Re: [Ace] EST over CoAP: Randomness

Hannes Tschofenig <Hannes.Tschofenig@arm.com> Tue, 14 May 2019 16:46 UTC

Return-Path: <Hannes.Tschofenig@arm.com>
X-Original-To: ace@ietfa.amsl.com
Delivered-To: ace@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8DAB0120172 for <ace@ietfa.amsl.com>; Tue, 14 May 2019 09:46:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TNuXSxj5vuhn for <ace@ietfa.amsl.com>; Tue, 14 May 2019 09:46:26 -0700 (PDT)
Received: from EUR03-VE1-obe.outbound.protection.outlook.com (mail-ve1eur03on0630.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe09::630]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 240EE12015B for <ace@ietf.org>; Tue, 14 May 2019 09:46:25 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector1-arm-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=qNdzP78kz8ESB5NWGMQIcmSIYtBLZYrOcHQF6c5GlCk=; b=BpngFMkTc8s5KplRoL8DNR7lXKhMC63AZ95IArf+xGXf4oIE9hRwe1KupN/Usmp+QVjQaOvOxVxCVZA/xfDAoOsIEPOe16ay4LhFdnWzsykeolmiQdzkLAv2g5NxG9s9/0uDNu5n5uK2eRVB08G5Rwgv+UjRCK8nL2OU7kkopes=
Received: from DBBPR08MB4539.eurprd08.prod.outlook.com (20.179.44.144) by DBBPR08MB4774.eurprd08.prod.outlook.com (20.179.45.147) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1878.22; Tue, 14 May 2019 16:46:23 +0000
Received: from DBBPR08MB4539.eurprd08.prod.outlook.com ([fe80::3803:e042:abea:cd93]) by DBBPR08MB4539.eurprd08.prod.outlook.com ([fe80::3803:e042:abea:cd93%5]) with mapi id 15.20.1878.024; Tue, 14 May 2019 16:46:23 +0000
From: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
To: Esko Dijk <esko.dijk@iotconsultancy.nl>, "Panos Kampanakis (pkampana)" <pkampana@cisco.com>, "ace@ietf.org" <ace@ietf.org>
Thread-Topic: [Ace] EST over CoAP: Randomness
Thread-Index: AdUGcOnxX76zbRm2S2qe/nEWIh3V6AAamrQAAAw3WYAACv9EMAAPxWTgACLZPZA=
Date: Tue, 14 May 2019 16:46:23 +0000
Message-ID: <DBBPR08MB45396D216551692BCE594780FA080@DBBPR08MB4539.eurprd08.prod.outlook.com>
References: <DBBPR08MB45393CDF71E7DB02F6C6938CFA330@DBBPR08MB4539.eurprd08.prod.outlook.com> <MWHPR11MB18386309CD27A19485A6B204C90C0@MWHPR11MB1838.namprd11.prod.outlook.com> <DBBPR08MB4539CB2F66FB6DB66E30776FFA0C0@DBBPR08MB4539.eurprd08.prod.outlook.com> <MWHPR11MB18389FB713EB9DEDDC75BA99C90C0@MWHPR11MB1838.namprd11.prod.outlook.com> <DB6P190MB0054CCBC63956CBDFF8E0F37FD0C0@DB6P190MB0054.EURP190.PROD.OUTLOOK.COM>
In-Reply-To: <DB6P190MB0054CCBC63956CBDFF8E0F37FD0C0@DB6P190MB0054.EURP190.PROD.OUTLOOK.COM>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Hannes.Tschofenig@arm.com;
x-originating-ip: [96.64.251.237]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 1cd492b4-7594-4126-f5e6-08d6d88bb2d1
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600141)(711020)(4605104)(4618075)(2017052603328)(7193020); SRVR:DBBPR08MB4774;
x-ms-traffictypediagnostic: DBBPR08MB4774:
x-microsoft-antispam-prvs: <DBBPR08MB47745DA26D0425654CEE9264FA080@DBBPR08MB4774.eurprd08.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0037FD6480
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(346002)(376002)(366004)(39860400002)(136003)(396003)(40434004)(199004)(189003)(26005)(14454004)(74316002)(6506007)(486006)(478600001)(476003)(186003)(102836004)(9326002)(6246003)(7696005)(71190400001)(7736002)(76176011)(446003)(11346002)(66066001)(8676002)(81166006)(81156014)(71200400001)(53936002)(8936002)(99286004)(110136005)(68736007)(9686003)(25786009)(5660300002)(5024004)(256004)(14444005)(52536014)(6116002)(790700001)(3846002)(6306002)(54896002)(72206003)(55016002)(33656002)(64756008)(6436002)(2501003)(229853002)(86362001)(66946007)(66476007)(66556008)(2906002)(73956011)(66446008)(316002)(76116006); DIR:OUT; SFP:1101; SCL:1; SRVR:DBBPR08MB4774; H:DBBPR08MB4539.eurprd08.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: arm.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: GyzUZROrpcVLB0i/njamUcMyj5wW4uuheuZAJKbbJmz3m2/iVJzEt1F6CENhIPj5FLgK57YAZ9PqVX68wrXVHrvDlQRYqE1BxrlfyO2OJEJVtNofTxFyVxB/QeYinRfjpd6mH1H7pyosvpMb57MjqPRcTpqBvhhOwqvpMaY5TURFV8yqyjuHup2J6iRHvLDYl6sJvHBFq/y0pdKM+l7nJvUU8NmNeFKtgvf+agYqDDowD5oksWaiNN0LVoJq8t0kkwa2kxrTeWxBL6kXZltx7yFY7Yvsys3Uo/ZSaBbLCjenTAk3YB8B6RnWGwaeSR+XnVvn5tT3zQnLyUTqqudLR8Z4qyOwBu5EuBr5ICZ52/B5FOtHEzD30TJ8k4ZFnGT7CQQrPZPuQlMPKDFhZN4JgfaeGA7px0SgynhAL+Up5Cs=
Content-Type: multipart/alternative; boundary="_000_DBBPR08MB45396D216551692BCE594780FA080DBBPR08MB4539eurp_"
MIME-Version: 1.0
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 1cd492b4-7594-4126-f5e6-08d6d88bb2d1
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 May 2019 16:46:23.0791 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBBPR08MB4774
Archived-At: <https://mailarchive.ietf.org/arch/msg/ace/WN30WD7mo9VVcEtK0tk_dbeNk2Y>
Subject: Re: [Ace] EST over CoAP: Randomness
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 14 May 2019 16:46:41 -0000

Hi Esko,

good to hear from you.


  *   Another reason for server-side keygen can be that an IT department/manager wants it that way. There could be a policy that the keypairs for all domain certificates must be created by the systems under direct control of the IT department. (E.g. to comply with other policies or to be able to trust the randomness level. Or just because that was the way it always has been when PCs were provisioned with certificates.)  This could be listed as an additional reason.

For readers interested in making informed decisions I believe it is worthwhile to point out that they need random number generation capabilities on IoT devices – not just for the private key generation in context of the EST exchange. I fear that some people, including IT managers, just glance over the details and focus on isolated aspects. I am sure you agree with me that this would be a too simplistic view.

Ciao
Hannes

IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.