Re: [6lowapp] Security and Commissioning
Cullen Jennings <fluffy@cisco.com> Tue, 03 November 2009 06:01 UTC
Return-Path: <fluffy@cisco.com>
X-Original-To: 6lowapp@core3.amsl.com
Delivered-To: 6lowapp@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix)
with ESMTP id AAAD43A6989 for <6lowapp@core3.amsl.com>;
Mon, 2 Nov 2009 22:01:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.599
X-Spam-Level:
X-Spam-Status: No, score=-106.599 tagged_above=-999 required=5 tests=[AWL=0.000,
BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com
[127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YEvObkFTmidn for
<6lowapp@core3.amsl.com>; Mon, 2 Nov 2009 22:01:52 -0800 (PST)
Received: from sj-iport-6.cisco.com (sj-iport-6.cisco.com [171.71.176.117]) by
core3.amsl.com (Postfix) with ESMTP id A2D203A697A for <6lowapp@ietf.org>;
Mon, 2 Nov 2009 22:01:52 -0800 (PST)
Authentication-Results: sj-iport-6.cisco.com;
dkim=neutral (message not signed) header.i=none
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: ApoEAJ9W70qrRN+K/2dsb2JhbADFHpc6hD0EgWI
X-IronPort-AV: E=Sophos;i="4.44,672,1249257600"; d="scan'208";a="423451699"
Received: from sj-core-4.cisco.com ([171.68.223.138]) by sj-iport-6.cisco.com
with ESMTP; 03 Nov 2009 06:02:13 +0000
Received: from xbh-sjc-231.amer.cisco.com (xbh-sjc-231.cisco.com
[128.107.191.100]) by sj-core-4.cisco.com (8.13.8/8.14.3) with ESMTP id
nA362Dkl020488; Tue, 3 Nov 2009 06:02:13 GMT
Received: from xfe-sjc-212.amer.cisco.com ([171.70.151.187]) by
xbh-sjc-231.amer.cisco.com with Microsoft SMTPSVC(6.0.3790.3959);
Mon, 2 Nov 2009 22:02:13 -0800
Received: from [192.168.4.177] ([10.99.9.18]) by xfe-sjc-212.amer.cisco.com
with Microsoft SMTPSVC(6.0.3790.3959); Mon, 2 Nov 2009 22:02:10 -0800
From: Cullen Jennings <fluffy@cisco.com>
To: d.sturek@att.net
In-Reply-To: <005b01ca5a82$e8039e40$b80adac0$@sturek@att.net>
Impp: xmpp:cullenfluffyjennings@jabber.org
References: <671E1ECE-D232-47B0-B8B0-DF354A7514EB@cisco.com>
<005b01ca5a82$e8039e40$b80adac0$@sturek@att.net>
Message-Id: <E9897D41-1585-4237-848C-BF7266FB6505@cisco.com>
Content-Type: text/plain; charset=US-ASCII; format=flowed; delsp=yes
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Apple Message framework v936)
Date: Mon, 2 Nov 2009 23:02:09 -0700
X-Mailer: Apple Mail (2.936)
X-OriginalArrivalTime: 03 Nov 2009 06:02:11.0769 (UTC)
FILETIME=[2F338A90:01CA5C4B]
Cc: 6lowapp@ietf.org
Subject: Re: [6lowapp] Security and Commissioning
X-BeenThere: 6lowapp@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Application protocols for constrained nodes and networks
<6lowapp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/6lowapp>,
<mailto:6lowapp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/6lowapp>
List-Post: <mailto:6lowapp@ietf.org>
List-Help: <mailto:6lowapp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/6lowapp>,
<mailto:6lowapp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 03 Nov 2009 06:01:53 -0000
On Oct 31, 2009, at 5:35 PM, Don Sturek wrote: > Hi Cullen, > > I think I could easily outline the options for this type of > commissioning. > About half that I know of are patented. > > Is this really something 6LowAPP would address though? Good question - that's really up to the participants that want to do the work. I suspect that something is needed or it will not be possible to have interoperable equipment for many of the uses cases but again, I may be way off base there. As a FYI for folks less familiar with the IETF on the on the topic of patents, the WG can choose between technologies - they might choose one that is somewhat technically inferior to get better patent licensing terms or less patents. The IETF process gets a fairly wide range of choice to the WGs on this. Some area of the IETF heavily avoid patents, others publish RFC that are encumbered with many patents. The one things the IETF does insist on is if people are participating in the discussion of an idea that they know is patents, that they do inform people that there may be IPR on it. This is so that the WG can try and make rational decisions about if they should choose that path or not. My description here is a bit hand wavy but it is all covered in detail in BCP 79 (http://tools.ietf.org/html/bcp79). > > Don > > -----Original Message----- > From: 6lowapp-bounces@ietf.org [mailto:6lowapp-bounces@ietf.org] On > Behalf > Of Cullen Jennings > Sent: Saturday, October 31, 2009 10:34 AM > To: 6lowapp@ietf.org > Subject: [6lowapp] Security and Commissioning > > > Consider one of the use cases several people have discussed. You > install a new light. You install a new light switch. Now, how do you > bind them together in the type of deployments where you want security? > > One way or another we need to meet the requirements of BCP 61. For > many BOFs, how they will BCP 61 is fairly obvious and no one worries > about it. However, for this BOF, it is not obvious. To get to a WG, I > think we need to have enough of a sketch of how we are going to do the > security that we can convince the security folks that we are not > insane and that we will be able to meet the requirements of BCP 61 in > the protocols developed. This duckling imprint approach was a stawman > approach to this but it may be totally useless and not what we want > to in which case we should promptly eject it from the charter. > > The question is, what are we going to do? Ideas? Can someone sketch > out at the back of a cocktail napkin level enough of an idea on the > one or more ways we want to deal wit this? If we agree on that I can > do my best to figure out how to get that into the charter in a way > that convinces the security people that they don't have to show up and > say No. > > > _______________________________________________ > 6lowapp mailing list > 6lowapp@ietf.org > https://www.ietf.org/mailman/listinfo/6lowapp >
- [6lowapp] Security and Commissioning Cullen Jennings
- Re: [6lowapp] Security and Commissioning Don Sturek
- Re: [6lowapp] Security and Commissioning Cullen Jennings