Re: [Ace] Adoption of Low Latency Group Communication Security Work in ACE

"Garcia Morchon O, Oscar" <oscar.garcia@philips.com> Tue, 26 July 2016 19:30 UTC

Return-Path: <oscar.garcia@philips.com>
X-Original-To: ace@ietfa.amsl.com
Delivered-To: ace@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5DB0812D130 for <ace@ietfa.amsl.com>; Tue, 26 Jul 2016 12:30:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.92
X-Spam-Level:
X-Spam-Status: No, score=-1.92 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=philips.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eU5EmNlJKBXM for <ace@ietfa.amsl.com>; Tue, 26 Jul 2016 12:30:09 -0700 (PDT)
Received: from EUR02-VE1-obe.outbound.protection.outlook.com (mail-eopbgr20119.outbound.protection.outlook.com [40.107.2.119]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CB53712B056 for <ace@ietf.org>; Tue, 26 Jul 2016 12:30:07 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Philips.onmicrosoft.com; s=selector1-philips-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=1J67n2SYVqeyyfUI+UVjtH6lqGosUPm+vtkUxWldCvQ=; b=douttl2hRVedTpisl+kB1mAOEokToY26/lc+hwY+f9OY+pA8xS2to4NCSE2VMc0Sm5nxp0dJyX6ShAufzBI4BMpmG7DggD+6EZKXbdy4fiWRG4NyO36cEPjbmD5rvk0LvTgH/jS89k0xiqEnnKsrxUoWnEH7IbibfyT4g7CJM/c=
Received: from DB5PR0401CA0017.eurprd04.prod.outlook.com (10.164.176.155) by AMSPR04MB536.eurprd04.prod.outlook.com (10.242.21.28) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.549.5; Tue, 26 Jul 2016 19:30:03 +0000
Received: from DB3FFO11FD031.protection.gbl (2a01:111:f400:7e04::148) by DB5PR0401CA0017.outlook.office365.com (2a01:111:e400:5a81::27) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.549.5 via Frontend Transport; Tue, 26 Jul 2016 19:30:03 +0000
Authentication-Results: spf=none (sender IP is 40.103.22.100) smtp.mailfrom=philips.com; gmail.com; dkim=none (message not signed) header.d=none;gmail.com; dmarc=none action=none header.from=philips.com;
Received-SPF: None (protection.outlook.com: philips.com does not designate permitted sender hosts)
Received: from 011-smtp-out.Philips.com (40.103.22.100) by DB3FFO11FD031.mail.protection.outlook.com (10.47.217.62) with Microsoft SMTP Server (TLS) id 15.1.539.16 via Frontend Transport; Tue, 26 Jul 2016 19:30:04 +0000
Received: from HE1PR9003MB0234.MGDPHG.emi.philips.com (129.75.99.147) by HE1PR9003MB0233.MGDPHG.emi.philips.com (129.75.99.146) with Microsoft SMTP Server (TLS) id 15.1.539.14; Tue, 26 Jul 2016 19:30:01 +0000
Received: from HE1PR9003MB0234.MGDPHG.emi.philips.com ([129.75.99.147]) by HE1PR9003MB0234.MGDPHG.emi.philips.com ([129.75.99.147]) with mapi id 15.01.0539.023; Tue, 26 Jul 2016 19:30:01 +0000
From: "Garcia Morchon O, Oscar" <oscar.garcia@philips.com>
To: Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>, Michael StJohns <mstjohns@comcast.net>
Thread-Topic: [Ace] Adoption of Low Latency Group Communication Security Work in ACE
Thread-Index: AQHR4zAR/VfAvy+jME6MJd9zlvSaHqAinnCAgAA3sACABkGagIAAPhWAgAAPugCAACjQgIAAI9CAgAA5oYCAAKpggIAAPgmAgAAHxgCAAA15gIAAFcAAgAAKwdA=
Date: Tue, 26 Jul 2016 19:30:01 +0000
Message-ID: <f582bf5a1daf4f25af17f62592c284ce@HE1PR9003MB0234.MGDPHG.emi.philips.com>
References: <578F4D59.8050005@gmx.net> <5E393DF26B791A428E5F003BB6C5342AB3716D64@OC11EXPO33.exchange.mit.edu> <23666.1469091857@obiwan.sandelman.ca> <95b0103c-ba2d-6cd8-6241-228df46e530b@sics.se> <8ca27108-a8b9-7b07-e752-656247716708@comcast.net> <HE1PR0601MB22030003D2913DA6096CB3E4FC0D0@HE1PR0601MB2203.eurprd06.prod.outlook.com> <a318cda7-ebf2-5a5c-d86a-9d67fb41a82f@comcast.net> <HE1PR0601MB2203D1C2C96278B23D71AD31FC0D0@HE1PR0601MB2203.eurprd06.prod.outlook.com> <f293e325-bea2-5c27-c677-563f05c60da0@cs.tcd.ie> <bf8531981ecd4a0db3607f9ef5328d38@VI1PR9003MB0237.MGDPHG.emi.philips.com> <8bbc028d-0960-3f93-ccc2-e8746fd98ca6@gmail.com> <579d47e5f90a43e194135e8c46c82159@VI1PR9003MB0237.MGDPHG.emi.philips.com> <CAHbuEH4Z071rdTf=x0bUKd3tkt_r-0k5-vXsYYeoHQrgH1AnTg@mail.gmail.com> <CAHbuEH6CnhHPoJ+pSsYxuUur-AQscLeHsJmEBs4je_cGAeLGsA@mail.gmail.com> <de53e908-9b1f-fe74-46fa-a78a07b8ea76@comcast.net> <CAHbuEH4oQyYi2MT8wN6gHbyGg6wWUFfbV8oJ6MKRempVetY4yw@mail.gmail.com>
In-Reply-To: <CAHbuEH4oQyYi2MT8wN6gHbyGg6wWUFfbV8oJ6MKRempVetY4yw@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
x-originating-ip: [216.200.123.162]
X-MS-Office365-Filtering-Correlation-Id: 81bcbca2-ba95-4aae-09dd-08d3b58b3e6d
Content-Type: multipart/related; boundary="_004_f582bf5a1daf4f25af17f62592c284ceHE1PR9003MB0234MGDPHGem_"; type="multipart/alternative"
MIME-Version: 1.0
X-OrganizationHeadersPreserved: HE1PR9003MB0233.MGDPHG.emi.philips.com
X-EOPAttributedMessage: 0
X-MS-Office365-Filtering-HT: Tenant
X-Forefront-Antispam-Report: CIP:40.103.22.100; IPV:NLI; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10019020)(979002)(7916002)(2980300002)(428002)(199003)(55904004)(24454002)(13464003)(374574003)(189002)(85714005)(377454003)(92566002)(16796002)(19580395003)(69596002)(33646002)(19627595001)(4326007)(6806005)(18206015028)(19580405001)(11100500001)(102836003)(2950100001)(6116002)(790700001)(3846002)(586003)(512874002)(10400500002)(101416001)(19617315012)(2900100001)(15975445007)(84326002)(7906003)(19625215002)(7110500001)(15650500001)(2420400007)(67866002)(189998001)(8666005)(16297215004)(105586002)(66926002)(17760045003)(325944008)(106466001)(7846002)(54356999)(7696003)(7736002)(16236675004)(76176999)(24736003)(551544002)(81166006)(8936002)(81156014)(356003)(8676002)(108616004)(86362001)(106116001)(87936001)(93886004)(99936001)(50986999)(5001770100001)(2906002)(97736004)(19300405004)(66066001)(68736007)(5003600100003)(7099028)(7059030)(35304002)(16866105001)(579004)(969003)(989001)(999001)(1009001)(1019001);DIR:OUT;SFP:1102;SCL:1;SRVR:AMSPR04MB536;H:011-smtp-out.Philips.com;FPR:;SPF:None;PTR:InfoDomainNonexistent;A:1;MX:1;LANG:en;
X-Microsoft-Exchange-Diagnostics: 1; DB3FFO11FD031; 1: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
X-CrossPremisesHeadersFiltered: DB3FFO11FD031.protection.gbl
X-Microsoft-Exchange-Diagnostics: 1; AMSPR04MB536; 2:birTDsz6tpW5tbbHEHDMK7p008g5darIU5EX91lmHjt8vly1+VELjE+yoDSjiNXh2NbFOoGw33NxHezkxdS3EUBNu9f5S7mEjVncPCFKgXJSw7t/gHTf/MdJiEBarXdb6aLbJx5nvWYNQ0JNu7tXXb27GuWwaz7pSvtxGPYkLJXOO2vXNCSn42o2dOTP8CsY; 3:epfgFKTMQkXkXa1AVULswTCvYUea8XTuiyBeL1sthESkMrY7hxAde6PJd4VSv39bKvDcJXbHkMpNbzgnEak48bl/t1YQJrjT8PbFP5o8kVZSe9etlnQQYFeePEK+xhYgTNR4OMPHA8O5eO2vuCicSeydy4wEAKN/UqsSjDY7jAVBKkHYK+cJMxKAF8xE5YTOPObxPdtjvsO/X/iEm/0531fDGx426Q/rNGGB9nnIPA4=
X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:AMSPR04MB536;
X-Microsoft-Exchange-Diagnostics: 1; AMSPR04MB536; 25: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
X-Microsoft-Exchange-Diagnostics: 1; AMSPR04MB536; 31:PiSEWxvUKHgjgYM23zfTgMjRiR7mS4rmOfMt6nqGB0Uy7RmZIZyIg7Nk+VuyY+Of/V9lEjBxOxxcgFv5ytl6hZ0lZfowOmC96xIWzPGK68x6O6EPAEQsC7qFQINPD6G8EALPwuMBzGtBqv+7UuL5UsRiteSMl8gJ4UNUs1gH6JM10S+A2n8+ygYxFpbCoL+fGrJEZuuLpte1gWFx7VN5QQ==; 20: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
X-Microsoft-Antispam-PRVS: <AMSPR04MB53692026652579429D7DD989F0E0@AMSPR04MB536.eurprd04.prod.outlook.com>
X-Exchange-Antispam-Report-Test: UriScan:(158342451672863)(68173958961439)(192374486261705)(4133748731835)(77572809127487)(21748063052155)(260087099026482);
X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(102415321)(601004)(2401047)(13018025)(5005006)(8121501046)(13016025)(10201501046)(3002001)(6055026); SRVR:AMSPR04MB536; BCL:0; PCL:0; RULEID:; SRVR:AMSPR04MB536;
X-Microsoft-Exchange-Diagnostics: 1; AMSPR04MB536; 4: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
X-Forefront-PRVS: 00159D1518
X-Microsoft-Exchange-Diagnostics: 1; AMSPR04MB536; 23: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
X-Microsoft-Exchange-Diagnostics: 1; AMSPR04MB536; 6:dGQir4LYIaZIolIQEZfQ4bhUxe/LvDd7oLHja71R29BHRew9XhGaexyV89zqJMS5i4bQH+rmRcgCLGQ7km76D9OeT5BhOFT0P7coAO+JeoEtYZ5+IJ6RhMCoyr1c8KD43wV02p0xYAJKDzatGuV556g8Qa8uyOq05Gqdl/BNSnDNSIpG8SzvSIjCJ6oPlwYIvZkkM+k64PgZbVCo5Wt1Sqm01tV0aqN3d4gcddLXdnyk9Nd+ui7WLRa5DMUfN0ah3ACuAZsJegcLjNk2N/G9dJg/tiNljZlEhk1fWX4Sv0TOfDfz1sRVLlB3xOSW7o/nBiSLynojAx6hZ2IBofNjTQ==; 5:Nf+JyVJhXfKO7qI1JQ2RbHcbOp5ROagKiRd5/7scgQrD1ATpEEOwOS7J3sY0kHm1o1idTksBHOIAjFtBRKOU5hoIuSPG6UqfWlEpM3OMI8Jy6ReXy84HgVwPzBE9ONXQ4iuG5hzq+XOS3tuk2+hByQ==; 24:f3q4XLgZfwDqYH6eZSgjjTFG6Bk+dKedAKGjUt+O0l7RuEiTA49YOiY0T3XGkdXEAWh1kc5l4FoCsbFqIsA0B/usPd2w/+F7mvjX4ShY3ZM=; 7:w9TYZoJIKh9zi7F73p2dJAT+C2oqRHqX4OUcwByRZaHTpWAqFniURg6dTIuK0dcBXlKPT/5yKCqfGT/OS4EYNdVmVnYbz6Z3cfhV0jW1Q5q+TVmxtXuimeSbB2NIcDbbOWl5wPI8plPrQktx9Xo8yaZys1CyuP+7lCTinoqEAXU1j5cYNgVeJuO2ZDATPvLelEOY0q27CqFIliEkYGqkZ6SA14OaLBFhNhZWJACFfEagW2+yiZYqfSREdD7AvtaH
SpamDiagnosticOutput: 1:99
SpamDiagnosticMetadata: NSPM
X-OriginatorOrg: philips.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 26 Jul 2016 19:30:04.0382 (UTC)
X-MS-Exchange-CrossTenant-Id: 1a407a2d-7675-4d17-8692-b3ac285306e4
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=1a407a2d-7675-4d17-8692-b3ac285306e4; Ip=[40.103.22.100]; Helo=[011-smtp-out.Philips.com]
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AMSPR04MB536
X-MS-Exchange-CrossPremises-OriginalClientIPAddress: 40.103.22.100
X-MS-Exchange-CrossPremises-AuthSource: DB3FFO11FD031.protection.gbl
X-MS-Exchange-CrossPremises-AuthAs: Anonymous
X-MS-Exchange-CrossPremises-AVStamp-Service: 1.0
X-MS-Exchange-CrossPremises-SCL: 1
X-MS-Exchange-CrossPremises-Antispam-ScanContext: DIR:Originating; SFV:NSPM; SKIP:0;
X-MS-Exchange-CrossPremises-Processed-By-Journaling: Journal Agent
X-OrganizationHeadersPreserved: AMSPR04MB536.eurprd04.prod.outlook.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/ace/TK3HfWCy6jSHGVqFLN2xFlo2CK4>
Cc: "ace@ietf.org" <ace@ietf.org>
Subject: Re: [Ace] Adoption of Low Latency Group Communication Security Work in ACE
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Jul 2016 19:30:12 -0000

Hi Kathleen and Mike,

I would like to contribute to the discussion on the threat model.

The discussion so far was about a technical solution to enable low latency group communication. There are different technical solutions for this, based on symmetric-keys or asymmetric keys. Which solution (security control) is suitable for a system depends indeed on different aspects such as cost or risk assessment.

The creation of a secure system involves a careful analysis of the risks and the corresponding mitigation strategies. This is not new and this is broadly used, for instance, there are many documents that describe this in detail including: i) the security categorization of systems and information systems, ii) how to determine the minimum security requirements, or iii) that summarize security controls that could/should be used in different cases. In the end, what these documents say is that as the “As the risk to an information system’s confidentiality, integrity and/or availability increases, the need for additional controls to protect the system may also increase accordingly”.

When doing a risk assessment, the threats for the specific system under discussion (detailing its architecture and boundaries of the information system) are identified, and for each threat the impact and likelihood are assessed. The combination of impact and likelihood gives the risk of the threat. When systems and their information (confidentiality, integrity, availability) are categorized according to their risk (typically, in low, moderate, or high) then proper security controls are selected to create a proper security architecture, and the overall system  is re-evaluated to make sure that risks for that system are mitigated. This is a continuous process that should be done for any (IoT) information system.

If I think about the discussion, a standardized solution for low latency group communication based on symmetric keys is a security control that removes risks in many Lighting systems and use cases.

Obviously, this same security control might not be enough to decrease the associated risk in a different system. But those are just different systems, and therefore, we cannot just say that a security control based on symmetric-keys is not useful or not secure. In my opinion, this statement does not make sense.

The crucial thing to understand is that when a secure system is designed, this should be done by picking up the proper security controls that remove the risks associated to that system.

The proposed work related to low latency group communication is asking for a standardized security control based on symmetric-keys that will remove the risks in very relevant IoT use cases such as Lighting use cases.

For other systems in which this security control is not enough, then other type of solution would be required, e.g., based on PKC for source authentication in group communication. Now, saying that we should apply a PKC-based solution to all use cases, including Lighting, is also not appropriate since the systems are different so that the same security controls are not required. Otherwise, someone could also start arguing that we should use AES256 for all IoT communications since it is more secure than AES128. However, we are not using AES256 but AES128 since AES-128 provides enough security to mitigate the risks of most of the (IoT) systems.

I believe that both solutions for secure group communication in IoT – namely, solutions based on symmetric-keys and asymmetric-keys -- might be useful in the long run to address the needs of different IoT systems. However, I also believe that ACE should definitely start with the secure group communication protocol based on symmetric keys due to two reasons: a) the Lighting industry has been and is already asking for this specific security control after careful risk analysis of its use cases and b) the protocol based on symmetric-keys is easier to start with.

Thanks, Oscar.

From: Ace [mailto:ace-bounces@ietf.org] On Behalf Of Kathleen Moriarty
Sent: Tuesday, July 26, 2016 1:26 PM
To: Michael StJohns
Cc: ace@ietf.org
Subject: Re: [Ace] Adoption of Low Latency Group Communication Security Work in ACE



On Tue, Jul 26, 2016 at 12:08 PM, Michael StJohns <mstjohns@comcast.net<mailto:mstjohns@comcast.net>> wrote:
On 7/26/2016 11:20 AM, Kathleen Moriarty wrote:
Just to note, I'm interested to see Mike's response on why this higher level of security is necessary in terms of a threat model.  I'm not convinced it is for lightbulbs, but that depends on how the threat model/solution is scoped and the advice for use - lightbulbs of current day capabilities and not other IoT devices with higher risk factors.


Hi Kathleen -

Can you describe how you would prevent this protocol from being used in "lower security threat environments"?  I can't and I've thought about how to write in various crippling conditions in the protocol structure without any useful conclusions.

Given that, and given that public key cryptography has the desired security properties, I remain unwilling to support symmetric key multicast for any cyberphysical protocol.  It's too risky and way too shortsighted.

A question remains unanswered about the possibility of support for what you propose in hardware asked earlier in the thread.  If there are real constraints that prevent using the better solution, we need to understand those constraints and work with what we have and determine the threat model.  You are assuming a zero trust model, which I would too for many situations, but I'm not sure that's necessary here.



Or put another way - you might as well use hashed passwords for the lighting problem - it has similar security properties to symmetric key multicast for control.

I understand the security implications fully.  I also understand that security is a balancing act with constraints, threat models and a risk assessment.  You might not use this to set the colors of the lights for the empire state building or you'd recommend that it be on an isolated network if you wanted to prevent tampering.
 There are ways to assess and mitigate threats and I don't think we should assume that isolated networks are out of the question unless the lighting manufacturers and IoT vendors working with us say that's not practical for the real use cases they have.



If we went forward with this, you'd need one of the biggest, blackest Black Box warnings on the protocol that we could conceive of to try to constrain this to the "low level of security" domains:

DON'T Use this protocol for anything but lighting control.
DON'T Use this protocol where the the maximum output of the lighting system could present a fire, thermal or blinding threat to safety.
DON'T Use this protocol to control lighting systems involved in decontamination and sterilization. (E.g. UV decontamination).
DON'T Use this protocol to control any power outage backup lighting system.
DON'T Implement this in a way that prevents local physical override of the lighting systems.

Or you say what the understood constraints are for using this protocol and recommend the use for isolated networks to prevent tampering.  We have a lower bar for the security of DHCP and connections to a DHCP server and I want to know that there is or is not a way to mitigate the threats associated with these concerns.  I don't see anything that helps in this response as you don't discuss the threat model or constraints that prevent the attacks you are worried about.  The message reads as one to scare off responses rather than get to the questions I asked.

Thanks,
Kathleen


I'm sure there are others.

Mike





Thanks,
Kathleen

On Tue, Jul 26, 2016 at 10:52 AM, Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com<mailto:kathleen.moriarty.ietf@gmail.com>> wrote:
Hello,



On Tue, Jul 26, 2016 at 7:10 AM, Kumar, Sandeep <sandeep.kumar@philips.com<mailto:sandeep.kumar@philips.com>> wrote:
Hi Rene

Makes more sense this way. Need to also add replay protection but that should be just part of the hash. Will it make things better for user experience? That depends on how big the pool of (good randomized) pre-computed values can be created before they run out and causes a stuck behavior.

If things can be made better, we should of course do that.  However, there are risk tradeoffs that sometimes make sense.  If it is not possible to precompute keys for speed, storage or some other reason, we need to figure that out and have it factored into a threat model.  This should all be part of a security considerations section (whatever is decided).  We are talking about cyber physical devices and controllers, in this case lightbulbs.  Sure, lightbulbs are evolving, so it may make a difference if we are talking about lightbulbs that can turn on/off, dim, change colors, or ones that perform other functions (MIT Media Lab type stuff).  It also matters if we are talking about use of lights within a controlled area and whether it is connected to other networks or not (IoT devices, Internet, protected network, etc.).  No one is suggesting that the same key be used in multiple environments, but a single group key for one environment.

There are always tradeoffs in security and that's okay.  What is the bigger threat model?

Lights turning on/off in large buildings could result in increased energy costs.
Lights turning on/off could result in safety issues (they could be extreme).

What measures would mitigate these (and maybe other risks)?  Suggest dividing up large buildings into sets so that a single group key could be used in that set.  Limit connections to other networks or have protective measures between them.

Maybe someone in this space can help more to build out the threat model to help the WG with this decision.  There are still some unanswered questions about the capabilities of hardware, are the alternate solutions to a group key feasible?  Will blocking the use of a single group key prevent the ability to move forward with a standard?

Thanks,
Kathleen


Regards
Sandeep



From: Rene Struik [mailto:rstruik.ext@gmail.com<mailto:rstruik.ext@gmail.com>]
Sent: Tuesday, July 26, 2016 3:00 AM
To: Kumar, Sandeep; Stephen Farrell; Somaraju Abhinav; Michael StJohns; ace@ietf.org<mailto:ace@ietf.org>

Subject: Re: [Ace] Adoption of Low Latency Group Communication Security Work in ACE

Hi Sandeep:

Fair enough, but with, e.g., ECDSA, computation of the ephemeral key R:=kG can be carried out independently of the remainder of the signature computation (where one computes e:=h(m), and calculates s:=(1/k)(e-r*d)(mod n) and subsequently outputs (r,s), where r is derived from R). So, if one wishes to, one can pre-compute many ephemeral key pairs (k, kG) and use those on demand {David Naccache, if I remember correctly, elaborated on these types of "labor division" in a 1998 paper}. So, in the Philips high-granularity luminary, the one simply hashes the state (still only a few-bytes entry) and then combines e with r, d, k, to produce signature component s -- a simple linear equation with two modular multiplies as cost.

Let's make things better...

Rene

On 7/25/2016 5:34 PM, Kumar, Sandeep wrote:

Because sometimes a lightswitch can have more than two states.

[http://images.philips.com/is/image/PhilipsConsumer/6916431PH-IMS-en_GB?wid=494&hei=435&$pnglarge$]

The color dial on this switch (src: http://www.philips.co.uk/c-p/6916431PH/livingcolors-remote-control) can set the color of lights one chooses. That would be quite some precomputations.



Sandeep





-----Original Message-----
From: Ace [mailto:ace-bounces@ietf.org] On Behalf Of Stephen Farrell
Sent: Monday, July 25, 2016 9:26 PM
To: Somaraju Abhinav; Michael StJohns; ace@ietf.org<mailto:ace@ietf.org>
Subject: Re: [Ace] Adoption of Low Latency Group Communication Security Work in ACE







On 25/07/16 17:59, Somaraju Abhinav wrote:

> we essentially have 50-100 ms for the signing+verification process and

> I do not know of a solution that does this



Just a clarifying question: why can't the signing possibly be done asynchronously? E.g. the private key holder could sign a value that will only be sent later - as long as it has one of those ready to emit whenever needed one can ignore the signing time. That can have power consumption consequences but I'd guess that's ok for a lightswitch.



If signing can be done ahead of time, then only verification time has to be considered.



S.





________________________________
The information contained in this message may be confidential and legally protected under applicable law. The message is intended solely for the addressee(s). If you are not the intended recipient, you are hereby notified that any use, forwarding, dissemination, or reproduction of this message is strictly prohibited and may be unlawful. If you are not the intended recipient, please contact the sender by return e-mail and destroy all copies of the original message.



_______________________________________________

Ace mailing list

Ace@ietf.org<mailto:Ace@ietf.org>

https://www.ietf.org/mailman/listinfo/ace




--

email: rstruik.ext@gmail.com<mailto:rstruik.ext@gmail.com> | Skype: rstruik

cell: +1 (647) 867-5658<tel:%2B1%20%28647%29%20867-5658> | US: +1 (415) 690-7363<tel:%2B1%20%28415%29%20690-7363>

_______________________________________________
Ace mailing list
Ace@ietf.org<mailto:Ace@ietf.org>
https://www.ietf.org/mailman/listinfo/ace



--

Best regards,
Kathleen



--

Best regards,
Kathleen


_______________________________________________

Ace mailing list

Ace@ietf.org<mailto:Ace@ietf.org>

https://www.ietf.org/mailman/listinfo/ace



_______________________________________________
Ace mailing list
Ace@ietf.org<mailto:Ace@ietf.org>
https://www.ietf.org/mailman/listinfo/ace



--

Best regards,
Kathleen