Re: [Anima] Adam Roach's Discuss on draft-ietf-anima-bootstrapping-keyinfra-22: (with DISCUSS and COMMENT)

Eliot Lear <lear@cisco.com> Tue, 16 July 2019 14:02 UTC

Return-Path: <lear@cisco.com>
X-Original-To: anima@ietfa.amsl.com
Delivered-To: anima@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 10CC312008B for <anima@ietfa.amsl.com>; Tue, 16 Jul 2019 07:02:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.501
X-Spam-Level:
X-Spam-Status: No, score=-14.501 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QVCoUrSinR2C for <anima@ietfa.amsl.com>; Tue, 16 Jul 2019 07:02:48 -0700 (PDT)
Received: from aer-iport-4.cisco.com (aer-iport-4.cisco.com [173.38.203.54]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D06E5120086 for <anima@ietf.org>; Tue, 16 Jul 2019 07:02:47 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=4083; q=dns/txt; s=iport; t=1563285768; x=1564495368; h=from:message-id:mime-version:subject:date:in-reply-to:cc: to:references; bh=HFCrUeJC5Vo4aMEugI5PekS6o2gxIgZEHkXXYUNR1nQ=; b=cjp3jSGixK6jY/brbOIL5IYT1m/x+ZAiKYDzI9Q+w3HlxfAVxw+h2e4+ 8LlRnAsSIiUAwTIaLK4lkf88KvamI7v5lnGNrZt7bjly+rGby42n3ZLfA yBm+iC4+hZyWyN39/hWDO1v7Pn5FsfTYGIvXqPCTbMg3Ss3RL5oQ/dO5U I=;
X-Files: signature.asc : 195
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AJAABT2C1d/xbLJq1lGgEBAQEBAgEBAQEHAgEBAQGBVAQBAQEBCwGDUQEgEiiEHIh7i1QlmH0UgWcCBwEBAQkDAQEvAQGEQAKCXTUIDgEDAQEEAQECAQVthTwMhUoBAQEBAgEjBFIFCwsYIwcCAlcGExkCgwcBgXsPrQB/M4VHhG8QgTQBgVCKJYF/gREnDBOCTD6ELQGDIDKCJgSMOAoSiB2VcgmCG4IfgQyQYRuCLYsKilOOZpMUgwsCBAYFAhWBUgE1RIEUMxoIGxVlAYJBPoI6hACKDz0DMJAzAQE
X-IronPort-AV: E=Sophos;i="5.63,498,1557187200"; d="asc'?scan'208";a="14302335"
Received: from aer-iport-nat.cisco.com (HELO aer-core-3.cisco.com) ([173.38.203.22]) by aer-iport-4.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 16 Jul 2019 14:02:45 +0000
Received: from [10.61.214.125] ([10.61.214.125]) by aer-core-3.cisco.com (8.15.2/8.15.2) with ESMTPS id x6GE2hDE015357 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Tue, 16 Jul 2019 14:02:44 GMT
From: Eliot Lear <lear@cisco.com>
Message-Id: <B5A2858B-A39E-4ED0-9553-8F3660FA4BDF@cisco.com>
Content-Type: multipart/signed; boundary="Apple-Mail=_FB8A8D25-C496-4762-B74F-34F71FC06571"; protocol="application/pgp-signature"; micalg="pgp-sha1"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Date: Tue, 16 Jul 2019 16:02:43 +0200
In-Reply-To: <fa09c4fa-c923-babd-735b-72741d41a35b@joelhalpern.com>
Cc: anima@ietf.org, Adam Roach <adam@nostrum.com>
To: "Joel M. Halpern" <jmh@joelhalpern.com>
References: <156282703648.15280.17739830959261983790.idtracker@ietfa.amsl.com> <17580.1562874933@localhost> <ACEB4033-707F-47AF-B58A-5227B444BEAB@cisco.com> <E2DA8D30-805E-478D-925D-534C04A0727F@cisco.com> <8869.1563140002@dooku.sandelman.ca> <cedc515e-22ab-94a9-e6ef-c55b345687ba@joelhalpern.com> <376eee31-0264-38a8-1d32-901bb1a0671b@gmail.com> <9e341730-dc47-8860-47d4-6421ab04d0dc@nostrum.com> <6ecdae7f-4fb7-d9fc-f19f-bf742c6fe83c@joelhalpern.com> <193EB8D1-3E58-4570-AC4D-55737E3D36CF@cisco.com> <a544c69a-38e2-4e6e-bc4f-752bbe524fa8@joelhalpern.com> <70FB01AF-08A1-4542-B944-556F51F98E5F@cisco.com> <fa09c4fa-c923-babd-735b-72741d41a35b@joelhalpern.com>
X-Mailer: Apple Mail (2.3445.104.11)
X-Outbound-SMTP-Client: 10.61.214.125, [10.61.214.125]
X-Outbound-Node: aer-core-3.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/anima/IBF9kgd5Ruy1bmv8aloBZDXyfqc>
Subject: Re: [Anima] Adam Roach's Discuss on draft-ietf-anima-bootstrapping-keyinfra-22: (with DISCUSS and COMMENT)
X-BeenThere: anima@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Autonomic Networking Integrated Model and Approach <anima.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/anima>, <mailto:anima-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/anima/>
List-Post: <mailto:anima@ietf.org>
List-Help: <mailto:anima-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/anima>, <mailto:anima-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 16 Jul 2019 14:02:50 -0000


> On 16 Jul 2019, at 15:57, Joel M. Halpern <jmh@joelhalpern.com> wrote:
> 
> I can't tell from this whether you agree that it is reasonable to put in some mechanism to address this issue?

I think I do because I proposed such a mechanism up thread.

Eliot
> 
> Yours,
> Joel
> 
> On 7/16/2019 9:40 AM, Eliot Lear wrote:
>> Hi Joel,
>>> On 16 Jul 2019, at 14:59, Joel Halpern Direct <jmh.direct@joelhalpern.com> wrote:
>>> 
>>> I am having trouble connecting your reply with my request.
>>> Let's take the direct issue first, and then the analogy.
>>> 
>>> I had suggested a specific enhancement to device behavior.  The response was "but that removes the theft protection."  It is that form of theft protection that I am objecting to.  As far as I can tell, the mechanism I suggested does not break zero touch.  It allows someone who controls their network, and who physically controls a new device, to put that new device in their network without asking anyone's permission.
>>> It does not permit someone with a device, but not network control, from adding that device to the network.  It does not permit someone with control of the network, but not physical access to the device, to achieve anything special.  So it seems compatible with the goals.
>> My apologies I took your statement as something more general than you intended.  With respect to this from earlier:
>>> I have assumed that what we needed is the ability for a buyer, who has physical possession of the device, and possibly some simple (non cryptographic) credentials provided by the seller to force the device to reset what it thinks it is part of, and to emit in some accessible form the information the buyer needs to be able to make this device part of his network, using his authentication servers, etc.
>> That was indeed what we discussed.  We just got into means a bit more than perhaps necessary.  I’ll point out that it’s always going to be a manufacturer call on how best to do this; and how to transport credentials, and how to keep them safe, even.
>>> 
>>> In terms of the analogy, I would have problem with IEtF defining a new protocol that added significant risk to the buyer when they buy from new vendors.
>>> And existing vendors do go out of businesses.  And vendors do end-of-life products.  (You can't get a new key to your car because the vendor has stopped supporting that model???)
>> I wouldn’t implement a 1:1 mapping products->MASA server function.  That seems excessive.  And rare is the case when a vendor EOLs a product and then cripples it through an update mechanism.  The only issue here is whether a database entry would stay around.
>>> 
>>> Now it may be that the particular approach I suggested won't work.  But it seems to me that there needs to be a way for folks to keep using, and to keep re-selling, devices without the support of the vendor.  That usage may not get all the zero-touch advantages that supported re-sale would get.  But it has to work.  And putting the onus for that on the original vendor does NOT seem an effective solution.
>> I think you mean, “requiring the vendor to stay around for ever doesn’t seem like an effective solution.”  Again, I don’t want to overgeneralize.
>> Eliot