thank you for the interest and the questions are illuminating. Please see my
  > reply inline.
  > 
  > 	> I have added a number of CCs, I think that this fits into ANIMA best.
  > 	>
  > 
  > 	> Hedanping (Ana) <ana.hedanping@huawei.com> wrote:
  > 	>     > A new draft is submitted, it's about the security bootstrapping
  > 	>     > architecture and methods for IoT networks that implement
  > IETF
  > 	> protocols
  > 	>     > (e.g. 6LoWPAN, 6lo, RPL, AODV, DSR) over IEEE 802.15.4.
  > 	>     > Two types of bootstrapping methods are developed: network
  > level
  > 	>     > bootstrapping and joining device level bootstrapping
  > 	>
  > 	>     > The link is:
  > 	>     >
  > http://tools.ietf.org/html/draft-he-iot-security-bootstrapping-00
  > 	>
  > 	> I read the document with great interest.
  > 	> I found that you explained the incremental boot-strapping process
  > quite well,
  > 	> and nobody has clearly articulated the process yet.  People have just
  > assumed
  > 	> that everyone knows this process, but really it needs to get written
  > down, so I
  > 	> thank you for doing that.
  > 
  > Thank you for the praise. As it is the initial version, more discussions and
  > comments are needed to make it better.
  > <RCC>I agree that it has not generally been articulated well. To some extent,
  > it is because up to now, there has been no "the one way to do it". Therefore,
  > something ZigBee IP is a profile which defines one particular way of doing it.
  > There are other ways as well, of course. I guess the question is whether it
  > can be generalised sufficiently to be generally applicable and whether that is
  > in fact worth doing</RCC>
  > 
  > 

<A>This draft targets at 802.15.4 networks, and one standard approach is possible. It is worth of generalizing an automatic mechanism for bootstrapping IoT network. As the size of the network can be large, network start-up or re-commission will be the burden of the network administrator.</A>
  
  > 	>
  > 	>    If EAP is used, PANA can be used to relay the authentication
  > message
  > 	>    from configured FFDs to 6LBR.  If the validation is successful, the
  > 	>    IP address and network key are generated and delivered to the
  > FFD.
  > 	>
  > 	> But, EAP-TLS with PANA is exactly what the Zigbee IP specification has
  > specified.
  > 	> Do you envision any changes from that specification?
  > 
  > Zigbee IP specification was developed to enable IP address for Zigbee
  > application, thus the protocol stack are built on IETF's standards, including
  > EAP-TLS.
  > As discussed in many working groups, TLS might result in a significant
  > amount of retransmissions due to unreliable communication capability of the
  > network and device, thus energy will be consumed fast.
  > I think EAP over DTLS /profiled DTLS could be a good option.
  > <RCC>EAP-TLS only uses TLS handshakes carried as EAP payloads, therefore
  > has little to do with TLS as it is normally used, i.e. over TCP. If you then start
  > to look at the difference between EAP-TLS (over UDP) and DTLS handshakes
  > over UDP, there is actually not much difference. In some areas, EAP is
  > actually preferable (fragmentation and header overhead)</RCC>
  > 
  > 

<A>I agree that the handshake process is similar, however DTLS and UDP is supported by CoAP and match the feature of constrained device. Reusing the protocols can reduce the HW and SW cost. Besides, EAP-TLS only supports certificate as authentication material, while allowing other materials would be desired for IoT network.</A>

  > 
  > 	> A minority of people had prefered this mechanism for 6tisch-security,
  > but
  > 	> none stepped forward to write up that mechanism.   Perhaps this
  > draft could
  > 	> fulfill that need?
  > 
  > Yes, we should describe more clearly on this mechanism, and maybe this
  > draft is a right place. It would be great if folks in the mailing list make
  > comments and contribution on this technical point.
  > <RCC>I am happy to write up that mechanism</RCC>
  > 

<A>That's great, we'll discuss more and move this work forward.</A>

  > 
  > 	> From the ANIMA and 6tisch-security point of view, my view is that this
  > is all
  > 	> about the choice of certificates for the TLS setup.  Do you have any
  > view on
  > 	> how that might work?
  > 
  > For unconstrained environment, I agree with you. But when it comes to
  > constrained device and constrained network communication, TLS might not
  > be a good choice as mentioned before. Certificate is not a good choice either
  > due to the high cost.
  > I would like to say: it is about the choice of credential type for secure channel
  > setup. The good candidates of credential types are Raw public key, Physical
  > Unclonable Function (PUF).
  > <RCC>There certainly are overheads in certificates but in the 802.1AR
  > scenario (draft-pritikin-anima-bootstrapping-keyinfra-01) it has clear
  > value.</RCC>
  > 
  > 
<A>Agree</A>
  > 
  > 	>
  > 	> The 6tisch-security bootstrap process aims to create a
  > 	> YANG/CBOR-over-CoAP-over-DTLS session between a Join Coordinator
  > and the
  > 	> Joining Node: over that management link, security (and timeslot
  > scheduling)
  > 	> would be provisioned.
  > 
  > CoAP-DTLS coincides with my idea.
  > Yang sounds like at a higher level, but I think EAP is actually the mechanism
  > running behind ^_^

  > <RCC>Again, in this document, it might be better to
  > abstract this session and describe what it is used for</RCC>
  > 
  
<A>I am not sure whether I understand the meaning of 'session'.</A>

  > 
  > 
  > Regards,
  > Ana
  > 
  > _______________________________________________
  > 6lo mailing list
  > 6lo@ietf.org
  > https://www.ietf.org/mailman/listinfo/6lo
  >