Re: [Ace] Design Consideration Document as one milestone?

Göran Selander <goran.selander@ericsson.com> Fri, 14 March 2014 11:02 UTC

Return-Path: <goran.selander@ericsson.com>
X-Original-To: ace@ietfa.amsl.com
Delivered-To: ace@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3AAB01A0119 for <ace@ietfa.amsl.com>; Fri, 14 Mar 2014 04:02:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.551
X-Spam-Level:
X-Spam-Status: No, score=-2.551 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, GB_AFFORDABLE=1, HELO_EQ_SE=0.35, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zjizX9ZoWAEu for <ace@ietfa.amsl.com>; Fri, 14 Mar 2014 04:02:47 -0700 (PDT)
Received: from mailgw2.ericsson.se (mailgw2.ericsson.se [193.180.251.37]) by ietfa.amsl.com (Postfix) with ESMTP id 1F09B1A0110 for <ace@ietf.org>; Fri, 14 Mar 2014 04:02:46 -0700 (PDT)
X-AuditID: c1b4fb25-b7f038e000005d01-e5-5322e1cf24b3
Received: from ESESSHC005.ericsson.se (Unknown_Domain [153.88.253.124]) by mailgw2.ericsson.se (Symantec Mail Security) with SMTP id 4E.A3.23809.FC1E2235; Fri, 14 Mar 2014 12:02:39 +0100 (CET)
Received: from ESESSMB303.ericsson.se ([169.254.3.152]) by ESESSHC005.ericsson.se ([153.88.183.33]) with mapi id 14.02.0387.000; Fri, 14 Mar 2014 12:02:39 +0100
From: Göran Selander <goran.selander@ericsson.com>
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>, "ace@ietf.org" <ace@ietf.org>
Thread-Topic: [Ace] Design Consideration Document as one milestone?
Thread-Index: AQHPPrewRMKjLCAMGkyGQgBzpjAjyZrfHJ+AgAABaQCAAU5cgA==
Date: Fri, 14 Mar 2014 11:02:38 +0000
Message-ID: <CF487533.B583%goran.selander@ericsson.com>
References: <53210566.60100@gmx.net> <CF477EB6.B3F8%goran.selander@ericsson.com> <5321D764.5010000@gmx.net>
In-Reply-To: <5321D764.5010000@gmx.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/14.3.9.131030
x-originating-ip: [153.88.183.18]
Content-Type: text/plain; charset="windows-1254"
Content-ID: <E84016C29637B9449C36A2DB871EDE62@ericsson.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFnrCLMWRmVeSWpSXmKPExsUyM+Jvje75h0rBBjN2GFt8/9bDbLF05z1W ByaPxZv2s3ksWfKTKYApissmJTUnsyy1SN8ugSuj79ontoJzOhVfHk5hb2BcqNLFyMkhIWAi sWbBVzYIW0ziwr31QDYXh5DAIUaJidNvMEE4Sxgl9nZcYgGpYhNwl5izdyWYLSIQJHG48TVY t7CAk8Ta97PZIeLOEosPLmGEsJ0kTm48BBZnEVCV6HzyAGgoBwevgLnEr5NgRwgJ5Eo0NJ8F G8MpoC4x5c1hZhCbEeig76fWMIHYzALiEreezGeCOFRAYsme88wQtqjEy8f/WEFsUQE9iXuP 5rJAxBUlPr7axwjRayBx5NxNVgjbWuLfg49QcW2JZQtfg83hFRCUODnzCcsERvFZSNbNQtI+ C0n7LCTts5C0L2BkXcXInpuYmZNebrSJERhTB7f8Vt3BeOecyCFGaQ4WJXHeD2+dg4QE0hNL UrNTUwtSi+KLSnNSiw8xMnFwSjUwilfNd6l0jF9b1/Vnstuj3WYtbGasDW5ME/nrW9/cUXuy 3axb95Wqmd13V/UpW4X2T7SuWGe+6ZmG1PQFM1ccXDgr7qWGwcdLkrfZTrApbbN6OnVZ1vyu givT+y7aia1frlm13qtf7fIVHi1/39tXHD6d9dX5aGj6tNHn9NeHIVMYmD6FqSZeUGIpzkg0 1GIuKk4EAHm69K13AgAA
Archived-At: http://mailarchive.ietf.org/arch/msg/ace/ekTc6-IIG44hCIm2A9dtH_4LE0g
Subject: Re: [Ace] Design Consideration Document as one milestone?
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Mar 2014 11:02:50 -0000

Hi Hannes

More good comments.

There are two things here:

1. One is to describe how properties of a security protocol impact the
"performance” of constrained devices in scope of this work, and what trade
offs are possible.

2. The other is to list and motivate assumptions and design choices made
in the work to select/profile the security protocol to be made by this
group.

The motivations in 2. should be based on the understanding to the
properties in 1. Whether we need to actually document 1. or not depend on
if we assume that people who will review 2 have this knowledge.


While we cannot optimise the protocol for each given system, I claim that
there is some basic knowledge about constrained devices which may speak
for/against certain protocol candidates.

Maybe we should have tutorials on this too?

I think Klaus’ draft on practical issues with DTLS, although not speaking
about security protocols in general, is a good starting point:
http://tools.ietf.org/id/draft-hartke-dice-practical-issues-00.txt


More comments inline

On 13/03/14 17:05, "Hannes Tschofenig" <hannes.tschofenig@gmx.net> wrote:

>Hi Goeran,
>
>you raise another difficult question that relates a bit to the type of
>IoT devices have in mind. I fully agree with the challenge you
>identified regarding symmetric vs. asymmetric key crypto. It will be
>difficult to reach a consensus on that topic since most people in the
>group are actually not building devices themselves and therefore just
>use what fits their solution best.
>
>The cost of transmission that you mention is also important but the
>implication of just having fewer round-trips is a bit too simplistic
>since a constrained resource server will obviously suffer a lot since he
>has to listen for incoming connection attempts.

Yes, round trips is too simplistic, e.g. size of messages has a large
impact too considering fragmentation. Even “listening" is too simplistic,
since there are various aspects of discontinuous reception, low-power
listening etc. So what can we say? There is expertise on specific
platforms and although there may be differences, my expectation is that
there is some common features like e.g. the cost for communication vs
symmetric crypto in a security protocol.

Göran


>
>So, I fear that (while these are super important aspects) we will have a
>hard time to make any useful decisions about them is two-fold:
>
> * We are not designing complete systems in the IETF and the energy
>assumption relates to the overall system (rather than a single
>protocol). Most of it is outside the IETF protocol design.
>
> * The processing capability obviously depends on the hardware and we
>are not making any statement about hardware in the group. Looking at
>Carsten's presentation from the BOF it also relates to cost, which is
>again a very complicated topic since hardware cost is not the only cost
>in product development.
>
>The classes in the LWIG terminology document do not go into any level of
>details regarding computational power and energy consumption. Only the
>memory requirements are listed in more detail and they seem to be rather
>hand-wavy.
>
>Ciao
>Hannes
>
>
>On 03/13/2014 04:00 PM, Göran Selander wrote:
>> Hi Hannes
>> 
>> Thanks for bringing this up. Let me give some context.
>> 
>> In the preparation for the BOF (and as was later shown in the BOF) it
>>was
>> clear that there are strong opinions about the (in)feasibility of
>>/public
>> key/ crypto in constrained devices. Some people state that ³there will
>> only be two public key operations in the lifetime of this device²,
>> referring to the high cost for asymmetric crypto so that they are only
>> used to establishing secret keys that are used thereafter. Yet other
>> people state ³the cost for public key crypto is negligable in today¹s
>> devices² 
>> 
>> Looking into the literature it is clear that public key crypto is in
>>many
>> cases affordable, but also that it does not come for free. Moreover,
>>when
>> comparing e.g. with message transmission and reception in wireless
>> embedded devices, you get another picture what may be expensive in
>> security protocol execution from an energy consumption point of view.
>> Section 3.2.2 discusses this in a symmetric crypto context.
>> 
>> This draft was put together in a rush a few days before cutoff and
>> contains mainly obvious things. As said, I¹m happy to use this as a
>>basis
>> for a Wiki or restart the discussion. What I would like to see
>>documented
>> is the (non-obvious) cost comparisons  and trade-offs between e.g.
>> round-trips and crypto operations, symmetric vs asymmetric operations
>>etc.
>> to be able to refer to in future discussions when we need to assess the
>> feasibility of a particular security protocol in a constrained
>>environment.
>> 
>> 
>> Göran
>> 
>> 
>> On 13/03/14 02:09, "Hannes Tschofenig" <hannes.tschofenig@gmx.net>
>>wrote:
>> 
>>> Goeran raised a question about adding a milestone for a document that
>>> captures assumptions and design criteria.
>>>
>>> He contributed an initial version of such a document with
>>> https://tools.ietf.org/html/draft-seitz-ace-design-considerations-00
>>>
>>> What does the rest of the group think about that idea?
>>>
>>> Would you be willing to review such a document?
>>> Would you be willing to contribute to such a document?
>>>
>>> Ciao
>>> Hannes
>>>
>> 
>> _______________________________________________
>> Ace mailing list
>> Ace@ietf.org
>> https://www.ietf.org/mailman/listinfo/ace
>> 
>