Re: [6tisch-security] people who have responded -- planned meetings

Michael Richardson <mcr+ietf@sandelman.ca> Mon, 09 May 2016 14:53 UTC

Return-Path: <mcr+ietf@sandelman.ca>
X-Original-To: 6tisch-security@ietfa.amsl.com
Delivered-To: 6tisch-security@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4EE4812D509 for <6tisch-security@ietfa.amsl.com>; Mon, 9 May 2016 07:53:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.897
X-Spam-Level:
X-Spam-Status: No, score=-2.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.996, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aQaWVVK1M3Ko for <6tisch-security@ietfa.amsl.com>; Mon, 9 May 2016 07:53:07 -0700 (PDT)
Received: from tuna.sandelman.ca (tuna.sandelman.ca [IPv6:2607:f0b0:f:3:216:3eff:fe7c:d1f3]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3109C12B007 for <6tisch-security@ietf.org>; Mon, 9 May 2016 07:53:07 -0700 (PDT)
Received: from sandelman.ca (obiwan.sandelman.ca [IPv6:2607:f0b0:f:2::247]) by tuna.sandelman.ca (Postfix) with ESMTP id 545CF200A3 for <6tisch-security@ietf.org>; Mon, 9 May 2016 10:58:32 -0400 (EDT)
Received: from obiwan.sandelman.ca (localhost [IPv6:::1]) by sandelman.ca (Postfix) with ESMTP id 7F30C638BD for <6tisch-security@ietf.org>; Mon, 9 May 2016 10:53:05 -0400 (EDT)
From: Michael Richardson <mcr+ietf@sandelman.ca>
To: 6tisch-security <6tisch-security@ietf.org>
In-Reply-To: <CADJ9OA_DN9me1ge5Fp6sWgpVqM847Vu9hS498Q+ao=gJ0iVRug@mail.gmail.com>
References: <21545.1462542640@obiwan.sandelman.ca> <CAAdgstQ_=vcon+WjBT7DLc=7203arCAXVHdjZgovtAYRy2z9rA@mail.gmail.com> <3938.1462650078@obiwan.sandelman.ca> <CADJ9OA_DN9me1ge5Fp6sWgpVqM847Vu9hS498Q+ao=gJ0iVRug@mail.gmail.com>
X-Mailer: MH-E 8.6; nmh 1.6+dev; GNU Emacs 24.4.2
X-Face: $\n1pF)h^`}$H>Hk{L"x@)JS7<%Az}5RyS@k9X%29-lHB$Ti.V>2bi.~ehC0; <'$9xN5Ub# z!G,p`nR&p7Fz@^UXIn156S8.~^@MJ*mMsD7=QFeq%AL4m<nPbLgmtKK-5dC@#:k
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg="pgp-sha1"; protocol="application/pgp-signature"
Date: Mon, 09 May 2016 10:53:04 -0400
Message-ID: <6807.1462805584@obiwan.sandelman.ca>
Archived-At: <http://mailarchive.ietf.org/arch/msg/6tisch-security/_RidgKrJ6TjOx9Jx-q8OW_7UaVM>
Subject: Re: [6tisch-security] people who have responded -- planned meetings
X-BeenThere: 6tisch-security@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Extended Design Team for 6TiSCH security architecture <6tisch-security.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/6tisch-security>, <mailto:6tisch-security-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/6tisch-security/>
List-Post: <mailto:6tisch-security@ietf.org>
List-Help: <mailto:6tisch-security-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/6tisch-security>, <mailto:6tisch-security-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 May 2016 14:53:09 -0000

Thomas Watteyne <thomas.watteyne@inria.fr> wrote:
    > Great! I would like to move fast on this, and suggest to have the
    > security
    > call at least 24 before the meeting so that we can complete the action
    > items
    > we will have discussed by the time of the 6TiSCH call.

I had already proposed to have the meeting 45 minutes before the 6tisch call,
but to do it weekly.


    > Would Thursday 7am Pacific (same time as 6TiSCH meeting) work for all?

It would not work for me on a sufficient number of Thursdays that it would be
a problem.

Thomas Watteyne <thomas.watteyne@inria.fr> wrote:
    > Would you agree that the agenda for the next sec meeting is to identify
    > the potential for using Object Security for secure joining a 6TiSCH
    > network, and that the homework to prepare is to read:

    > - [high] draft-selander-ace-object-security
    > - [med] draft-ietf-cose-msg
    > - [low] draft-selander-ace-cose-ecdhe
    > - [low] draft-hartke-core-e2e-security-reqs
    > - [low] draft-ietf-ace-oauth-authz

I'm fortunate that I've read most of these documents in detail.
I agree that this is an important thing to consider.

I want to point out that OSCOAP does not have a clear session key exchange
protocol as yet (several ideas proposed), and once it does, it still needs to
do enough certificate processing and ownership voucher analysis to enable the
security.

I had proposed DTLS/COAP (are we calling this coaps yet.. rhymes with soaps?)
with blockwise support.  From my point of view, sitting inside the
unconstrained JCE, it matters little if it's OSCOAP (security inside COAP) vs
DTLS/COAP (security outside of COAP).  They seem to have the same essential
properties in the end.

**to the constrained node it matters that we reuse as much code as possible**

--
Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works
 -= IPv6 IoT consulting =-