Re: [6tisch-security] agenda for 2014-05-27 6tisch security call

Jonathan Simon <jsimon@linear.com> Wed, 28 May 2014 15:45 UTC

Return-Path: <jsimon@linear.com>
X-Original-To: 6tisch-security@ietfa.amsl.com
Delivered-To: 6tisch-security@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 116461A0426 for <6tisch-security@ietfa.amsl.com>; Wed, 28 May 2014 08:45:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.209
X-Spam-Level:
X-Spam-Status: No, score=-2.209 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=1.989, RCVD_IN_DNSWL_MED=-2.3, WEIRD_PORT=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lsYXofJBwadq for <6tisch-security@ietfa.amsl.com>; Wed, 28 May 2014 08:45:16 -0700 (PDT)
Received: from p01c11o148.mxlogic.net (p01c11o148.mxlogic.net [208.65.144.71]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F1BE81A0491 for <6tisch-security@ietf.org>; Wed, 28 May 2014 08:45:13 -0700 (PDT)
Received: from unknown [12.218.215.72] (EHLO smtpauth1.linear.com) by p01c11o148.mxlogic.net(mxl_mta-8.0.0-1) with ESMTP id 68406835.2ab1bf65e940.70974.00-532.201008.p01c11o148.mxlogic.net (envelope-from <jsimon@linear.com>); Wed, 28 May 2014 09:45:10 -0600 (MDT)
X-MXL-Hash: 538604866bce9602-0b80044389ad95af70b2c1e00fff418ece4b6ba9
Received: from unknown [12.218.215.72] (EHLO smtpauth1.linear.com) by p01c11o148.mxlogic.net(mxl_mta-8.0.0-1) with ESMTP id 08406835.0.70908.00-322.200765.p01c11o148.mxlogic.net (envelope-from <jsimon@linear.com>); Wed, 28 May 2014 09:45:06 -0600 (MDT)
X-MXL-Hash: 538604824c117a13-a28d054e08609684c0f44a1e0b180e2f92104d46
Received: from jsimonmacmini.engineering.linear.com (unknown [10.70.48.25]) by smtpauth1.linear.com (Postfix) with ESMTPSA id 0A1A374095; Wed, 28 May 2014 08:45:02 -0700 (PDT)
Content-Type: multipart/alternative; boundary="Apple-Mail=_D825E0BB-475F-4275-BF8D-37EBB0DAD774"
Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.2\))
From: Jonathan Simon <jsimon@linear.com>
In-Reply-To: <674F70E5F2BE564CB06B6901FD3DD78B2723B85A@TGXML210.toshiba.local>
Date: Wed, 28 May 2014 08:47:12 -0700
Message-Id: <1315B075-A0A5-4008-8CC9-4918F54CBED1@linear.com>
References: <E045AECD98228444A58C61C200AE1BD8416F3AF4@xmb-rcd-x01.cisco.com> <531DD632.2060009@cox.net> <531DDB20.5050600@gmail.com> <10925.1394631496@sandelman.ca> <532069C8.2050005@gmail.com> <23590.1394999032@sandelman.ca> <18106.1395625035@sandelman.ca> <19609.1396839403@sandelman.ca> <11557.1397444260@sandelman.ca> <28192.1398644294@sandelman.ca> <29064.1399255587@sandelman.ca> <19475.1400588783@sandelman.ca> <4903.1401158997@sandelman.ca> <53840205.2070103@gmail.com> <CAJeFcoS3PNFX2obx3uNDJDtH=QvNLmaPhw2R468sNaeqpo8QBQ@mail.gmail.com> <674F70E5F2BE564CB06B6901FD3DD78B2723B576@TGXML210.toshiba.local> <CAJeFcoQBp1A7pwZHWoesvrjSySW0UZ0k11-s3-MFAozSuR0Yrw@mail.gmail.com> <674F70E5F2BE564CB06B6901FD3DD78B2723B85A@TGXML210.toshiba.local>
To: yoshihiro.ohba@toshiba.co.jp
X-Mailer: Apple Mail (2.1878.2)
X-AnalysisOut: [v=2.1 cv=HKVNF+dv c=1 sm=1 tr=0 a=glloKNylpeYNumXQcclYyA==]
X-AnalysisOut: [:117 a=glloKNylpeYNumXQcclYyA==:17 a=9iaqTFGLkfwA:10 a=D2_]
X-AnalysisOut: [GN2MmYMYA:10 a=BLceEmwcHowA:10 a=MqDINYqSAAAA:8 a=YlVTAMxI]
X-AnalysisOut: [AAAA:8 a=48vgC7mUAAAA:8 a=pGLkceISAAAA:8 a=NojvYFcnAAAA:8 ]
X-AnalysisOut: [a=rWPlndbxAAAA:8 a=SyYMxH9GAAAA:8 a=hmoMHVBNAvfwr_aig9sA:9]
X-AnalysisOut: [ a=q1XwhpTjOhBg3YWl:21 a=vpVJyqRcafJSD0Bg:21 a=QEXdDO2ut3Y]
X-AnalysisOut: [A:10 a=19wCD08tTksA:10 a=vsVyj9psLt0A:10 a=wUAfXdCGL-oA:10]
X-AnalysisOut: [ a=G1HyQLfxkfkA:10 a=qVizmW-ZYBIA:10 a=p-HxVa_ds0YA:10 a=x]
X-AnalysisOut: [EeETXzOXN8A:10 a=yRLhjdVT-pYA:10 a=uztyEWA5df8A:10 a=AeFSe]
X-AnalysisOut: [x2-gKoA:10 a=QxAq9r8ObNgA:10 a=ULth79YsAAUA:10 a=xLpt9-x9c]
X-AnalysisOut: [SEA:10 a=lZB815dzVvQA:10 a=MSl-tDqOz04A:10 a=mVM6EhRi2tsA:]
X-AnalysisOut: [10 a=AxI3N9zt8-FzzBT7M1sA:9 a=ml4kTY82G7zcJurg:21 a=X2R_o6]
X-AnalysisOut: [fj01iq23Ln:21 a=HqYEXM9lUC7XZcfi:21 a=_W_S_7VecoQA:10 a=tX]
X-AnalysisOut: [snliwV7b4A:10]
X-Spam: [F=0.5000000000; CM=0.500; MH=0.500(2014052813); S=0.200(2014051901)]
X-MAIL-FROM: <jsimon@linear.com>
X-SOURCE-IP: [12.218.215.72]
Archived-At: http://mailarchive.ietf.org/arch/msg/6tisch-security/UlQdxDeGrEwnIDs0P2-fx_c12eI
Cc: mcr+ietf@sandelman.ca, rstruik.ext@gmail.com, 6tisch-security@ietf.org
Subject: Re: [6tisch-security] agenda for 2014-05-27 6tisch security call
X-BeenThere: 6tisch-security@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Extended Design Team for 6TiSCH security architecture <6tisch-security.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/6tisch-security>, <mailto:6tisch-security-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/6tisch-security/>
List-Post: <mailto:6tisch-security@ietf.org>
List-Help: <mailto:6tisch-security-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/6tisch-security>, <mailto:6tisch-security-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 May 2014 15:45:23 -0000

Yoshihiro -

I don’t think this is a problem.  Nodes that are in the network reject incoming frames secured with the well-known key. The well-known key is only used to authenticate beacons, and authenticate join requests (which don’t carry synchronization information).  There is a DoS vector, in that an attacker can inject joining traffic (destined for the network mananager) that will ultimately be discarded, possibly preventing other nodes from joining, and increasing the traffic in the network. 

Jonathan Simon, Ph. D
Director of Systems Engineering
Linear Technology, Dust Networks product group
30695 Huntwood Ave
Hayward, CA 94544-7021
(510) 400-2936
(510) 489-3799 FAX
jsimon@linear.com

**LINEAR TECHNOLOGY CORPORATION** 
*****Internet Email Confidentiality Notice***** 
 This e-mail transmission, and any documents, files or previous e-mail messages attached to it may contain confidential information that is legally privileged. If you are not the intended recipient, or a person responsible for delivering it to the intended recipient, you are hereby notified that any disclosure, copying, distribution or use of any of the information contained in or attached to this transmission is STRICTLY PROHIBITED. If you have received this transmission in error, please immediately notify me by reply e-mail, or by telephone at (510) 400-2936, and destroy the original transmission and its attachments without reading or saving in any manner. Thank you. 

On May 28, 2014, at 8:01 AM, <yoshihiro.ohba@toshiba.co.jp> <yoshihiro.ohba@toshiba.co.jp> wrote:

> Hi Jonathan,
>  
> Thank you for your answer.
>  
> I think this can be an issue if already joined nodes also use the beacons protected with the well-known key for maintaining synchronization and slot allocations, as an attacker can send forged beacons protected with the well-known key.
>  
> Yoshihiro Ohba
>  
>  
> From: 6tisch-security [mailto:6tisch-security-bounces@ietf.org] On Behalf Of Jonathan Simon
> Sent: Wednesday, May 28, 2014 11:49 PM
> To: ohba yoshihiro(大場 義洋 ○RDC□NSL)
> Cc: Michael Richardson; Rene Struik; 6tisch-security@ietf.org
> Subject: Re: [6tisch-security] agenda for 2014-05-27 6tisch security call
>  
> Yoshihiro - 
> 
> Q. In w/HART, are all beacon frames authenticated with a well-known key even after a joining node obtained the runtime link layer key?
> 
> A. Yes. In WirelessHART the beacons (called "advertisements" but they serve the same purpose and have similar content) are intended for devices not yet in the network, so they always use the well-known key.  To discover other nodes within the network, they use frames secured with the runtime link-layer key.
> 
> Jonathan
>  
> 
> On Tue, May 27, 2014 at 11:18 PM, <yoshihiro.ohba@toshiba.co.jp> wrote:
> Hi Jonathan,
>  
> Thank you for sending the summary of w/HART joining.
>  
> I have question.
>  
> In w/HART, are all beacon frames authenticated with a well-known key even after a joining node obtained the runtime link layer key? 
>  
> Regards,
> Yoshihiro Ohba
>  
>  
>  
>  
> From: 6tisch-security [mailto:6tisch-security-bounces@ietf.org] On Behalf Of Jonathan Simon
> Sent: Tuesday, May 27, 2014 10:41 PM
> To: Rene Struik
> Cc: Michael Richardson; 6tisch-security@ietf.org
> Subject: Re: [6tisch-security] agenda for 2014-05-27 6tisch security call
>  
> Rene had asked on a previous call for someone to summarize WirelessHART joining - here you go.
> 
> * One or more devices are sending beacons to advertise the presence of the network. In WirelessHART, this frame is unencrypted, but authenticated with a well known key.  The beacon contains the current ASN, which the joining device uses to synchronize its clock.
> 
> * Once the joining node has heard a beacon, it continues listening for additional beacons for a short specified timeout.
> 
> * The joining node encrypts a frame containing some HART specific content, including a list of beaconing neighbors it heard in the previous steps. The size of the payload is ~ 60 bytes.  The packet is routed by a "proxy" node - the joining parent. The frame is authenticated using the well-known key, and encrypted using a shared symmetric key known only by the node and the manager.
> 
> * The manager responds with a frame containing the run-time link-layer key, the node's new short address (this takes the place of PAN coordinator association), and a unicast session key and starting nonce for the manager. This frame is encrypted with the symmetric key. The payload is ~ 60 bytes, and is routed to the proxy for delivery to the joining node - the proxy uses the link-layer well known key on the frame.
> 
> * At this point the joining node transitions to using the run-time link-layer key for all link-layer frames, and the manager unicast session for end-to-end manager traffic. This ends the initial security handshake.
> 
> * Over a number of additional frames, the manager assigns additional sessions, including broadcast sessions, and a unicast session to the Gateway (sink for all data traffic), and additional communications resources, routing information, etc.  There is no explicit transition from joining to joined - the mote transitions when certain key frames are received.
> 
> * Note that a WirelessHART link-layer frame contains and additional frame type byte and a 4-byte link-layer MIC, on top of the unsecured 15.4 frame.  A network frame contains an additional 16-40 bytes of addressing, routing, security and other information.
> 
> Hope this help!
> 
> Jonathan
>  
>  
> 
> On Mon, May 26, 2014 at 8:09 PM, Rene Struik <rstruik.ext@gmail.com> wrote:
> Hi Michael:
> 
> I would like to discuss the outstanding issues I summarized in my email of Tue last week, May 20, 2014, 9:45am EDT (see http://www.ietf.org/mail-archive/web/6tisch-security/current/msg00086.html). This was also one of the action items at the conclusion of last week's 6TiSCH security call.
> 
> FYI - the w/HART communication flows were discussed during the 6TiSCH security conf call the week before, on Mon May 12, 2014. If one wishes to go over this again, that is fine, but I would prefer us giving preference to taking on already articulated issues (which were assigned as homework assignment to reflect upon) first (i.e., prior to item #4 of the proposed agenda).
> 
> As another agenda point, I would like us to discuss the frequency of future calls (as part of EOB).
> 
> Best regards, Rene
> 
> 
> On 5/26/2014 10:49 PM, Michael Richardson wrote:
> To remind, we moved the call from the 26th to the 27th at 10am EDT.
> That's 90 minutes from this email.
>  
> 1) notewell.
> 2) intros
> 3) recap of draft-piro-
> 4) wirelesshart -way --- how does the communication work?
> 5) how to summarize all of this to the working group
> 6) how to close this process up?
>  
> -- remember that the call is recorded, and the NoteWell applies.
>  
> -- The URL to access the webex, which will we use for audio only:
>   https://cisco.webex.com/cisco/j.php?MTID=m2fe139bf876cea3ec62750cd580b7908
>  
> -- we will resume with the etherpad at:
>    http://etherpad.tools.ietf.org:9000/p/notes-ietf-89-6tisch-security
>  
> I'm at +1 613 276-6809, IM: mcr@xmpp.credil.org or mcharlesr@gmail.com,
> if you need more than that to get in, or are having difficulties.
> Please make sure your audio works, and that you mute when not talking.
>  
> --
> Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works
>  -= IPv6 IoT consulting =-
>  
>  
>  
>  
> 
> _______________________________________________
> 6tisch-security mailing list
> 6tisch-security@ietf.org
> https://www.ietf.org/mailman/listinfo/6tisch-security
> 
> 
> 
> -- 
> email: rstruik.ext@gmail.com | Skype: rstruik
> cell: +1 (647) 867-5658 | US: +1 (415) 690-7363
> 
> _______________________________________________
> 6tisch-security mailing list
> 6tisch-security@ietf.org
> http://cp.mcafee.com/d/avndzgQ93gArhoKyyVteX9KVJ5MsOCrhs7cLCQn1NEVhjpd79JNVVVNyZPoziiJo0E-kfSfbCPVg_oYKrSWtS7Cn-LP2rWrX37nKnjpvpVZZxZYsNORQX8FGT7cYG7DR8OJMddECQjt-hojuv78I9CzATsSjDdqymokWnPtU03wCHIcfBisEeRNOsGm9BWvpKcFBzrAVkIjbQ-Pspjb5O5mUm-waBYTu00CQknArCMnWhEwdbrAVkIjbQ-Pspjb6BQQgqh-26Cy1SIjh0Dt5wLtYKCed43AVkIjd45fIT6kONEwJFVVJNwSeVhsrLe-Fkd
> 
> 
> 
> 
> --
> -- 
> Jonathan Simon, Ph. D
> Director of Systems Engineering
> Dust Networks at Linear Technology
> 30695 Huntwood Ave
> Hayward, CA 94544-7021
> (510) 400-2936
> (510) 489-3799 FAX
> jsimon@linear.com
> 
> **LINEAR TECHNOLOGY CORPORATION** 
> *****Internet Email Confidentiality Notice***** 
>  This e-mail transmission, and any documents, files or previous e-mail messages attached to it may contain confidential information that is legally privileged. If you are not the intended recipient, or a person responsible for delivering it to the intended recipient, you are hereby notified that any disclosure, copying, distribution or use of any of the information contained in or attached to this transmission is STRICTLY PROHIBITED. If you have received this transmission in error, please immediately notify me by reply e-mail, or by telephone at (510) 400-2936, and destroy the original transmission and its attachments without reading or saving in any manner. Thank you.
> 
> _______________________________________________
> 6tisch-security mailing list
> 6tisch-security@ietf.org
> http://cp.mcafee.com/d/2DRPow76QmbEFLzzhOM-rKrhs7cFCQn1PbVJ5MsqekkSjhOrsuuusoLsS8QAHm0afB3ZzOVI-kfSfbCTA7hPXPb_nVNZNBVxzHTbEzHIYYepd7bz8XBHEShhlKM_OEuvkzaT0QSyrhdTV5xdVYsyMCqejtPpesRG9pxjFvdTw0e2qKMM-l9OwXn79OFoCnFZCUOCmdKjBiNcLjXdNBcIn8lrxrW0GnPtU02rojhKUr1vF6y0QJKjBiNcLjXdNBcIqnjh1F7U8qq87qNd42tQm2ZTOWoUQgejBiNcQgk-Pspjb6y2SDDCT63rt_U2SVUlVB0
> 
> 
> 
> 
> --
> -- 
> Jonathan Simon, Ph. D
> Director of Systems Engineering
> Dust Networks at Linear Technology
> 30695 Huntwood Ave
> Hayward, CA 94544-7021
> (510) 400-2936
> (510) 489-3799 FAX
> jsimon@linear.com
> 
> **LINEAR TECHNOLOGY CORPORATION** 
> *****Internet Email Confidentiality Notice***** 
>  This e-mail transmission, and any documents, files or previous e-mail messages attached to it may contain confidential information that is legally privileged. If you are not the intended recipient, or a person responsible for delivering it to the intended recipient, you are hereby notified that any disclosure, copying, distribution or use of any of the information contained in or attached to this transmission is STRICTLY PROHIBITED. If you have received this transmission in error, please immediately notify me by reply e-mail, or by telephone at (510) 400-2936, and destroy the original transmission and its attachments without reading or saving in any manner. Thank you.
> _______________________________________________
> 6tisch-security mailing list
> 6tisch-security@ietf.org
> http://cp.mcafee.com/d/1jWVIe3zqb5QkTzhOMC-rKrhs7cFCQn1PbVJ5MsqekkSjhOrsuuusoLsS8QAHm0afB3ZzOVI-kfSfbCO5JtvupvW_8CzBdBBfHTbECzBdzATC7xNEVVqWtAklrCzB7BgY-F6lK1FJ4SyrLOb2rPUV5xcQsCXCOsVHkiP2Di-rL00s4RtxxYGjB1SKejBiNcLjXdNBcIrsDaBypuDSrzapoKgGT2TQ1kLCXM04S-qem7T3obZ8Qg6BJOsGm9BWvpKcFBziWq8d8_13jh0Xm9EwjKyMnK-nj76y1OsGm9Cy2DSrzapoQgmQYYSUMrDrkr2pAaTam