Return-Path: <malisa.vucinic@inria.fr>
X-Original-To: 6tisch@ietfa.amsl.com
Delivered-To: 6tisch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1])
 by ietfa.amsl.com (Postfix) with ESMTP id CC275120041;
 Mon,  7 Oct 2019 08:38:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.9
X-Spam-Level: 
X-Spam-Status: No, score=-6.9 tagged_above=-999 required=5
 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001,
 SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44])
 by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id GDbYpipsIlPp; Mon,  7 Oct 2019 08:38:48 -0700 (PDT)
Received: from mail3-relais-sop.national.inria.fr
 (mail3-relais-sop.national.inria.fr [192.134.164.104])
 (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
 (No client certificate requested)
 by ietfa.amsl.com (Postfix) with ESMTPS id EA2B41208BD;
 Mon,  7 Oct 2019 08:38:43 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="5.67,268,1566856800"; d="scan'208";a="321894870"
Received: from wifi-pro-82-179.paris.inria.fr ([128.93.82.179])
 by mail3-relais-sop.national.inria.fr with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384;
 07 Oct 2019 17:38:42 +0200
Content-Type: text/plain;
	charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
From: =?utf-8?B?TWFsacWhYSBWdcSNaW5pxIc=?= <malisa.vucinic@inria.fr>
In-Reply-To: <157023324915.1400.10416689027865506912@ietfa.amsl.com>
Date: Mon, 7 Oct 2019 17:38:41 +0200
Cc: ops-dir@ietf.org, 6tisch <6tisch@ietf.org>, ietf@ietf.org,
 draft-ietf-6tisch-minimal-security.all@ietf.org
Content-Transfer-Encoding: quoted-printable
Message-Id: <91540EE6-E74D-4ECA-9E54-9B5E35FA5937@inria.fr>
References: <157023324915.1400.10416689027865506912@ietfa.amsl.com>
To: Linda Dunbar <linda.dunbar@futurewei.com>
X-Mailer: Apple Mail (2.3445.104.11)
Archived-At: <https://mailarchive.ietf.org/arch/msg/6tisch/J-9_1GXZunKlcnlfJn33Ap6LECg>
Subject: Re: [6tisch] Opsdir last call review of
 draft-ietf-6tisch-minimal-security-12
X-BeenThere: 6tisch@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Discuss link layer model for Deterministic IPv6 over the TSCH mode
 of IEEE 802.15.4e,
 and impacts on RPL and 6LoWPAN such as resource allocation" <6tisch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/6tisch>,
 <mailto:6tisch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/6tisch/>
List-Post: <mailto:6tisch@ietf.org>
List-Help: <mailto:6tisch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/6tisch>,
 <mailto:6tisch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Oct 2019 15:38:50 -0000

Dear Linda,

Many thanks for your review. Please find the responses inline.

Kind regards,
Mali=C5=A1a

> On 5 Oct 2019, at 01:54, Linda Dunbar via Datatracker =
<noreply@ietf.org> wrote:
>=20
> Reviewer: Linda Dunbar
> Review result: Has Nits
>=20
> Reviewer: Linda Dunbar
> Review result: Has Nits  & with comment
>=20
> I am the assigned Ops area reviewer for this draft. The Ops =
directorate reviews
> all IETF documents being processed by the IESG for the IETF Chair.  =
Please
> treat these comments just like any other last call comments.
>=20
> This document is written very clear, specifying a framework for a new =
device to
> securely join a 6TiSCH network.

>=20
> One question: the document assumes that there is pre-shared key (PSK) =
between
> the device and the controller. The Security Consideration does =
describe the
> common pitfall of  a single PSK shared among a group of devices. Is =
there any
> way to prevent it? Is it necessary to require the Key to be =
periodically
> changed?

Please note that the document mandates unique PSKs between each device =
and the JRC (Section 3, PSK), thus a compromise of a single device does =
not leak the PSK of other devices in the network. The discussion you =
refer to in the Security Consideration section makes an attempt to draw =
attention to the unsafe practices, but beyond mandating the PSK to be =
unique for each pledge, which is already a strong requirement, I am not =
sure we can do much more about it. Requiring the PSK to be periodically =
changed would require periodic in-situ manipulation of devices (by the =
100s or even 1000s), something that is not realistically going to =
happen=E2=80=A6What we could do, however, is to mandate the PSK to be =
changed upon device re-commissioning to a new owner, when it is likely =
that a device needs to be manipulated, so I would propose the following =
sentence be added at the end of Section 3, PSK:

NEW:
In case of device re-commissioning to a new owner, it is REQUIRED to =
change the PSK.

Would that work?

> Another  suggestion:
> Section 5.1 introduces an acronym ASN to represent "Absolute slot =
number".
>=20
> Can you use a different acronym because ASN has been widely used in =
networking
> as the Autonomous System Number.

ASN for "Absolute slot number=E2=80=9D was defined in the IEEE 802.15.4 =
specification and the acronym is widely used in our community. I would =
refrain from re-defining it as it would cause confusion, given that is =
already used in other documents produced by the 6TiSCH working group =
(RFC8180, RFC7554).

> ---
> An autonomous system number (ASN) is a unique number that's available =
globally
> to identify an autonomous system and which enables that system to =
exchange
> exterior routing information with other neighboring autonomous =
systems.
>=20
> Thank you.
>=20
> Linda Dunbar
>=20
>=20
> _______________________________________________
> 6tisch mailing list
> 6tisch@ietf.org
> https://www.ietf.org/mailman/listinfo/6tisch

