Re: [Dtls-iot] IP Addresses in Certificates

Michael StJohns <msj@nthpermutation.com> Tue, 11 August 2015 14:47 UTC

Return-Path: <msj@nthpermutation.com>
X-Original-To: dtls-iot@ietfa.amsl.com
Delivered-To: dtls-iot@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 499FE1A901F for <dtls-iot@ietfa.amsl.com>; Tue, 11 Aug 2015 07:47:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.59
X-Spam-Level:
X-Spam-Status: No, score=-2.59 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, T_FILL_THIS_FORM_SHORT=0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Jvccrz4m85Nv for <dtls-iot@ietfa.amsl.com>; Tue, 11 Aug 2015 07:47:12 -0700 (PDT)
Received: from mail-qg0-f51.google.com (mail-qg0-f51.google.com [209.85.192.51]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 07A021A8FD6 for <dtls-iot@ietf.org>; Tue, 11 Aug 2015 07:47:12 -0700 (PDT)
Received: by qgeg42 with SMTP id g42so104471100qge.1 for <dtls-iot@ietf.org>; Tue, 11 Aug 2015 07:47:11 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:subject:to:references:cc:from:message-id:date :user-agent:mime-version:in-reply-to:content-type :content-transfer-encoding; bh=0ITikWbGDTS41ONoucY1yWX6rwbQbzAUH5Y+G7OP9Gs=; b=kBfcIUV9quDGS+IDlU/C4lqcvrNKu9ngjjjkVerGRPiDUNSeY+YsW9cyomxmlLInut SYdG8VgVDWuuTDBu50e1QmAN14xZZ1qhMBs953194mp9NOqEUg4dTuHiJTVnz5ChAFGo LlaHmQHQKozLaD4xPqAH7lQ87HYgq5cZB3tBraQG/fIGgzWJaP7yEOGcbEoHuoGgyMlK DPrlON4bH3k77nCE/3zB1U3BWpq524Ey356e9bqbABDC4LgzrWVD/Dj6llhwLwB6DKZJ kHzV5YsFqhxycYggujEm2ZbSI7/0o0rr+/njeO2kZg0o6T8WOkSwd+R/aizdCwYKUlkS TCxg==
X-Gm-Message-State: ALoCoQkos2E1jkfyznL1MiTTTzywcp906shBUBpy/Y4dFVmLej7Kh1hudFAhfqXxZucIUhZTqlaw
X-Received: by 10.140.194.198 with SMTP id p189mr51789234qha.42.1439304431014; Tue, 11 Aug 2015 07:47:11 -0700 (PDT)
Received: from ?IPv6:2601:148:c000:1bb4:25a8:b49c:958b:8d09? ([2601:148:c000:1bb4:25a8:b49c:958b:8d09]) by smtp.gmail.com with ESMTPSA id 41sm747538qkp.9.2015.08.11.07.47.10 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 11 Aug 2015 07:47:10 -0700 (PDT)
To: Stephen Farrell <stephen.farrell@cs.tcd.ie>, Hannes Tschofenig <hannes.tschofenig@gmx.net>
References: <55A63EEF.7010608@gmx.net> <55A641EC.4030203@cs.tcd.ie> <D1D3F9D5.31B15%thomas.fossati@alcatel-lucent.com> <trinity-5e418e2e-726a-4c31-8498-634e598fb57e-1438786484782@3capp-gmx-bs46> <55C23E1B.5050300@cs.tcd.ie> <55C2687F.8050004@nthpermutation.com> <55C4BEE5.5080107@gmx.net> <55C7F80B.5020501@cs.tcd.ie>
From: Michael StJohns <msj@nthpermutation.com>
Message-ID: <55CA0AF4.2070909@nthpermutation.com>
Date: Tue, 11 Aug 2015 10:47:16 -0400
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.0.1
MIME-Version: 1.0
In-Reply-To: <55C7F80B.5020501@cs.tcd.ie>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/dtls-iot/VZVH5Z1gKbdu9K__zCm6uOR-HmE>
Cc: dtls-iot@ietf.org
Subject: Re: [Dtls-iot] IP Addresses in Certificates
X-BeenThere: dtls-iot@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: DTLS for IoT discussion list <dtls-iot.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dtls-iot>, <mailto:dtls-iot-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dtls-iot/>
List-Post: <mailto:dtls-iot@ietf.org>
List-Help: <mailto:dtls-iot-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dtls-iot>, <mailto:dtls-iot-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 11 Aug 2015 14:47:14 -0000

On 8/9/2015 9:02 PM, Stephen Farrell wrote:
> Hiya,
>
> On 07/08/15 15:21, Hannes Tschofenig wrote:
>> Hi Mike, Hi Stephen,
>>
>> I don't understand why we should make any recommendations for how to use
>> IP addresses in certificates.
> For which definition of "we"?
My guess is that he was referring to DICE given the mailing list...

>
> I guess it is maybe wrong to consider the DICE WG doing this, but my
> comment was really asking the question and not insisting on a given
> answer.

I didn't take your question as rhetorical either....

>
>> IP addresses in certificates are not useful for end devices since their
>> IP addresses is most likely not known during manufacturing nor does it
>> add any security value.
> Fair point.
>
> OTOH, there will be devices whose only visible identifier is an IP
> address, right? If so, and if certificates/DTLS are to be of use with
> such devices... then what? I do think some variety of "we" ought try
> to address this problem.

I don't think that's ever correct.  The most visible identifier is 
generally going to be the L2 address which will generally be fixed from 
manufacturing.  But that's immaterial as what's important is not the 
network visible identity, but the identity the device uses for its 
connection to the network and to IOT services.

802.1AR uses the Manufacturer device type OID/Serial number pair as the 
recommended identity for manufactured in certificates and that makes a 
lot of sense as both of those are human usable and tend to also be on 
the label on the device or device box.  That makes it pretty easy to add 
them to access control lists in the IOT services server or to provide a 
secondary (and revokable) credential (after verifying the primary 
manufacturer/serial credential) that the device can use to connect to 
the network or local IOT servers.


Going back to what I said before:

> So I think your recommendation of "future work needed" is probably more
> correct than "IP certificates needed".

So I think we should close out this item for DICE.

But might it be a better item for ACE?

>
>> Regarding IEEE 802.1AR I don't believe it recommends using IP addresses
>> in certificates either.
> Which is entirely fine. There are definitely better ways of naming
> things than with addresses, esp relatively-scoped addresses.
>
>
> S.
>
>> Ciao
>> Hannes
>>
>> On 08/05/2015 09:48 PM, Michael StJohns wrote:
>>> Hi Stephen et al.
>>>
>>> I'm coming in on this fairly late (2 weeks) so let me try and muddy the
>>> waters:
>>>
>>> IEEE 802.1AR is a good source for ideas of how to deal with certificates
>>> and small devices.   In the case of Zigbee Smart Energy 2.0 for example,
>>> we use their concepts of LDevID  (Locally significant) and IDevID
>>> (Initial) device identifiers.  The latter is what gets built into the
>>> device and SEP2.0 uses the SubjectAltName hardwareModuleName in RFC4108
>>> as the manufactured in name for the device.  The attachment of a
>>> certificate to MAC address or even IP address by the manufacturer has a
>>> number of issues that are painful to address and that don't usually add
>>> to the security of the system.  (e.g. the handle of the name mostly
>>> isn't important to the underlying protocols in IOT and the relationship
>>> between an entity and its IP or MAC generally isn't a necessary
>>> consideration for trust between entities given certificates - same
>>> reason that client certificates for TLS rarely have IP addresses in
>>> them, but do have human personal names or email addresses).
>>>
>>> Ideally you want a mapping between what's on the certificate inside the
>>> device and what's on the label outside - so that humans can basically
>>> type things in (or barcode them or....) during installation.  I might
>>> expect a local trust center to issue an LDevID based on the (manual?)
>>> acceptance of IDevID, and the LDevID *could* contain an IP address as a
>>> SubjectAltName, but I don't think we've gone that deep and most folk
>>> balk at running a Mini-CA in their home.
>>>
>>> So I think your recommendation of "future work needed" is probably more
>>> correct than "IP certificates needed".
>>>
>>> Later, Mike
>>>
>>>
>>>
>>>
>>>
>>> On 8/5/2015 12:47 PM, Stephen Farrell wrote:
>>>> Hiya,
>>>>
>>>> On 05/08/15 15:54, Hannes Tschofenig wrote:
>>>>> Hi Stephen,
>>>>> reading through this issue again I believe you could help us further
>>>>> explain
>>>>> what we could recommend in the document.
>>>> Assuming that it'd be a bunch of work to recommend how to best
>>>> handle certificates for devices that will only ever have a bogon
>>>> IP address, I guess the best for now is to just say that that work
>>>> is not (yet) done and hence this document makes no recommendation.
>>>>
>>>> Seem ok? (And yes it could be that the current text on that
>>>> is just fine, I didn't go look back right now)
>>>>
>>>> S.
>>>>
>>>>> Currently, we are saying that folks shouldn't use IP addresses in
>>>>> certificates
>>>>> and in the email below Thomas mentioned one reason for doing so. I
>>>>> also pointed
>>>>> to a separate draft we have been working on to explore the topic
>>>>> further (see
>>>>> <draft-fossati-core-certmode-rd-names-01>).
>>>>> Ciao
>>>>> Hannes
>>>>> *Gesendet:* Dienstag, 21. Juli 2015 um 14:16 Uhr
>>>>> *Von:* "FOSSATI, Thomas (Thomas)" <thomas.fossati@alcatel-lucent.com>
>>>>> *An:* "Stephen Farrell" <stephen.farrell@cs.tcd.ie>, "Hannes Tschofenig"
>>>>> <hannes.tschofenig@gmx.net>, "dtls-iot@ietf.org" <dtls-iot@ietf.org>
>>>>> *Betreff:* Re: [Dtls-iot] IP Addresses in Certificates
>>>>> Hi Stephen,
>>>>>
>>>>> On 15/07/2015 12:20, "dtls-iot on behalf of Stephen Farrell"
>>>>> <dtls-iot-bounces@ietf.org on behalf of stephen.farrell@cs.tcd.ie>
>>>>> wrote:
>>>>>    >Hiya,
>>>>>    >
>>>>>    >On 15/07/15 12:07, Hannes Tschofenig wrote:
>>>>>    >> Stephen wrote:
>>>>>    >>
>>>>>    >> (5) 6.3: Forgetting CoAP for the moment, surely this profile
>>>>> will be
>>>>>    >> used with devices that only have (possibly bogon) IP addresses
>>>>> and that
>>>>>    >> want to have those in certs. I do get that how to handle that
>>>>> well is
>>>>>    >> not very clear, esp. for certs for e.g. 192.168.0.1, but
>>>>> shouldn't it
>>>>>    >> really be covered by this profile?
>>>>>    >
>>>>>    >I should also have mentioned link-local addresses too I guess.
>>>>>
>>>>> v6 link-local make sense as stable identifiers, but they'd be equivalent
>>>>> to EUI-64 (which is what 6.3.2 requires for the use case where all the
>>>>> secure communication happens on the same subnet), only a few bytes
>>>>> larger
>>>>> than their EUI counterpart.
>>>>>
>>>>> Other kinds of IP addresses aren't long-term/stable enough to be put
>>>>> in a
>>>>> certificate -- which is in line with the recommendation we give in CoAP
>>>>> [https://tools.ietf.org/html/rfc7252#section-9.1.3.3].
>>>>>
>>>>> Cheers, t
>>>>>