[Diem] Re: Some high-level thoughts on scoping
Felix Linker <linkerfelix@gmail.com> Mon, 01 July 2024 13:09 UTC
Return-Path: <linkerfelix@gmail.com>
X-Original-To: diem@ietfa.amsl.com
Delivered-To: diem@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 14F25C169409 for <diem@ietfa.amsl.com>; Mon, 1 Jul 2024 06:09:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.104
X-Spam-Level:
X-Spam-Status: No, score=-2.104 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YS7aGWc-lQCU for <diem@ietfa.amsl.com>; Mon, 1 Jul 2024 06:09:45 -0700 (PDT)
Received: from mail-wm1-x32b.google.com (mail-wm1-x32b.google.com [IPv6:2a00:1450:4864:20::32b]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BA219C169407 for <diem@ietf.org>; Mon, 1 Jul 2024 06:09:45 -0700 (PDT)
Received: by mail-wm1-x32b.google.com with SMTP id 5b1f17b1804b1-4256f102e89so20279595e9.0 for <diem@ietf.org>; Mon, 01 Jul 2024 06:09:45 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1719839383; x=1720444183; darn=ietf.org; h=references:to:cc:in-reply-to:date:subject:mime-version:message-id :from:from:to:cc:subject:date:message-id:reply-to; bh=H2C7dzioQDVLkWu2vGUUX9pSFq/XQkHX3C2pAUdtYt0=; b=lxRYYvj0+Q+VrIgBQn8niQFVOIeUyW2Jfsm5YzL6xgbEaRUyLQRDY1+3DDXZxk/hrm kCoD+RaoNZ7iD1BxzWdkOO3SLrrDRf0/CchPgf4lhXfPN9blrWzF8i9z0DG8Z9YRWFlC y1NuqrMacnfHUkZgJaqqvYNI0hWEdWd9Cl+YmRPJIXOQesQXNKEJ4e2yYQrJVmRhnEsp lDRyVpicPuVbGcthynOU8mOnyMWdGi8EdYoh+8dKURCgNwyFZtDJNRxlwjqCy3pcE10s cNDNXShedEfdtDkE5+Q3Ph5W12yZo+dgb2eHMdM0VtfEhvoiKzcUMcUlzafPS83BNaG+ 14ow==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1719839383; x=1720444183; h=references:to:cc:in-reply-to:date:subject:mime-version:message-id :from:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=H2C7dzioQDVLkWu2vGUUX9pSFq/XQkHX3C2pAUdtYt0=; b=FMxXKBbvXxg4gsnvlcsaj5g4CmoGAtDCEWfDdmRAziiOcIhBxHXCt7zSTs7sla89iG mxXP+mGKZ0BbnFphklULjOj3c3TUo5bvwgmCAiRHiygkhyFrwOMUaA3EOotP66RM8F4a J7EKjs7RXBJXIJFnWIhVC9aGhsZb8A+5vMddZ8rUBxwfaNW3gBiCOyjtoDCS6XjWuBSw MghsU4uZxcg7yBqO/97D3upJvT+uC2fARLMr6n7DJrVz9pwzxagmDaXMhngxU1zpAdCN /ucj5URPqo3WrARxQTeG52FN8vna+tp2wFIud8GduuV8h1n0S3o/vmE4t6AIKPWf2M5U pvLA==
X-Gm-Message-State: AOJu0YxHyukjscAqfu05H3r3xTTbWbqK9VXIAiQw9ssBY94r4w6UMag9 sj1v9bCG4ZycxlSuxsfxbG5XLtHb0bbOAP2+G++pO1E4Kf4yrFxIoBlOhQ==
X-Google-Smtp-Source: AGHT+IHZzMN5k6KnKXp6xgcMshk6x9djXDuH8RBpBYY0prc21Q/vtwKy9573V+XGpZxPDbOoXrF05A==
X-Received: by 2002:a05:600c:4f52:b0:424:aa64:e9b3 with SMTP id 5b1f17b1804b1-4257a02b701mr36526605e9.29.1719839383036; Mon, 01 Jul 2024 06:09:43 -0700 (PDT)
Received: from smtpclient.apple (2001-67c-10ec-5784-8000--4eb.net6.ethz.ch. [2001:67c:10ec:5784:8000::4eb]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-4256af5b66csm150906075e9.18.2024.07.01.06.09.42 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Mon, 01 Jul 2024 06:09:42 -0700 (PDT)
From: Felix Linker <linkerfelix@gmail.com>
Message-Id: <C4F779D8-D854-43FA-AA2B-965382DB66EF@gmail.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_B6CE0CC5-8A38-46C3-B6B9-DF1E9D86762C"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3774.600.62\))
Date: Mon, 01 Jul 2024 15:09:31 +0200
In-Reply-To: <CABcZeBNxiUuXRykDSZ8rZ64JNKUgO76Ztdd7JwQv-RTqMgyDQg@mail.gmail.com>
To: Eric Rescorla <ekr@rtfm.com>
References: <CABcZeBNxiUuXRykDSZ8rZ64JNKUgO76Ztdd7JwQv-RTqMgyDQg@mail.gmail.com>
X-Mailer: Apple Mail (2.3774.600.62)
Message-ID-Hash: WJK72PCS7WBZHHR5IY6ZYF464ZXPE6YU
X-Message-ID-Hash: WJK72PCS7WBZHHR5IY6ZYF464ZXPE6YU
X-MailFrom: linkerfelix@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: diem@ietf.org
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [Diem] Re: Some high-level thoughts on scoping
List-Id: Discussion of digital emblems <diem.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/diem/qgZzyTSN4pIJkmvxBxh_1-7mgco>
List-Archive: <https://mailarchive.ietf.org/arch/browse/diem>
List-Help: <mailto:diem-request@ietf.org?subject=help>
List-Owner: <mailto:diem-owner@ietf.org>
List-Post: <mailto:diem@ietf.org>
List-Subscribe: <mailto:diem-join@ietf.org>
List-Unsubscribe: <mailto:diem-leave@ietf.org>
Hi Ekr, I wanted to quickly jump in and discuss point [0]. I think there is a significant risk associated with unauthenticated emblems. It could turn out that they are distributed in bad faith so often that people would stop paying attention to any emblem. The signal-to-noise ratio would be simply too low. Nevertheless, I think that anyone should be able to deploy emblems. This is why we aimed to provide accountability with ADEM. We require parties to bind their signing keys to their domain name in a non-repudiable way. So you at least put your domain name at stake when distributing fraudulent emblems. Such emblems in some sense are unauthenticated (they don’t like back to a „root CA“), but they still can be authentically associated with a domain name. Best, Felix > On 29 Jun 2024, at 23:32, Eric Rescorla <ekr@rtfm.com> wrote: > > Hi folks, > > I've been reading the mailing list and wanted to offer some high > level comments. > > PROBLEM STATEMENT > We have two problem statement documents here which seem to have > different ideas of what the problem is. I would characterize > these as: > > - Port emblems from the physical to the digital domain (draft-linker) > - Improve on the security properties of physical emblems for physical > objects by digitizing them (draft-haberman) > > These seem like quite different objectives, made more different by the > assumption that both PS documents seem to make that the digital > emblems have to be hard to forge [0]. For instance, the mechanism > described in draft-adem-wg-adem-core-latest ties the emblem to some > network identifier for an element (the IP address or a domain name), > but this does not transfer in an obvious way to physical object. > > The emblem being physically attached to the object doesn't really help > here because the attacker might copy (if it's copyable) or move the > emblem (if it's uncopyable, though of course this is quite hard to do > while also having it be cheap) I see that in > (https://mailarchive.ietf.org/arch/msg/diem/-5sgtyo8hbCq7rLEDRVPZb8krMQ/) > Bill Woodcock observes that the emblem might carry various attributes > about the physical properties of the asset, but this seems like > a much weaker form of binding as there are going to be a very large > number of assets and the ability to positively identify each one > by properties such as size and mess will necessarily be quite limited. > Even ignoring everything else, just specifying the parameters one > would use in order to provide such a binding between emblem and > object seems challenging, and not really something that the IETF > is well suited to address (how does one distinguish between a pile > of more or less identical looking 40ft shipping containers?). > > > ARCHITECTURE > Conceptually, it seems to me that there are at least four technical > problems to solve: > > 1. The information to be conveyed about the asset (e.g., "This is a > hospital"). > > 2. The binding of the information to the asset (e.g., "this asset > has this IP address" or "this asset is a crate with the following > properties") > > 3. How the information is delivered to the verifying party. > > 4. How the information is attested to (e.g., the trust hierarchy). > Obviously, if we decided not to authenticate the information > we wouldn't need this. > > My sense is that while (1) and (4) are potentially common to both the > digital and physical domains, (2) and (3) will necessarily be > quite different. For instance, draft-adem-wg-adem-tls specifies > a binding of ADEM to TLS in the NewSessionTicket message, whereas > in the context of physical assets I've heard people suggest > QR codes or RFID tags [1]. > > > NEXT STEPS > I see that there is some debate about whether we need to address the > physical domain at all. I don't have an informed opinion on this > topic, but based on the above it seems to me that (1) the digital > domain is going to be quite a bit easier and (2) there is a > well-identified stakeholder (ICRC) which wants to do it and is > participating on this list. To that end, I think it's worth > considering whether it would be best for a potential WG to > start by trying to address the digital domain and then consider > expanding scope once the easier problem is well understood. > > -Ekr > > > [0] I actually think this assumption deserves some examination. There > aren't really any technical mechanisms that stop me from painting a > red cross on a military target. Rather, there are legal restrictions > on doing so. It's not entirely clear to me from reading the > various documents people have pointed to why that's insufficient in > the digital domain. It would certainly be much easier to design > a system like this if it just allowed for unverifiable claims > about the protected status of some asset. > > [1] I'm not sure if RFID tags can be covertly verified. > _______________________________________________ > Diem mailing list -- diem@ietf.org > To unsubscribe send an email to diem-leave@ietf.org
- [Diem] Re: [EXT] Re: Some high-level thoughts on … Mauro Vignati
- [Diem] Re: [EXT] Re: Some high-level thoughts on … Mauro Vignati
- [Diem] Re: Some high-level thoughts on scoping Bill Woodcock
- [Diem] Some high-level thoughts on scoping Eric Rescorla
- [Diem] Re: Some high-level thoughts on scoping Orie Steele
- [Diem] Re: Some high-level thoughts on scoping Felix Linker
- [Diem] Re: Some high-level thoughts on scoping Serge Droz
- [Diem] Re: Some high-level thoughts on scoping Felix Linker
- [Diem] Re: Some high-level thoughts on scoping Eric Rescorla
- [Diem] Re: [EXT] Re: Some high-level thoughts on … Samit D_CUNHA
- [Diem] Re: [EXT] Re: Some high-level thoughts on … Samit D_CUNHA
- [Diem] Re: [EXT] Re: Some high-level thoughts on … Samit D_CUNHA
- [Diem] Re: Some high-level thoughts on scoping Eric Rescorla
- [Diem] Re: Some high-level thoughts on scoping Dennis Jackson
- [Diem] Re: [EXT] Re: Some high-level thoughts on … Serge Droz
- [Diem] Re: [EXT] Re: Some high-level thoughts on … Mallory Knodel
- [Diem] Re: [EXT] Re: Some high-level thoughts on … Mallory Knodel
- [Diem] Re: [EXTERNAL] Re: [EXT] Re: Some high-lev… Tommy Jensen