Re: [Anima] Adam Roach's Discuss on draft-ietf-anima-bootstrapping-keyinfra-22: (with DISCUSS and COMMENT)

Joel Halpern Direct <jmh.direct@joelhalpern.com> Tue, 16 July 2019 12:59 UTC

Return-Path: <jmh.direct@joelhalpern.com>
X-Original-To: anima@ietfa.amsl.com
Delivered-To: anima@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EA9EE12004F for <anima@ietfa.amsl.com>; Tue, 16 Jul 2019 05:59:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level:
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=joelhalpern.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Hw823jyg-O3o for <anima@ietfa.amsl.com>; Tue, 16 Jul 2019 05:59:50 -0700 (PDT)
Received: from maila2.tigertech.net (maila2.tigertech.net [208.80.4.152]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 15469120411 for <anima@ietf.org>; Tue, 16 Jul 2019 05:59:50 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by maila2.tigertech.net (Postfix) with ESMTP id 45p0qB05c8zKnLP; Tue, 16 Jul 2019 05:59:50 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelhalpern.com; s=2.tigertech; t=1563281990; bh=jpTaBj3Jx3b3W/DObS1q+ebX6VdNCmnVPZQ5LaRSNTc=; h=Subject:To:Cc:References:From:Date:In-Reply-To:From; b=El6uG0JRk8V+xMhljTeD6scRaqeVEVlTGsjBycf4hOogR7nfFlMSAUrWB0lClmtMe A5HlmUNGm0ZxXjdwg/bpEktESQ5SO5zgH25V4zgSxD6gt1IUU2ABUmQ1U6l0yt3Q8B TW0OAisPu6xcSxbJcYKcMcUfoRLLcr7uvYBVOBO8=
X-Virus-Scanned: Debian amavisd-new at maila2.tigertech.net
Received: from [172.20.7.244] (209-255-163-147.ip.mcleodusa.net [209.255.163.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by maila2.tigertech.net (Postfix) with ESMTPSA id 45p0q82Z80z14L3M; Tue, 16 Jul 2019 05:59:48 -0700 (PDT)
To: Eliot Lear <lear@cisco.com>
Cc: anima@ietf.org, Adam Roach <adam@nostrum.com>
References: <156282703648.15280.17739830959261983790.idtracker@ietfa.amsl.com> <17580.1562874933@localhost> <ACEB4033-707F-47AF-B58A-5227B444BEAB@cisco.com> <E2DA8D30-805E-478D-925D-534C04A0727F@cisco.com> <8869.1563140002@dooku.sandelman.ca> <cedc515e-22ab-94a9-e6ef-c55b345687ba@joelhalpern.com> <376eee31-0264-38a8-1d32-901bb1a0671b@gmail.com> <9e341730-dc47-8860-47d4-6421ab04d0dc@nostrum.com> <6ecdae7f-4fb7-d9fc-f19f-bf742c6fe83c@joelhalpern.com> <193EB8D1-3E58-4570-AC4D-55737E3D36CF@cisco.com>
From: Joel Halpern Direct <jmh.direct@joelhalpern.com>
Message-ID: <a544c69a-38e2-4e6e-bc4f-752bbe524fa8@joelhalpern.com>
Date: Tue, 16 Jul 2019 08:59:47 -0400
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0
MIME-Version: 1.0
In-Reply-To: <193EB8D1-3E58-4570-AC4D-55737E3D36CF@cisco.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/anima/UX5IgjO88j7P3IgVDcSahe0ap6M>
Subject: Re: [Anima] Adam Roach's Discuss on draft-ietf-anima-bootstrapping-keyinfra-22: (with DISCUSS and COMMENT)
X-BeenThere: anima@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Autonomic Networking Integrated Model and Approach <anima.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/anima>, <mailto:anima-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/anima/>
List-Post: <mailto:anima@ietf.org>
List-Help: <mailto:anima-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/anima>, <mailto:anima-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 16 Jul 2019 12:59:53 -0000

I am having trouble connecting your reply with my request.
Let's take the direct issue first, and then the analogy.

I had suggested a specific enhancement to device behavior.  The response 
was "but that removes the theft protection."  It is that form of theft 
protection that I am objecting to.  As far as I can tell, the mechanism 
I suggested does not break zero touch.  It allows someone who controls 
their network, and who physically controls a new device, to put that new 
device in their network without asking anyone's permission.
It does not permit someone with a device, but not network control, from 
adding that device to the network.  It does not permit someone with 
control of the network, but not physical access to the device, to 
achieve anything special.  So it seems compatible with the goals.

In terms of the analogy, I would have problem with IEtF defining a new 
protocol that added significant risk to the buyer when they buy from new 
vendors.
And existing vendors do go out of businesses.  And vendors do 
end-of-life products.  (You can't get a new key to your car because the 
vendor has stopped supporting that model???)

Now it may be that the particular approach I suggested won't work.  But 
it seems to me that there needs to be a way for folks to keep using, and 
to keep re-selling, devices without the support of the vendor.  That 
usage may not get all the zero-touch advantages that supported re-sale 
would get.  But it has to work.  And putting the onus for that on the 
original vendor does NOT seem an effective solution.

Yours,
Joel

On 7/16/2019 7:21 AM, Eliot Lear wrote:
> Hi Joel,
> 
>> On 15 Jul 2019, at 23:42, Joel M. Halpern <jmh@joelhalpern.com 
>> <mailto:jmh@joelhalpern.com>> wrote:
>>
>> I would probably go a step further than Adam.  Protecting the device 
>> so a thief can not use it in the thiefs' own network seems to me to be 
>> something that we should not be trying to achieve.  An active 
>> non-goal. It is not our problem.
> 
>>  And trying to achieve it has the implications that lead to this whole 
>> discussion about the original manufacturer controlling who can resell 
>> / re-buy the device.
> 
> I would rather we redressed this directly.  There is an entire work flow 
> that involves zero-touch provisioning that at least two, and likely four 
> large platforms are driving toward, that *all* require some sort of 
> manufacturer assertion for device ownership to be transferred.  This is 
> not just a good idea or an anti-theft mechanism, but an aspect that is 
> required for zero-touch, particularly with wireless, where network 
> selection has to occur.  While in that sense, you might say, “Anti-theft 
> wasn’t the goal”, it is certainly a nice add-on, and it seems like a 
> valuable function.
> 
> Personally I *like* that we had this discussion.  I think the BRSKI work 
> will be much improved because of it, and people have a better 
> understanding of how the mechanisms can be used/abused as a result.  I 
> only wish we had had it earlier.
> 
> So now let’s talk about anti-theft and counterfeiting.  BRSKI has an 
> interesting link to both.  If a manufacturer is able to show the 
> customer what devices have been registered, any device that seems to be 
> operational but is NOT registered has to be considered suspect by the 
> customer.  That’s a nice counterfeit protection, and it isn’t there by 
> accident.
> 
> Similarly having a way to say, “the thing won’t join an unauthorized 
> network” is a very strong theft deterrent, very much akin to the 
> electronic keys that we see now in cars.  You generally can no longer go 
> to the local locksmith to get a duplicate key for a great many cars, but 
> your theft insurance has dropped through the floor (particularly if you 
> own a Honda).  Might GM, Ford, BMW etc might fail?  Sure.  No more new 
> keys for those cars: the old ones had better suffice.
> 
> In this case we discussed several approaches to deal with the case where 
> the supplier drops dead.  IMHO that’s a good outcome.
> 
> Eliot
> 
> 
> 
> 
>>  While manufacturers may like that, it does not seem to be something 
>> we should get involved in. At all.
>>
>> Yours,
>> Joel
>>
>> On 7/15/2019 5:10 PM, Adam Roach wrote:
>>> On 7/15/19 3:38 PM, Brian E Carpenter wrote:
>>>> On 15-Jul-19 16:45, Joel M. Halpern wrote:
>>>>> I presume I am missing something basic.
>>>>> I have tried to follow this discussion, as it seems to be about a
>>>>> critical aspect of whether the BRSKI work is acceptable.
>>>>>
>>>>> I have assumed that what we needed is the ability for a buyer, who has
>>>>> physical possession of the device, and possibly some simple (non
>>>>> cryptographic) credentials provided by the seller to force the 
>>>>> device to
>>>>> reset what it thinks it is part of, and to emit in some accessible form
>>>>> the information the buyer needs to be able to make this device part of
>>>>> his network, using his authentication servers, etc.
>>>> Yes, but *not* a solution that works if the device is stolen.
>>> I'm actually a little ambivalent with respect to this use case. For 
>>> the kind of devices that the document purports to be targeting, I 
>>> would imagine that theft is in the range of parts-per-thousand (or 
>>> lower) as compared to things like post-bankruptcy liquidation. If you 
>>> can fix the first without ruining the second, great.
>>> /a
>