Re: [Ace] Adoption of Low Latency Group Communication Security Work in ACE

Jim Schaad <ietf@augustcellars.com> Thu, 21 July 2016 15:18 UTC

Return-Path: <ietf@augustcellars.com>
X-Original-To: ace@ietfa.amsl.com
Delivered-To: ace@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9595812D63B for <ace@ietfa.amsl.com>; Thu, 21 Jul 2016 08:18:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.188
X-Spam-Level:
X-Spam-Status: No, score=-3.188 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-1.287, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id E6xyHDiHkg9D for <ace@ietfa.amsl.com>; Thu, 21 Jul 2016 08:18:12 -0700 (PDT)
Received: from mail2.augustcellars.com (augustcellars.com [50.45.239.150]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DD41212D6A9 for <ace@ietf.org>; Thu, 21 Jul 2016 08:18:11 -0700 (PDT)
Received: from hebrews (31.133.168.227) by mail2.augustcellars.com (192.168.0.56) with Microsoft SMTP Server (TLS) id 15.0.1178.4; Thu, 21 Jul 2016 08:23:57 -0700
From: Jim Schaad <ietf@augustcellars.com>
To: 'Michael StJohns' <mstjohns@comcast.net>, ace@ietf.org
References: <578F4D59.8050005@gmx.net> <5E393DF26B791A428E5F003BB6C5342AB3716D64@OC11EXPO33.exchange.mit.edu> <23666.1469091857@obiwan.sandelman.ca> <57909559.2000805@tzi.org> <655911d1-927e-56ae-1b73-903ad925ea88@comcast.net>
In-Reply-To: <655911d1-927e-56ae-1b73-903ad925ea88@comcast.net>
Date: Thu, 21 Jul 2016 17:17:38 +0200
Message-ID: <02df01d1e363$064e3070$12ea9150$@augustcellars.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQGmLKv0rKngDW7mmHcovkcF2Z7DWwIONiC1AwVM9m4Byrq9gQJ7OXLjoC+gkIA=
Content-Language: en-us
X-Originating-IP: [31.133.168.227]
Archived-At: <https://mailarchive.ietf.org/arch/msg/ace/Q58jVlBJwCTWCPGsJiLbwSgeRw8>
Subject: Re: [Ace] Adoption of Low Latency Group Communication Security Work in ACE
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Jul 2016 15:18:16 -0000


> -----Original Message-----
> From: Ace [mailto:ace-bounces@ietf.org] On Behalf Of Michael StJohns
> Sent: Thursday, July 21, 2016 3:05 PM
> To: ace@ietf.org
> Subject: Re: [Ace] Adoption of Low Latency Group Communication Security
> Work in ACE
> 
> On 7/21/2016 5:26 AM, Carsten Bormann wrote:
> > Michael Richardson wrote:
> >> Why will ACE succeed when DICE failed?
> > Because DICE tried to hack something into TLS.  That had no support.
> 
> Actually, that's not the complete story.  It was one of the things that finally killed
> this off (e.g. DICE was supposed to make a profile of DTLS for constrained
> devices, BUT DTLS didn't already support multicast, so its difficult to profile it
> in...; we have to come up with message formats for a DTLS extension)
> 
> It wasn't the only thing.  Again, there's a very long record of why this was a bad
> idea in DICE.  It's trivially easy to map each and every one of those arguments to
> why the equivalent thing in ACE is bad.
> 
> >
> >> Does ACE now have some knowledge or mechanism that DICE couldn't have
> created
> >> because it was out of scope?
> > ACE has COSE.
> 
> *sigh* If this had any application to the stated lighting problem, then
> sending a COSE message with a public key signed payload to trigger state
> changes would be the solution, not a symmetric group multicast key.
> 
> E.g. use section 4 of the
> https://datatracker.ietf.org/doc/draft-ietf-cose-msg/ document.  Do NOT
> use any of the symmetric key sections.
> 
>   I've said similar things before, but there continues to be this belief
> from certain folk that its too expensive to do public key cryptography
> for lightbulbs.
> 
> So to be clear - yes COSE is useful.  No, it does not actually do
> anything to fix the problem of symmetric key group communications UNLESS
> you stick to the public key sections.

I completely agree with this.  The problem is not how the messages are distributed and how the protection is done on the message.  The problem is that the authentication of the message is being done with a value which cannot be assigned to a single command generation entity and thus anybody with the key can masquerade as a command generation entity.

Jim

> 
> Later, Mike
> 
> 
> >
> > Grüße, Carsten
> >
> > _______________________________________________
> > Ace mailing list
> > Ace@ietf.org
> > https://www.ietf.org/mailman/listinfo/ace
> 
> 
> _______________________________________________
> Ace mailing list
> Ace@ietf.org
> https://www.ietf.org/mailman/listinfo/ace