Re: [6tisch] [6tisch-security] proposed security text for architecture draft

<yoshihiro.ohba@toshiba.co.jp> Thu, 13 November 2014 00:24 UTC

Return-Path: <yoshihiro.ohba@toshiba.co.jp>
X-Original-To: 6tisch@ietfa.amsl.com
Delivered-To: 6tisch@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BEEFC1A00CA; Wed, 12 Nov 2014 16:24:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.986
X-Spam-Level:
X-Spam-Status: No, score=-4.986 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_JP=1.244, HOST_EQ_JP=1.265, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.594, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vVX2i_lFZ9ZW; Wed, 12 Nov 2014 16:24:37 -0800 (PST)
Received: from imx12.toshiba.co.jp (imx12.toshiba.co.jp [61.202.160.132]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 160C71A011D; Wed, 12 Nov 2014 16:24:13 -0800 (PST)
Received: from arc11.toshiba.co.jp ([133.199.90.127]) by imx12.toshiba.co.jp with ESMTP id sAD0OBMp006406; Thu, 13 Nov 2014 09:24:11 +0900 (JST)
Received: (from root@localhost) by arc11.toshiba.co.jp id sAD0OBGV019521; Thu, 13 Nov 2014 09:24:11 +0900 (JST)
Received: from ovp11.toshiba.co.jp [133.199.90.148] by arc11.toshiba.co.jp with ESMTP id KAA19519; Thu, 13 Nov 2014 09:24:10 +0900
Received: from mx11.toshiba.co.jp (localhost [127.0.0.1]) by ovp11.toshiba.co.jp with ESMTP id sAD0OAfc001560; Thu, 13 Nov 2014 09:24:10 +0900 (JST)
Received: from TGXML207.toshiba.local by toshiba.co.jp id sAD0OAM9021621; Thu, 13 Nov 2014 09:24:10 +0900 (JST)
Received: from TGXML210.toshiba.local ([169.254.4.194]) by TGXML207.toshiba.local ([133.199.70.16]) with mapi id 14.03.0195.001; Thu, 13 Nov 2014 09:24:10 +0900
From: yoshihiro.ohba@toshiba.co.jp
To: mcr+ietf@sandelman.ca
Thread-Topic: [6tisch] [6tisch-security] proposed security text for architecture draft
Thread-Index: AQHP/tFzySavYUJZ1EKsu8a/r5YA9ZxdrsLQ
Date: Thu, 13 Nov 2014 00:24:10 +0000
Message-ID: <674F70E5F2BE564CB06B6901FD3DD78B272A9108@TGXML210.toshiba.local>
References: <20507.1415811045@sandelman.ca> <674F70E5F2BE564CB06B6901FD3DD78B272A8EFA@TGXML210.toshiba.local> <5854.1415835364@sandelman.ca>
In-Reply-To: <5854.1415835364@sandelman.ca>
Accept-Language: ja-JP, en-US
Content-Language: ja-JP
x-originating-ip: [133.199.16.37]
msscp.transfermailtomossagent: 103
Content-Type: text/plain; charset="iso-2022-jp"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: http://mailarchive.ietf.org/arch/msg/6tisch/UxuC3RDlvEwzgrR15BHs2t25bUM
Cc: 6tisch@ietf.org, 6tisch-security@ietf.org
Subject: Re: [6tisch] [6tisch-security] proposed security text for architecture draft
X-BeenThere: 6tisch@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Discuss link layer model for Deterministic IPv6 over the TSCH mode of IEEE 802.15.4e, and impacts on RPL and 6LoWPAN such as resource allocation" <6tisch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/6tisch>, <mailto:6tisch-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/6tisch/>
List-Post: <mailto:6tisch@ietf.org>
List-Help: <mailto:6tisch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/6tisch>, <mailto:6tisch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 13 Nov 2014 00:24:42 -0000

Michael,

Regarding EAP method, I mentioned EAP-TLS.  EAP-TLS works for both certificate-based authentication and pre-shared key based authentication (EAP-TLS-PSK) without EAP tunneling method such as EAP-TTLS.  In the latter case, TLS session is typically terminated at AAA server.   

It is unfortunate that some contributors felt that EAP-based approach does not work for them, but there is another use case where EAP-based approach is definitely needed (smart meters).  Having said that it would make sense to have two options (DTLS-based and EAP-based approaches) for joining operation.

Regarding beacon security, I can send clarification text.

Yoshihiro Ohba


-----Original Message-----
From: 6tisch [mailto:6tisch-bounces@ietf.org] On Behalf Of Michael Richardson
Sent: Thursday, November 13, 2014 8:36 AM
To: ohba yoshihiro(大場 義洋 ○RDC□NSL)
Cc: 6tisch@ietf.org; 6tisch-security@ietf.org
Subject: Re: [6tisch] [6tisch-security] proposed security text for architecture draft


<yoshihiro.ohba@toshiba.co.jp> wrote:
    > I am still in the middle of understanding how loose source routes for
    > joining nodes that have only link-local address can work.  Another
    > option that is not mentioned in the text below is relaying
    > authentication at join assistant node.  

Yoshihiro has correctly pointed out that in IPv6 some of the loose source route options are not as rich as we envisioned; and we need to think which exact option is appropriate.  I think this is a detail, and I think that we can deal with this.

    > The authentication relay model
    > is proven to work in ZigBee IP.

I can not comment directly; some contributors felt that this would not work for them. Too much single use code, too much total byte count, packets too big.

    > I have a reservation on JCE-initiated TLS session as opposed to what
    > existing 802.1X/PANA with EAP-TLS do where TLS session is initiated by
    > joining node.  An obvious downside of JCE-initiated TLS session is that
    > it is difficult to use AAA infrastructure.

Perhaps you can more clearly say what kind of EAP methods you would propose.
Username+password?  SIM or AKA authentication?  Kerberos/NTLM(ActiveDirectory)?
What else is there?

The TLS methods do not count, as they are usually used just to create a secure container for a username/password, and in the situations where the certificate is relevant, the *DTLS* method proposed can use certificates in the same way. 

    > Beacon security issue should be investigated more.  Integrity
    > protecting beacons with a well-known key can allow attackers to easily
    > launch a DoS attack on already connected nodes by advertising forged
    > ASN as attackers know the well-known key.  Shouldn't network-specific
    > dynamic key also be needed for protecting beacons for already-connected
    > nodes?

Already connected nodes listen to beacons sent under the production key, none of this text not changes that: can you offer some edits to make that clearer.

--
Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works  -= IPv6 IoT consulting =-