Re: [Ace] Adoption of Low Latency Group Communication Security Work in ACE

Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com> Tue, 26 July 2016 17:26 UTC

Return-Path: <kathleen.moriarty.ietf@gmail.com>
X-Original-To: ace@ietfa.amsl.com
Delivered-To: ace@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7FCAA12D80E for <ace@ietfa.amsl.com>; Tue, 26 Jul 2016 10:26:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.689
X-Spam-Level:
X-Spam-Status: No, score=-2.689 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id raaz3geY_xJ1 for <ace@ietfa.amsl.com>; Tue, 26 Jul 2016 10:26:07 -0700 (PDT)
Received: from mail-yw0-x230.google.com (mail-yw0-x230.google.com [IPv6:2607:f8b0:4002:c05::230]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CE85412D806 for <ace@ietf.org>; Tue, 26 Jul 2016 10:26:06 -0700 (PDT)
Received: by mail-yw0-x230.google.com with SMTP id j12so22970290ywb.2 for <ace@ietf.org>; Tue, 26 Jul 2016 10:26:06 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=ZqLDvwHzj/ZWDZIc4cfcmz1crPQA9iqbcoty+t4t1FQ=; b=U3nF7jGsgtB/mr3CQDeal6EVm1ssg3+/urXnpyuT7qZouGiTR9cwuByGz2r8WSW5Ao 8x80vZ48yxb1dHVDP+uNgo6NR+d0bLo0Kzd8bJXLFh0dTIXIrR2bwAqJtuJHLJ3iCn1k b1LYwZklRaRbPX+9wpH8fFtVPy6RRllhnrN5UIfXidTmdit2vzTv3HjnsRTwFHEMArTm Wrq/wsCS0uLP1ix1wiGD6oeqQyT7DZ6/8rCWU9ERL9mtyvEPv0Npo7ddOSwkLDUsR+it 6CJ2PqhMZuGQo/c7K+oOCqnwMUqZRLKJwXWaiN8jNg1R+w3OGHE5MevagG04exwoNA+j EfWQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=ZqLDvwHzj/ZWDZIc4cfcmz1crPQA9iqbcoty+t4t1FQ=; b=GTyYZ3ruHckO0TiLpwRjnEFcjC9Ouiy8/PzSEshz0134Vd0M+VC9TzWBhLpCouWRL+ nfmivk0zyugr3uKRh5Oe8dhZKMKyg47mCYjeZq36wQgSyrvlSU2hHTPmY1sMY5yxk0v5 KxOCmepsgV/SPmTf5oytDiNt8de20BCzyzwBFd6YegsbEKMNqoWQN363BQORplGPrZTn Cy8x50DZFnJ9cG6Zqqcljhw/VGuan+N1m0pMg+qgAeUN8n39HV0M/SW1YUb/ylfp9zby F548+c4f0eR9y9BjtAW2gbdVmt3YfQvGrhr/+FXFbQOwx8JZ6TJAbUywzBwvR2EvM8/6 y3mg==
X-Gm-Message-State: AEkoousJHX4myojrZnPz7jdWfXsWkqzP0nvAkD9uQJNRhF7gFBOoOuHEW1jcOLjkVpmeDOPD3a8oetQoCrO6Mw==
X-Received: by 10.31.120.76 with SMTP id t73mr10640935vkc.81.1469553965808; Tue, 26 Jul 2016 10:26:05 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.159.37.104 with HTTP; Tue, 26 Jul 2016 10:26:04 -0700 (PDT)
In-Reply-To: <de53e908-9b1f-fe74-46fa-a78a07b8ea76@comcast.net>
References: <578F4D59.8050005@gmx.net> <5E393DF26B791A428E5F003BB6C5342AB3716D64@OC11EXPO33.exchange.mit.edu> <23666.1469091857@obiwan.sandelman.ca> <95b0103c-ba2d-6cd8-6241-228df46e530b@sics.se> <8ca27108-a8b9-7b07-e752-656247716708@comcast.net> <HE1PR0601MB22030003D2913DA6096CB3E4FC0D0@HE1PR0601MB2203.eurprd06.prod.outlook.com> <a318cda7-ebf2-5a5c-d86a-9d67fb41a82f@comcast.net> <HE1PR0601MB2203D1C2C96278B23D71AD31FC0D0@HE1PR0601MB2203.eurprd06.prod.outlook.com> <f293e325-bea2-5c27-c677-563f05c60da0@cs.tcd.ie> <bf8531981ecd4a0db3607f9ef5328d38@VI1PR9003MB0237.MGDPHG.emi.philips.com> <8bbc028d-0960-3f93-ccc2-e8746fd98ca6@gmail.com> <579d47e5f90a43e194135e8c46c82159@VI1PR9003MB0237.MGDPHG.emi.philips.com> <CAHbuEH4Z071rdTf=x0bUKd3tkt_r-0k5-vXsYYeoHQrgH1AnTg@mail.gmail.com> <CAHbuEH6CnhHPoJ+pSsYxuUur-AQscLeHsJmEBs4je_cGAeLGsA@mail.gmail.com> <de53e908-9b1f-fe74-46fa-a78a07b8ea76@comcast.net>
From: Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>
Date: Tue, 26 Jul 2016 13:26:04 -0400
Message-ID: <CAHbuEH4oQyYi2MT8wN6gHbyGg6wWUFfbV8oJ6MKRempVetY4yw@mail.gmail.com>
To: Michael StJohns <mstjohns@comcast.net>
Content-Type: multipart/related; boundary="94eb2c14b1721ccd3205388d32da"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ace/idP6I3k2Ju5Kw6t-Rb7n_DZcsYE>
Cc: "ace@ietf.org" <ace@ietf.org>
Subject: Re: [Ace] Adoption of Low Latency Group Communication Security Work in ACE
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Jul 2016 17:26:09 -0000

On Tue, Jul 26, 2016 at 12:08 PM, Michael StJohns <mstjohns@comcast.net>
wrote:

> On 7/26/2016 11:20 AM, Kathleen Moriarty wrote:
>
> Just to note, I'm interested to see Mike's response on why this higher
> level of security is necessary in terms of a threat model.  I'm not
> convinced it is for lightbulbs, but that depends on how the threat
> model/solution is scoped and the advice for use - lightbulbs of current day
> capabilities and not other IoT devices with higher risk factors.
>
>
> Hi Kathleen -
>
> Can you describe how you would prevent this protocol from being used in
> "lower security threat environments"?  I can't and I've thought about how
> to write in various crippling conditions in the protocol structure without
> any useful conclusions.
>
> Given that, and given that public key cryptography has the desired
> security properties, I remain unwilling to support symmetric key multicast
> for any cyberphysical protocol.  It's too risky and way too shortsighted.
>

A question remains unanswered about the possibility of support for what you
propose in hardware asked earlier in the thread.  If there are real
constraints that prevent using the better solution, we need to understand
those constraints and work with what we have and determine the threat
model.  You are assuming a zero trust model, which I would too for many
situations, but I'm not sure that's necessary here.



>
> Or put another way - you might as well use hashed passwords for the
> lighting problem - it has similar security properties to symmetric key
> multicast for control.
>

I understand the security implications fully.  I also understand that
security is a balancing act with constraints, threat models and a risk
assessment.  You might not use this to set the colors of the lights for the
empire state building or you'd recommend that it be on an isolated network
if you wanted to prevent tampering.
 There are ways to assess and mitigate threats and I don't think we should
assume that isolated networks are out of the question unless the lighting
manufacturers and IoT vendors working with us say that's not practical for
the real use cases they have.



>
> If we went forward with this, you'd need one of the biggest, blackest
> Black Box warnings on the protocol that we could conceive of to try to
> constrain this to the "low level of security" domains:
>
> DON'T Use this protocol for anything but lighting control.
> DON'T Use this protocol where the the maximum output of the lighting
> system could present a fire, thermal or blinding threat to safety.
> DON'T Use this protocol to control lighting systems involved in
> decontamination and sterilization. (E.g. UV decontamination).
> DON'T Use this protocol to control any power outage backup lighting system.
> DON'T Implement this in a way that prevents local physical override of the
> lighting systems.
>

Or you say what the understood constraints are for using this protocol and
recommend the use for isolated networks to prevent tampering.  We have a
lower bar for the security of DHCP and connections to a DHCP server and I
want to know that there is or is not a way to mitigate the threats
associated with these concerns.  I don't see anything that helps in this
response as you don't discuss the threat model or constraints that prevent
the attacks you are worried about.  The message reads as one to scare off
responses rather than get to the questions I asked.

Thanks,
Kathleen


> I'm sure there are others.
>
> Mike
>
>
>
>
> Thanks,
> Kathleen
>
> On Tue, Jul 26, 2016 at 10:52 AM, Kathleen Moriarty <
> kathleen.moriarty.ietf@gmail.com> wrote:
>
>> Hello,
>>
>>
>>
>> On Tue, Jul 26, 2016 at 7:10 AM, Kumar, Sandeep <
>> sandeep.kumar@philips.com> wrote:
>>
>>> Hi Rene
>>>
>>>
>>>
>>> Makes more sense this way. Need to also add replay protection but that
>>> should be just part of the hash. Will it make things better for user
>>> experience? That depends on how big the pool of (good randomized)
>>> pre-computed values can be created before they run out and causes a stuck
>>> behavior.
>>>
>>
>> If things can be made better, we should of course do that.  However,
>> there are risk tradeoffs that sometimes make sense.  If it is not possible
>> to precompute keys for speed, storage or some other reason, we need to
>> figure that out and have it factored into a threat model.  This should all
>> be part of a security considerations section (whatever is decided).  We are
>> talking about cyber physical devices and controllers, in this case
>> lightbulbs.  Sure, lightbulbs are evolving, so it may make a difference if
>> we are talking about lightbulbs that can turn on/off, dim, change colors,
>> or ones that perform other functions (MIT Media Lab type stuff).  It also
>> matters if we are talking about use of lights within a controlled area and
>> whether it is connected to other networks or not (IoT devices, Internet,
>> protected network, etc.).  No one is suggesting that the same key be used
>> in multiple environments, but a single group key for one environment.
>>
>> There are always tradeoffs in security and that's okay.  What is the
>> bigger threat model?
>>
>> Lights turning on/off in large buildings could result in increased energy
>> costs.
>> Lights turning on/off could result in safety issues (they could be
>> extreme).
>>
>> What measures would mitigate these (and maybe other risks)?  Suggest
>> dividing up large buildings into sets so that a single group key could be
>> used in that set.  Limit connections to other networks or have protective
>> measures between them.
>>
>> Maybe someone in this space can help more to build out the threat model
>> to help the WG with this decision.  There are still some unanswered
>> questions about the capabilities of hardware, are the alternate solutions
>> to a group key feasible?  Will blocking the use of a single group key
>> prevent the ability to move forward with a standard?
>>
>> Thanks,
>> Kathleen
>>
>>
>>>
>>>
>>> Regards
>>>
>>> Sandeep
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>> *From:* Rene Struik [mailto:rstruik.ext@gmail.com]
>>> *Sent:* Tuesday, July 26, 2016 3:00 AM
>>> *To:* Kumar, Sandeep; Stephen Farrell; Somaraju Abhinav; Michael
>>> StJohns; ace@ietf.org
>>>
>>> *Subject:* Re: [Ace] Adoption of Low Latency Group Communication
>>> Security Work in ACE
>>>
>>>
>>>
>>> Hi Sandeep:
>>>
>>> Fair enough, but with, e.g., ECDSA, computation of the ephemeral key
>>> R:=kG can be carried out independently of the remainder of the signature
>>> computation (where one computes e:=h(m), and calculates s:=(1/k)(e-r*d)(mod
>>> n) and subsequently outputs (r,s), where r is derived from R). So, if one
>>> wishes to, one can pre-compute many ephemeral key pairs (k, kG) and use
>>> those on demand {David Naccache, if I remember correctly, elaborated on
>>> these types of "labor division" in a 1998 paper}. So, in the Philips
>>> high-granularity luminary, the one simply hashes the state (still only a
>>> few-bytes entry) and then combines e with r, d, k, to produce signature
>>> component s -- a simple linear equation with two modular multiplies as cost.
>>>
>>> Let's make things better...
>>>
>>> Rene
>>>
>>> On 7/25/2016 5:34 PM, Kumar, Sandeep wrote:
>>>
>>> Because sometimes a lightswitch can have more than two states.
>>>
>>> [image:
>>> http://images.philips.com/is/image/PhilipsConsumer/6916431PH-IMS-en_GB?wid=494&hei=435&$pnglarge$]
>>>
>>> The color dial on this switch (src:
>>> http://www.philips.co.uk/c-p/6916431PH/livingcolors-remote-control) can
>>> set the color of lights one chooses. That would be quite some
>>> precomputations.
>>>
>>>
>>>
>>> Sandeep
>>>
>>>
>>>
>>>
>>>
>>> -----Original Message-----
>>> From: Ace [mailto:ace-bounces@ietf.org <ace-bounces@ietf.org>] On
>>> Behalf Of Stephen Farrell
>>> Sent: Monday, July 25, 2016 9:26 PM
>>> To: Somaraju Abhinav; Michael StJohns; ace@ietf.org
>>> Subject: Re: [Ace] Adoption of Low Latency Group Communication Security
>>> Work in ACE
>>>
>>>
>>>
>>>
>>>
>>>
>>>
>>> On 25/07/16 17:59, Somaraju Abhinav wrote:
>>>
>>> > we essentially have 50-100 ms for the signing+verification process and
>>>
>>> > I do not know of a solution that does this
>>>
>>>
>>>
>>> Just a clarifying question: why can't the signing possibly be done
>>> asynchronously? E.g. the private key holder could sign a value that will
>>> only be sent later - as long as it has one of those ready to emit whenever
>>> needed one can ignore the signing time. That can have power consumption
>>> consequences but I'd guess that's ok for a lightswitch.
>>>
>>>
>>>
>>> If signing can be done ahead of time, then only verification time has to
>>> be considered.
>>>
>>>
>>>
>>> S.
>>>
>>>
>>>
>>>
>>>
>>>
>>> ------------------------------
>>>
>>> The information contained in this message may be confidential and
>>> legally protected under applicable law. The message is intended solely for
>>> the addressee(s). If you are not the intended recipient, you are hereby
>>> notified that any use, forwarding, dissemination, or reproduction of this
>>> message is strictly prohibited and may be unlawful. If you are not the
>>> intended recipient, please contact the sender by return e-mail and destroy
>>> all copies of the original message.
>>>
>>>
>>>
>>> _______________________________________________
>>>
>>> Ace mailing list
>>>
>>> Ace@ietf.org
>>>
>>> https://www.ietf.org/mailman/listinfo/ace
>>>
>>>
>>>
>>>
>>>
>>> --
>>>
>>> email: rstruik.ext@gmail.com | Skype: rstruik
>>>
>>> cell: +1 (647) 867-5658 | US: +1 (415) 690-7363
>>>
>>>
>>> _______________________________________________
>>> Ace mailing list
>>> Ace@ietf.org
>>> https://www.ietf.org/mailman/listinfo/ace
>>>
>>>
>>
>>
>> --
>>
>> Best regards,
>> Kathleen
>>
>
>
>
> --
>
> Best regards,
> Kathleen
>
>
> _______________________________________________
> Ace mailing listAce@ietf.orghttps://www.ietf.org/mailman/listinfo/ace
>
>
>
> _______________________________________________
> Ace mailing list
> Ace@ietf.org
> https://www.ietf.org/mailman/listinfo/ace
>
>


-- 

Best regards,
Kathleen