Re: [Anima-bootstrap] AN Group Key

Brian E Carpenter <brian.e.carpenter@gmail.com> Mon, 24 October 2016 18:57 UTC

Return-Path: <brian.e.carpenter@gmail.com>
X-Original-To: anima-bootstrap@ietfa.amsl.com
Delivered-To: anima-bootstrap@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 804FA1299B9 for <anima-bootstrap@ietfa.amsl.com>; Mon, 24 Oct 2016 11:57:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level:
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id G3DC5aPLEvNu for <anima-bootstrap@ietfa.amsl.com>; Mon, 24 Oct 2016 11:57:36 -0700 (PDT)
Received: from mail-pf0-x236.google.com (mail-pf0-x236.google.com [IPv6:2607:f8b0:400e:c00::236]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 041661299B7 for <anima-bootstrap@ietf.org>; Mon, 24 Oct 2016 11:57:36 -0700 (PDT)
Received: by mail-pf0-x236.google.com with SMTP id e6so103501704pfk.3 for <anima-bootstrap@ietf.org>; Mon, 24 Oct 2016 11:57:35 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=subject:to:references:cc:from:organization:message-id:date :user-agent:mime-version:in-reply-to:content-transfer-encoding; bh=Y62GQKdlGyVdZUhIbHo/QcpUt5JSlGFuAt+nqYPLtUc=; b=CcYzYwxL+k974BbLiUUPOuL05Qs/hsFWUdOPbuDMNoa8KdNu3/K7zAL0FAqfFgf7Wl ENkp504gLNJ9H1MdDRNODdfkiGwyCWR6/lvJ0g4Oyn1sSY8LH+fPTmbBBbqZXCdX5JSD UD2v3M2a70Lz6ymoUGVnibs/DmppCsfXrtsPbUaYg9AvSu2fBMVxfDG9i4N3hP0MkmBZ /hkIgfitYgfn5Mjv2uRpJ2KEXGpLowmtLUz/wnn6KUJy1bKeA+CK0Wt2yf0Mozgz1CKl gHPl63ALCrOAKgGvQ7qCKLhCRmSTB8dR8mWGG8DRBi/6We/u4gVdamWHX+90t5L1OJOC KK3A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:subject:to:references:cc:from:organization :message-id:date:user-agent:mime-version:in-reply-to :content-transfer-encoding; bh=Y62GQKdlGyVdZUhIbHo/QcpUt5JSlGFuAt+nqYPLtUc=; b=fsBo29xSyNd5M3S0aisiRp2DSsq0OTzB2TacLQScyDl1YapPulkABBIqquxUivu7+a odEs3llJERFycQvmELi7l7oMuUuEWllMtFzRqC/vhP7JPDXqLi/lmwC+Ns/34NKScaLN CRxKWYfFXFHpYvy+bOZv4FLwbSWpqFDU/tbd9Gb0WTAjVBK5xC/zsrC60X9LxYgfH1oj TquocwrwqiwtyLEIFIzepMrH6ufKFJphR5RvC4RwBigECB/T34UHwUfJDmv5nEcw2zvr GmN+eI+BkVfdIcgp6T9CM4ke5JMJ8iegUirJAnp6GDSx1WbOFj9axL5rl8MYcHcY5Doc 0s9A==
X-Gm-Message-State: ABUngvdBTzNkVBDm+c3dxdNCNlqjeYeeF/e8KCwygrOy/QJ1EYD4HjtIAI4U54k+MgCG6g==
X-Received: by 10.98.80.2 with SMTP id e2mr31814063pfb.183.1477335455483; Mon, 24 Oct 2016 11:57:35 -0700 (PDT)
Received: from ?IPv6:2406:e007:6593:1:28cc:dc4c:9703:6781? ([2406:e007:6593:1:28cc:dc4c:9703:6781]) by smtp.gmail.com with ESMTPSA id cp2sm27256885pad.3.2016.10.24.11.57.33 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 24 Oct 2016 11:57:35 -0700 (PDT)
To: "Max Pritikin (pritikin)" <pritikin@cisco.com>
References: <b72c6437-bb28-3ab6-49bf-727f8e962dbd@gmail.com> <7DBD3957-4BAC-4902-B3FE-A0D1B011EBF6@cisco.com>
From: Brian E Carpenter <brian.e.carpenter@gmail.com>
Organization: University of Auckland
Message-ID: <de087d0d-8310-d8b1-9964-e653f9a9c845@gmail.com>
Date: Tue, 25 Oct 2016 07:57:33 +1300
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.4.0
MIME-Version: 1.0
In-Reply-To: <7DBD3957-4BAC-4902-B3FE-A0D1B011EBF6@cisco.com>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/anima-bootstrap/rF_vGDbzUJLs-kmnrvjXTHTtuwo>
Cc: anima-bootstrap <anima-bootstrap@ietf.org>
Subject: Re: [Anima-bootstrap] AN Group Key
X-BeenThere: anima-bootstrap@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Mailing list for the bootstrap design team of the ANIMA WG <anima-bootstrap.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/anima-bootstrap>, <mailto:anima-bootstrap-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/anima-bootstrap/>
List-Post: <mailto:anima-bootstrap@ietf.org>
List-Help: <mailto:anima-bootstrap-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/anima-bootstrap>, <mailto:anima-bootstrap-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Oct 2016 18:57:37 -0000

Hi Max,

Thanks. I don't propose anything for now, but maybe this could be an idea for
future work. Since GRASP does rely on link-local multicast, it would be good
to have some idea of how to secure it (if the ACP doesn't take care of
it for us).

Regards
   Brian

On 25/10/2016 06:32, Max Pritikin (pritikin) wrote:
> BRSKI bootstraps a public key identity for the domain. It then rolls into a local certificate distribution but as currently noted in s5.7:
> 
>    The prior sections provide functionality for the New Entity to obtain
>    a trust anchor representative of the Domain.  The following section
>    describe using EST to obtain a locally issued PKI certificate.  The
>    New Entity MAY perform alternative enrollment methods or proceed to
>    use its IDevID credential indefinately, but those that leverage the
>    discovered Registrar to proceed with certificate enrollment MUST
>    implement the following EST choices.
> 
> The exact wording here could be adjusted. The point is that once the domain trust anchor is bootstrapped a mandatory to implement, or highly recommended interoperable approach, to identifying the device be implemented. 
> 
> One could branch off here into a group key method or could distribute the certs and use them to engage with a group key model. 
> 
> - max
> 
> 
>> On Oct 22, 2016, at 5:21 PM, Brian E Carpenter <brian.e.carpenter@gmail.com> wrote:
>>
>> This is perhaps a bit of a side track, but is there a way to leverage the
>> BRSKI registrar to securely distribute a Group Key? If every node in an AN
>> domain had the same Group Key, we could make GRASP multicast secure.
>>
>> (I never followed the MSEC work, but it looks mighty complex.)
>>
>> Regards
>>   Brian Carpenter
>>
>>
>> _______________________________________________
>> Anima-bootstrap mailing list
>> Anima-bootstrap@ietf.org
>> https://www.ietf.org/mailman/listinfo/anima-bootstrap
> 
>