Re: [6tisch] differential security for CoAP resources

Thomas Watteyne <watteyne@eecs.berkeley.edu> Thu, 07 May 2015 23:00 UTC

Return-Path: <twatteyne@gmail.com>
X-Original-To: 6tisch@ietfa.amsl.com
Delivered-To: 6tisch@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8A4981B2C2A for <6tisch@ietfa.amsl.com>; Thu, 7 May 2015 16:00:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.977
X-Spam-Level:
X-Spam-Status: No, score=-0.977 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FM_FORGED_GMAIL=0.622, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, MIME_8BIT_HEADER=0.3, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0xERwjJ5AFif for <6tisch@ietfa.amsl.com>; Thu, 7 May 2015 16:00:52 -0700 (PDT)
Received: from mail-wi0-x234.google.com (mail-wi0-x234.google.com [IPv6:2a00:1450:400c:c05::234]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E80CE1B2C32 for <6tisch@ietf.org>; Thu, 7 May 2015 16:00:44 -0700 (PDT)
Received: by widdi4 with SMTP id di4so8528884wid.0 for <6tisch@ietf.org>; Thu, 07 May 2015 16:00:43 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:cc:content-type; bh=vqd4SaSIzKlezx07h7pknkHWbKqkEemVH9u6tdFTlQo=; b=ZE6fzFqTKueTGShe9vwUHFCLBSWkyW6TMcUQOVEwSGM5BpyHbsfEHwiYS/ztgwB497 X0TSba9MFDz/ZogmB87R3tXInW/y7kldHE/sxcYzou1GPcKJScbj9asBoDD40sfFSGae T3xqrKRmD5g7nT0pSCLLWMnJHadmVU6y9rovZbKJa23afVFQrbjZGs8DtprOkmR6IJk0 ah0wE/NqaYsP5dFTj9Bk4jv6Hs5G6sdRxvYnX4uJ1ZGZ77udn/GiFawZbDf0hP12Y2H3 l/Sv0W1mzjo1IUmXqSBpnStlJ8CI8E2o89FhYdEn+RCqEG7pnsfndKG9KKrIgV8ysa3N 2V7Q==
X-Received: by 10.180.72.198 with SMTP id f6mr821489wiv.21.1431039643724; Thu, 07 May 2015 16:00:43 -0700 (PDT)
MIME-Version: 1.0
Sender: twatteyne@gmail.com
Received: by 10.28.57.133 with HTTP; Thu, 7 May 2015 16:00:23 -0700 (PDT)
In-Reply-To: <5C431BC2-2291-43BC-9F2D-EE4D61EB1F4C@imag.fr>
References: <554AB31A.6030200@berkeley.edu> <ACA1D97F-BFAC-4296-A959-45CE40A8E447@imag.fr> <CADJ9OA_TbHhAWpM5_-RBCMu2NwM+O-OQqKzgfomTM9LyLzncbw@mail.gmail.com> <5C431BC2-2291-43BC-9F2D-EE4D61EB1F4C@imag.fr>
From: Thomas Watteyne <watteyne@eecs.berkeley.edu>
Date: Fri, 08 May 2015 01:00:23 +0200
X-Google-Sender-Auth: PHrN8njvECKVUskhPFj72hWgUkg
Message-ID: <CADJ9OA-9uVHShgndpS-aDVFzkExEBM+NSANFMMF8MVv+sV6oOg@mail.gmail.com>
To: Mališa Vučinić <Malisa.Vucinic@imag.fr>
Content-Type: multipart/alternative; boundary="f46d0434c0b49fb007051585e1eb"
Archived-At: <http://mailarchive.ietf.org/arch/msg/6tisch/XvFhaurITZ6_DcqM9eBlsLQTVGk>
Cc: "6tisch@ietf.org" <6tisch@ietf.org>
Subject: Re: [6tisch] differential security for CoAP resources
X-BeenThere: 6tisch@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Discuss link layer model for Deterministic IPv6 over the TSCH mode of IEEE 802.15.4e, and impacts on RPL and 6LoWPAN such as resource allocation" <6tisch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/6tisch>, <mailto:6tisch-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/6tisch/>
List-Post: <mailto:6tisch@ietf.org>
List-Help: <mailto:6tisch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/6tisch>, <mailto:6tisch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 May 2015 23:00:53 -0000

Malisa,

The short answer is: I don't know yet :-)

There are obviously different approaches. To be most effective, the right
way to let people propose solutions as individual I-Ds, then have the WG
debate over pros/cons of each.

The requirements are summarized in Kris' e-mail.

Thomas


On Thu, May 7, 2015 at 8:46 PM, Mališa Vučinić <Malisa.Vucinic@imag.fr>
wrote:

> Thomas,
>
> On 07 May 2015, at 06:45, Thomas Watteyne <watteyne@eecs.berkeley.edu>
> wrote:
>
> For the distributed CoAPIE case,
> https://tools.ietf.org/html/draft-wang-6tisch-6top-coapie-00 doesn't
> focus on security (it's a -00). IMO, there are two options:
> - we consider CoAPIE security to be part of L2 security. That is, a
> network-wide PSK, or neighbor-by-neighbor keys installed by the JCE
>
>
> Even if you consider CoAPIE security to be protected by different L2 keys,
> you need to take care of actual CoAP resource access i.e. difference
> between nodes that can READ and DELETE a 6top resource from Kris’ mail.
> Assuming the mote possesses a table/ACL locally, you would essentially be
> doing some sort of implicit CoAP authorization using L2 keys. The problem
> is that higher access granularity at CoAP resource level would then
> translate to more complex L2 key distribution schemes, which could be
> considered a layer violation.
>
> - the CoAPIE also encapsulates the DTLS record. Packet will be (much)
> bigger, and neighbor-to-neighbor authentication would be needed.
>
>
> If I am reading
> https://tools.ietf.org/html/draft-wang-6tisch-6top-coapie-00 correctly,
> CoAPIE’s payload at L2 is directly a CoAP message - the rest of the
> protocol stack is not included. Do you consider including the full protocol
> stack in the IE in order to get DTLS working?
>
> Mališa
>
>
> _______________________________________________
> 6tisch mailing list
> 6tisch@ietf.org
> https://www.ietf.org/mailman/listinfo/6tisch
>
>