[6tsch] (my comments) Re: Security slides
Rene Struik <rstruik.ext@gmail.com> Thu, 25 July 2013 18:43 UTC
Return-Path: <rstruik.ext@gmail.com>
X-Original-To: 6tsch@ietfa.amsl.com
Delivered-To: 6tsch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix)
with ESMTP id 223E121F85B2 for <6tsch@ietfa.amsl.com>;
Thu, 25 Jul 2013 11:43:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level:
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5
tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com
[127.0.0.1]) (amavisd-new, port 10024) with ESMTP id F3D5vv1tBIlw for
<6tsch@ietfa.amsl.com>; Thu, 25 Jul 2013 11:43:48 -0700 (PDT)
Received: from mail-qc0-x22a.google.com (mail-qc0-x22a.google.com
[IPv6:2607:f8b0:400d:c01::22a]) by ietfa.amsl.com (Postfix) with ESMTP id
72DA221F8E70 for <6tsch@ietf.org>; Thu, 25 Jul 2013 11:43:43 -0700 (PDT)
Received: by mail-qc0-f170.google.com with SMTP id s1so1142180qcw.1 for
<6tsch@ietf.org>; Thu, 25 Jul 2013 11:43:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
h=message-id:date:from:user-agent:mime-version:to:cc:subject
:references:in-reply-to:content-type;
bh=XPSW14GetR38SlwlFI+u35NL9an+8rJCWKnQHjIIUtI=;
b=YdAH9JIPWuSKR0VBc+5l4KS2XX71fXCMX6sdKB1T6Ai3Y5Etifs/yp5iheiOL8Nm0o
NUOY8kNqW1nxy3KD/Tvpo9rm+XfYeJQNnhLzDWgvRNKE0JrOHjDyJ9SSIZrAJSqvrtHS
Z6vADJnWLABwvviGIRJlj0h4cEMXCoRv46iPW2Y1QWBVckmmnZoqnn+1IZfTBGqPeUrx
N7/1NB5x8s8jK2nDm4MKWyVAJLDEX4iK/juSsEMpMZ+lF3jrmTuA3xV8vrMw6dG+rznk
Xyb+/71yPjUIk0UKxL6k8fORUl7meB4N80MTNBaWHqsd5a/Ng7FL6z4ogK6a7g2sWfst pJtQ==
X-Received: by 10.49.127.196 with SMTP id ni4mr51409464qeb.5.1374777822842;
Thu, 25 Jul 2013 11:43:42 -0700 (PDT)
Received: from [192.168.1.101]
(CPE0013100e2c51-CM001cea35caa6.cpe.net.cable.rogers.com. [99.231.4.27]) by
mx.google.com with ESMTPSA id m10sm22786179qae.12.2013.07.25.11.43.37 for
<multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128);
Thu, 25 Jul 2013 11:43:41 -0700 (PDT)
Message-ID: <51F171D8.1060702@gmail.com>
Date: Thu, 25 Jul 2013 14:43:36 -0400
From: Rene Struik <rstruik.ext@gmail.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64;
rv:17.0) Gecko/20130620 Thunderbird/17.0.7
MIME-Version: 1.0
To: yoshihiro.ohba@toshiba.co.jp
References: <674F70E5F2BE564CB06B6901FD3DD78B12D3F92D@tgxml338.toshiba.local>
In-Reply-To: <674F70E5F2BE564CB06B6901FD3DD78B12D3F92D@tgxml338.toshiba.local>
Content-Type: multipart/mixed; boundary="------------080006010501050409020407"
Cc: 6tsch@ietf.org
Subject: [6tsch] (my comments) Re: Security slides
X-BeenThere: 6tsch@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "Discuss link layer model for Deterministic IPv6 over the TSCH mode
of IEEE 802.15.4e,
and impacts on RPL and 6LoWPAN such as resource allocation" <6tsch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/6tsch>,
<mailto:6tsch-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/6tsch>
List-Post: <mailto:6tsch@ietf.org>
List-Help: <mailto:6tsch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/6tsch>,
<mailto:6tsch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Jul 2013 18:43:49 -0000
Hi Yoshi: I am not sure why ZigBee IP is mentioned on the slides, since ZigBee does not use TSCH. If mentioning a potential "user" at all, it seems more appropriate to mention w/HART or ISA SP100. (It is quite likely not needed, though, since covered elsewhere on general overview slides.) Why not using the 802.15.4e specification as basis for security slides? Section 5.1.2.6 describes PAN formation. It would also help to have a few words on "basic" security features of 802.15.4, so that people get an idea what is in there. 802.15.4e nodes use time-scheduling info to determine when to communicate (time scheduling) and on which communication channel (channel hopping). The 802.15.4e specification describes how this is done, based on available TSCH parameters, but does not describe how these TSCH parameters are set. That is where some of the work comes in, also for security. I edited the slides you sent out for review, so as to reflect the above (please see attached). BTW - I did not delve into PAN formation as hinted at in 802.15.4e. As you can see, I suggest partitioning security work in two stages, where the second stage is conditional on rechartering. More importantly, though, I feel one needs to focus on understanding the space (and the "hooks" in 802.15.4e) first, before putting "solutions" on the table. In other words, first define the problem on which these solutions should be based. One interesting problem would be how to use 802.15.4e security, after a joining operation, but prior to getting a reliable Absolute Slot Number... We can discuss more on the call tomorrow. Best regards, Rene On 7/24/2013 6:05 PM, yoshihiro.ohba@toshiba.co.jp wrote: > > Security slides are available at: > > https://bitbucket.org/6tsch/meetings/src/master/130730_ietf-87_berlin/3f_draft-ohba-6tsch-security.pptx > > Please review and send your feedback. > > Regards, > > Yoshihiro Ohba > > > > _______________________________________________ > 6tsch mailing list > 6tsch@ietf.org > https://www.ietf.org/mailman/listinfo/6tsch -- email: rstruik.ext@gmail.com | Skype: rstruik cell: +1 (647) 867-5658 | US: +1 (415) 690-7363
- [6tsch] Security slides yoshihiro.ohba
- [6tsch] (my comments) Re: Security slides Rene Struik
- Re: [6tsch] (my comments) Re: Security slides yoshihiro.ohba
- Re: [6tsch] (my comments) Re: Security slides Rene Struik
- Re: [6tsch] (my comments) Re: Security slides Rene Struik