Re: [6tisch] Observe for rekeying (was: Updates to minimal-security-06)

Mališa Vučinić <malisa.vucinic@inria.fr> Tue, 10 April 2018 09:13 UTC

Return-Path: <malisa.vucinic@inria.fr>
X-Original-To: 6tisch@ietfa.amsl.com
Delivered-To: 6tisch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2226212420B for <6tisch@ietfa.amsl.com>; Tue, 10 Apr 2018 02:13:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.919
X-Spam-Level:
X-Spam-Status: No, score=-5.919 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FROM_EXCESS_BASE64=0.979, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mG8HfOcJSqHX for <6tisch@ietfa.amsl.com>; Tue, 10 Apr 2018 02:13:39 -0700 (PDT)
Received: from mail2-relais-roc.national.inria.fr (mail2-relais-roc.national.inria.fr [192.134.164.83]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 99D881273E2 for <6tisch@ietf.org>; Tue, 10 Apr 2018 02:13:38 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="5.48,431,1517871600"; d="scan'208,217";a="322073794"
Received: from mail-ot0-f181.google.com ([74.125.82.181]) by mail2-relais-roc.national.inria.fr with ESMTP/TLS/AES128-GCM-SHA256; 10 Apr 2018 11:13:34 +0200
Received: by mail-ot0-f181.google.com with SMTP id f47-v6so11916626oth.2 for <6tisch@ietf.org>; Tue, 10 Apr 2018 02:13:34 -0700 (PDT)
X-Gm-Message-State: ALQs6tAABwXPT1MiM5eiaHtYnwqzktIa+i3LhC7dyaaSC2bEu29rNojs 5P4G/l7aEX0IDE7ymo11XCglZGeqQ0DMDKD8SG0=
X-Google-Smtp-Source: AIpwx4+iQxW86BkvKjg8BCmLjQBDi414HD5Z70lZ6obCBli9J614+wdKIN+OJf8vQBd4VKs8+DUZ41A1/UF4nEvqneA=
X-Received: by 2002:a9d:40d9:: with SMTP id t25-v6mr15793485oti.388.1523351613838; Tue, 10 Apr 2018 02:13:33 -0700 (PDT)
MIME-Version: 1.0
References: <CANDGjydb27-u3r2vG5M6-mWj1fmin52Uq5qPu0d5n2OQsJQVyw@mail.gmail.com> <a208b48c5a7d6c2dca34d8f0e5be7e58@xs4all.nl> <CANDGjyevHr80v-WfPoE5midSq3QOCHsaSve7ej-+43PFygBQUA@mail.gmail.com> <1b9a1cd21e3aa368077f6a1c0e61a5d0@xs4all.nl> <CANDGjyeP70BMBVNyPzEoQg7tqGwWo=9rP3fZOscJohj_L020YA@mail.gmail.com> <20180326084154.GA11596@hephaistos.amsuess.com>
In-Reply-To: <20180326084154.GA11596@hephaistos.amsuess.com>
From: Mališa Vučinić <malisa.vucinic@inria.fr>
Date: Tue, 10 Apr 2018 09:13:23 +0000
X-Gmail-Original-Message-ID: <CANDGjyej41Wmp15DFL_Y5RK5ENtUuiqvngnHSq3maX4-9VSDKQ@mail.gmail.com>
Message-ID: <CANDGjyej41Wmp15DFL_Y5RK5ENtUuiqvngnHSq3maX4-9VSDKQ@mail.gmail.com>
To: "Christian M. Amsüss" <christian@amsuess.com>
Cc: consultancy@vanderstok.org, 6tisch@ietf.org
Content-Type: multipart/alternative; boundary="000000000000cf9be805697aef87"
Archived-At: <https://mailarchive.ietf.org/arch/msg/6tisch/TVbFDVGpGIf5ERTJq3g-PCLDUos>
Subject: Re: [6tisch] Observe for rekeying (was: Updates to minimal-security-06)
X-BeenThere: 6tisch@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Discuss link layer model for Deterministic IPv6 over the TSCH mode of IEEE 802.15.4e, and impacts on RPL and 6LoWPAN such as resource allocation" <6tisch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/6tisch>, <mailto:6tisch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/6tisch/>
List-Post: <mailto:6tisch@ietf.org>
List-Help: <mailto:6tisch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/6tisch>, <mailto:6tisch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 10 Apr 2018 09:13:43 -0000

Hi Christan,

Thanks for your response and apologies for the slow follow up. See inline.

Mališa

On Mon, Mar 26, 2018 at 10:42 AM Christian M. Amsüss <christian@amsuess.com>
wrote:

> Hello Mališa,
>
> On Fri, Mar 23, 2018 at 10:12:16AM +0000, Mališa Vučinić wrote:
> > I am tempted to say that this does not prevent us from updating the
> client
> > endpoint (but not the token) based on implicit knowledge at JRC. Do you
> > agree?
>
> observation is fundamentally a hop-to-hop thing (terminated at proxies);
> both the token and the observation counter are scoped to those hops, and
> while a minimal proxy may get away with passing them on unmodified, I
> doubt that that can be used to form a stable mechanism.
>
> The topic of a delegated observe has been brought up before[1] (with a
> focus on nomadic devices), and was not followed up to after initial
> comments. If minimal-security were to do observations that hops off a
> proxy observation to a direct one, it'd need a specification similar to
> that (with its holes filled) to let that observation hop off smoothly.
>
> (Whether the observation is FETCH or GET is immaterial here, and in this
> setting it's a good approximation to say that the difference is that the
> FETCH allows binary data with a mime type to be part of the request,
> which would in a GET need to be squished into a query string).
>
>
> As I understand, even richardson-6tisch-minimal-rekey needs to transport
> that modelled data, so at any rate I can suggest two alternatives to a
> hopping observation:
>
> * Don't observe through the proxy, but establish an observation after
>   the address has been assigned.


>   This incurs cost of two additional packages, but is conceptually
>   simple and straightforward.
>

Yep, so two messages to join and two additional messages for the first
rekey to happen.



>
> * Establish a dynlink (formerly bindings) to make the JRC PUT (or PATCH)
>   the node.


>   This would take two additional messages as well (the former pledge
>   requesting a dynlink once it knows its final address, plus its
>   response). This is the less common but more versatile approach to
>   observation.


>   An advantage over plain observation is that it might be possible to
>   establish this link in another way than explicitly requesting it (eg.
>   piggy-backing an "and when you've managed, please keep me posted on /X
>   relative to whatever address I might have then", or by the JRC knowing
>   from somewhere else that such a binding is to be established)
>

What would be the advantage of establishing a dynlink over specifying in
the minimal-security draft that once the pledge joins, it needs to expose a
/j resource that the JRC may use to update the keying material? This would
essentially be a static link specified in the draft. Do you see any pitfall
with that?


6tisch-minimal-rekey sounds like it is a valid expectation that the
> nodes will use CoMI; if that is the case and this approach is followed,
> the PUT/PATCHing that would be the result of a dynlink cold probably be
> set up implicitly.
>

I don't think we have the consensus on the use of CoMI in minimal-security.
We considered it for future work, but at this point I would refrain from
pulling in new specifications..


>
> Best regards
> Christian
>
> [1]:
> https://mailarchive.ietf.org/arch/msg/core/-emsRTJmyyFHlrNwbJkqGfXQaYw
>
> --
> To use raw power is to make yourself infinitely vulnerable to greater
> powers.
>   -- Bene Gesserit axiom
>