Re: [hrpc] [Iotops] Authorization for IoT devices

Hannes Tschofenig <Hannes.Tschofenig@arm.com> Tue, 27 July 2021 10:00 UTC

Return-Path: <Hannes.Tschofenig@arm.com>
X-Original-To: hrpc@ietfa.amsl.com
Delivered-To: hrpc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 737893A1DEC for <hrpc@ietfa.amsl.com>; Tue, 27 Jul 2021 03:00:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=LGwxCMv+; dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=LGwxCMv+
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wtdajQQ4tKR0 for <hrpc@ietfa.amsl.com>; Tue, 27 Jul 2021 03:00:44 -0700 (PDT)
Received: from EUR05-VI1-obe.outbound.protection.outlook.com (mail-vi1eur05on2040.outbound.protection.outlook.com [40.107.21.40]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 830D23A1E06 for <hrpc@irtf.org>; Tue, 27 Jul 2021 03:00:44 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=6gZd+dPzCdh25mksHB5Po345RiMt7ulDKgifcAwbDy8=; b=LGwxCMv+ZPqKPLlXb/TBfPG1aOEdXq4eZpm4JH73sVxj4/Hx8l7jz56KOrfvEYSKTQ/UvCRsZolTkJJd8Thm8wGd6J44TMCkiFDZZ+YuvL/szJxUONntEWt6OQ0rrVRvlIfPLBh+colpqr30UIZyIGEeNUvjo9akdJceb2Q0kBg=
Received: from DB6PR0201CA0004.eurprd02.prod.outlook.com (2603:10a6:4:3f::14) by DB6PR08MB2888.eurprd08.prod.outlook.com (2603:10a6:6:25::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4352.29; Tue, 27 Jul 2021 10:00:40 +0000
Received: from DB5EUR03FT007.eop-EUR03.prod.protection.outlook.com (2603:10a6:4:3f:cafe::50) by DB6PR0201CA0004.outlook.office365.com (2603:10a6:4:3f::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4352.26 via Frontend Transport; Tue, 27 Jul 2021 10:00:40 +0000
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; irtf.org; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;irtf.org; dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by DB5EUR03FT007.mail.protection.outlook.com (10.152.20.148) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4352.24 via Frontend Transport; Tue, 27 Jul 2021 10:00:40 +0000
Received: ("Tessian outbound 1e4fcc40c873:v100"); Tue, 27 Jul 2021 10:00:40 +0000
X-CR-MTA-TID: 64aa7808
Received: from e7ced190da3d.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 5B38A6A0-BA14-42C9-B03A-302395E3EC72.1; Tue, 27 Jul 2021 10:00:34 +0000
Received: from EUR02-AM5-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id e7ced190da3d.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Tue, 27 Jul 2021 10:00:34 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=EkO1lTymScxrN7AaRzCbl5D0/BJ0hHKahUGSvT1DQMbabcDul0oAxZpacvVjDB6UoTvEtgX2+EqTYoTg7EG+0G187l61UtQ8L3q6t/dw982XddaAaLWj2BgoQ+/V+ylSxDZ1dr48rBTlchqbj7I5cBM34VlUdiCkR2uU9R5rIObEXX99C5IhmpBnvk9rWONt7glJy/wn4mex19z/N7DPzO44UQ7bB9WI8O3+E2tMKR2g6pBMAedNjdSYSiFMJ3LKq9OvWmtcn0U4AOZl+iGo4phzFj5jOomuZDUYf3IFNd1k9nc5MDTqQCJgZvZ5R8jDVb4BZXy6HR4oUoqADwqCow==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=6gZd+dPzCdh25mksHB5Po345RiMt7ulDKgifcAwbDy8=; b=D33pcvb/r/yXhnZEU1r5yisbgYpjbblfWtjogEaqKYrBMJzNn+GNnsyE3bSlKjWaMFvb26CITkyINk1N0GS88Ky9j3R4awvDi/D9S1CMpCpdnIyOXiYc7jsKPfmYiJ2qPOwg0fgAMtMKwEcP/277VwYQNuLQWfwX6Bumtge1bZ5c2P1sE7HhxXtNuQwVeCD7oWV5VZ7UVhyR3ohenDFOZbKheDN12xKuNFqIPcZZJwDpvxenzgMVzdpKkY/lkju7oXeKG/YsJUBYBaU7jFvNeagLRSaZO3Phf3uxBRomAKYr3cHc4hIqRonY8U0uRDTCzKPPnx1X0tJjqE0ViNjJrQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=6gZd+dPzCdh25mksHB5Po345RiMt7ulDKgifcAwbDy8=; b=LGwxCMv+ZPqKPLlXb/TBfPG1aOEdXq4eZpm4JH73sVxj4/Hx8l7jz56KOrfvEYSKTQ/UvCRsZolTkJJd8Thm8wGd6J44TMCkiFDZZ+YuvL/szJxUONntEWt6OQ0rrVRvlIfPLBh+colpqr30UIZyIGEeNUvjo9akdJceb2Q0kBg=
Received: from DBBPR08MB5915.eurprd08.prod.outlook.com (2603:10a6:10:20d::17) by DBBPR08MB6187.eurprd08.prod.outlook.com (2603:10a6:10:209::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4352.25; Tue, 27 Jul 2021 10:00:32 +0000
Received: from DBBPR08MB5915.eurprd08.prod.outlook.com ([fe80::55c7:8f34:351:9518]) by DBBPR08MB5915.eurprd08.prod.outlook.com ([fe80::55c7:8f34:351:9518%3]) with mapi id 15.20.4352.032; Tue, 27 Jul 2021 10:00:32 +0000
From: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
To: Michael Richardson <mcr+ietf@sandelman.ca>, "hrpc@irtf.org" <hrpc@irtf.org>, "iotops@ietf.org" <iotops@ietf.org>
Thread-Topic: [Iotops] Authorization for IoT devices
Thread-Index: AQHXgouVFWMKuox4kUWxdOEjkHQAe6tWlvdQ
Date: Tue, 27 Jul 2021 10:00:32 +0000
Message-ID: <DBBPR08MB5915856184BCB76D521132FDFAE99@DBBPR08MB5915.eurprd08.prod.outlook.com>
References: <18201.1627351357@localhost>
In-Reply-To: <18201.1627351357@localhost>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: 1E3532339E500D468FF8DAF241944552.0
x-checkrecipientchecked: true
Authentication-Results-Original: sandelman.ca; dkim=none (message not signed) header.d=none; sandelman.ca; dmarc=none action=none header.from=arm.com;
x-ms-publictraffictype: Email
X-MS-Office365-Filtering-Correlation-Id: c5fd50bf-74f6-4c85-53d0-08d950e56418
x-ms-traffictypediagnostic: DBBPR08MB6187:|DB6PR08MB2888:
X-Microsoft-Antispam-PRVS: <DB6PR08MB2888EAD179FE8BB3F9AAF8DFFAE99@DB6PR08MB2888.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
x-ms-oob-tlc-oobclassifiers: OLM:7691;OLM:9508;
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original: 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
X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DBBPR08MB5915.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(376002)(39850400004)(346002)(136003)(396003)(366004)(86362001)(33656002)(966005)(122000001)(478600001)(38100700002)(83380400001)(71200400001)(2906002)(66574015)(8676002)(8936002)(52536014)(26005)(66446008)(66556008)(76116006)(66946007)(110136005)(64756008)(66476007)(316002)(9686003)(55016002)(53546011)(6506007)(186003)(7696005)(5660300002)(38070700004); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBBPR08MB6187
Original-Authentication-Results: sandelman.ca; dkim=none (message not signed) header.d=none; sandelman.ca; dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped: DB5EUR03FT007.eop-EUR03.prod.protection.outlook.com
X-MS-Office365-Filtering-Correlation-Id-Prvs: d3deebd2-9966-4d24-faf5-08d950e55f7d
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFS:(4636009)(376002)(396003)(136003)(39850400004)(346002)(36840700001)(46966006)(86362001)(66574015)(8936002)(5660300002)(316002)(70586007)(52536014)(83380400001)(2906002)(9686003)(55016002)(82310400003)(966005)(26005)(47076005)(8676002)(186003)(33656002)(336012)(82740400003)(110136005)(6506007)(70206006)(356005)(36860700001)(478600001)(53546011)(81166007)(7696005); DIR:OUT; SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 27 Jul 2021 10:00:40.6604 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: c5fd50bf-74f6-4c85-53d0-08d950e56418
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource: DB5EUR03FT007.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR08MB2888
Archived-At: <https://mailarchive.ietf.org/arch/msg/hrpc/eUXn0lOgv9z9hblM4DciXOlFT5w>
Subject: Re: [hrpc] [Iotops] Authorization for IoT devices
X-BeenThere: hrpc@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: hrpc discussion list <hrpc.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/hrpc>, <mailto:hrpc-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hrpc/>
List-Post: <mailto:hrpc@irtf.org>
List-Help: <mailto:hrpc-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/hrpc>, <mailto:hrpc-request@irtf.org?subject=subscribe>
X-List-Received-Date: Tue, 27 Jul 2021 10:00:56 -0000

Have you tried to use ACE-OAuth, Michael?

The work in the ACE group had the goal to develop an authorization solution for IoT devices.

-----Original Message-----
From: Iotops <iotops-bounces@ietf.org> On Behalf Of Michael Richardson
Sent: Tuesday, July 27, 2021 4:03 AM
To: hrpc@irtf.org; iotops@ietf.org
Subject: [Iotops] Authorization for IoT devices


HRPC folks,

Today, I made a presentation at IOTOPS about
       https://datatracker.ietf.org/doc/draft-richardson-iotops-iot-iot/
I will send a youtube link as soon as it is published.

The short is that I see a need to standardize the encoding of authorization
control lists in IoT devices.   It should be possible to determine who can
open one's front door, (or furnace or stove or security cameras...), and also who can change the list.

I think that it should be possible to have a third party (person, device,
application) review the authorization list to see that, for instance, an ex-spouse does not have access.  Or to allow a less technical person to easily effect that new policy.

The access list might include a variety of other entities: banks with mortgages, sherrif, landlord, building manager.  Some of these might be
proclaimed by local law, convention, or contract.   My goal isn't to say
whether these are good or bad things, but rather to be able to clearly
document them.   I don't know if your furnace manufacturer should have remote
access, but if they do, it should be explicit rather than implicitely built-in to firmware.

I know that HRPC meets Tuesday, but I didn't ask for time because my week is already full.  I'm asking that the RG might review the document, look at the use cases, and ideally:
  1) suggest new ones
  2) tell me why some of mine are silly
  3) connect me with people who might be thinking about regulation in this area.

(The NYC key 2642/1620 situation begs for an auditable digital solution)

While I wrote the document about front door locks, one should think that it
applies to pretty much any major IoT device in the home.   While some systems
have a controller or commissioner or "home base" that collects the keys to all other devices, in that case, who has the keys to his key holder?

--
Michael Richardson <mcr+IETF@sandelman.ca>   . o O ( IPv6 IøT consulting )
           Sandelman Software Works Inc, Ottawa and Worldwide




IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.