Re: [Anima] Is this how BRSKI/IPIP works?

Michael Richardson <mcr+ietf@sandelman.ca> Fri, 14 July 2017 23:01 UTC

Return-Path: <mcr@sandelman.ca>
X-Original-To: anima@ietfa.amsl.com
Delivered-To: anima@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B1630127444 for <anima@ietfa.amsl.com>; Fri, 14 Jul 2017 16:01:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vo1nkBbQooBl for <anima@ietfa.amsl.com>; Fri, 14 Jul 2017 16:01:51 -0700 (PDT)
Received: from relay.sandelman.ca (relay.cooperix.net [IPv6:2a01:7e00::f03c:91ff:feae:de77]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2DC2F126DD9 for <anima@ietf.org>; Fri, 14 Jul 2017 16:01:51 -0700 (PDT)
Received: from dooku.sandelman.ca (ip-94-113-76-12.net.upcbroadband.cz [94.113.76.12]) by relay.sandelman.ca (Postfix) with ESMTPS id 0C59A1F8FB; Fri, 14 Jul 2017 23:01:50 +0000 (UTC)
Received: by dooku.sandelman.ca (Postfix, from userid 179) id 3EA4B27F8; Sat, 15 Jul 2017 01:01:47 +0200 (CEST)
From: Michael Richardson <mcr+ietf@sandelman.ca>
To: Brian E Carpenter <brian.e.carpenter@gmail.com>
cc: Eliot Lear <lear@cisco.com>, Toerless Eckert <tte@cs.fau.de>, Anima WG <anima@ietf.org>
In-reply-to: <a3e62089-a035-f38e-2907-efa78975bbb9@gmail.com>
References: <467b3a9b-6fe0-c01f-6165-18e6e290a28c@gmail.com> <20170706033719.GF14122@faui40p.informatik.uni-erlangen.de> <827f69e7-4730-7bd2-c0ac-987e94adc61d@gmail.com> <20170706070938.GG14122@faui40p.informatik.uni-erlangen.de> <c885cdc9-0ec9-98fd-858d-07c66bb84e25@cisco.com> <9854.1500037758@dooku.sandelman.ca> <a3e62089-a035-f38e-2907-efa78975bbb9@gmail.com>
Comments: In-reply-to Brian E Carpenter <brian.e.carpenter@gmail.com> message dated "Sat, 15 Jul 2017 08:14:04 +1200."
X-Mailer: MH-E 8.6; nmh 1.6; GNU Emacs 24.5.1
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg="pgp-sha1"; protocol="application/pgp-signature"
Date: Sat, 15 Jul 2017 01:01:47 +0200
Message-ID: <15646.1500073307@dooku.sandelman.ca>
Archived-At: <https://mailarchive.ietf.org/arch/msg/anima/2ocY-aG6ijQzSRxGx4PkCGEUtb4>
Subject: Re: [Anima] Is this how BRSKI/IPIP works?
X-BeenThere: anima@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Autonomic Networking Integrated Model and Approach <anima.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/anima>, <mailto:anima-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/anima/>
List-Post: <mailto:anima@ietf.org>
List-Help: <mailto:anima-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/anima>, <mailto:anima-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Jul 2017 23:01:52 -0000

Brian E Carpenter <brian.e.carpenter@gmail.com> wrote:
    > But On 14/07/2017 18:13, Eliot Lear wrote: ...
    >> I made my comment in the context of a possible interface collision in
    >> your diagram.  Those had to do with the autonomic nodes, not the
    >> proxies, as I understand things.  To avoid those sorts of collisions,
    >> it seems like using the h/w address remains sensible.  A collision in
    >> those circumstances would be extremely unlikely, whereas relying on
    >> poor PRNG almost assures it of happening.  These devices are likely to
    >> have very little entropy available to them.

    > And they may well be BRSKI pledges, just not using GRASP for discovery.
    > So Eliot's point seems valid (but not an issue for ANIMA alone).

7217 says:
RID = F(Prefix, Net_Iface, Network_ID, DAD_Counter, secret_key)

only the secret_key is really unique, and perhaps that's what you are
worrying about?

secret_key:
          A secret key that is not known by the attacker.  The secret
          key SHOULD be of at least 128 bits.  It MUST be initialized to
          a pseudo-random number (see [RFC4086] for randomness
          requirements for security) when the operating system is
          installed or when the IPv6 protocol stack is "bootstrapped"
          for the first time.

As the secret_key should be generated when the system is "installed"
or "first bootstrapped", I'm not sure the PRNG quality at runtime.
It seems to me like the secret_key should be set at manufacturer time
on the "bed-of-nails" or other JTAG point, at the same time when the
BRSKI IDevID and (perhaps) MASA anchors are loaded.   If those things
are in a TPM, then the secret_key could be there too.

-- 
]               Never tell me the odds!                 | ipv6 mesh networks [ 
]   Michael Richardson, Sandelman Software Works        | network architect  [ 
]     mcr@sandelman.ca  http://www.sandelman.ca/        |   ruby on rails    [