[Anima] security review issue 11: what if MASA refuses to provide a voucher #88

Michael Richardson <mcr+ietf@sandelman.ca> Fri, 30 November 2018 02:27 UTC

Return-Path: <mcr@sandelman.ca>
X-Original-To: anima@ietfa.amsl.com
Delivered-To: anima@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E99F0127B4C for <anima@ietfa.amsl.com>; Thu, 29 Nov 2018 18:27:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CfmnViRuW0Yu for <anima@ietfa.amsl.com>; Thu, 29 Nov 2018 18:27:29 -0800 (PST)
Received: from relay.sandelman.ca (relay.cooperix.net [IPv6:2a01:7e00::f03c:91ff:feae:de77]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4B17112008A for <anima@ietf.org>; Thu, 29 Nov 2018 18:27:29 -0800 (PST)
Received: from dooku.sandelman.ca (unknown [80.233.33.183]) by relay.sandelman.ca (Postfix) with ESMTPS id 159D71F8BD; Fri, 30 Nov 2018 02:27:28 +0000 (UTC)
Received: by dooku.sandelman.ca (Postfix, from userid 179) id F1A8C173B; Thu, 29 Nov 2018 21:26:53 -0500 (EST)
From: Michael Richardson <mcr+ietf@sandelman.ca>
To: anima@ietf.org
In-reply-to: <24358.1543530974@dooku.sandelman.ca>
References: <153826253306.18743.9250084704876465818@ietfa.amsl.com>, <153874289877.989.15433226866680411112@ietfa.amsl.com> <24358.1543530974@dooku.sandelman.ca>
Comments: In-reply-to Michael Richardson <mcr+ietf@sandelman.ca> message dated "Thu, 29 Nov 2018 22:36:14 -0000."
X-Mailer: MH-E 8.6; nmh 1.6; GNU Emacs 24.5.1
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg="pgp-sha256"; protocol="application/pgp-signature"
Date: Fri, 30 Nov 2018 02:26:53 -0000
Message-ID: <7970.1543544813@dooku.sandelman.ca>
Archived-At: <https://mailarchive.ietf.org/arch/msg/anima/ZbC3AfNBu4AdUo4AqEZmm6cu8VY>
Subject: [Anima] security review issue 11: what if MASA refuses to provide a voucher #88
X-BeenThere: anima@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Autonomic Networking Integrated Model and Approach <anima.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/anima>, <mailto:anima-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/anima/>
List-Post: <mailto:anima@ietf.org>
List-Help: <mailto:anima-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/anima>, <mailto:anima-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 30 Nov 2018 02:27:31 -0000

https://github.com/anima-wg/anima-bootstrap/issues/88

> What happens if the MASA refuses to provide a voucher, or provides a wrong
> voucher? Can the MASA be used to restrain commerce with specific countries?
> Is that a feature or a bug?

BRSKI does not eliminate other mechanisms of enrolling devices.
If the vendor eliminates all other ways of enrolling devices, then yes, it
could be used as a restraint.  But, many vendors already restrict which
firmware can be used in which countries, and by which customers.

It's a feature that the MASA can be used to defer theft.
It's a bug that the MASA can be used to prevent resale.
I'd love to resolve the situation, but I don't know how.

--
Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works
 -= IPv6 IoT consulting =-