Re: [Atlas] Application Transport LAyer Security (ATLAS) Charter Text

Hannes Tschofenig <Hannes.Tschofenig@arm.com> Fri, 02 February 2018 12:26 UTC

Return-Path: <Hannes.Tschofenig@arm.com>
X-Original-To: atlas@ietfa.amsl.com
Delivered-To: atlas@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 19F2912D7F8 for <atlas@ietfa.amsl.com>; Fri, 2 Feb 2018 04:26:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level:
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nvsLzefAfiz6 for <atlas@ietfa.amsl.com>; Fri, 2 Feb 2018 04:26:24 -0800 (PST)
Received: from EUR01-HE1-obe.outbound.protection.outlook.com (mail-he1eur01on0068.outbound.protection.outlook.com [104.47.0.68]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6DCE4129C6B for <atlas@ietf.org>; Fri, 2 Feb 2018 04:26:23 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector1-arm-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=7jHAoZ/Gm2dAiBrcXAuH/IHbNL492cIO07VE2qLNfnA=; b=EohX8c2ZZcEPBYSb7mWlGaDrff0WrJmmkj/eQk/I+AYZxsg96MdcPrVU7qUT/L66FxiBHLWKVLZkfpAHhgYY/Qxh8pxt94kOtndpSq13L8pNtfxlUrOd+8fnx5Kv/6P8r2aQl+kzWU3RI1Nr8ZDum4m34vsrGK5dlVO/2b00KlY=
Received: from AM4PR0801MB2706.eurprd08.prod.outlook.com (10.167.90.148) by AM4PR0801MB1442.eurprd08.prod.outlook.com (10.168.5.22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.444.14; Fri, 2 Feb 2018 12:26:20 +0000
Received: from AM4PR0801MB2706.eurprd08.prod.outlook.com ([fe80::b863:80d:692b:e64b]) by AM4PR0801MB2706.eurprd08.prod.outlook.com ([fe80::b863:80d:692b:e64b%14]) with mapi id 15.20.0444.022; Fri, 2 Feb 2018 12:26:20 +0000
From: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
To: Rafa Marin Lopez <rafa@um.es>
CC: "atlas@ietf.org" <atlas@ietf.org>
Thread-Topic: [Atlas] Application Transport LAyer Security (ATLAS) Charter Text
Thread-Index: AdOTwyPirW/e5/LOQWOr6hMZrGuG4wISVqgAAATwp9A=
Date: Fri, 02 Feb 2018 12:26:20 +0000
Message-ID: <AM4PR0801MB270672FDA690903CA86EFB3FFAF90@AM4PR0801MB2706.eurprd08.prod.outlook.com>
References: <AM4PR0801MB2706895905D2634096D4A11BFAEC0@AM4PR0801MB2706.eurprd08.prod.outlook.com> <1351441E-26C6-4E16-AD62-B06C860AE97D@um.es>
In-Reply-To: <1351441E-26C6-4E16-AD62-B06C860AE97D@um.es>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Hannes.Tschofenig@arm.com;
x-originating-ip: [80.92.119.5]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; AM4PR0801MB1442; 7:PPUBNsShP6PTxRv2y/k5eiKPPXA5RPzNTitU0RJqgxB+i3u0mute7QGvzzLtq0W+S82fSBecLRck2BMHr7l8Egn96rqeXiqXBy3/qkU+woGhkfxWp2rhy44t2sCc9oYHpmOWpcXlLAdlj0kmIW7v3TlaIf7ZgQvGVh9Scs9tGNJSHLC3+uuTAq03RrSUCbhpb4IkshiWoO/xTzXT7R5cPxGlWTzAjwKDa4RDxo2XeNH8Ynv4YqiSObjxhoLrjVus
x-ms-exchange-antispam-srfa-diagnostics: SSOS;
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: e0625d2d-179e-41dc-303e-08d56a382a56
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(4534165)(4627221)(201703031133081)(201702281549075)(48565401081)(5600026)(4604075)(3008032)(2017052603307)(7153060)(7193020); SRVR:AM4PR0801MB1442;
x-ms-traffictypediagnostic: AM4PR0801MB1442:
x-microsoft-antispam-prvs: <AM4PR0801MB144232546BC6AABE426CCA7FFAF90@AM4PR0801MB1442.eurprd08.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(180628864354917)(278428928389397)(192374486261705)(211936372134217)(17755550239193);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040501)(2401047)(5005006)(8121501046)(3231101)(2400082)(944501161)(3002001)(93006095)(93001095)(10201501046)(6055026)(6041288)(20161123560045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123562045)(20161123558120)(20161123564045)(6072148)(201708071742011); SRVR:AM4PR0801MB1442; BCL:0; PCL:0; RULEID:; SRVR:AM4PR0801MB1442;
x-forefront-prvs: 05715BE7FD
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(346002)(39380400002)(366004)(396003)(376002)(39860400002)(199004)(13464003)(189003)(252514010)(53754006)(40434004)(105586002)(3660700001)(3280700002)(68736007)(14454004)(74316002)(186003)(6116002)(59450400001)(53546011)(305945005)(26005)(7736002)(86362001)(6506007)(2950100002)(5660300001)(6916009)(2906002)(4326008)(66066001)(15650500001)(7696005)(102836004)(3846002)(76176011)(97736004)(2900100001)(25786009)(81156014)(81166006)(8676002)(6436002)(561944003)(33656002)(99286004)(9686003)(106356001)(6306002)(5890100001)(6246003)(55016002)(5250100002)(53936002)(229853002)(8936002)(966005)(316002)(72206003)(478600001); DIR:OUT; SFP:1101; SCL:1; SRVR:AM4PR0801MB1442; H:AM4PR0801MB2706.eurprd08.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en;
received-spf: None (protection.outlook.com: arm.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: +Jg/4XyS9pb4xqwqzzavErk+HiA2ymfT4Xx8HW3kboX29WjOfMDZGjmgQQhk07I0It58fmZa8TLqXkaxdsXhEA==
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-Network-Message-Id: e0625d2d-179e-41dc-303e-08d56a382a56
X-MS-Exchange-CrossTenant-originalarrivaltime: 02 Feb 2018 12:26:20.2547 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM4PR0801MB1442
Archived-At: <https://mailarchive.ietf.org/arch/msg/atlas/WG22U6viCEBisaZp-sOWijvwMY4>
Subject: Re: [Atlas] Application Transport LAyer Security (ATLAS) Charter Text
X-BeenThere: atlas@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Application Transport LAyer Security <atlas.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/atlas>, <mailto:atlas-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/atlas/>
List-Post: <mailto:atlas@ietf.org>
List-Help: <mailto:atlas-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/atlas>, <mailto:atlas-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 02 Feb 2018 12:26:27 -0000

Hi Rafa,

Thanks for your feedback.

A few remarks below.

-----Original Message-----
From: Rafa Marin Lopez [mailto:rafa@um.es]
Sent: 02 February 2018 10:59
To: Hannes Tschofenig
Cc: Rafa Marin Lopez; atlas@ietf.org
Subject: Re: [Atlas] Application Transport LAyer Security (ATLAS) Charter Text

Dear Hannes, all:

I have been reading the text about the potential charter and I have a few comments/questions (my apologies if they have been already addressed in the mailing list).

First of all, it seems the idea is using TLS/DTLS handshake as key exchange protocol. Therefore, the level of optimization (reducing number of messages , message size) is limited to what we can do with TLS and DTLS (I am thinking specially in constrained devices). Nevertheless, the advantage is that we already have that source code in the device anyway.

[Hannes] I agree that there are limits to the optimization one can make. On the other hand, this approach immediately re-uses all optimizations made for TLS/DTLS. For example, with the work on TLS 1.3 and DTLS 1.3 numerous optimizations have been made. I also have to say that this is foremost enable the functionality in the first place (and not just for IoT scenarios).

However, it is not clear to me if TLS/DTLS record layer will be also used as mandatory to protect application or not. In other words, my question is whether the TLS/DTLS handshake will be used to generate key material but this key material will not be used by the record protocol but other mechanisms to protect application messages. Or, or the contrary, the record protocol will be also used to protect application protocol. As an analogy, AFAIK, IKEv2 is used in IEEE 802.15.9 to generate key material to IEEE 802.15.4 but not for IPsec.

[Hannes] Very good question. I tried to make this more clear in my response to Carsten where I also provided an updated version of the charter text. At a minimum we should explore a solution that exports keying material for use with non-record layer protected application data.

By the way, a potential reference of this kind of Application Transport LAyer Security: In IEEE 802.21a we worked in something where the TLS handshake was transported inside IEEE 802.21 (MIH) messages. As a consequence we used the TLS record to protect further MIH messages. The reason of using TLS was very similar to the one stated here.

[Hannes] Thanks for this example. I will add it to the charter text to illustrate prior work. I believe Thread also used a similar approach.

Ciao
Hannes

Best Regards.

> El 22 ene 2018, a las 22:00, Hannes Tschofenig <Hannes.Tschofenig@arm.com> escribió:
>
> Hi all,
>
> Below you can find a first strawman proposal for the charter text of the ATLAS group. Following the discussions around the Singapore IETF meeting the idea is to have time at the London IETF meeting to find out whether there is enough interest but also where this work should happen (i.e., new group or an existing group).
>
> As you can see from the available drafts (see below) the use cases cover the Web as well as IoT environments.
>
> Ciao
> Hannes
>
> -------
>
> Application Transport LAyer Security (ATLAS)
>
> Charter for Working Group
>
> The Transport Layer Security (TLS) protocol has been huge successful protocol in the market place and it is used by developers to secure connection-oriented as well as connection-less transport protocols. Under the hood, both TLS and DTLS consist of sub-protocols, namely the handshaking protocols and the record protocol. The handshaking protocols offer an authenticated key exchange protocol that establishes the necessary keys and parameters for protecting application data via the record protocol. Years have been spent in improving both protocols and particularly the more sophisticated handshaking protocols. Through standardization in the IETF TLS working group many extensions and ciphersuites have been published and implemented that allow TLS to be customized for different environment. This flexibility and the availability of source code is appreciated by developers writing web applications, smart phone apps, and also for securing backend communication. With the need to secure embedded devices communicating with the cloud-based infrastructure TLS and DTLS has even found traction in the Internet of Things (IoT) community.
>
> TLS and DTLS sit between the transport layer, such as TCP and UDP, and the applications. Hence, TLS and DTLS offer protection of application traffic exchanged between the endpoints of the transport layer. There are, however, deployments where security protection needs to be applied beyond these two transport layer endpoints. Use cases include deployments where proxies terminate connections along the path or where devices transmit data first over a non-IP transport, such as Bluetooth Smart, before IP communication starts at the smart phone towards a cloud-based infrastructure.
>
> There is a need to offer application layer security for communication that is session based, i.e., where communication establishment is followed by an exchange of an arbitrary number of application data. Securing one-shot payloads, such as firmware updates in an IoT context, is outside the scope of this work. This application layer security mechanism requires authentication of the endpoints, and a modern a key exchange protocol. The result of a positive handshake will lead to the establishment of keying material and negotiated algorithms for confidentiality, integrity and replay protection of application data.
>
> Instead of re-designing a key exchange protocol this group will re-use the TLS handshaking protocols at the application layer for establishing keying material to protect application data.
>
> This group will maintain a close relationship with the TLS working group as well as with relevant application and IoT-relevant working groups in the IETF.
>
> Milestones
>
> May 2018    Adopt "Architecture and Use Case" document as WG item
>
> Jun 2018    Adopt "Application Layer TLS" specification as WG item.
>             Currently available proposals include:
> -   draft-schmertmann-dice-codtls-00
> -   draft-bhattacharyya-dice-less-on-coap-00
> -   draft-garcia-core-app-layer-sec-with-dtls-record-00
> -   draft-tschofenig-layered-tls-00
> -   draft-friel-tls-over-http-00
> -   and https://cloud.google.com/security/encryption-in-transit/application-layer-transport-security
>
> Oct 2018    Submit "Architecture and Use Case" document to the IESG for publication as an Informational Standard.
>
> Nov 2018    Submit "Application Layer TLS" specification to the IESG for publication as an Proposed Standard.
>
> IMPORTANT NOTICE: The contents of this email and any attachments are
> confidential and may also be privileged. If you are not the intended
> recipient, please notify the sender immediately and do not disclose
> the contents to any other person, use it for any purpose, or store or
> copy the information in any medium. Thank you.
> _______________________________________________
> Atlas mailing list
> Atlas@ietf.org
> https://www.ietf.org/mailman/listinfo/atlas

-----------------------------------------------------------
Rafael Marin Lopez, PhD
Dept. Information and Communications Engineering (DIIC) Faculty of Computer Science-University of Murcia
30100 Murcia - Spain
Telf: +34868888501 Fax: +34868884151 e-mail: rafa@um.es
----------------------------------------------------------






IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.