Re: [Anima] [6lo] Comments needed for Security Bootstrapping of IEEE 802.15.4 based Internet of Things
Behcet Sarikaya <sarikaya2012@gmail.com> Fri, 20 February 2015 20:51 UTC
Return-Path: <sarikaya2012@gmail.com>
X-Original-To: anima@ietfa.amsl.com
Delivered-To: anima@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0C89C1A87B0; Fri, 20 Feb 2015 12:51:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.75
X-Spam-Level:
X-Spam-Status: No, score=-1.75 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5Rc4zCN9t1W5; Fri, 20 Feb 2015 12:51:32 -0800 (PST)
Received: from mail-la0-x22c.google.com (mail-la0-x22c.google.com [IPv6:2a00:1450:4010:c03::22c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F406F1A879F; Fri, 20 Feb 2015 12:51:31 -0800 (PST)
Received: by lams18 with SMTP id s18so8540082lam.13; Fri, 20 Feb 2015 12:51:30 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:reply-to:in-reply-to:references:date:message-id :subject:from:to:cc:content-type; bh=gx9Pwjc2tDPn/MvFBc4h57v3BOIE2hdSAgPdsA9KyAc=; b=yk+b0G33gKTIpBCZYH92abNGpZYaMrAaG8WQtzUPVOQXHqoYXUfsrgRPzavMPrR06o +OF1suCBE+OH2DWTMugasMXjmp/QCP6FUHnkUdiRsRZ9oGQSBoabAdOETMAMAJZf0ajb lM4fCsPqz7vL1gD1piRf4qrDlABfGuNUwRDYmsW1SnK918KkRPsTq3wvtDkhVyyaBv7N Vm9vG8+yntoSoYsRNm/vR1uTcACLZEQBi61q9wuxBqUPqmAAOF9tM7AkPFyq6lxTzQvF yX4RKjj5JS2K/d+W1ra+BXizr7j+9ettoG6a7cMaP1WLok+LPRvJu+LGeEHtXQYDPpXP LKgA==
MIME-Version: 1.0
X-Received: by 10.112.134.106 with SMTP id pj10mr10455995lbb.58.1424465490453; Fri, 20 Feb 2015 12:51:30 -0800 (PST)
Received: by 10.114.187.13 with HTTP; Fri, 20 Feb 2015 12:51:30 -0800 (PST)
In-Reply-To: <54E7219B.6040006@gridmerge.com>
References: <77FA386512F0D748BC7C02C36EB1106D921776@szxeml557-mbs.china.huawei.com> <6426.1422664463@sandelman.ca> <77FA386512F0D748BC7C02C36EB1106D92CC62@szxeml557-mbs.china.huawei.com> <54E7219B.6040006@gridmerge.com>
Date: Fri, 20 Feb 2015 14:51:30 -0600
Message-ID: <CAC8QAcfcR=KyKttX6CMjzQwG=sxoMtP5CEneAc0rDXer8aE7yQ@mail.gmail.com>
From: Behcet Sarikaya <sarikaya2012@gmail.com>
To: robert.cragie@gridmerge.com
Content-Type: text/plain; charset="UTF-8"
Archived-At: <http://mailarchive.ietf.org/arch/msg/anima/UymcDjBR-1jcb5AsxPSODrGaWyE>
Cc: Michael Richardson <mcr+ietf@sandelman.ca>, "Hedanping (Ana)" <ana.hedanping@huawei.com>, "6tisch-security@ietf.org" <6tisch-security@ietf.org>, "anima@ietf.org" <anima@ietf.org>, "6lo@ietf.org" <6lo@ietf.org>
Subject: Re: [Anima] [6lo] Comments needed for Security Bootstrapping of IEEE 802.15.4 based Internet of Things
X-BeenThere: anima@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: sarikaya@ieee.org
List-Id: Autonomic Networking Integrated Model and Approach <anima.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/anima>, <mailto:anima-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/anima/>
List-Post: <mailto:anima@ietf.org>
List-Help: <mailto:anima-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/anima>, <mailto:anima-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Feb 2015 20:51:35 -0000
Hi Robert, Thank you for your comments. On Fri, Feb 20, 2015 at 5:59 AM, Robert Cragie <robert.cragie@gridmerge.com> wrote: > Hi Danping, > > I have some general comments on the draft and some additional comments > inline, bracketed by <RCC></RCC> > > General comments: > > I think the general model is good but could be simplified to two cases: > > 1) Where the authenticator is in direct communication > 2) Where the authenticator is not in direct communication (relay case) > > My reasoning is because: > > a) There isn't much distinction between RFD and FFD from an authentication > perspective > b) There isn't much distinction between joining an existing network and > initial joining > > If you think there are distinctions, then they need clarifying. > > Other points: > > "Because IEEE 802.15.4 maximum payload size is 128 Bytes, a standard > security bootstrapping protocol should be light-weight with low > complexity.": I think it would be better to say "should ideally be > light-weight with low complexity". There may be requirements where high > security strength is required and therefore this will necessarily involve > more communication overhead and processing. > I think the hierarchical joining description is generally useful. > It is conceivable for an RFD to communicate directly with a 6LBR so I don't > think that should be excluded from Figure 1 > "[I-D.pritikin-anima-bootstrapping-keyinfra] proposes a zero-touch > bootstrapping key infrastructure to allow joining device securely and > automatically bootstraps itself based on 802.1AR certificate. It can't be > directly used in 802.15.4 devices due to the high security complexity and > heavy communication overhead.": I disagree with this statement. We used this > approach in ZigBee IP. So there is already ZigBee IP's EAP-TLS approach. Then, why do you think a new approach is needed? > I agree some may think the communication overhead > "heavy" but that doesn't mean it can't be done. The associated security > complexity is also becoming less onerous as crypto accelerators become built > into hardware and cores. > The document mentions a couple of protocols (EAP and PANA) but doesn't go > into enough detail on how those are deployed. Also, there are other choices. > The document could give generic names to the particular communications and > then add a section to give examples. > Thanks for the pointers. We are currently working on an analysis draft to see if there is interest in new work in this area. I think that any solution work should follow on the results of such a discussion. What do you think? Regards, Behcet > Robert > > On 02/02/2015 08:13, Hedanping (Ana) wrote: > > Hi Michael, > Thank you for the interest and the questions are illuminating. Please see my > reply inline. > > > I have added a number of CCs, I think that this fits into ANIMA best. > > > > > Hedanping (Ana) <ana.hedanping@huawei.com> wrote: > > > A new draft is submitted, it's about the security bootstrapping > > > architecture and methods for IoT networks that implement IETF > > protocols > > > (e.g. 6LoWPAN, 6lo, RPL, AODV, DSR) over IEEE 802.15.4. > > > Two types of bootstrapping methods are developed: network level > > > bootstrapping and joining device level bootstrapping > > > > > The link is: > > > http://tools.ietf.org/html/draft-he-iot-security-bootstrapping-00 > > > > I read the document with great interest. > > I found that you explained the incremental boot-strapping process quite > well, > > and nobody has clearly articulated the process yet. People have just > assumed > > that everyone knows this process, but really it needs to get written > down, so I > > thank you for doing that. > > Thank you for the praise. As it is the initial version, more discussions and > comments are needed to make it better. > > <RCC>I agree that it has not generally been articulated well. To some > extent, it is because up to now, there has been no "the one way to do it". > Therefore, something ZigBee IP is a profile which defines one particular way > of doing it. There are other ways as well, of course. I guess the question > is whether it can be generalised sufficiently to be generally applicable and > whether that is in fact worth doing</RCC> > > > > > Given that: > > > > Because IEEE 802.15.4 maximum payload size is 128 Bytes, a standard > > security bootstrapping protocol should be light-weight with low > > complexity. The protocol must allow for commissioning of devices > > > > I was surprised that the draft then suggested EAP with PANA as a > transport: > > <RCC>I realise that PANA/EAP/EAP-TLS gets roundly criticised for being > "heavyweight". Indeed, there are overheads in the use of these three very > well-established protocols which could be removed in certain cases. However, > this would result in the development of new protocols. Having done a lot of > work in looking at DTLS options, I can confidently say that the difference > at the end of the day is quite small</RCC> > > > > > If EAP is used, PANA can be used to relay the authentication message > > from configured FFDs to 6LBR. If the validation is successful, the > > IP address and network key are generated and delivered to the FFD. > > > > But, EAP-TLS with PANA is exactly what the Zigbee IP specification has > specified. > > Do you envision any changes from that specification? > > Zigbee IP specification was developed to enable IP address for Zigbee > application, thus the protocol stack are built on IETF's standards, > including EAP-TLS. > As discussed in many working groups, TLS might result in a significant > amount of retransmissions due to unreliable communication capability of the > network and device, thus energy will be consumed fast. > I think EAP over DTLS /profiled DTLS could be a good option. > > <RCC>EAP-TLS only uses TLS handshakes carried as EAP payloads, therefore has > little to do with TLS as it is normally used, i.e. over TCP. If you then > start to look at the difference between EAP-TLS (over UDP) and DTLS > handshakes over UDP, there is actually not much difference. In some areas, > EAP is actually preferable (fragmentation and header overhead)</RCC> > > > A minority of people had prefered this mechanism for 6tisch-security, but > > none stepped forward to write up that mechanism. Perhaps this draft > could > > fulfill that need? > > Yes, we should describe more clearly on this mechanism, and maybe this draft > is a right place. It would be great if folks in the mailing list make > comments and contribution on this technical point. > > <RCC>I am happy to write up that mechanism</RCC> > > > You write that the IP address would be generated; usually that occurs via > > distribution of PIOs via ND (router-adveristments) or RPL. Were you > going to > > suggest something else here? > > According to my knowledge, IP address can be generated once a device is > authenticated to network access, afterwards, other further protocols can use > IP to communicate. > Besides, PANA needs IP as well. The incremental bootstrapping takes > advantage of such IP address generation mechanism, so that PANA can be run > without any problem. > > <RCC>ZigBee IP solved this problem by using SLAAC IPv6 addresses based on > the EUI-64. These can be used in PANA straight away without the need for any > other configuration</RCC> > > > > > From the ANIMA and 6tisch-security point of view, my view is that this is > all > > about the choice of certificates for the TLS setup. Do you have any view > on > > how that might work? > > For unconstrained environment, I agree with you. But when it comes to > constrained device and constrained network communication, TLS might not be a > good choice as mentioned before. Certificate is not a good choice either due > to the high cost. > I would like to say: it is about the choice of credential type for secure > channel setup. The good candidates of credential types are Raw public key, > Physical Unclonable Function (PUF). > > <RCC>There certainly are overheads in certificates but in the 802.1AR > scenario (draft-pritikin-anima-bootstrapping-keyinfra-01) it has clear > value.</RCC> > > > > > The 6tisch-security bootstrap process aims to create a > > YANG/CBOR-over-CoAP-over-DTLS session between a Join Coordinator and the > > Joining Node: over that management link, security (and timeslot > scheduling) > > would be provisioned. > > CoAP-DTLS coincides with my idea. > Yang sounds like at a higher level, but I think EAP is actually the > mechanism running behind ^_^ > > <RCC>Again, in this document, it might be better to abstract this session > and describe what it is used for</RCC> > > > Regards, > Ana > > _______________________________________________ > 6lo mailing list > 6lo@ietf.org > https://www.ietf.org/mailman/listinfo/6lo > > > > _______________________________________________ > 6lo mailing list > 6lo@ietf.org > https://www.ietf.org/mailman/listinfo/6lo >
- Re: [Anima] [6lo] Comments needed for Security Bo… Michael Richardson
- Re: [Anima] [6lo] Comments needed for Security Bo… Hedanping (Ana)
- Re: [Anima] [6tisch-security] [6lo] Comments need… Tero Kivinen
- Re: [Anima] [6lo] Comments needed for Security Bo… Hannes Tschofenig
- Re: [Anima] [6lo] Comments needed for Security Bo… Brian E Carpenter
- Re: [Anima] [6lo] Comments needed for Security Bo… Behcet Sarikaya
- Re: [Anima] [6lo] Comments needed for Security Bo… peter van der Stok
- Re: [Anima] [6lo] Comments needed for Security Bo… Hannes Tschofenig
- Re: [Anima] [6lo] Comments needed for Security Bo… Brian E Carpenter
- Re: [Anima] [6lo] Comments needed for Security Bo… Brian E Carpenter
- Re: [Anima] [6lo] Comments needed for Security Bo… peter van der Stok
- Re: [Anima] [6lo] Comments needed for Security Bo… Brian E Carpenter
- Re: [Anima] [6lo] Comments needed for Security Bo… Behcet Sarikaya
- Re: [Anima] [6lo] Comments needed for Security Bo… Kent Watsen
- Re: [Anima] [6lo] Comments needed for Security Bo… Hannes Tschofenig
- Re: [Anima] [6lo] Comments needed for Security Bo… Brian E Carpenter
- Re: [Anima] [6lo] Comments needed for Security Bo… Hedanping (Ana)
- [Anima] Device vs network bootstrapping [Comments… Brian E Carpenter
- Re: [Anima] [6lo] Comments needed for Security Bo… Behcet Sarikaya
- [Anima] Thread [Comments needed for Security Boot… Brian E Carpenter
- Re: [Anima] [6lo] Thread [Comments needed for Sec… Ralph Droms
- Re: [Anima] [6lo] Thread [Comments needed for Sec… Brian E Carpenter
- Re: [Anima] [6lo] Device vs network bootstrapping… Hedanping (Ana)
- Re: [Anima] [6lo] Comments needed for Security Bo… Hedanping (Ana)
- Re: [Anima] [6lo] Comments needed for Security Bo… peter van der Stok
- Re: [Anima] [6lo] Device vs network bootstrapping… Brian E Carpenter
- Re: [Anima] [6lo] Device vs network bootstrapping… Kent Watsen
- Re: [Anima] [6tisch-security] [6lo] Comments need… Thomas Watteyne
- Re: [Anima] [6tisch-security] [6lo] Device vs net… Brian E Carpenter
- Re: [Anima] [6lo] Comments needed for Security Bo… Robert Cragie
- Re: [Anima] [6lo] Comments needed for Security Bo… Paul Duffy
- Re: [Anima] [6tisch-security] [6lo] Device vs net… Kris Pister
- Re: [Anima] Thread [Comments needed for Security … Hannes Tschofenig
- Re: [Anima] [6lo] Thread [Comments needed for Sec… Ralph Droms
- Re: [Anima] Thread [Comments needed for Security … Brian E Carpenter
- [Anima] (Fair) competition in pursuing ideas and … Rene Struik
- Re: [Anima] (Fair) competition in pursuing ideas … Brian E Carpenter
- Re: [Anima] (Fair) competition in pursuing ideas … Sheng Jiang
- Re: [Anima] (Fair) competition in pursuing ideas … Rene Struik
- Re: [Anima] (Fair) competition in pursuing ideas … Sheng Jiang
- Re: [Anima] Thread [Comments needed for Security … Hannes Tschofenig
- Re: [Anima] (Fair) competition in pursuing ideas … Hannes Tschofenig
- Re: [Anima] (Fair) competition in pursuing ideas … Robert Cragie
- Re: [Anima] [6lo] Thread [Comments needed for Sec… Oliver Hahm
- Re: [Anima] [6lo] Thread [Comments needed for Sec… Alper Yegin
- Re: [Anima] [6lo] Thread [Comments needed for Sec… Carsten Bormann