Re: [6tisch] Updates to minimal-security-06
Mališa Vučinić <malishav@gmail.com> Tue, 10 April 2018 09:21 UTC
Return-Path: <malishav@gmail.com>
X-Original-To: 6tisch@ietfa.amsl.com
Delivered-To: 6tisch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1A57B12420B for <6tisch@ietfa.amsl.com>; Tue, 10 Apr 2018 02:21:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.019
X-Spam-Level:
X-Spam-Status: No, score=-1.019 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, FROM_EXCESS_BASE64=0.979, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id K9Z_KmWFvUaw for <6tisch@ietfa.amsl.com>; Tue, 10 Apr 2018 02:21:36 -0700 (PDT)
Received: from mail-ot0-x22d.google.com (mail-ot0-x22d.google.com [IPv6:2607:f8b0:4003:c0f::22d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2B91E127369 for <6tisch@ietf.org>; Tue, 10 Apr 2018 02:21:36 -0700 (PDT)
Received: by mail-ot0-x22d.google.com with SMTP id h55-v6so11948180ote.9 for <6tisch@ietf.org>; Tue, 10 Apr 2018 02:21:36 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=RpUiZkxuK2aohGCt84jE4q+TfDp2PFkYa619JlPr+0w=; b=iYL0vBPSt27WWiIQWX1jxJfA8t5LALUsN0wO/t7+zUPYsmw7YkgMhD6N4p3IQNVTqB DhtSJi3B9S5W+6/f0bfxafnuO3uthH/HYwcUhTlrPzrPfebDEALh/H5wPAZEVVSWu1CR 1gQv2BH4+pf1YLMkVo4/4fGblNW8si2Qbjeq7tEfAkJ5yAFPaHJijoiUpr7bV/6rdh3A pRB4kV46vZg9APNmRh4kXED0DUjSGhvWn2BmWKaXvgYm67B72efl/wFGZKCjAd0z6wlh EIuUCh9bALlIoMdhM9x2Rmxe4VVeDYJLq18LItemcWQrdNOsMD4e5hq4sBjDVMYMpfaf h4Xw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=RpUiZkxuK2aohGCt84jE4q+TfDp2PFkYa619JlPr+0w=; b=ttW/L6r18dVCyKcMwuwd4tjJ0Qa+2KMMqw0SEEg6KtNgQJDxpneBHGbMC2fUBoTcae 3cm13EH6H4+ez4z+3SJbhEfS333nAyhjKJrUZfAUEXT7DYZ+86167CQ4KOiXyhuNZRxq HqmFlXD63ex5pX1ZHw3bFG3ymkjz74MtSmEL7hQgz2UVq42EYP4txEm9neO/pDtNBXIm ut3Kia2KjfAaW3mxajQx4ebP14Tn4vsde3UKjxuby7nSWzhY+hpZsQQ4mF5xkC/zMoqh MHAWiSVH9VBI4rArBiw+XF70s2s+VAf1yhDJhFrvCEKH4HSeAsgQZ2MoRUTkFK0bXsPE 1OPw==
X-Gm-Message-State: ALQs6tA71u7mqpVUhmSZfC6lHCiDleVJfbBleSpAvRBcyaaz2lA9+ACl cW+nRCoVuAMLtZFQlkueha4A2itguzKpxvXH8jY=
X-Google-Smtp-Source: AIpwx49Ir4J5PKCECvW00akhlsGPQ7dnRAZAylN/6FOxsC92oPP36zCQMkEMHXq2WFPoUn6r79PHxoC+8CDYD5UIP/s=
X-Received: by 2002:a9d:4c16:: with SMTP id l22-v6mr11793946otf.176.1523352095338; Tue, 10 Apr 2018 02:21:35 -0700 (PDT)
MIME-Version: 1.0
References: <CANDGjydb27-u3r2vG5M6-mWj1fmin52Uq5qPu0d5n2OQsJQVyw@mail.gmail.com> <31648.1521740357@dooku.sandelman.ca> <CANDGjyeuj0jv17jz2v-iEJd2oxY3Lq0CxBPkcJvSRzWqy_thpQ@mail.gmail.com> <14716.1521930960@dooku.sandelman.ca> <CADJ9OA80gbZtX7aBVUR=y8G_pe7XWggZZJvTUWqggLALn_jC_g@mail.gmail.com>
In-Reply-To: <CADJ9OA80gbZtX7aBVUR=y8G_pe7XWggZZJvTUWqggLALn_jC_g@mail.gmail.com>
From: Mališa Vučinić <malishav@gmail.com>
Date: Tue, 10 Apr 2018 09:21:24 +0000
Message-ID: <CANDGjyc8ufh6i70MJ_-214EOpa0qqyC-beTWXO5XP6tOB0+f4g@mail.gmail.com>
To: Thomas Watteyne <thomas.watteyne@inria.fr>
Cc: Michael Richardson <mcr+ietf@sandelman.ca>, "6tisch@ietf.org" <6tisch@ietf.org>, "c.amsuess@energyharvesting.at" <c.amsuess@energyharvesting.at>
Content-Type: multipart/alternative; boundary="00000000000082b57a05697b0cf2"
Archived-At: <https://mailarchive.ietf.org/arch/msg/6tisch/axn4nqtlwfs-2RCd2r7vVUpnc-8>
Subject: Re: [6tisch] Updates to minimal-security-06
X-BeenThere: 6tisch@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Discuss link layer model for Deterministic IPv6 over the TSCH mode of IEEE 802.15.4e, and impacts on RPL and 6LoWPAN such as resource allocation" <6tisch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/6tisch>, <mailto:6tisch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/6tisch/>
List-Post: <mailto:6tisch@ietf.org>
List-Help: <mailto:6tisch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/6tisch>, <mailto:6tisch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 10 Apr 2018 09:21:40 -0000
Hi Thomas, See inline. Mališa On Mon, Mar 26, 2018 at 9:00 AM Thomas Watteyne <thomas.watteyne@inria.fr> wrote: > There are two seperated discussions going on in this thread. @Malisa, if > you agree, let's split the thread. > I have clarifying questions about both. > > *About OBSERVE* > > The issue raised is that, during the join request/response exchange > between the pledge and the JRC, the JRC never learns the IPv6 address of > the pledge (thanks to the Stateless-Proxy CoAP option). This means that, if > the join request is carried by a CoAP FETCH message with Observe, the JRC > has no means of addressing the joined node when the Observe triggers. > Doing a second GET with Observe once the pledge has joined defeats the > purpose of going for FETCH. > Any other option? > This discussion is now under the thread: *Observe for rekeing (was: Updates to minimal-security-06).* I agree with your summary. Right now we are discussing whether the joined node can expose a resource (e.g. /j), that the JRC can POST to and update the key as it knows implicitly joined node's IPv6 address. > *About COSE_Key* > > The issue raised is that, during a rekey of key K2 by the JRC, the JRC > cannot specify an ASN from which the new key is to be used. > A strong requirement is for a node NOT have a node rejoin for each rekey. > Must we use the COSE_Key structure? > Is the the message sent by the JRC containing the new key end-to-end > ACK'ed, i.e. does the JRC know it got received? > Moving the discussion about the rekeying mechanism to the thread: *Rekeying for minimal-security (was: Updates to minimal-security-06).* > > Thomas > > On Sat, Mar 24, 2018 at 11:36 PM, Michael Richardson < > mcr+ietf@sandelman.ca> wrote: > >> >> Mališa Vučinić <malishav@gmail.com> wrote: >> mcr> I think that the mechanism that was explained at: >> mcr> >> https://tools.ietf.org/html/draft-richardson-6tisch-minimal-rekey-02# >> mcr> section-4 >> >> mcr> is a better workable solution. Deploy all the new keys (it may >> take some >> mcr> days on sleep networks), and then have nodes switch when they >> see traffic >> mcr> with the new key. >> >> > Thanks, Michael, for the reminder on this document, I have to say >> that I forgot >> > about it.. IIUC, the issue you have with the mechanism I proposed >> is that the >> > JRC in some cases may not know how long it could take to deploy the >> keys so >> > that it cannot properly set the ASN. I think that's a valid concern >> and that it >> > would indeed be better if we could decouple the JRC from the inner >> network >> > specifics as much as possible. >> >> Exactly. >> It does not have to change significantly what you have, it just has to >> include the (new) keyIndex. >> >> > To do this and support rekeying with your proposal, we need to >> differentiate >> > between "start using this key" and "install the key but don't start >> using it >> > until you see it being used in the network", for 6LBR and joined >> nodes to >> > follow, respectively. We can likely do this by extending the >> COSE_Key map with >> > an additional parameter for this purpose, which I prefer to pulling >> in the >> > whole COMI machinery, as is suggested in the minimal-rekey draft. >> >> I agree, we don't need COMI, just the text about when to start using the >> new key. >> Shall I suggest some text it github? >> >> > Essentially, the process would be: >> > - the JRC deploys the new key(s) to all the nodes except to the >> 6LBR. >> > - nodes will install them, but keep using the old keys because the >> new COSE_Key >> > parameter is set to "install the key but don't start using it until >> you see it >> > being used in the network". >> >> I'd say that you always do this with any new key if you have no keys. >> I don't think we need a flag. >> >> In fact, even for the "0th key", you would start using it as soon as you >> see >> something that passes with that key, such as authenticating the Beacon >> that >> you used to find the Proxy in the first place.... >> >> > - deploy the key to the 6LBR, with the COSE_Key parameter set to >> "start using >> > now". >> > - once a node sees the new key being used and the replay protection >> and the >> > authenticity check at L2 passes, it removes the old keys and starts >> using the >> > new key for all outgoing traffic >> >> Yes. >> >> -- >> ] Never tell me the odds! | ipv6 mesh >> networks [ >> ] Michael Richardson, Sandelman Software Works | network >> architect [ >> ] mcr@sandelman.ca http://www.sandelman.ca/ | ruby on >> rails [ >> >> >> _______________________________________________ >> 6tisch mailing list >> 6tisch@ietf.org >> https://www.ietf.org/mailman/listinfo/6tisch >> >> > > > -- > ________________________________________ > > Thomas Watteyne, PhD > Research Scientist & Innovator, Inria > Sr Networking Design Eng, Analog Devices > Founder & co-lead, UC Berkeley OpenWSN > Co-chair, IETF 6TiSCH > > www.thomaswatteyne.com > ________________________________________ >
- [6tisch] Updates to minimal-security-06 Mališa Vučinić
- Re: [6tisch] Updates to minimal-security-06 peter van der Stok
- Re: [6tisch] Updates to minimal-security-06 Mališa Vučinić
- Re: [6tisch] Updates to minimal-security-06 Michael Richardson
- Re: [6tisch] Updates to minimal-security-06 peter van der Stok
- Re: [6tisch] Updates to minimal-security-06 Mališa Vučinić
- Re: [6tisch] Updates to minimal-security-06 Mališa Vučinić
- Re: [6tisch] Updates to minimal-security-06 Michael Richardson
- Re: [6tisch] Updates to minimal-security-06 Michael Richardson
- Re: [6tisch] Updates to minimal-security-06 Michael Richardson
- Re: [6tisch] Updates to minimal-security-06 peter van der Stok
- Re: [6tisch] Updates to minimal-security-06 Thomas Watteyne
- Re: [6tisch] Updates to minimal-security-06 peter van der Stok
- [6tisch] Observe for rekeying (was: Updates to mi… Christian M. Amsüss
- Re: [6tisch] Observe for rekeying (was: Updates t… Mališa Vučinić
- Re: [6tisch] Updates to minimal-security-06 Mališa Vučinić
- [6tisch] Rekeying for minimal-security (was: Upda… Mališa Vučinić
- Re: [6tisch] Observe for rekeying (was: Updates t… Christian M. Amsüss
- Re: [6tisch] Observe for rekeying (was: Updates t… Mališa Vučinić
- Re: [6tisch] Observe for rekeying peter van der Stok
- Re: [6tisch] Observe for rekeying (was: Updates t… Mališa Vučinić
- Re: [6tisch] Rekeying for minimal-security (was: … Mališa Vučinić
- Re: [6tisch] Rekeying for minimal-security (was: … Michael Richardson
- Re: [6tisch] Rekeying for minimal-security (was: … Michael Richardson
- Re: [6tisch] Rekeying for minimal-security (was: … Mališa Vučinić
- Re: [6tisch] Rekeying for minimal-security (was: … Michael Richardson
- Re: [6tisch] Rekeying for minimal-security (was: … Michael Richardson
- Re: [6tisch] Rekeying for minimal-security (was: … Mališa Vučinić
- Re: [6tisch] Rekeying for minimal-security (was: … Michael Richardson
- Re: [6tisch] Rekeying for minimal-security (was: … Tero Kivinen
- Re: [6tisch] Rekeying for minimal-security (was: … Mališa Vučinić
- Re: [6tisch] Rekeying for minimal-security (was: … Mališa Vučinić
- Re: [6tisch] Rekeying for minimal-security (was: … Tero Kivinen
- Re: [6tisch] Rekeying for minimal-security (was: … Michael Richardson
- Re: [6tisch] Rekeying for minimal-security (was: … Michael Richardson
- Re: [6tisch] Rekeying for minimal-security (was: … Michael Richardson
- Re: [6tisch] Rekeying for minimal-security (was: … Michael Richardson
- Re: [6tisch] Rekeying for minimal-security (was: … Mališa Vučinić
- Re: [6tisch] Updates to minimal-security-06 Mališa Vučinić
- Re: [6tisch] Rekeying for minimal-security (was: … Michael Richardson