[6tisch-security] DRAFT minutes from meeting 2016-09-13

Michael Richardson <mcr+ietf@sandelman.ca> Mon, 26 September 2016 15:06 UTC

Return-Path: <mcr+ietf@sandelman.ca>
X-Original-To: 6tisch-security@ietfa.amsl.com
Delivered-To: 6tisch-security@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9442612B2A8 for <6tisch-security@ietfa.amsl.com>; Mon, 26 Sep 2016 08:06:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.217
X-Spam-Level:
X-Spam-Status: No, score=-4.217 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, RP_MATCHES_RCVD=-2.316, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id k2mcXwgyGGf8 for <6tisch-security@ietfa.amsl.com>; Mon, 26 Sep 2016 08:06:38 -0700 (PDT)
Received: from tuna.sandelman.ca (tuna.sandelman.ca [209.87.249.19]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E6C2112B2AC for <6tisch-security@ietf.org>; Mon, 26 Sep 2016 08:06:37 -0700 (PDT)
Received: from sandelman.ca (obiwan.sandelman.ca [IPv6:2607:f0b0:f:2::247]) by tuna.sandelman.ca (Postfix) with ESMTP id 30568203CD for <6tisch-security@ietf.org>; Mon, 26 Sep 2016 11:19:57 -0400 (EDT)
Received: from obiwan.sandelman.ca (localhost [IPv6:::1]) by sandelman.ca (Postfix) with ESMTP id B21936392D for <6tisch-security@ietf.org>; Mon, 26 Sep 2016 11:06:36 -0400 (EDT)
From: Michael Richardson <mcr+ietf@sandelman.ca>
To: 6tisch-security <6tisch-security@ietf.org>
X-Attribution: mcr
X-Mailer: MH-E 8.6; nmh 1.6+dev; GNU Emacs 24.5.1
X-Face: $\n1pF)h^`}$H>Hk{L"x@)JS7<%Az}5RyS@k9X%29-lHB$Ti.V>2bi.~ehC0; <'$9xN5Ub# z!G,p`nR&p7Fz@^UXIn156S8.~^@MJ*mMsD7=QFeq%AL4m<nPbLgmtKK-5dC@#:k
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg="pgp-sha1"; protocol="application/pgp-signature"
Date: Mon, 26 Sep 2016 11:06:36 -0400
Message-ID: <12244.1474902396@obiwan.sandelman.ca>
Archived-At: <https://mailarchive.ietf.org/arch/msg/6tisch-security/XNaAc9y3xAeo2hdiCaqEbVUb6J0>
Subject: [6tisch-security] DRAFT minutes from meeting 2016-09-13
X-BeenThere: 6tisch-security@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Extended Design Team for 6TiSCH security architecture <6tisch-security.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/6tisch-security>, <mailto:6tisch-security-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/6tisch-security/>
List-Post: <mailto:6tisch-security@ietf.org>
List-Help: <mailto:6tisch-security-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/6tisch-security>, <mailto:6tisch-security-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 26 Sep 2016 15:06:44 -0000

To remind: we are meeting 2016-09-27, at 1400UTC (10am EDT).
We meet at: https://jitsi.tools.ietf.org/6tischSecurity
Please try your browser, firewall/etc. beforehand. The room is open.
We will use audio only, so feel free to mute your camera, and use the shared
etherpad within JITSI.

Agenda for this week:
0) note well.
1) approval of agenda
2) minutes from last week.
3) work to do during meeting:
   time sequence diagram for document
      draft-richardson-6tisch-dtsecurity-secure-join
4) possibility to use GRASP from Join Assistant to JCE, since DAR/DAC is off
   the table.


DRAFT MINUTES from 2016-09-13:
AGENDA
   0) hello and Note Well.
   1) review since IETF96.
      a) updates on crypto?
      EDHOC -- dialogue with some crypto people about freshness (of
      initiator) with two-pass protocol. The issue you need to know it's not a
      replay.

        -- go for SIGMA-I protocol.
        SIGMA-I is a design pattern for crypto protocols:
                http://webee.technion.ac.il/~hugo/sigma.html

        Provides identity protection against active attacks of initiator and
        passive attacks of responder.  Three passes, but the total EDHOC +
        OSCOAP can be embedded in two round trips. Similar to what TLS 1.3
        has done.

              -- plan to have an update on document for review, then CFRG
                 review.

      Q: any plans to submit to 802.15.9, or specify how to use it with 15.9?
      A (Tero): need to have KMP defined somewhere (i.e. IETF).  IEEE
            802.15.9 has small appendix to explain how to derive keys for 15.4.  To
            get a number to use, there is an IEEE 802.15 Assigned Number
            Authority. There is a form to do this.
            Some stuff is moving from 802.15.9 to 802.15.12 (upper layer
            interface).

            EDHOC will remain in ACE WG.

      b) updates on network logistics.
        - discussion about whether JCE managed, centrally initiated secured CoAP for join traffic
        - TW suggests that join traffic, if on a seperate track, can be grown
          in bandwidth as required.  So even though 6p can add cells, it can not
          grow all of the cells.

        - TW explains that pledge becomes associated to JA's schedule, and at
          the beginning of the minimal slot, it wakes up to listen, (Rx/Tx).

        - initial show of interest should be part of the protocol, and should
          be part of the security protocol description.

MCR wrote an initial ACTION required:
      a) PRO of centrally initiated
      b) CON of centrally initiated
      c) PRO of pledge initiated
      d) CON of pledge initiated

      TW: if we have a solution that has a lot of round trips, then it is
          better to sequence things.
      TW: if you have a 500-byte frame, then it will take ~5 slotframes to
          send this packet to next hop, possibly about 5s as the slotframe
          repeats each 1s.

      MCR: is there value of the Join Assistant to schedule the pledges/new nodes to initiate?
      TW: if there is multiple nodes talking to the same JA, then there is no contention.

   2) state of draft?
      https://datatracker.ietf.org/doc/draft-richardson-6tisch-dtsecurity-secure-join/
      https://github.com/ietf-roll/6tisch-secure-join ..


CONCLUSION from above discussion was that JCE initiated join protocol is
still possible, and is better from bandwidth planning point of view.




--
Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works
 -= IPv6 IoT consulting =-