Re: [Ace] Stephen Farrell's Yes on draft-ietf-ace-usecases-09: (with COMMENT)
Stephen Farrell <stephen.farrell@cs.tcd.ie> Thu, 22 October 2015 14:06 UTC
Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: ace@ietfa.amsl.com
Delivered-To: ace@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B17F01ACE78; Thu, 22 Oct 2015 07:06:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.311
X-Spam-Level:
X-Spam-Status: No, score=-4.311 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XJzD_KeA3G48; Thu, 22 Oct 2015 07:06:24 -0700 (PDT)
Received: from mercury.scss.tcd.ie (mercury.scss.tcd.ie [134.226.56.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 11D421ACE70; Thu, 22 Oct 2015 07:06:24 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id 3C796BE35; Thu, 22 Oct 2015 15:06:22 +0100 (IST)
Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Y7sH1WKm8yvZ; Thu, 22 Oct 2015 15:06:22 +0100 (IST)
Received: from [134.226.36.93] (bilbo.dsg.cs.tcd.ie [134.226.36.93]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id 33EF5BE32; Thu, 22 Oct 2015 15:06:21 +0100 (IST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cs.tcd.ie; s=mail; t=1445522782; bh=2B7Gx0Z87Wp3DyGFoF+ryLVezsshz4TKDw5bc1ThzXE=; h=Subject:To:References:Cc:From:Date:In-Reply-To:From; b=nnSBQr7wjV/17IaB7w9SbWZuxPtxm4NNiyROb3DVKQG4nMAgQllRJZ+EQB9azhKKw lgjm5ijyUDgvm3hio/wp/1E51Puwmj7FLdF7wDdbXP+174bDNhAgcQPMIBN6zLn4zh 9xUrT6Lzf9nnSN6Otu6Xi7ew6an6tlgM84f4t5Uc=
To: Carsten Bormann <cabo@tzi.org>
References: <20151022132903.23826.2689.idtracker@ietfa.amsl.com> <9727B59F-CD2D-4A32-8F7B-F5C89EE2E388@tzi.org>
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
Openpgp: id=D66EA7906F0B897FB2E97D582F3C8736805F8DA2; url=
Message-ID: <5628ED5D.7070508@cs.tcd.ie>
Date: Thu, 22 Oct 2015 15:06:21 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.3.0
MIME-Version: 1.0
In-Reply-To: <9727B59F-CD2D-4A32-8F7B-F5C89EE2E388@tzi.org>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/ace/tuEOkJtRv1IXm9WsC_HBQXYNUbg>
Cc: Hannes.Tschofenig@gmx.net, ace-chairs@ietf.org, draft-ietf-ace-usecases@ietf.org, The IESG <iesg@ietf.org>, ace@ietf.org
Subject: Re: [Ace] Stephen Farrell's Yes on draft-ietf-ace-usecases-09: (with COMMENT)
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 22 Oct 2015 14:06:29 -0000
On 22/10/15 14:59, Carsten Bormann wrote: > Hi Stephen, > > I agree with all of these. However, they are not specific to ACE; > they are general security considerations for constrained devices (or > IoT things in general). I think what we need to do is collect the > security considerations we have in, say, RFC 7252, RFC 7228, etc., > combine this with the points below and a few more that came up, and > generate a referenceable “Security Considerations for Constrained > Devices on the Internet” document. I’d love to reference that from > any document I’m working on. Such a document would indeed be a fine thing. Do we have folks who are willing and able already? That said, I do think there may be ace-specific use-cases to be derived from (some of) the points raised, e.g. handling end of life is maybe not the same as a handover after the vendor is off the stage. S. > > Grüße, Carsten > > >> On 22 Oct 2015, at 15:29, Stephen Farrell >> <stephen.farrell@cs.tcd.ie> wrote: >> >> Stephen Farrell has entered the following ballot position for >> draft-ietf-ace-usecases-09: Yes >> >> When responding, please keep the subject line intact and reply to >> all email addresses included in the To and CC lines. (Feel free to >> cut this introductory paragraph, however.) >> >> >> Please refer to >> https://www.ietf.org/iesg/statement/discuss-criteria.html for more >> information about IESG DISCUSS and COMMENT positions. >> >> >> The document, along with other ballot positions, can be found >> here: https://datatracker.ietf.org/doc/draft-ietf-ace-usecases/ >> >> >> >> ---------------------------------------------------------------------- >> >> COMMENT: >> ---------------------------------------------------------------------- >> >> >> >> Excellent and well written document, thanks. I think there are >> five things you could usefully add, see below. That said, I agree >> that this cannot and should not try to be fully complete so I won't >> argue (much:-) if you prefer to omit these. We/you can figure out >> what if any text to add I'm sure, but I'm happy to chat about >> that. >> >> 1. Software update is really needed and often missing and usually >> hard. There's at least a need to authenticate and authorize new >> firmware, when there is any update. That may not be the same as >> authorizing a new config. >> >> 2. Alice buys a new device, and would like to know if it is calling >> home or what it is doing before she configures it, or perhaps >> before she accepts it in her network. Even if she accepts it, she >> may want to be able to monitor the data it is sending "home" e.g. >> to ensure her TV is not sending data when she inserts a USB stick, >> if that is undesired. >> >> 3. Device fingerprinting is a threat that ought be considered by >> solution developers, especially if there is no reliable software >> update. Probably the best to be done is to try to make it hard for >> unauthorized parties to fingerprint a device, but that's also >> hard. >> >> 4. Commercial Devices will be end-of-lifed by vendors, and yet >> Alice still needs to be able to use, and perhaos to update, the >> device. That calls for some kind of authorization handover which is >> not quite the same as a change of ownership. >> >> 5. Penetration testing will happen and devices should not barf even >> then. Maybe that's a security consideration worth a mention. >> >> See also the secdir review. [1] It'd be good to see a response to >> that. >> >> [1] >> https://www.ietf.org/mail-archive/web/secdir/current/msg06101.html >> >> >> _______________________________________________ Ace mailing list >> Ace@ietf.org https://www.ietf.org/mailman/listinfo/ace >> >
- [Ace] Stephen Farrell's Yes on draft-ietf-ace-use… Stephen Farrell
- Re: [Ace] Stephen Farrell's Yes on draft-ietf-ace… Carsten Bormann
- Re: [Ace] Stephen Farrell's Yes on draft-ietf-ace… Stephen Farrell
- Re: [Ace] Stephen Farrell's Yes on draft-ietf-ace… Kumar, Sandeep
- Re: [Ace] Stephen Farrell's Yes on draft-ietf-ace… Carsten Bormann
- Re: [Ace] Stephen Farrell's Yes on draft-ietf-ace… Kathleen Moriarty
- Re: [Ace] Stephen Farrell's Yes on draft-ietf-ace… Ludwig Seitz
- Re: [Ace] Stephen Farrell's Yes on draft-ietf-ace… Stephen Farrell
- Re: [Ace] Stephen Farrell's Yes on draft-ietf-ace… Kathleen Moriarty
- Re: [Ace] Stephen Farrell's Yes on draft-ietf-ace… Ludwig Seitz
- Re: [Ace] Stephen Farrell's Yes on draft-ietf-ace… Stefanie Gerdes
- Re: [Ace] Stephen Farrell's Yes on draft-ietf-ace… Kathleen Moriarty
- Re: [Ace] Stephen Farrell's Yes on draft-ietf-ace… Ludwig Seitz
- Re: [Ace] Stephen Farrell's Yes on draft-ietf-ace… Kathleen Moriarty