Re: [6tisch-security] EALS and how to go from 6tisch-minimal-security to zero-touch enrollment

Mališa Vučinić <malisa.vucinic@inria.fr> Tue, 21 March 2017 13:41 UTC

Return-Path: <malisa.vucinic@inria.fr>
X-Original-To: 6tisch-security@ietfa.amsl.com
Delivered-To: 6tisch-security@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 03C0B1298BF for <6tisch-security@ietfa.amsl.com>; Tue, 21 Mar 2017 06:41:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.899
X-Spam-Level:
X-Spam-Status: No, score=-6.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UAWhdKYVreIg for <6tisch-security@ietfa.amsl.com>; Tue, 21 Mar 2017 06:41:14 -0700 (PDT)
Received: from mail3-relais-sop.national.inria.fr (mail3-relais-sop.national.inria.fr [192.134.164.104]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B753E129873 for <6tisch-security@ietf.org>; Tue, 21 Mar 2017 06:41:13 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="5.36,198,1486422000"; d="scan'208,217";a="217519456"
Received: from unknown (HELO [128.93.85.17]) ([128.93.85.17]) by mail3-relais-sop.national.inria.fr with ESMTP/TLS/DHE-RSA-AES256-SHA; 21 Mar 2017 14:41:11 +0100
Content-Type: multipart/alternative; boundary="Apple-Mail=_D5E1A9FB-58F2-442A-A9FA-D81A994CCA2D"
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Mališa Vučinić <malisa.vucinic@inria.fr>
In-Reply-To: <18795.1490045214@obiwan.sandelman.ca>
Date: Tue, 21 Mar 2017 14:41:11 +0100
Cc: 6tisch Security <6tisch-security@ietf.org>
Message-Id: <83C74693-26B4-47B6-B6F5-2186B3863A70@inria.fr>
References: <D4E34D31.783F2%goran.selander@ericsson.com> <7579.1488907684@obiwan.sandelman.ca> <14442.1489106136@obiwan.sandelman.ca> <07EC7DD8-F0B2-4CFB-A402-1CBB50729CE1@inria.fr> <19411.1489268391@obiwan.sandelman.ca> <7E6CC32A-020E-4437-8972-1FD40991D198@inria.fr> <18795.1490045214@obiwan.sandelman.ca>
To: Michael Richardson <mcr+ietf@sandelman.ca>
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/6tisch-security/TilFGs1W-kqUWU_RZHecFypkZWA>
Subject: Re: [6tisch-security] EALS and how to go from 6tisch-minimal-security to zero-touch enrollment
X-BeenThere: 6tisch-security@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Extended Design Team for 6TiSCH security architecture <6tisch-security.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/6tisch-security>, <mailto:6tisch-security-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/6tisch-security/>
List-Post: <mailto:6tisch-security@ietf.org>
List-Help: <mailto:6tisch-security-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/6tisch-security>, <mailto:6tisch-security-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 Mar 2017 13:41:16 -0000

Do you mean pledge-initiated message_1 (pledge being the party U)? What you describe can be done with the same mechanism as currently done in minimal-security and the Discovery Message — empty CoAP ACK. One issue there is that identity of U is not sent until message_3. We could piggyback the identity of U in EXT_1 but that would break identity protection of Sigma-I though.

> On 20 Mar 2017, at 22:26, Michael Richardson <mcr+ietf@sandelman.ca> wrote:
> 
> I had the same thought: if we always send message_1 of minimal-security,
> and we have some way to get an ACK that isn't message_2, but that tells the
> pledge that it can stop sending, then that accomplishes the goal of the init
> bit, and communicates the existence of the pledge to the JRC.