Re: [core] Block Transfer and Object Security .... Re: Agenda

Göran Selander <goran.selander@ericsson.com> Tue, 29 March 2016 09:57 UTC

Return-Path: <goran.selander@ericsson.com>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4921A12D5F9 for <core@ietfa.amsl.com>; Tue, 29 Mar 2016 02:57:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.202
X-Spam-Level:
X-Spam-Status: No, score=-4.202 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XKcpTn5DbDtW for <core@ietfa.amsl.com>; Tue, 29 Mar 2016 02:57:38 -0700 (PDT)
Received: from sessmg22.ericsson.net (sessmg22.ericsson.net [193.180.251.58]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CA5FD12D5FE for <core@ietf.org>; Tue, 29 Mar 2016 02:57:26 -0700 (PDT)
X-AuditID: c1b4fb3a-f79d86d000005b69-33-56fa5185f159
Received: from ESESSHC008.ericsson.se (Unknown_Domain [153.88.183.42]) by sessmg22.ericsson.net (Symantec Mail Security) with SMTP id 56.28.23401.5815AF65; Tue, 29 Mar 2016 11:57:25 +0200 (CEST)
Received: from ESESSMB303.ericsson.se ([169.254.3.117]) by ESESSHC008.ericsson.se ([153.88.183.42]) with mapi id 14.03.0248.002; Tue, 29 Mar 2016 11:57:24 +0200
From: Göran Selander <goran.selander@ericsson.com>
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>, Carsten Bormann <cabo@tzi.org>
Thread-Topic: [core] Block Transfer and Object Security .... Re: Agenda
Thread-Index: AQHRiN7QrElu1ST8/UiJ0vOten3L1J9uo36AgAAqAACAAWN8AA==
Date: Tue, 29 Mar 2016 09:57:23 +0000
Message-ID: <D320171C.51160%goran.selander@ericsson.com>
References: <56F56B0F.9070508@gmx.net> <56F6A942.4010405@tzi.org> <56F6B333.2060105@gmx.net> <56F6B708.4080805@tzi.org> <56F90AFF.5080809@gmx.net> <56F92027.9060308@tzi.org> <56F94362.8000706@gmx.net>
In-Reply-To: <56F94362.8000706@gmx.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/14.6.1.160122
x-originating-ip: [153.88.183.154]
Content-Type: text/plain; charset="utf-8"
Content-ID: <D13663EAC0BAEF418A76A772F5C7597A@ericsson.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFtrAIsWRmVeSWpSXmKPExsUyM2K7lm5r4K8wg5Yd/BZHptxltdj3dj2z xdKd91gdmD0Wb9rP5rFkyU8mj2mLMgOYo7hsUlJzMstSi/TtErgy5k/pYyr4olTxZdsT9gbG BqUuRg4OCQETiTMzZbsYOYFMMYkL99azdTFycQgJHGGUeHfpBDNIQkhgCaPEmmkuIDabgIvE g4ZHTCC2iECwxMVLP8BsZgE1iUdLz7GAzBQWcJe4ukQWosRD4tiuh+wgYREBJ4mGNd4gYRYB VYk7W8+wgti8AhYSD3Y+YYTYdI5R4sqGchCbU0BdYs3h9+wgNiPQad9PrYHaJC5x68l8JoiT BSSW7DnPDGGLSrx8/A9spqiAnsTtjrXsEHEliUW3PzOBnMAsoCmxfpc+xBhriYcb/7NC2IoS U7ofskOcIyhxcuYTlgmMErOQbJuF0D0LSfcsJN2zkHQvYGRdxShanFpcnJtuZKSXWpSZXFyc n6eXl1qyiREYjwe3/LbawXjwueMhRgEORiUe3oSVP8OEWBPLiitzDzFKcDArifCWB/wKE+JN SaysSi3Kjy8qzUktPsQozcGiJM7L9ulymJBAemJJanZqakFqEUyWiYNTqoFR5YxI8MufPSw6 LqKX2jh9mu1enuOWvHDQ3OXZxb13/wp88Fh5KXNljGH560fJR69qeKsz/KiR3sS+xqTh/RpG 5u9drz6s7c8q2XPj4+nDubkeC0/M/mBt2tNXYdDL5iOXXWxbNX/mXPmPq178/mx6dlnJyhYd xpRTIb/ntN7jVVr8kn3er7ltSizFGYmGWsxFxYkAlkR76sMCAAA=
Archived-At: <http://mailarchive.ietf.org/arch/msg/core/Zmrob_fbP6CSuv6A2VJlmFTSRoA>
Cc: "core@ietf.org WG" <core@ietf.org>
Subject: Re: [core] Block Transfer and Object Security .... Re: Agenda
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Mar 2016 09:57:40 -0000

Hi Hannes,

On 2016-03-28 16:44, "core on behalf of Hannes Tschofenig"
<core-bounces@ietf.org on behalf of hannes.tschofenig@gmx.net> wrote:

>Hi Carsten,
>
>the observation that a proxy has negative impacts on security when
> * hop-by-hop communication security is used in combination with
> * terminating that communication at the proxy
>is nothing that relates to the blockwise transfer itself.

See previous mail.

>
>In general, in such a setup the proxy has the power to change the
>content, re-arrange data, inject new data, etc.
>
>I understand that end-to-end security is important in such cases and of
>course raises the question about the use of intermediaries in the first
>place 

Intermediaries can also perform a security function by protecting
availability in terms of communication resources and power consumption of
constrained endpoints. I don’t see this as black or white, but as
conflicting requirements where different trade-offs are preferred
depending on the scenario. This is the topic of
draft-hartke-core-e2e-security-reqs, it would be interesting to hear your
comments on that.


>(particularly if they are supposed to make all sorts of
>computations, like aggregation and analysis, on that data).

Those kind intermediaries are currently out of scope in the draft
referenced above, but one of the topics for discussion in that slot on the
CoRE agenda is what kind of intermediaries this analysis should encompass.
Currently it is forward proxy and pub-sub broker, we are considering to
add reverse proxy and translational proxy (e.g. HTTP-CoAP).

Göran



>
>Ciao
>Hannes
>
>On 03/28/2016 02:14 PM, Carsten Bormann wrote:
>> Hi Hannes,
>> 
>>> I have re-read the Blockwise Transfer draft and the document does not
>>> give me the impression that there is any specific need to tie it to
>>> Object Security.
>>>
>>> Can you explain what the relationship is?
>> 
>> After the last call completed, we had a discussion on the IETF mailing
>> list how to employ object security in a block-wise transfer that spans
>> proxies.
>> If you secure only the complete representation, the cache in a proxy
>> might be poisoned by fake blocks, and you get an availability problem.
>> If you secure each of the blocks (and have a way for the proxy to be
>> part of a security association needed so it also can verify the blocks),
>> you can prevent that, but you still have to secure the way the entire
>> representation is composed from those blocks, and that might mean
>> additional components are needed in an object security protocol.
>> 
>> I agree that none of these considerations have a bearing on the
>> block-wise protocol itself, and this also was the resolution we reached
>> after the discussion.  But it was useful to have the discussion, and it
>> will inform the discussion about object security.
>> 
>>> I hope there is no plan to make the completion of Blockwise transfer
>>> dependent on the progress of object security.
>> 
>> No, as far as the CoRE WG is concerned, block-wise is done.
>> It is currently in IESG evaluation and on the agenda of the 2016-04-21
>> IESG telechat; Matthias Kovatsch is the shepherd.
>> 
>> Grüße, Carsten
>>