Re: [core] concerns re draft-oflynn-core-bootstrapping-02

Rene Struik <rstruik.ext@gmail.com> Fri, 29 October 2010 12:41 UTC

Return-Path: <rstruik.ext@gmail.com>
X-Original-To: core@core3.amsl.com
Delivered-To: core@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0FD833A683B for <core@core3.amsl.com>; Fri, 29 Oct 2010 05:41:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.837
X-Spam-Level:
X-Spam-Status: No, score=-2.837 tagged_above=-999 required=5 tests=[AWL=-0.238, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Mxc+A7GwQttX for <core@core3.amsl.com>; Fri, 29 Oct 2010 05:41:51 -0700 (PDT)
Received: from mail-gw0-f44.google.com (mail-gw0-f44.google.com [74.125.83.44]) by core3.amsl.com (Postfix) with ESMTP id F099E3A67E1 for <core@ietf.org>; Fri, 29 Oct 2010 05:41:50 -0700 (PDT)
Received: by gwb15 with SMTP id 15so2088865gwb.31 for <core@ietf.org>; Fri, 29 Oct 2010 05:43:45 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from :user-agent:mime-version:to:cc:subject:references:in-reply-to :content-type:content-transfer-encoding; bh=UBUoI9OnzeKlp5aE3v9DiQPx6aITL/IN/TTHdxGJ8rw=; b=UdNXxP+4ZFTCzJkSGn1VWNBqnrN7Bq8jv9itDQx18QogAD5Wdwhuuu60rjjqnJJn6p V6+Q84iKtDJ3ftK6qTS7BMcioqQe1O9Gf48vHZviVq+X+vwvfKSV8bQuEGLodWfOpL6I cP6LGdkiJCnV4O6JNGPGbu3U/wQhuEMLZfJGE=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:user-agent:mime-version:to:cc:subject :references:in-reply-to:content-type:content-transfer-encoding; b=W/Or9KtzLrhFgBig1r10YbuWBoIfaTdDQBQyb6rJoVZ24vcKLzHzTKIgoknrXCbgbk mw5r0/H6ksJm+LAYruG9FxjM1DQHhppoqLW1oIlKB/qCVjGZG+k7EC63LbwxYHTw/7od 0ZnECxy8siFJ/n4dJ/BlKtyeERGvSK0bbNo6E=
Received: by 10.100.9.14 with SMTP id 14mr10235779ani.239.1288356224332; Fri, 29 Oct 2010 05:43:44 -0700 (PDT)
Received: from [192.168.1.102] (CPE0013100e2c51-CM00186851d6f6.cpe.net.cable.rogers.com [99.232.69.160]) by mx.google.com with ESMTPS id b22sm2461850anb.35.2010.10.29.05.43.42 (version=TLSv1/SSLv3 cipher=RC4-MD5); Fri, 29 Oct 2010 05:43:43 -0700 (PDT)
Message-ID: <4CCAC166.90504@gmail.com>
Date: Fri, 29 Oct 2010 08:43:18 -0400
From: Rene Struik <rstruik.ext@gmail.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.0; en-GB; rv:1.9.2.12) Gecko/20101027 Thunderbird/3.1.6
MIME-Version: 1.0
To: Yoshihiro Ohba <yoshihiro.ohba@toshiba.co.jp>
References: <BE21691E-1C60-4E2C-B7A8-81782F46E923@tzi.org> <E96BC2D7-3C56-4859-94B3-8B1AF1990C77@tzi.org> <935DB371-B149-486A-8AD2-3B4454C9B172@tzi.org> <4CA3BB54.8050706@gmail.com> <AANLkTimFX2BuD=UT3t4XV8XvD+ZRhgj57wDzRc2sFKOc@mail.gmail.com> <4CA5E8E0.4030503@gmail.com> <AANLkTi=0yEc6Fgi2-eahb8JtRZBxC9PWD=aEwQjh3F6R@mail.gmail.com> <4CA6095F.6040403@gmail.com> <B0F8E486-051F-4C5D-A05F-BDB3701404C5@cs.rwth-aachen.de> <4CB48B9B.9010206@gmail.com> <4CC83F61.5060109@gmail.com> <023a01cb76e1$869bfcc0$93d3f640$%yegin@yegin.org> <D266D724-C345-4980-A685-5742F76C60D3@tzi.org> <4CCA052E.2010909@toshiba.co.jp> <4CCA41AC.6040800@gmail.com> <4CCA7819.6020908@toshiba.co.jp>
In-Reply-To: <4CCA7819.6020908@toshiba.co.jp>
Content-Type: text/plain; charset="ISO-2022-JP"
Content-Transfer-Encoding: 7bit
Cc: core@ietf.org
Subject: Re: [core] concerns re draft-oflynn-core-bootstrapping-02
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/core>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 29 Oct 2010 12:41:55 -0000

Hi Yoshihiro:

As already expressed, I would really favor a more fundamental approach,
where deployment scenarios, desired operational behaviors, and required
security properties are guideline to the design. Protocol soup acronyms
are nice, but they could obscure what one is really after here (at
least, that is what this does to me).

That is also what I expressed in my email 4 weeks ago (October 1, 2010),
originally in the context of HIP. Unfortunately, most of the analysis is
still missing.

Best regards, Rene
(again in the office Monday)

On 29/10/2010 3:30 AM, Yoshihiro Ohba wrote:
> Hello Rene,
>
> Thank you very much for expressing your concerns in detail.
>
> Basically there is no implications such as (a) and (b1) to (b4) in the
> general framework of PANA, EAP and AAA.  Let me explain this in
> details below..
>
> (2010/10/29 12:38), Rene Struik wrote:
>> Hi Yoshihiro:
>>
>> It seems that in your example each device identifier is tied to a 
>> single security manager (e.g., device A and security manager S would 
>> yield device id A@S.com).
>>
>> This seems to imply the following:
>> (a) entangles the name space and device role space (since tie-ing node 
>> A to a node S that assumes a security manager role for A);
> In the case where the EAP peer identity is tied with the device in
> which the EAP peer resides, you are right.  However, the EAP peer
> identity is not necessarily tied with the device.  It can be also tied
> with the user who uses the device.  Or when a tunneling EAP method
> such as EAP-TTLS is used, it is possible to tie the EAP peer identity
> for the outer EAP method with the device *and* tie the EAP peer
> identity for the inner EAP method with the user.  So in general EAP
> framework, there is no fixed binding is assumed between the device and
> security manager.
>
>> (b) precludes scenarios where
>> (b1) a device may have multiple security managers (example: remote 
>> control, spare remote under the pillow, central node);
> When PANA is used, it is possible to have multiple PANA sessions
> between a PaC and a PAA, and different EAP peer identities can be used
> for those PANA sessions where each EAP peer identity may be tied with
> a distinct security manager.  OTOH, this kind of scenario is difficult
> to be supported by IEEE 802.1X which allows only one authentication
> session between a pair of 802.1X Supplicant and Authenticator.
>
>> (b2) a security manager may change over time (example: change of 
>> security manager, due to malfunctioning device or ownership change);
> I think this is basically a provisioning issue.  If a deployment uses
> a provisioning mechanism that allows dynamically changing the EAP peer
> identity associated with a particular device, it is possible to change
> a security manager over time under the EAP framework.
>
>> (b3) a device may not have a security manager yet (example: device is 
>> initially taken out of generic box, without any imprinting happening 
>> yet);
> Again I think this is a provisioning issue.  If a deployment uses a
> provisioning mechanism that supports a standalone bootstrapping
> mechanism during the provisioning phase, it is possible not to use a
> security manager in the provisioning phase.
>
>> (b4) a device and security manager may not be in hierarchical 
>> relationship (example: simple device pairing a la Bluetooth v2.1 EDR).
>> As such, this seems to preclude many useful deployment scenarios for 
>> sensor networks.
> Since the EAP framework does not require to use the AAA
> infrastructure, a P2P relationship can be supported by the EAP framework.
>
> We can clarify these things in the core-bootstrapping draft if it helps.
>
> Best Regards,
> Yoshihiro Ohba
>
>
>> Hence, my note in my email as of Wed October 27, 2010, 11:04am EDT re 
>> the latest version of draft-oflynn-core-bootstrapping-02, in which I 
>> highlighted the importance of facilitating a flexible set of 
>> deployment scenarios.
>>
>> Please let me know if I misinterpreted your EAP-style explanation 
>> (above, I only focus on logical device roles and not on communication 
>> patterns).
>>
>> Best regards, Rene
>>
>> [excerpt email RS as of October 1, 2010, 12:16pm EDT]
>>
>> In my mind, properties of suitable authenticated key agreement schemes 
>> should include (a) key establishment; (b) implicit key authentication; 
>> (c) key confirmation; (d) mutual entity authentication; (e) forward 
>> secrecy; (f) {perhaps} some more esoteric properties (key compromise 
>> impersonation resilience, etc.).
>>
>> Moreover, the "name space" (device identifiers) and the "cryptographic 
>> space" (public keys, etc.) should be independent, so that this would 
>> allow trust lifecycle management to be reduced to proper management of 
>> device identifiers (i.e., ****no** entanglement of concepts from 
>> different disciplines).
>>
>>
>> On 28/10/2010 7:20 PM, Yoshihiro Ohba wrote:
>>> OK, then let me use the term "RADIUS server" to explain.
>>>
>>> Any EAP transport protocol such as IEEE 802.1X and PANA works with
>>> multiple AAA domains in which a single access network may interface to
>>> multiple RADIUS servers where each RADIUS server serves for a distinct
>>> AAA domain. With EAP, RADIUS routing is based on the EAP peer
>>> identity such as "foo@domainA.com" and "bar@domainB.com" in a way that
>>> authentication messages for EAP peer "foo@domainA.com"are routed to
>>> "domainA.com" RADIUS server and authentication messages for EAP peer
>>> "bar@domainB.com" are routed to "domainB.com" RADIUS server. The EAP
>>> peer identity is extracted from the initial EAP exchange by an EAP
>>> pass-through authenticator that is co-located with a RADIUS client at
>>> the border of the access network. In a large scale RADIUS deployment,
>>> there may be RADIUS proxies between a RADIUS client and a RADIUS
>>> server to simplify the AAA routing task for RADIUS clients. In PANA,
>>> PAA (PANA Authentication Agent) is the EAP pass-through authenticator,
>>> and PaC (PANA Client) is the EAP peer.
>>>
>>> Hope this helps,
>>> Yoshihiro Ohba
>>>
>>> (2010/10/29 6:21), Carsten Bormann wrote:
>>>> On Oct 28, 2010, at 22:48, Alper Yegin wrote:
>>>>
>>>>> mothership
>>>> I think other terms are "mother-may-I", "trust center", "RADIUS 
>>>> server", or "Policy Decision Point". Just guessing, though.
>>>> I think the use case of interest here is a single constrained 
>>>> network that simultaneously serves multiple trust domains, so being 
>>>> authorized by any one of them should give you access.
>>>>
>>>> With that potential explanation, can you elucidate whether (and 
>>>> maybe how) PANA would work in this scenario?
>>>>
>>>> Gruesse, Carsten
>>>>
>>>> _______________________________________________
>>>> core mailing list
>>>> core@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/core
>>>>
>>> _______________________________________________
>>> core mailing list
>>> core@ietf.org
>>> https://www.ietf.org/mailman/listinfo/core
>>


-- 
email: rstruik.ext@gmail.com
Skype: rstruik
cell: +1 (647) 867-5658
USA Google voice: +1 (415) 690-7363