Re: [Anima] Roman Danyliw's Discuss on draft-ietf-anima-bootstrapping-keyinfra-28: (with DISCUSS and COMMENT)

Roman Danyliw <rdd@cert.org> Tue, 05 November 2019 23:20 UTC

Return-Path: <rdd@cert.org>
X-Original-To: anima@ietfa.amsl.com
Delivered-To: anima@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7454112008F; Tue, 5 Nov 2019 15:20:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cert.org
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Rxu0JTHFJyOJ; Tue, 5 Nov 2019 15:20:02 -0800 (PST)
Received: from taper.sei.cmu.edu (taper.sei.cmu.edu [147.72.252.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 31E9E120072; Tue, 5 Nov 2019 15:20:00 -0800 (PST)
Received: from korb.sei.cmu.edu (korb.sei.cmu.edu [10.64.21.30]) by taper.sei.cmu.edu (8.14.7/8.14.7) with ESMTP id xA5NJcN7032648; Tue, 5 Nov 2019 18:19:38 -0500
DKIM-Filter: OpenDKIM Filter v2.11.0 taper.sei.cmu.edu xA5NJcN7032648
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cert.org; s=yc2bmwvrj62m; t=1572995978; bh=0YLRDe4OJ7AgOs+53BHBsaaj/Jgpf4JTccAKMjIaDTE=; h=From:To:CC:Subject:Date:References:In-Reply-To:From; b=ptBOEz2IDu2FA+iww9KNlZVDZzKRyMhirFiQdKbqoFLEUAIn+EMmkvRhofsS91+BZ zPky+wETKgvUxlR3j83lB3SYGgIj4jG62dRYKy+IE460jPKNNfZtu6PeAmmLGRRAwh qcIACCPhzfC+ck8d4OEYLxQehksI+xKjeKhjDPpk=
Received: from CASSINA.ad.sei.cmu.edu (cassina.ad.sei.cmu.edu [10.64.28.249]) by korb.sei.cmu.edu (8.14.7/8.14.7) with ESMTP id xA5NJXrD008972; Tue, 5 Nov 2019 18:19:33 -0500
Received: from MARCHAND.ad.sei.cmu.edu ([10.64.28.251]) by CASSINA.ad.sei.cmu.edu ([10.64.28.249]) with mapi id 14.03.0468.000; Tue, 5 Nov 2019 18:19:33 -0500
From: Roman Danyliw <rdd@cert.org>
To: 'Michael Richardson' <mcr+ietf@sandelman.ca>, Christian Huitema <huitema@huitema.net>
CC: "draft-ietf-anima-bootstrapping-keyinfra@ietf.org" <draft-ietf-anima-bootstrapping-keyinfra@ietf.org>, "tte+ietf@cs.fau.de" <tte+ietf@cs.fau.de>, "anima-chairs@ietf.org" <anima-chairs@ietf.org>, The IESG <iesg@ietf.org>, "anima@ietf.org" <anima@ietf.org>
Thread-Topic: [Anima] Roman Danyliw's Discuss on draft-ietf-anima-bootstrapping-keyinfra-28: (with DISCUSS and COMMENT)
Thread-Index: AQHVhIeYyx5AvXxfuUGQRO91lISI4KdflLIAgB2O/hA=
Date: Tue, 05 Nov 2019 23:19:32 +0000
Message-ID: <359EC4B99E040048A7131E0F4E113AFC01E709807E@marchand>
References: <157127457937.7863.815173980398917672.idtracker@ietfa.amsl.com> <8262.1571345790@dooku.sandelman.ca>
In-Reply-To: <8262.1571345790@dooku.sandelman.ca>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.64.22.6]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/anima/0BUWT3az-x4nguc_r0Dled_fc4E>
Subject: Re: [Anima] Roman Danyliw's Discuss on draft-ietf-anima-bootstrapping-keyinfra-28: (with DISCUSS and COMMENT)
X-BeenThere: anima@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Autonomic Networking Integrated Model and Approach <anima.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/anima>, <mailto:anima-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/anima/>
List-Post: <mailto:anima@ietf.org>
List-Help: <mailto:anima-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/anima>, <mailto:anima-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Nov 2019 23:20:05 -0000

Hi Michael!

Pruning the thread ...

> -----Original Message-----
> From: iesg <iesg-bounces@ietf.org> On Behalf Of Michael Richardson
> Sent: Thursday, October 17, 2019 4:57 PM
> To: Roman Danyliw <rdd@cert.org>; Christian Huitema
> <huitema@huitema.net>
> Cc: draft-ietf-anima-bootstrapping-keyinfra@ietf.org; tte+ietf@cs.fau.de;
> anima-chairs@ietf.org; The IESG <iesg@ietf.org>; anima@ietf.org
> Subject: Re: [Anima] Roman Danyliw's Discuss on draft-ietf-anima-
> bootstrapping-keyinfra-28: (with DISCUSS and COMMENT)
> 
> 
> {please excuse me if this is a resend}
> 
> {ALSO responding to Christian's third review comments.
>   https://datatracker.ietf.org/doc/review-ietf-anima-bootstrapping-keyinfra-
> 28-secdir-telechat-huitema-2019-10-12/ }
> 
> Roman Danyliw via Datatracker <noreply@ietf.org> wrote:
>     > ----------------------------------------------------------------------
>     > DISCUSS:
>     > ----------------------------------------------------------------------

Thanks for the updated text in -29.  I've cleared the DISCUSS in the tracker.

>     > ----------------------------------------------------------------------
>     > COMMENT:
>     > ----------------------------------------------------------------------

Thanks for addressing these other comments (which I have removed from the thread).

>     > ** Section 10.3.  Per “[t]he so-called "call-home" mechanism that
>     > occurs as part of the BRSKI-MASA connection standardizes what has
> been
>     > deemed by some as a sinister mechanism for corporate oversight of
>     > individuals. ([livingwithIoT] and [IoTstrangeThings] for a small
>     > sample).”
> 
>     > -- Thanks for including this text about the “call-home” mechanism.
>     > However the references don’t seem like a fit.  Both references appear
>     > to focus on the regular “call home” activity of these device rather
>     > than the narrow, on-time one-time onboarding process.  The nature of
>     > the “call-home” isn’t just about privacy (as these articles imply), but
>     > also lock-in.
> 
> While I agree with you, the devices mentioned in the above references die if
> they can't call home AT ANY TIME.  Not just at onboarding.   So, the
> oversight present in BRSKI is just less effective than other devices.

I'm not disputing the phenomenon of devices not working if they aren't connected to the network.  I'm struggling to find that message in the provided references.

[livingwithIoT]
https://www.siliconrepublic.com/machines/iot-smart-devices-reality

[IoTstrangeThings]
https://www.welivesecurity.com/2017/03/03/internet-of-things-security-privacy-iot-update/

Unrelated, with [livingwithIoT], did you really mean the siliconrepublic content or the link to the gizmodo article it makes to:

https://gizmodo.com/the-house-that-spied-on-me-1822429852

>     > -- It isn't appropriate to characterize concerns about the BRISKI-MASA
>     > link as “sinister mechanisms ...”.
> 
> Did you read the review comments back in November/December 2018? :-) if
> you are arguing that I'm using too alarmist language, I will accept suggests for
> less alarmist language.

I did ;-) But it isn't clear to me that future readers will remember this discussion.  I'd advocate for stand-alone language. The less alarmist text I would propose is: 

OLD:

The so-called "call-home" mechanism that occurs as part of the BRSKI-
   MASA connection standardizes what has been deemed by some as a
   sinister mechanism for corporate oversight of individuals.
   ([livingwithIoT] and [IoTstrangeThings] for a small sample).

   As the Autonomic Control Plane (ACP) usage of BRSKI is not targeted
   at individual usage of IoT devices, but rather at the Enterprise and
   ISP creation of networks in a zero-touch fashion, the "call-home"
   represents a different kind of concern.

NEW:

With consumer-oriented devices, the "call-home" mechanism in IoT devices raises significant privacy concerns.  See [livingwithIoT] and [IoTstrangeThings] for exemplars.  The Autonomic Control Plane (ACP) usage of BRSKI is not targeted at individual usage of IoT devices, but rather at the Enterprise and ISP creation of networks in a zero-touch fashion where the "call-home" represents a different class of privacy and lifecycle management concerns. 

>     > ** Section 10.7.  Per “It is anticipated that specialist service
>     > providers will come to exist that deal with the creation of vouchers in
>     > much the same way that many companies have outsourced email,
>     > advertising and janitorial services.”, I don’t think this is a fair
>     > analogy.  Delegating the voucher process to an entity would take active
>     > cooperation of the manufacturer.  If the manufacture is out of
>     > business, there is not guarantee this would have been put in place (or
>     > those assets were acquired in the liquidation)
> 
> Recent changes remind that the manufacturer needs to escrow their keys.
> If the manufacturer is out of business, then where will you get security
> updates from?  Do you want to enable a secondary market for devices with
> decade old security holes?

I'm questioning the analogy to advertising or janitorial services.  To me, both of these examples are instances of a service being provided to the existing company rather than demonstrating how asset hand-off or continued maintenance would occur in the case of bankruptcy/liquidation.
 
>     > ** Section 11.5.2.2 prescribes that the operator of a MASA “MUST issue
>     > a firmware update to all devices that had that key as a trust anchor”.
>     > This suggests a required capability to update trust anchors.  However,
>     > Section 7.4.3 discusses a similar (albeit more flexible) practice but
>     > this is non-normative and deemed reduced security.  Why the
> dissidence?
> 
> If you lose your key, you'll have to update the firmware to update the
> anchors.
> If you have implemented 7.4.3, then it might be that you can do less.
> However, in one version of 7.4.3, a factory reset might restore the original
> (lost) keys, which is why a firmware update would in general be needed.

Got it.  Thanks for the clarification.
Thanks.

Regards,
Roman