Re: [Ace] Next step for use case document

Göran Selander <goran.selander@ericsson.com> Wed, 08 October 2014 12:41 UTC

Return-Path: <goran.selander@ericsson.com>
X-Original-To: ace@ietfa.amsl.com
Delivered-To: ace@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0B1AA1A0349 for <ace@ietfa.amsl.com>; Wed, 8 Oct 2014 05:41:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.901
X-Spam-Level:
X-Spam-Status: No, score=-3.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VyhIP0AVfPm8 for <ace@ietfa.amsl.com>; Wed, 8 Oct 2014 05:41:49 -0700 (PDT)
Received: from sesbmg22.ericsson.net (sesbmg22.ericsson.net [193.180.251.48]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 381321A0347 for <ace@ietf.org>; Wed, 8 Oct 2014 05:41:48 -0700 (PDT)
X-AuditID: c1b4fb30-f79736d0000053b8-0a-5435310ac4ae
Received: from ESESSHC012.ericsson.se (Unknown_Domain [153.88.253.124]) by sesbmg22.ericsson.net (Symantec Mail Security) with SMTP id 7E.5A.21432.A0135345; Wed, 8 Oct 2014 14:41:46 +0200 (CEST)
Received: from ESESSMB303.ericsson.se ([169.254.3.188]) by ESESSHC012.ericsson.se ([153.88.183.54]) with mapi id 14.03.0174.001; Wed, 8 Oct 2014 14:41:35 +0200
From: Göran Selander <goran.selander@ericsson.com>
To: Likepeng <likepeng@huawei.com>, Hannes Tschofenig <hannes.tschofenig@gmx.net>, "ace@ietf.org" <ace@ietf.org>
Thread-Topic: [Ace] Next step for use case document
Thread-Index: AQHP2+Z2zMYxzyxQtE+FAIirW36spZwmBHpQgAAuHIA=
Date: Wed, 08 Oct 2014 12:41:35 +0000
Message-ID: <D05AF6C0.18C97%goran.selander@ericsson.com>
References: <D04EDD20.185CB%goran.selander@ericsson.com> <34966E97BE8AD64EAE9D3D6E4DEE36F2581A37D0@SZXEMA501-MBS.china.huawei.com>
In-Reply-To: <34966E97BE8AD64EAE9D3D6E4DEE36F2581A37D0@SZXEMA501-MBS.china.huawei.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/14.4.4.140807
x-originating-ip: [153.88.183.16]
Content-Type: text/plain; charset="utf-8"
Content-ID: <24503BBB51C8854E9E68B7BDB030DDB5@ericsson.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFuphkeLIzCtJLcpLzFFi42KZGfG3RpfL0DTEYPEqOYvv33qYLZbuvMdq sedwE7MDs8fiTfvZPFqOvGX1WLLkJ1MAcxSXTUpqTmZZapG+XQJXxoQrD5gKNqVWzHvwgr2B 8UlSFyMHh4SAicSaNRJdjJxAppjEhXvr2boYuTiEBI4ySjRtfATlLGaUOHp2LwtIFZuAi8SD hkdMILaIQJHEnHMvWEAGCQsYSbw5JQIRNpZoOLiQHcK2kji0bAaYzSKgInHr6BlGEJtXwEKi Y+ZBNhBbSKCFUeL/dHEQm1MgTKLt43dWEJsR6KDvp9aArWIWEJe49WQ+E8ShAhJL9pxnhrBF JV4+/gdWLyqgJ/Fsw2Z2iLiixM6z7cwgpzELaEqs36UPMcZaYsb25ewQtqLElO6H7BDnCEqc nPmEZQKj+Cwk22YhdM9C0j0LSfcsJN0LGFlXMYoWpxYn5aYbGemlFmUmFxfn5+nlpZZsYgRG 38Etvw12ML587niIUYCDUYmHd8EskxAh1sSy4srcQ4zSHCxK4rwLz80LFhJITyxJzU5NLUgt ii8qzUktPsTIxMEp1cA4++KsBp2D7+9bLl23nMHJy/vHqTeiya0vjFWPb8us9rvcqPa36W3M 9eZ2b84v09ykDq4oPp3/sHGqYC+T1/8s308un0NzdZZF6T7x45WuMTx2UfDAajajNbf/vH/z LcBXksW73s197YUqs5ylH+f9fGy4tK+gfhb7g7uuHZW+yVUK9tZ71x1TYinOSDTUYi4qTgQA F2O6ZZ8CAAA=
Archived-At: http://mailarchive.ietf.org/arch/msg/ace/S2k4XOeumDlhgyy-z2OMufqWSMg
Subject: Re: [Ace] Next step for use case document
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 Oct 2014 12:41:51 -0000

Hi Kepeng,

On 08/10/14 12:34, "Likepeng" <likepeng@huawei.com> wrote:

>Hi Goran,
>
>Thanks for the input.
>
>My understanding of the " secure store and forward " use case is mainly
>about "object security", right?

Yes, object security is certainly one candidate solution.

>
>We discussed "object security" during IESG evaluation, and I remember the
>conclusion is, this should be in scope:
>http://www.ietf.org/mail-archive/web/ace/current/msg00619.html
>
>> The utility company wants to verify stored and forwarded metering data
>>with
>> respect to authenticity, integrity and replay.
>
>About the authenticity, integrity and replay, they seem to be quite
>general and not specific to "store and forward" use case.

That is right. This formulation is stressing that they need to be valid
also in "store and forward" use cases.

>
>Maybe it is better to go to a little bit more detail.
>
>For example, about integrity, we can say, distribution entity (e.g. Data
>Collection unit) may read the data, and must not modify the data.

I’m agree with what you write that the service operator/distribution
entity must not modify data and may read the data during test or error
cases. This is a consequence of the other security properties, so to me
this is just a matter of presentation style; whether you a) want to
emphasise what is specific to this use case or b) want to emphasise what
is common between the use cases. Maybe we could delegate to the use case
editors to come with a proposal how to present this?

>
>> The utility company wants to configure utility meters securely: The
>>devices
>> should be able to verify that a configuration request is authorized,
>>authentic,
>> integrity and replay protected.
>
>About configuration, I expect this should be out of scope and should be
>done by out-of-band mechanisms.

Maybe configuration is not the right word? This is about changing settings
in the smart meter. I understand this as an analogue to the kind of
(re-)commissioning and maintenance activity described in the BLMS use case
(Section 2.4.1 of draft-seitz-ace-usecases-01), again, in the setting that
there is not necessarily direct connectivity to the smart meter.

Best regards,
Göran

>
>Kind Regards
>Kepeng
>
>> -----邮件原件-----
>> 发件人: Göran Selander [mailto:goran.selander@ericsson.com]
>> 发送时间: 2014年9月29日 21:08
>> 收件人: Likepeng; Hannes Tschofenig; ace@ietf.org
>> 主题: Re: [Ace] Next step for use case document
>> 
>> Dear WG chairs and all,
>> 
>> Please find below some further suggestions for content of the use case
>> document. Apologies for the lengthy mail.
>> 
>> I propose that some use case in the draft should highlight the need for
>>a
>> solution that supports secure store and forward. Here are a set of use
>>cases
>> supporting this, the first one is based on interviews with people
>>working with
>> utilities. The others use cases show that this is not an isolated
>>example. (There
>> is no need to include all use cases in the draft.)
>> 
>> Utility data collection
>> - - -
>> A utility company is updating its old utility distribution network with
>>advanced
>> meters and new communication systems, known as an Advanced Metering
>> Infrastructure (AMI).  AMI refers to a system that measures, collects
>>and
>> analyzes usage, and interacts with metering devices such as electricity
>>meters,
>> gas meters, heat meters, and water meters, through various communication
>> media either on request (on-demand) or on pre-defined schedules.  Based
>> on this technology, new services make it possible for consumers to
>>control
>> their utility consumption and reduce costs by supporting new tariff
>>models
>> from utility companies, and more accurate and timely billing.
>> 
>> The technical solution is based on levels of data aggregation between
>>³smart
>> meters² located at the consumer premises and the Meter Data Management
>> (MDM) system located at the utility company.  Two possible intermediate
>> levels are:
>> 
>> - Head-End System (HES) which is hardware and software that receives the
>> stream of meter data and exposes an interface to the MDM.
>> 
>> - Data Collection (DC) units located in a local network communicating
>>with a
>> number of smart meters and with a backhaul interface communicating with
>> the HES, e.g. using cellular communication.
>> 
>> For reasons of efficiency and cost end-to-end connectivity is not always
>> feasible, so metering data is stored in batches in DC for some time
>>before being
>> forwarded to the HES, and in turn accessed by the MDM.  The HES and the
>> DC units may be operated by a third party service operator on behalf of
>>the
>> utility company.  One responsibility of the service operator is to make
>>sure
>> that meter readings are performed and delivered to the HES.  An example
>>of
>> a Service Level Agreement between the service operator and the utility
>> company is e.g.  "at least 95 % of the meters have readings recorded
>>during
>> the last 72 hours².
>> 
>> 
>> Security properties
>> 
>> The utility company wants to verify stored and forwarded metering data
>>with
>> respect to authenticity, integrity and replay.
>> 
>> The utility company wants to configure utility meters securely: The
>>devices
>> should be able to verify that a configuration request is authorized,
>>authentic,
>> integrity and replay protected.
>> 
>> The utility company wants to be in control of access to plain text
>>metering data.
>> Other parties may be allowed access but at the discretion of the utility
>> company. E.g. the service operator needs access during test or error
>>cases, or
>> for calibrating units on replacement. In particular, it should be
>>possible to
>> confidentiality protect the metering data between smart meter and the
>>utility
>> company's network.
>> 
>> (There are also other desirable security properties, the ambition here
>>is not to
>> be exhaustive but to highlight the need for end-to-end authorised
>>access. )
>> 
>> 
>> 
>> Actually, the drive-by metering use case (section 2.5.1) may require a
>>similar
>> functionality:
>> 
>> 
>> Drive-by metering data collection
>> - - -
>> The meters communicate with a vehicle-attached base station, which
>>drives by
>> and collects meter readings. The drive-by service could potentially be
>>operated
>> by a third party collecting meter readings on behalf of one or multiple
>>utility
>> companies, and should not have access to plain text meter readings, or
>>not be
>> able to change the readings. Also in this case it may be cost-efficient
>>to upload
>> the readings from the vehicle once the car returns to the 3rd party
>>premises,
>> e.g. over WLAN. This means that the readings need to be stored and later
>> forwarded, and should be protected end-to-end between smart meter and
>> Meter-Data Management system in the respective utility company network
>> analogously to the previous use case.
>> 
>> 
>> There are other examples where it may be impossible or infeasible to
>>support
>> end-to-end connectivity, e.g. in networks with sleepy devices, in which
>>case a
>> publish-subscribe paradigm may be more natural.  Here we pick another
>> application of publish-subscribe:
>> 
>> Information Centric Networking (ICN)
>> - - -
>> ICN is a paradigm for data access, changing focus from current
>>host-centric
>> network to an information-centric network.  In a host-centric network,
>>the
>> basic idea is to create secure connections to hosts of trusted
>>providers of data.
>> In an information-centric network, on the other hand, it is acceptable
>>that any
>> source (cache) should be equally usable.  This requires some mechanism
>>for
>> making each information item trustworthy by itself, which can be
>>achieved for
>> example by signing data.
>> In this case a consumer of an information object could prove its
>>authenticity by
>> verifying the digital signature.  Applying ICN to the IoT setting,
>>sensor
>> readings could be protected and stored in arbitrary content nodes, not
>> necessarily only in origin servers; device configuration updates could
>>be
>> protected and stored in proxies, not necessarily only in dedicated
>> configuration servers.
>> 
>> Similar security properties apply as in the previous cases.
>> 
>> 
>> 
>> Göran
>> 
>> 
>> 
>> From:  Likepeng <likepeng@huawei.com>
>> Date:  Wednesday 24 September 2014 09:06
>> To:  "ace@ietf.org" <ace@ietf.org>
>> Subject:  [Ace] Next step for use case document
>> 
>> 
>> >Thanks all for the feedbacks to the use case document:
>> >http://datatracker.ietf.org/doc/draft-seitz-ace-usecases/
>> >
>> >Hannes and I went through the feedbacks in the mailing list.
>> >
>> >
>> >In summary, we feel that there is no consensus to adopt the current
>> >version of this document.
>> >
>> >Considering that use case document is our charter item, and this is the
>> >only viable candidate, our plan is to ask authors to update the draft
>> >according to the received feedbacks so far and we will initiate another
>> >call-for-adoption  for the new version.
>> >
>> >Also, kindly remind you to contribute your texts to the use case
>>document.
>> >
>> >Thanks,
>> >
>> >Kind Regards
>> >Kepeng & Hannes
>