Re: [6tsch] FW: draft-ohba-6tsch-security-00

Qin Wang <qinwang@berkeley.edu> Thu, 27 June 2013 18:19 UTC

Return-Path: <qinwang@berkeley.edu>
X-Original-To: 6tsch@ietfa.amsl.com
Delivered-To: 6tsch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C174221F9E8D for <6tsch@ietfa.amsl.com>; Thu, 27 Jun 2013 11:19:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.751
X-Spam-Level:
X-Spam-Status: No, score=-1.751 tagged_above=-999 required=5 tests=[AWL=-1.225, BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, MIME_CHARSET_FARAWAY=2.45, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gYKI0tXS8Cx7 for <6tsch@ietfa.amsl.com>; Thu, 27 Jun 2013 11:19:27 -0700 (PDT)
Received: from mail-ie0-f173.google.com (mail-ie0-f173.google.com [209.85.223.173]) by ietfa.amsl.com (Postfix) with ESMTP id 2CB7B21F9E86 for <6tsch@ietf.org>; Thu, 27 Jun 2013 11:19:27 -0700 (PDT)
Received: by mail-ie0-f173.google.com with SMTP id k13so2190264iea.4 for <6tsch@ietf.org>; Thu, 27 Jun 2013 11:19:26 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:x-gm-message-state; bh=mUj+hFRCQuGxHeC7BEnyFRXt+uM/E63uEn0wiVwYQNo=; b=USmu5ECwUgT8piyOYHx0Tpansm7N3HhD8D0tn6WIhHEoapWm0RDDvoB6a39d1LtFTR J3up3B5HA0QC69vJUKUDnUwWdl0v3nSwNnOcLJSUIKVHCP27qZIdAtB7IbvVqHCXT19H jtmYkI2iV+qAWSZSPz/O1vuHcHGKDHg1lrX5n8xDBzV4GvS2jP+mrWesvA+AowlB1oFf hMoQJVbgU1/XnrgxLNEhjNQN+O8UqVAD7Fgcmsy/FDieFEP9PkKLIS5QQUESujIb8Rog YCs3ftsBpnwLKXRCw8PqqaFI4UD9hXxR3pXnRMMNBMkQdWHeygs2cmRkMA/mKrrEm4L7 KsXg==
MIME-Version: 1.0
X-Received: by 10.50.36.100 with SMTP id p4mr17084351igj.30.1372357166312; Thu, 27 Jun 2013 11:19:26 -0700 (PDT)
Received: by 10.64.240.20 with HTTP; Thu, 27 Jun 2013 11:19:26 -0700 (PDT)
In-Reply-To: <674F70E5F2BE564CB06B6901FD3DD78B12D271C3@tgxml338.toshiba.local>
References: <674F70E5F2BE564CB06B6901FD3DD78B12D258EB@tgxml338.toshiba.local> <CALEMV4Zq5B9vDGQr-Jnkc9umPCxw+sLAdNzGx3dJmgPv1GiA_Q@mail.gmail.com> <E045AECD98228444A58C61C200AE1BD841331338@xmb-rcd-x01.cisco.com> <674F70E5F2BE564CB06B6901FD3DD78B12D25F39@tgxml338.toshiba.local> <E045AECD98228444A58C61C200AE1BD841331D7E@xmb-rcd-x01.cisco.com> <CADJ9OA_QnF3nHHZ_orjxSqg=_ikJRTUMLZVVvUDXp48Eq1RwHQ@mail.gmail.com> <674F70E5F2BE564CB06B6901FD3DD78B12D271C3@tgxml338.toshiba.local>
Date: Fri, 28 Jun 2013 02:19:26 +0800
Message-ID: <CAAzoce7S8WNAYt_inJResgxZ2AiKcSd1qaiERhCiC4Wrmv0EEQ@mail.gmail.com>
From: Qin Wang <qinwang@berkeley.edu>
To: "yoshihiro.ohba@toshiba.co.jp" <yoshihiro.ohba@toshiba.co.jp>
Content-Type: multipart/alternative; boundary=089e011608e4673dc504e026cd38
X-Gm-Message-State: ALoCoQmBAqwTe2pfZjBAMo7uvGISSY4F+1ZEk7y7E5A72w6vcvm0y/Z9hHLp5l9wGdYv28x9z5VW
Cc: Thomas Watteyne <watteyne@eecs.berkeley.edu>, "6tsch@ietf.org" <6tsch@ietf.org>
Subject: Re: [6tsch] FW: draft-ohba-6tsch-security-00
X-BeenThere: 6tsch@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "Discuss link layer model for Deterministic IPv6 over the TSCH mode of IEEE 802.15.4e, and impacts on RPL and 6LoWPAN such as resource allocation" <6tsch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/6tsch>, <mailto:6tsch-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/6tsch>
List-Post: <mailto:6tsch@ietf.org>
List-Help: <mailto:6tsch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/6tsch>, <mailto:6tsch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 Jun 2013 18:19:31 -0000

Hi Yoshi,

It seems to me that ,besides Symmetric algorithm module like AES-based CCM*
required by 802.15.4e , every node has to equip a Asymmetric algorithm
module as well. correct? If it is true, I'm afraid if it is too heavy for a
node with limited resource.

Thanks
Qin


On Thu, Jun 27, 2013 at 10:51 PM, <yoshihiro.ohba@toshiba.co.jp> wrote:

>  Hi Thomas,****
>
> ** **
>
> Thank you very much for your comments.  Please my response below.****
>
> ** **
>
> *From:* 6tsch-bounces@ietf.org [mailto:6tsch-bounces@ietf.org<6tsch-bounces@ietf.org>]
> *On Behalf Of *Thomas Watteyne
> *Sent:* Thursday, June 27, 2013 1:24 PM
> *To:* 6tsch@ietf.org
> *Subject:* Re: [6tsch] FW: draft-ohba-6tsch-security-00****
>
> ** **
>
> Yoshihiro and co-authors,****
>
> ** **
>
> It's wonderful you were able to publish this draft so quickly!****
>
> ** **
>
> Here is a list of pseudo-random thoughts I had while reading it. I'd be
> happy if we could discuss the clarifying questions below on the ML and
> during the following weekly calls. Do not hesitate to spawn your answers
> into different e-mail threads if that's easier. I'm also adding some random
> remarks and typos at the end of this e-mail; feel free to ignore any or all
> of them.****
>
> ** **
>
> *Clarifying questions*****
>
> ** **
>
> *Credentials for P1 authentication.* The draft now reads that during the
> P1 bootstrapping phase, the new node authenticates to the authentication
> server. For this to be possible, the node must have something installed.
> That can be some pre-installed key, a certificate, or something more
> exotic. In any case, I believe it would be useful to have a section at the
> very beginning which indicates what the new node is expected to have when
> trying to join the network. This will have an impact either on the
> production phase of the devices, or on the pre-deployment routine the
> installer need to go through.****
>
> *[YO] I agree. Pascal had a similar comment and he suggested to have
> phase-*0 for commissioning.****
>
> ** **
>
> *Interaction with IEEE802.15.4 security mechanisms*. IEEE802.15.4 (and
> IEEE802.15.4e) comes with a CCM*, a combined encryption and authentication
> block cipher mode, built on an AES-128 cipher. Using CCM*, a node can
> encrypt and/or authenticate all MAC-layer frames. CCM* allows you to choose
> which range of bytes you encrypt and/or authenticate in your packet. In
> addition, IEEE802.15.4e defines that the nonce counter used by CCM*
> contains the 5-byte ASN. This brings replay protection, since the ASN rolls
> over every 350 years with 10ms slots. It would be great if the security
> mechanism we come up with takes advantage of this capability, since at
> least parts of it is built into most (all?) IEEE802.15.4 radios/SoCs. Maybe
> the draft could contain some text explaining how this would work.****
>
> ** **
>
> *[YO] If 5-octet ASN is persistently maintained across coordinator
> crashes, etc. then frame counter wrap-up may not be a concern.  Otherwise,
> the issue would still remain, no?*
>
> * *
>
> ** **
>
> *Session with the PCE.* The PCE plays a special role in a 6TSCH networks.
> Since it is responsible for the TSCH schedule (and maybe even for some
> routing), it's essential that the communication between a node and the PCE
> be confidential and authenticated. Do we need to have a special requirement
> for the mote-to-PCE communication? If not, is this completely covered by
> the discussion about P3?****
>
> *[YO] I believe mote-*to-PCE communication is covered by the discussion
> about P3. Please let me know if I am missing something.****
>
> ** **
>
> *Authentication relay.* I'm a bit confused by the exact natore of the
> authentication relay. This comes up for example in the following
> requirement:****
>
>    R1-2: Phase-1 KMP MUST support stateless authentication relay
> operation.****
>
> What I understand is that it's the role the motes already in the network
> play when a new node joins and is multiple hops away from the
> authentication server. In this case, do those nodes need to play
> any security role at all? Can they not relay a opaque sequence of bytes
> which happens to be the (end-to-end secure) authentication traffic between
> the authentication server and the new mote? The following paragraph seems
> to indicate this:****
>
>    A Phase-3 node can forward Phase-1 KMP messages originated from****
>
>    or destined for a Phase-1 node that is joining the mesh network****
>
>    through the Phase-3 node.****
>
> *[YO] An authentication relay will only relay authentication messages. If
> an opaque sequence happens to have the same format as the intended
> authentication message the relay will forward the sequence, but
> authentication won’t succeed unless it is true authentication traffic.
> This is a kind of DoS attack and rate limiting at the relay can help
> mitigating the attack.*****
>
> ** **
>
> *Footprint of keying material.* The draft indicates that, in the extreme
> case, a node maintains separate keying material to communicate with each of
> its neighbors. Is this accurate? ****
>
> *[YO] Yes.*
>
> * *
>
> This might introduce a large footprint, both in memory and complexity. Is
> it possible to optionally relax P2 this for low-end implementations, and
> e.g. have a common network key? I understand the implication which you
> highlight in the introduction w.r.t. ZIP.****
>
> *[YO] *I believe a common network key is acceptable for small-sized
> networks only (e.g., less than 30 mesh nodes) as highlighted in the
> introduction.  As far as I understand, the required scalability for 6TSCH
> is more than 1000 nodes which I characterize as a large-sized networks, and
> that is why the current requirements come. I believe small-footed devices
> will simply limit the number of neighboring nodes, and a mesh network with
> smaller node degree will be formed as a result, and it works.****
>
> ** **
>
> *EB protection.* I understand the concern you express in Section 6, but
> thanks to the TSCH nature of our little networks, the counter wraps every
> 350 years. I believe this significantly lowers the vulnerability of using a
> pre-installed key.****
>
> *[YO] If one TSCH node is compromised and the pre-installed key is known
> to attackers, then the TSCH network can be totally vulnerable. I think
> pre-installed key is not good regardless of the size of frame counter.****
> *
>
> ** **
>
> *Random remarks*****
>
> ** **
>
> - About section 2, I would argue that definitions live in the terminology
> draft. It's already referenced at the bottom, so maybe put that
> cross-reference at the beginning of Section 2?****
>
> - The draft lists the requirements for a secure 6TSCH solutions. PANA is
> listed as one of the candidate KMPs. Maybe remove PANA it from the abstract?
> ****
>
> *[YO] We will work on revising abstract. Note that PANA is the only
> candidate for P1 KMP.*****
>
> ** **
>
> *Typos and other minor things*****
>
> ** **
>
> - "provide adequate Time Sensitive behaviors" -> "provide adequate levels
> of determinism"****
>
> - Following Metcalf's law: add reference?****
>
> - "value of using radios" -> "the value of using radios"****
>
> - "wraps up" -> "wraps" (not sure)?****
>
> - "temporal PIN" -> "temporary PIN" (again, not sure)?****
>
> - "located in the coordinator" -> "co-located with the coordinator"?****
>
> - The SA of a link between node i and node j maintains MAC keys.****
>
> - MAC key, I assume using CCM*? encryption? authentication? both?****
>
> *[YO] Yes, it is for CCM* therefore it can be one of ENC or MIC, or both.*
> ****
>
> - bi-directinal -> bi-directional****
>
> - "on required security level" -> "on the required security level"****
>
> - "seciton" -> "section"****
>
> - "reply protected" -> "replay protected"****
>
> - "candiate" -> "candidate"****
>
> - "e.g sensor" -> "e.g. sensor"****
>
> - DTLS[RFC6347]: please make this s XREF****
>
> - "multicast key exportation" -> "exporting multicast keys"?****
>
> - "exported key material" -> "exported keying material"?****
>
> - "intergrity" -> "integrity"****
>
> ** **
>
> *[YO] I will fix all typos.  *
>
> * *
>
> *Thanks again*
>
> *Yoshihiro Ohba*
>
> ** **
>
> Thomas****
>
> ** **
>
> On Tue, Jun 25, 2013 at 8:30 AM, Pascal Thubert (pthubert) <
> pthubert@cisco.com> wrote:****
>
> Dear all:****
>
>  ****
>
> I realized that the list was not copied; fixing this now. The discussion
> is around section 2 that is missing the expansion of 6TSCH****
>
>  ****
>
> Cheers,****
>
>  ****
>
> Pascal****
>
>  ****
>
> *From:* yoshihiro.ohba@toshiba.co.jp [mailto:yoshihiro.ohba@toshiba.co.jp]
>
> *Sent:* mardi 25 juin 2013 11:04
> *To:* Pascal Thubert (pthubert); xvilajosana@eecs.berkeley.edu;
> maria-rita.palattella@uni.lu****
>
>
> *Cc:* watteyne@eecs.berkeley.edu
> *Subject:* RE: [6tsch] draft-ohba-6tsch-security-00****
>
>  ****
>
>  ****
>
>  ****
>
> *From:* Pascal Thubert (pthubert) [mailto:pthubert@cisco.com<pthubert@cisco.com>]
>
> *Sent:* Tuesday, June 25, 2013 5:46 PM
> *To:* xvilajosana@eecs.berkeley.edu; ohba yoshihiro(大場 義洋 ○RDC□NSL);
> maria-rita.palattella@uni.lu
> *Cc:* watteyne@eecs.berkeley.edu
> *Subject:* RE: [6tsch] draft-ohba-6tsch-security-00****
>
>  ****
>
> Hello Xavi and Yoshi.****
>
>  ****
>
> I’d agree that our terminology is not perfect for that definition. Let us
> discuss this at the next call.****
>
> “****
>
>   6TSCH:      Entity that sets up the schedule, controls the****
>
>                connectivity graph of the network, and the resources****
>
>                allocated to each scheduled cell in that connectivity****
>
>                graph.  It may be an adaptation layer, a distributed****
>
>                reservation protocol, a centralized path computation****
>
>                entity, or any combination thereof.****
>
>  ****
>
> “****
>
> I think that the definition should 1) spell out the acronym “IPv6 over
> Time Slotted Channel Hopping”, and 2) explain that 6TSCH defines a set of
> IETF sublayers and protocols, as well as an architecture to bind them
> together, for use in TSCH based networks. Which in turns reminds me that
> people are getting confused when we tell them that 6TSCH pronounces
> “SIXTUS” and that we also have a sublayer called 6TUS. Shouldn’t we change
> something there?****
>
>  ****
>
> Yoshi:  I think section 2 should refer to our terminology. There is
> already a XREF link at the end of the draft. If the terminology expands the
> acronym for 6TSCH you’re all set : )****
>
> *[YO] As soon as we agree on the acronym for 6TSCH I will put it in
> section 2.*****
>
>  ****
>
> About section 3. Could we separate the commissioning from the
> bootstrapping? I would like to see a phase 0 when the device is prepared
> and the management systems are provisioned. In particular: What are the
> expectation on the device off the factory: Some builtin vendor crypto
> material / certificate? And then when the device is acquired and prepared
> for installation: Should the OT people configure an IPv6 address?
> Additional crypto material like a shared secret?****
>
>  ****
>
> *[YO] We could add text for phase 0 for commissioning (I think Figure 1
> can still start with phase 1 since phase 0 does not need to be
> standardized).  The purpose of phase 0 is to install phase 1 KMP
> credentials in a physically secured and managed location before the devices
> are placed where they are expected to operate.*****
>
> * *****
>
> *Regards,*****
>
> *Yoshihiro Ohba*****
>
>  ****
>
>  ****
>
> Cheers,****
>
>  ****
>
> Pascal****
>
>
> _______________________________________________
> 6tsch mailing list
> 6tsch@ietf.org
> https://www.ietf.org/mailman/listinfo/6tsch****
>
> ** **
>
> _______________________________________________
> 6tsch mailing list
> 6tsch@ietf.org
> https://www.ietf.org/mailman/listinfo/6tsch
>
>