Re: [Hipsec] Iotdir last call review of draft-ietf-hip-dex-11

Miika Komu <miika.komu@ericsson.com> Tue, 31 December 2019 12:09 UTC

Return-Path: <miika.komu@ericsson.com>
X-Original-To: hipsec@ietfa.amsl.com
Delivered-To: hipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B2F271200E5; Tue, 31 Dec 2019 04:09:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.002
X-Spam-Level:
X-Spam-Status: No, score=-2.002 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NZjU0P8lW9tc; Tue, 31 Dec 2019 04:09:54 -0800 (PST)
Received: from EUR04-HE1-obe.outbound.protection.outlook.com (mail-eopbgr70059.outbound.protection.outlook.com [40.107.7.59]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 650DA1200DF; Tue, 31 Dec 2019 04:09:54 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=VLP4WhmBSSy2ABaJmGh62UIBno4oUbXqsR7vFsxsd/8FbnXibe4oJPaiEUyVw7pzrAuGvUae+UtM0jB8+L5jhnwVYdiYypP4c5qyBAtxOaXBfw+vqZrXULfhXyq2PrD3zaPvCZI8a83iz402azEDMmVWLe2EoimiH9MsA3zM10aIP/nwdAJGPDj1kKByUgOzYkKL4vG3D+ypOD8ZqUx28KotG8SDeb761/vqRJvyeTEpW57cbQJLfLJFvySEqCx1M/O3K51/M/F8pxlfMdeCtO6uADKn1uWG+Y0SfmpXboX9zQZmlHlW9MnxqyieiCdjtgDA3d/CWR24llMDV5L1Vg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=w35+vpUo0b28Pz/3ivegzD1VZ49GvBJa297jSBlf+pE=; b=dGEDPPmtGPUscMTP9CBgJxluY3zx0UZoAws/W6zhNsev9nYD6R7YKsYEcgbXoB5txz53aaBezzQHP5emVdxvC/2ej5CmNsFkWxmebGuAPPXYOryHlaz0459VgSp8mSJHTs1UpDc13M21u04xPhaln/HIzACDH51RGJXEBOsQ7O+jzerGvgTuwmXJQ4Lec68XhOrnWFUExHzlgy8FeuZTfP+gJ2w6UPEhd7jZK/4+SAYxnpMY7orx3ecpDyCQJap35/w4rieX65fNUIzlJDu3VVb3cqF2rJgkjGmkukR7ZRQg0doT+4TEzJ8Rur5XO6dJj41r4B+xc3umLieQscftBg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=w35+vpUo0b28Pz/3ivegzD1VZ49GvBJa297jSBlf+pE=; b=Rb8yTrqiacMXF1Qy09IDL7tYBCKmautuuQ5oNpozuhSJRiM9iv3jJR+x2gA51jHa0gWrysipreCw28aO7ponzzO1Ex2XLcbgP6dVsB58BIYx+ebkeHyjJ/KSnVD2v+uD33ATORWrcXpLjSg/5yFURhasjsGb0CiTJBQQh6pyCY8=
Received: from AM0PR07MB3876.eurprd07.prod.outlook.com (52.134.81.144) by AM0PR07MB4292.eurprd07.prod.outlook.com (52.133.61.28) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2602.6; Tue, 31 Dec 2019 12:09:51 +0000
Received: from AM0PR07MB3876.eurprd07.prod.outlook.com ([fe80::ad0a:3e71:2e55:a2aa]) by AM0PR07MB3876.eurprd07.prod.outlook.com ([fe80::ad0a:3e71:2e55:a2aa%6]) with mapi id 15.20.2602.010; Tue, 31 Dec 2019 12:09:51 +0000
From: Miika Komu <miika.komu@ericsson.com>
To: "mcr+ietf@sandelman.ca" <mcr+ietf@sandelman.ca>, "Iot-dir@ietf.org" <Iot-dir@ietf.org>, "rgm@htt-consult.com" <rgm@htt-consult.com>
CC: "draft-ietf-hip-dex.all@ietf.org" <draft-ietf-hip-dex.all@ietf.org>, "last-call@ietf.org" <last-call@ietf.org>, "hipsec@ietf.org" <hipsec@ietf.org>
Thread-Topic: [Hipsec] Iotdir last call review of draft-ietf-hip-dex-11
Thread-Index: AQHVo1sF+DwCdbtUFEazFV3FYY+r6KfUX7AA
Date: Tue, 31 Dec 2019 12:09:51 +0000
Message-ID: <79c13e5dc226066927cfed4f6050cf8da0af24d9.camel@ericsson.com>
References: <157466392692.32744.2341419042914872690@ietfa.amsl.com>
In-Reply-To: <157466392692.32744.2341419042914872690@ietfa.amsl.com>
Accept-Language: fi-FI, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Evolution 3.28.5-0ubuntu0.18.04.1
authentication-results: spf=none (sender IP is ) smtp.mailfrom=miika.komu@ericsson.com;
x-originating-ip: [89.166.49.243]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: bdbdb35b-6911-4c6f-7b6e-08d78dea56fc
x-ms-traffictypediagnostic: AM0PR07MB4292:
x-microsoft-antispam-prvs: <AM0PR07MB4292ED69461E9DCF50D90416FC260@AM0PR07MB4292.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0268246AE7
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(366004)(346002)(39860400002)(396003)(136003)(376002)(199004)(189003)(52314003)(71200400001)(186003)(66946007)(2616005)(110136005)(6512007)(8676002)(66446008)(66556008)(64756008)(66476007)(2906002)(36756003)(81156014)(81166006)(5660300002)(76116006)(66574012)(6506007)(6486002)(44832011)(8936002)(478600001)(54906003)(26005)(4326008)(4001150100001)(316002)(86362001)(99106002); DIR:OUT; SFP:1101; SCL:1; SRVR:AM0PR07MB4292; H:AM0PR07MB3876.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-ID: <24B9F4217C97C544838009153A6FAFB5@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: bdbdb35b-6911-4c6f-7b6e-08d78dea56fc
X-MS-Exchange-CrossTenant-originalarrivaltime: 31 Dec 2019 12:09:51.5576 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: vrI6dTa8BbU0g8e/ZhhD3BqtV0GwhW07iEdGHhDAr3SGO66+JyPP5bbP7ixjMi3pxu0x6rduvbs38KIPcLNSVw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR07MB4292
Archived-At: <https://mailarchive.ietf.org/arch/msg/hipsec/DGzeQkgc7ZTMdYDNqV2XXRdkRMM>
Subject: Re: [Hipsec] Iotdir last call review of draft-ietf-hip-dex-11
X-BeenThere: hipsec@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the official IETF Mailing List for the HIP Working Group." <hipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hipsec>, <mailto:hipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hipsec/>
List-Post: <mailto:hipsec@ietf.org>
List-Help: <mailto:hipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hipsec>, <mailto:hipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 31 Dec 2019 12:09:57 -0000

Hi,

(Robert, please double check if you agree with my comments)

su, 2019-11-24 kello 22:38 -0800, Michael Richardson via Datatracker
kirjoitti:
> Reviewer: Michael Richardson
> Review result: Ready
> 
> I am the assigned IoT-Directorate reviewer for 1draft-ietf-hip-dex
> I reviewed the -11 version.
> 
> I did not identify any technical problems or gaps.
> The introduction tells that I won't understand this without a good
> understanding of RFC7401 (HIPv2).  I went ahead anyway, given that I
> did know
> HIPv1 (RFC5201) and IKEv2.
> 
> While it is clear that I could not implement without knowing 7401, I
> did find
> that I could understand most of the goals, the compromises that were
> made to
> reduce the complexity for constrained environments.  I did go back
> and read
> 7401 in the end to fill in a few gaps.
> 
> Particularly I really needed to understand RFC7343 HITs of the new
> type, and
> I did not manage to understand that part.

let us know if we should clarify something particular in the DEX draft.

> I observe that a new ECDH type of
> HIT is defined, but I did understand how these values would be
> exchanged/stored or looked up.
> I would appreciate a use case or two which has been sufficiently
> built-out so
> that I can see the whole picture. If ECDH HITs come from DNS (via
> AAAA
> records) for instance, then I'd appreciate an understanding if/how
> the
> constrained device is able to leverage DNSSEC.

not really AAAA records, but rather "HI" records, so actually the
public key is stored in the DNS as defined in RFC8005.

Nothing prevents using DNSSEC except the capabilities of the device. I
don't know the footprint of a minimal DNSSEC implementation at the
client side...

> In particular, I'd like to know what kind of applications are ruled
> out by
> lack of PFS,

this is a rather generic question and I don't know if some researched
and created a taxonomy of applications that fit PFS. So I don't really
have a good answer for this but just a couple of easy answers:

* If the data is of emphemeral nature (useful only at the very
present), then PFS may not be necessary.
* If the hardware too is too constrained, then non-PFS security is
better than no security.

> and if a kind of PFS can be restored by rotating HITs in DNS.

really interesting, how would this work in practice?

(Usually it's just the server's HITs stored in the DNS so perhaps just
extra security measure for the server?)

> Would this document play well with draft-ietf-ipsecme-implicit-iv?

BEX and DEX can be used with any data plane security, but ESP is
commonly used, so I don't really see why not. Saving bits on the wire
for the data plane in contrained scenarios is always good.

Robert what do you think?

> I am unclear if the diet nature of DEX is more about:
>   (1) constrained/challenged networks
>   (2) constrained/slow CPUs
>   (3) systems with very minimal amounts of flash

I haven't been involved with this work since the beginning, so perhaps
Robert should comment on this more but here's my interpretation. I
believe the priority is on slow CPUs and flash comes as the second.
Network is the last one in the priority list; if you check the origins
of the work, for instance, the "Slimfit" approach compresses HIP
messages much better.

RFC7228 section 3 lists different classes of IoT devices but it's
mostly related to the memory dimension. I am not sure if have
classifications for the network/CPU dimensions in IETF...

> (1) networks have often very small packet sizes, and I would
> appreciate
> understanding the total frame sise of each I1/R1/I2/R2, and any
> impact that
> fragment assembly might have on the statelessness of the I1/R1
> exchange.

according to Hummen et al, "Slimfit - A HIP DEX Compression Layer
for the IP-based Internet of Things", DEX packets sizes were roughly as
follows in an earlier version of the draft (draft-moskowitz-hip-dex-
00):

I1: 48 bytes
R1: ~184 bytes
I2  ~232 bytes
R2: ~86 bytes

> I know that HIP has be profiled for use in 802.15.9, and I assume
> that HIP
> DEX is even better, but the lack of PFS might be a show stopper.

Quoting Eric Vyncke:

"I had a conversation with Ben Kaduk today at the hackathon. While Ben
had reviewed the DEX document about 2 years ago, he was clear that PFS
is a requirement for IETF standard _EXCEPT_ (and this is important):
1) the text is clear that there is no PFS property in DEX
2) there is a justification why PFS was not implemented (such as
defining a specific use case)."

Regarding to the use case, Robert sent the following text proposal
earlier:

HIP DEX, by design does not support Perfect Forward Secrecy (PFS). All 
current PFS approaches use Ephemeral DH, secured and identified in
some  manner (e.g. SIGMA or PAKE).  There are classes of devices, like
those  based on the 8051 microprocessor where this is prohibitably
expensive.   Experience with the ZWAVE ZW0500 found that EC25519 key
pair generation  exceeded 10 seconds with unacceptable battery
consumption. The ECDH  wide-multiply of the static-static keys was
taking 8 - 9 seconds with  measurable battery drain.  For these class
of devices, the possible risk  of no PFS has to be weighed against the
risk of theft of preshared keys alternatives.

Also if is often the case that HIP DEX is only performed during device 
join time, and thus no PFS is considered an acceptable compromised.

HIP DEX MUST only be used in communicating with such constrained
devices.

> (2) slow/sleepy CPUs are not going away, but the amount of available
> flash on
> rather cheap, small and sleepy devices is now in the multiple
> megabytes, so
> it is unclear if further code simplications are worthwhile.

Agree on the cheapness of memory but I believe the restrictions are
leaning more towards CPU.

> My questions should not stop the document from advancing.

Thanks for you feedback. It is a bit unclear to me how to reflect this
discussion the draft, so please comment explicitly if you think
something should be added there.