[6tsch] (my comments) Re: Security slides

Rene Struik <rstruik.ext@gmail.com> Thu, 25 July 2013 18:43 UTC

Return-Path: <rstruik.ext@gmail.com>
X-Original-To: 6tsch@ietfa.amsl.com
Delivered-To: 6tsch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 223E121F85B2 for <6tsch@ietfa.amsl.com>; Thu, 25 Jul 2013 11:43:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level:
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id F3D5vv1tBIlw for <6tsch@ietfa.amsl.com>; Thu, 25 Jul 2013 11:43:48 -0700 (PDT)
Received: from mail-qc0-x22a.google.com (mail-qc0-x22a.google.com [IPv6:2607:f8b0:400d:c01::22a]) by ietfa.amsl.com (Postfix) with ESMTP id 72DA221F8E70 for <6tsch@ietf.org>; Thu, 25 Jul 2013 11:43:43 -0700 (PDT)
Received: by mail-qc0-f170.google.com with SMTP id s1so1142180qcw.1 for <6tsch@ietf.org>; Thu, 25 Jul 2013 11:43:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=message-id:date:from:user-agent:mime-version:to:cc:subject :references:in-reply-to:content-type; bh=XPSW14GetR38SlwlFI+u35NL9an+8rJCWKnQHjIIUtI=; b=YdAH9JIPWuSKR0VBc+5l4KS2XX71fXCMX6sdKB1T6Ai3Y5Etifs/yp5iheiOL8Nm0o NUOY8kNqW1nxy3KD/Tvpo9rm+XfYeJQNnhLzDWgvRNKE0JrOHjDyJ9SSIZrAJSqvrtHS Z6vADJnWLABwvviGIRJlj0h4cEMXCoRv46iPW2Y1QWBVckmmnZoqnn+1IZfTBGqPeUrx N7/1NB5x8s8jK2nDm4MKWyVAJLDEX4iK/juSsEMpMZ+lF3jrmTuA3xV8vrMw6dG+rznk Xyb+/71yPjUIk0UKxL6k8fORUl7meB4N80MTNBaWHqsd5a/Ng7FL6z4ogK6a7g2sWfst pJtQ==
X-Received: by 10.49.127.196 with SMTP id ni4mr51409464qeb.5.1374777822842; Thu, 25 Jul 2013 11:43:42 -0700 (PDT)
Received: from [192.168.1.101] (CPE0013100e2c51-CM001cea35caa6.cpe.net.cable.rogers.com. [99.231.4.27]) by mx.google.com with ESMTPSA id m10sm22786179qae.12.2013.07.25.11.43.37 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 25 Jul 2013 11:43:41 -0700 (PDT)
Message-ID: <51F171D8.1060702@gmail.com>
Date: Thu, 25 Jul 2013 14:43:36 -0400
From: Rene Struik <rstruik.ext@gmail.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:17.0) Gecko/20130620 Thunderbird/17.0.7
MIME-Version: 1.0
To: yoshihiro.ohba@toshiba.co.jp
References: <674F70E5F2BE564CB06B6901FD3DD78B12D3F92D@tgxml338.toshiba.local>
In-Reply-To: <674F70E5F2BE564CB06B6901FD3DD78B12D3F92D@tgxml338.toshiba.local>
Content-Type: multipart/mixed; boundary="------------080006010501050409020407"
Cc: 6tsch@ietf.org
Subject: [6tsch] (my comments) Re: Security slides
X-BeenThere: 6tsch@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "Discuss link layer model for Deterministic IPv6 over the TSCH mode of IEEE 802.15.4e, and impacts on RPL and 6LoWPAN such as resource allocation" <6tsch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/6tsch>, <mailto:6tsch-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/6tsch>
List-Post: <mailto:6tsch@ietf.org>
List-Help: <mailto:6tsch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/6tsch>, <mailto:6tsch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Jul 2013 18:43:49 -0000

Hi Yoshi:

I am not sure why ZigBee IP is mentioned on the slides, since ZigBee 
does not use TSCH. If mentioning a potential "user" at all, it seems 
more appropriate to mention w/HART or ISA SP100. (It is quite likely not 
needed, though, since covered elsewhere on general overview slides.)

Why not using the 802.15.4e specification as basis for security slides? 
Section 5.1.2.6 describes PAN formation. It would also help to have a 
few words on "basic" security features of 802.15.4, so that people get 
an idea what is in there.

802.15.4e nodes use time-scheduling info to determine when to 
communicate (time scheduling) and on which communication channel 
(channel hopping). The 802.15.4e specification describes how this is 
done, based on available TSCH parameters, but does not describe how 
these TSCH parameters are set. That is where some of the work comes in, 
also for security.

I edited the slides you sent out for review, so as to reflect the above 
(please see attached). BTW - I did not delve into PAN formation as 
hinted at in 802.15.4e.

As you can see, I suggest partitioning security work in two stages, 
where the second stage is conditional on rechartering. More importantly, 
though, I feel one needs to focus on understanding the space (and the 
"hooks" in 802.15.4e) first, before putting "solutions" on the table. In 
other words, first define the problem on which these solutions should be 
based.

One interesting problem would be how to use 802.15.4e security, after a 
joining operation, but prior to getting a reliable Absolute Slot Number...

We can discuss more on the call tomorrow.

Best regards, Rene

On 7/24/2013 6:05 PM, yoshihiro.ohba@toshiba.co.jp wrote:
>
> Security slides are available at:
>
> https://bitbucket.org/6tsch/meetings/src/master/130730_ietf-87_berlin/3f_draft-ohba-6tsch-security.pptx
>
> Please review and send your feedback.
>
> Regards,
>
> Yoshihiro Ohba
>
>
>
> _______________________________________________
> 6tsch mailing list
> 6tsch@ietf.org
> https://www.ietf.org/mailman/listinfo/6tsch


-- 
email: rstruik.ext@gmail.com | Skype: rstruik
cell: +1 (647) 867-5658 | US: +1 (415) 690-7363