[hrpc] Authorization for IoT devices

Michael Richardson <mcr+ietf@sandelman.ca> Tue, 27 July 2021 02:03 UTC

Return-Path: <mcr+ietf@sandelman.ca>
X-Original-To: hrpc@ietfa.amsl.com
Delivered-To: hrpc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8ABBE3A10AE for <hrpc@ietfa.amsl.com>; Mon, 26 Jul 2021 19:03:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2aKkR6jmSUac for <hrpc@ietfa.amsl.com>; Mon, 26 Jul 2021 19:03:05 -0700 (PDT)
Received: from tuna.sandelman.ca (tuna.sandelman.ca [IPv6:2607:f0b0:f:3:216:3eff:fe7c:d1f3]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 31BC43A1084 for <hrpc@irtf.org>; Mon, 26 Jul 2021 19:02:44 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by tuna.sandelman.ca (Postfix) with ESMTP id 46617389B8; Mon, 26 Jul 2021 22:06:26 -0400 (EDT)
Received: from tuna.sandelman.ca ([127.0.0.1]) by localhost (localhost [127.0.0.1]) (amavisd-new, port 10024) with LMTP id DrUOl_MDFSt2; Mon, 26 Jul 2021 22:06:22 -0400 (EDT)
Received: from sandelman.ca (obiwan.sandelman.ca [IPv6:2607:f0b0:f:2::247]) by tuna.sandelman.ca (Postfix) with ESMTP id B9FB2389B5; Mon, 26 Jul 2021 22:06:21 -0400 (EDT)
Received: from localhost (localhost [IPv6:::1]) by sandelman.ca (Postfix) with ESMTP id C4D951FB; Mon, 26 Jul 2021 22:02:37 -0400 (EDT)
From: Michael Richardson <mcr+ietf@sandelman.ca>
To: hrpc@irtf.org, iotops@ietf.org
X-Attribution: mcr
X-Mailer: MH-E 8.6+git; nmh 1.7+dev; GNU Emacs 26.1
X-Face: $\n1pF)h^`}$H>Hk{L"x@)JS7<%Az}5RyS@k9X%29-lHB$Ti.V>2bi.~ehC0; <'$9xN5Ub# z!G,p`nR&p7Fz@^UXIn156S8.~^@MJ*mMsD7=QFeq%AL4m<nPbLgmtKK-5dC@#:k
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg="pgp-sha512"; protocol="application/pgp-signature"
Date: Mon, 26 Jul 2021 22:02:37 -0400
Message-ID: <18201.1627351357@localhost>
Archived-At: <https://mailarchive.ietf.org/arch/msg/hrpc/4yhTzTtUcG-VPOTfh7cSVkxuvUM>
Subject: [hrpc] Authorization for IoT devices
X-BeenThere: hrpc@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: hrpc discussion list <hrpc.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/hrpc>, <mailto:hrpc-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hrpc/>
List-Post: <mailto:hrpc@irtf.org>
List-Help: <mailto:hrpc-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/hrpc>, <mailto:hrpc-request@irtf.org?subject=subscribe>
X-List-Received-Date: Tue, 27 Jul 2021 02:03:13 -0000

HRPC folks,

Today, I made a presentation at IOTOPS about
       https://datatracker.ietf.org/doc/draft-richardson-iotops-iot-iot/
I will send a youtube link as soon as it is published.

The short is that I see a need to standardize the encoding of authorization
control lists in IoT devices.   It should be possible to determine who can
open one's front door, (or furnace or stove or security cameras...), and
also who can change the list.

I think that it should be possible to have a third party (person, device,
application) review the authorization list to see that, for instance, an
ex-spouse does not have access.  Or to allow a less technical person to
easily effect that new policy.

The access list might include a variety of other entities: banks with
mortgages, sherrif, landlord, building manager.  Some of these might be
proclaimed by local law, convention, or contract.   My goal isn't to say
whether these are good or bad things, but rather to be able to clearly
document them.   I don't know if your furnace manufacturer should have remote
access, but if they do, it should be explicit rather than implicitely
built-in to firmware.

I know that HRPC meets Tuesday, but I didn't ask for time because my week is
already full.  I'm asking that the RG might review the document, look at the
use cases, and ideally:
  1) suggest new ones
  2) tell me why some of mine are silly
  3) connect me with people who might be thinking about regulation in this area.

(The NYC key 2642/1620 situation begs for an auditable digital solution)

While I wrote the document about front door locks, one should think that it
applies to pretty much any major IoT device in the home.   While some systems
have a controller or commissioner or "home base" that collects the keys to
all other devices, in that case, who has the keys to his key holder?

--
Michael Richardson <mcr+IETF@sandelman.ca>   . o O ( IPv6 IøT consulting )
           Sandelman Software Works Inc, Ottawa and Worldwide