WG Review: Software Updates for Internet of Things (suit)

The IESG <iesg-secretary@ietf.org> Mon, 06 December 2021 21:28 UTC

Return-Path: <iesg-secretary@ietf.org>
X-Original-To: ietf-announce@ietf.org
Delivered-To: ietf-announce@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id BE9A33A002C; Mon, 6 Dec 2021 13:28:42 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
Subject: WG Review: Software Updates for Internet of Things (suit)
X-Test-IDTracker: no
X-IETF-IDTracker: 7.40.0
Auto-Submitted: auto-generated
Precedence: bulk
Cc: suit@ietf.org
Reply-To: iesg@ietf.org
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
Message-ID: <163882612198.32151.15275050155695497916@ietfa.amsl.com>
Date: Mon, 06 Dec 2021 13:28:42 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf-announce/CbgLtCdTRKyoaFtEvU39oypZHOU>
X-BeenThere: ietf-announce@ietf.org
X-Mailman-Version: 2.1.29
List-Id: "IETF announcement list. No discussions." <ietf-announce.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf-announce/>
List-Post: <mailto:ietf-announce@ietf.org>
List-Help: <mailto:ietf-announce-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 06 Dec 2021 21:28:43 -0000

The Software Updates for Internet of Things (suit) WG in the Security Area of
the IETF is undergoing rechartering. The IESG has not made any determination
yet. The following draft charter was submitted, and is provided for
informational purposes only. Please send your comments to the IESG mailing
list (iesg@ietf.org) by 2021-12-15.

Software Updates for Internet of Things (suit)
-----------------------------------------------------------------------
Current status: Active WG

Chairs:
  Dave Thaler <dthaler@microsoft.com>
  David Waltermire <david.waltermire@nist.gov>
  Russ Housley <housley@vigilsec.com>

Assigned Area Director:
  Roman Danyliw <rdd@cert.org>

Security Area Directors:
  Benjamin Kaduk <kaduk@mit.edu>
  Roman Danyliw <rdd@cert.org>

Mailing list:
  Address: suit@ietf.org
  To subscribe: https://www.ietf.org/mailman/listinfo/suit
  Archive: https://mailarchive.ietf.org/arch/search/?email_list=suit

Group page: https://datatracker.ietf.org/group/suit/

Charter: https://datatracker.ietf.org/doc/charter-ietf-suit/

Vulnerabilities in Internet of Things (IoT) devices have raised the need for
a secure firmware update mechanism that is also suitable for constrained
devices.  Security experts, researchers, and regulators recommend that all
IoT devices be equipped with such a mechanism.  While there are many
proprietary firmware update mechanisms in use today, there is no modern
interoperable approach allowing secure updates to firmware in IoT devices. In
June 2016, the Internet Architecture Board organized a workshop on 'Internet
of Things (IoT) Software Update (IOTSU)', and RFC 8240 documents various
requirements and challenges that are specific to IoT devices.

A firmware update solution consists of several components, including:
* A mechanism to transport firmware images to compatible devices.
* A manifest that provides meta-data about the firmware image (such as a
  firmware package identifier, the hardware the package needs to run, and
  dependencies on other firmware packages), as well as cryptographic
  information for protecting the firmware image in an end-to-end fashion.
* The firmware image itself.

The SUIT WG is defining a firmware update solution (taking into account past
learning from RFC 4108 and other proprietary firmware update solutions) that
are usable on Class 1 (as defined in RFC 7228) devices, i.e., devices with
~10 KiB RAM and ~100 KiB flash.  The solution may apply to more capable
devices as well.  The SUIT WG is not defining any new transport or discovery
mechanisms, but may describe how to use existing mechanisms within the
architecture.

The SUIT WG has already completed work on two documents:
* An IoT firmware update architecture.
* An information model for the SUIT manifest.

Now that the information model is complete, the SUIT WG has selected the CBOR
serialization format and the associated COSE cryptographic mechanisms to
encode the SUIT manifest. The SUIT WG may consider a small number of
additional formats in the future; however, to reduce the complexity of a
firmware management solution, a very small number of formats is preferred to
enable SUIT maifest integration and interoperability with other IoT
technologies and ecosystems.  To support a wide range of deployment
scenarios, the formats are expected to be expressive enough to allow the use
of different firmware sources and permission models.

To enable SUIT Status Tracker functionality (per RFC9019), the SUIT WG is
also defining extensions to determine if a particular manifest could be
successfully deployed to a device and determine if an operation was
successful.

In addition, the SUIT WG will work with the RATS WG to specify claims related
to the SUIT Status Tracker that can be used to provide evidence in support of
the RATS architecture.

The SUIT WG will continue to work with silicon vendors and OEMs that develop
IoT operating systems to produce implementations based on SUIT WG
specifications.  In particular, the SUIT WG plans to continue to participate
in IETF Hackathons.

The SUIT WG document deliverables are:
* A SUIT manifest format specification using CBOR.
* Extensions to the SUIT manifest for optional capabilities, including:
  - firmware encryption,
  - trust domains,
  - update management, and
  - inclusion of a file in the MUD format (RFC 8520).
* A secure method for an IoT device to report on firmware update status.

In addition, either the SUIT WG or the RATS WG will produce:
* A set of claims for attesting to firmware update status.

Milestones:

  Dec 2021 - Adopt SUIT Manifest update management document as WG item

  Dec 2021 - Adopt SUIT Manifest trust domains document as WG item

  Dec 2021 - Adopt SUIT Manifest MUD extension document as WG item

  Mar 2022 - Decide with RATS WG in which working group the 'set of claims
  for attesting to firmware update status' document should be produced

  Aug 2022 - Submit firmware encryption document to the IESG for publication
  as a Proposed Standard

  Sep 2022 - Submit SUIT Status Tracker document to the IESG for publication
  as a Proposed Standard

  Nov 2022 - Submit SUIT Manifest update management document to the IESG for
  publication as a Proposed Standard

  Nov 2022 - Submit SUIT Manifest trust domains document to the IESG for
  publication as a Proposed Standard

  Dec 2022 - Submit SUIT Manifest MUD extension document to the IESG for
  publication as a Proposed Standard