Re: [Iot-directorate] Iotdir last call review of draft-ietf-drip-arch-22

Thomas Fossati <Thomas.Fossati@arm.com> Wed, 11 May 2022 14:10 UTC

Return-Path: <Thomas.Fossati@arm.com>
X-Original-To: iot-directorate@ietfa.amsl.com
Delivered-To: iot-directorate@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 69299C15EB32; Wed, 11 May 2022 07:10:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.895
X-Spam-Level:
X-Spam-Status: No, score=-1.895 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=mEPx3emb; dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=mEPx3emb
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZcV4n8A9lZMU; Wed, 11 May 2022 07:10:26 -0700 (PDT)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com (mail-vi1eur04on062c.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe0e::62c]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 42A45C180A7C; Wed, 11 May 2022 07:10:24 -0700 (PDT)
ARC-Seal: i=2; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass; b=X7dTVtm6MehLYvzybAEHj+CeQ2EgzlAcTu4QhnQACIkV9qZTnwhwFBSnF3t48E0t/N1LrccUTC6bak/QNdBo5N6UT02Tv5DpDJ4XBy/J+94/jhWrD/dPzCdJeUNM3UcLT2l8WFQGi1XHVx/IQJpB8VER9S+O5L6ydZJ2Hdxa6cb+r475FvyK02NdY+VDAP81vNl5qdNit6laCXXeTcoFBXOhjIwILnxU/riQWFR0iMj3t/GZPTeMTJd6dslEdOLapYrzd6u07UdDPKTf5zyU64VCkJRvHhjEKoYlvVmK5t1Ge+Or/u+jtyjNGC4nsHlWV26YmWpo8pqHyBgnSRAe7g==
ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=qccCLg7s7IY8OuFcO1ZuMtC4vVDFkBJ0wYinFPwOn2g=; b=ONo94XwTsOmhruh+ujjlQLC9AfXjbRvQAEgWX/VJiiXy9/PO3hX/QBSsIOrG22qHcbDII/26rZeZbm4XJGXRVl056th8y3FvonHU7pkxqgWWZYzHplP9AVN75lg4+HGIcBc7QtWKG26CWlWqdyhBsTmfawNOeTO+2tGZc/BvSXtDa8032GNPNUMR8NNtrt4ux0Kf+72Wx3X/T+jyfeUEVE4qe/UNFNxlnu2DzqPGotA81xQAgfu7hFoiy+slmCad2Mmn9Q8GF6PptWWqnBBhQ21PzykJ6gC8f/zBjiiRIi8V1VtoBqA5ZQCumNFtyQVK39E1y58OEJ9nIQLSHH/JLg==
ARC-Authentication-Results: i=2; mx.microsoft.com 1; spf=pass (sender ip is 63.35.35.123) smtp.rcpttodomain=ietf.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com; arc=pass (0 oda=1 ltdi=1 spf=[1,1,smtp.mailfrom=arm.com] dkim=[1,1,header.d=arm.com] dmarc=[1,1,header.from=arm.com])
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=qccCLg7s7IY8OuFcO1ZuMtC4vVDFkBJ0wYinFPwOn2g=; b=mEPx3embnKHfV6C3t98LxC4e7p1uke9St2/cJl8d/EPfza0VivAs3krjYmu0vgpO04pmX93+2Vh0tHTqxY/oT7tUgJ6wZF8dsO/HlogYmrlFJ0QU//gWo0DWvUb0MVD+WbSghYnRftII1XyMebSKIsBGbaVnJhqdPNnFBTzMrvY=
Received: from DB3PR08CA0017.eurprd08.prod.outlook.com (2603:10a6:8::30) by VI1PR0802MB2383.eurprd08.prod.outlook.com (2603:10a6:800:a5::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5227.21; Wed, 11 May 2022 14:10:10 +0000
Received: from DBAEUR03FT051.eop-EUR03.prod.protection.outlook.com (2603:10a6:8:0:cafe::33) by DB3PR08CA0017.outlook.office365.com (2603:10a6:8::30) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5250.13 via Frontend Transport; Wed, 11 May 2022 14:10:10 +0000
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by DBAEUR03FT051.mail.protection.outlook.com (100.127.142.148) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5250.13 via Frontend Transport; Wed, 11 May 2022 14:10:08 +0000
Received: ("Tessian outbound 07c1c99345b0:v119"); Wed, 11 May 2022 14:10:08 +0000
X-CheckRecipientChecked: true
X-CR-MTA-CID: c4b77ca80a9a157c
X-CR-MTA-TID: 64aa7808
Received: from 0fd5c28cbb92.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 9537A715-5D63-41CD-A7F5-AE846EF58D82.1; Wed, 11 May 2022 14:10:01 +0000
Received: from EUR05-DB8-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 0fd5c28cbb92.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Wed, 11 May 2022 14:10:01 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=UO+NodFx6fmBy84z8o8/EktDvMHT4Q5fo+SlBoJ6NJh5yZWV7g70ybb4Cjgjb7e1q74Mkrk05fmvsaNqbubQvKnUeAYk7D3wVBWPADQePAzHbfk+YkQxNS4q7eVmYdZcinrrYTslYncHZj9yIUaw/7aojhA80A2zVdF6wST/mgTXY5JWkcH6GgdEcmqPEp1wqELp1619YyUllOHxnNnQWkfbtIz7r1Ojx7qmXazS8ul9PIg9hvQk+r7hS7mw8SmOnc8zK5WZvs8LVDESDczTMzT91/gvesCAN7fWVEkW4a2MKEcOj9tIZDIRdoPvsR3keCyYKDw7Q9bZyXiy+y7TXQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=qccCLg7s7IY8OuFcO1ZuMtC4vVDFkBJ0wYinFPwOn2g=; b=RSEnV2r3bdTUVJDsudBmqDRzc0pxwNtAykQHObyI0VeKwboIm3aGbYrQ+HcUGLvkOcH6St1702tr9NiRkEBDyOkwX4K9SAxIwmT1EBQyUzRSEG4b+n0BaGwLciS5oypj4HS2oA0XzDG22xQK+LA79J/5vdIuNkAOlkMD8rkeOijTQD5kNFiQ//hbHVtHKNLZRHtps0fczlleyObQUGQPi9b96rx1Izo4PAO7VKxsce49e3PyoJpCdHLWyCEfMTL7iwiyVOi5/fnQb0O4dntty5QFrEkKvwWaxHA0PzVXh/IcloA6AC0rYZtZ6sQlMpn17ONtZjKriE70l3VnA190fQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=qccCLg7s7IY8OuFcO1ZuMtC4vVDFkBJ0wYinFPwOn2g=; b=mEPx3embnKHfV6C3t98LxC4e7p1uke9St2/cJl8d/EPfza0VivAs3krjYmu0vgpO04pmX93+2Vh0tHTqxY/oT7tUgJ6wZF8dsO/HlogYmrlFJ0QU//gWo0DWvUb0MVD+WbSghYnRftII1XyMebSKIsBGbaVnJhqdPNnFBTzMrvY=
Received: from DB9PR08MB6524.eurprd08.prod.outlook.com (2603:10a6:10:251::8) by AM0PR08MB5378.eurprd08.prod.outlook.com (2603:10a6:208:18a::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5250.13; Wed, 11 May 2022 14:09:59 +0000
Received: from DB9PR08MB6524.eurprd08.prod.outlook.com ([fe80::1068:1c85:6733:52b5]) by DB9PR08MB6524.eurprd08.prod.outlook.com ([fe80::1068:1c85:6733:52b5%4]) with mapi id 15.20.5227.023; Wed, 11 May 2022 14:09:59 +0000
From: Thomas Fossati <Thomas.Fossati@arm.com>
To: "Stuart W. Card" <stu.card@axenterprize.com>, "iot-directorate@ietf.org" <iot-directorate@ietf.org>
CC: "draft-ietf-drip-arch.all@ietf.org" <draft-ietf-drip-arch.all@ietf.org>, "last-call@ietf.org" <last-call@ietf.org>, "tm-rid@ietf.org" <tm-rid@ietf.org>
Thread-Topic: Iotdir last call review of draft-ietf-drip-arch-22
Thread-Index: AQHYZQgcHdB9fqNJbkencFmJ3z2gqq0ZtwmO
Date: Wed, 11 May 2022 14:09:58 +0000
Message-ID: <DB9PR08MB6524E6A3A337293ECB571BD19CC89@DB9PR08MB6524.eurprd08.prod.outlook.com>
References: <164840309027.4996.16025423500440919013@ietfa.amsl.com> <7abfe697-4d62-fdae-0ee1-a05809c0705f@axenterprize.com>
In-Reply-To: <7abfe697-4d62-fdae-0ee1-a05809c0705f@axenterprize.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Authentication-Results-Original: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
X-MS-Office365-Filtering-Correlation-Id: 30f2480d-a51f-4869-e3c0-08da3357f4c7
x-ms-traffictypediagnostic: AM0PR08MB5378:EE_|DBAEUR03FT051:EE_|VI1PR0802MB2383:EE_
X-Microsoft-Antispam-PRVS: <VI1PR0802MB23836D6F487AD7F695337B719CC89@VI1PR0802MB2383.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original: 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
X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DB9PR08MB6524.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(38100700002)(83380400001)(122000001)(71200400001)(38070700005)(66556008)(66476007)(66446008)(8676002)(4326008)(66946007)(966005)(64756008)(91956017)(76116006)(86362001)(110136005)(54906003)(316002)(26005)(186003)(508600001)(53546011)(6506007)(9686003)(7696005)(5660300002)(9326002)(8936002)(52536014)(15974865002)(55016003)(33656002)(2906002); DIR:OUT; SFP:1101;
Content-Type: multipart/alternative; boundary="_000_DB9PR08MB6524E6A3A337293ECB571BD19CC89DB9PR08MB6524eurp_"
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB5378
Original-Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped: DBAEUR03FT051.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs: 1a98636f-e9f0-4804-80ce-08da3357eed5
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFS:(13230001)(4636009)(40470700004)(46966006)(36840700001)(186003)(40460700003)(316002)(26005)(83380400001)(9686003)(508600001)(55016003)(450100002)(70206006)(70586007)(356005)(47076005)(36860700001)(336012)(54906003)(82310400005)(110136005)(5660300002)(4326008)(86362001)(8676002)(81166007)(15974865002)(8936002)(33656002)(966005)(52536014)(9326002)(30864003)(2906002)(53546011)(6506007)(7696005); DIR:OUT; SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 May 2022 14:10:08.8102 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 30f2480d-a51f-4869-e3c0-08da3357f4c7
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource: DBAEUR03FT051.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0802MB2383
Archived-At: <https://mailarchive.ietf.org/arch/msg/iot-directorate/JRFE0ehqN7tMKWekVEtMZAykuEM>
Subject: Re: [Iot-directorate] Iotdir last call review of draft-ietf-drip-arch-22
X-BeenThere: iot-directorate@ietf.org
X-Mailman-Version: 2.1.34
Precedence: list
List-Id: Mailing list for the IoT Directorate Members <iot-directorate.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/iot-directorate>, <mailto:iot-directorate-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/iot-directorate/>
List-Post: <mailto:iot-directorate@ietf.org>
List-Help: <mailto:iot-directorate-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/iot-directorate>, <mailto:iot-directorate-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 11 May 2022 14:10:30 -0000

Hi Stuart,

> Thanks for the review! I was asked to address one of your nits,

Thank you!

> all of your other points having been addressed previously by others
> (we think/hope).

I haven't seen any reply from your co-authors and, unless I missed it,
there was no publicly visible updates to the draft version that I
reviewed (-22), so I cannot confirm nor deny :-)

> "Bluetooth 4.x" and "Bluetooth 5.x" are intended to distinguish
> between those two major versions, which have differences motivating
> different Broadcast RID message encapsulation, but imply concisely
> that Broadcast RID is insensitive to the minor versions.

Sure.

> ASTM F3411 requires that if a Broadcast RID sender uses any form of
> Bluetooth, it must use 4.x, with additional use of 5.x being optional.
> The corresponding ASD-STAN for Direct RID states the reverse. Thus
> effectively any implementation intended for international use must
> concurrently transmit over both 4.x and 5.x.

!

> The Bluetooth specs are voluminous: attempting to cite all those that
> apply here would be quite a rabbit hole; I personally would prefer to
> cite only ASTM F3411 and let the diligent student follow the reference
> trail.

Sounds reasonable..

> Will our editing the draft to consistently use the forms "4.x" and
> "5.x" suffice?

Yes.

Cheers, t


> On 3/27/2022 1:44 PM, Thomas Fossati via Datatracker wrote:
> > Reviewer: Thomas Fossati
> > Review result: Ready with Issues
> >
> > This is a great document and fun to read.  Thank you authors!  I
> > have tried to highlight a few small things that could be articulated
> > a bit more from an IoT perspective but overall I have no major
> > concerns with it, except a tangential thing around the document
> > intended status (see "Issues" below.)
> >
> > # Issues
> >
> > * The charter says: "the WG will propose a standard document that
> > describes the architecture […]" but the status is informational.  I
> > am pretty sure informational should be appropriate, but highlighting
> > a potential disconnect.
> >
> > # Comments
> >
> > * In some IETF circles (e.g., RATS & TEEP) "attestation" has a
> > precise meaning, which is quite distinct from the DRIP definition
> > "[…] normally used when an entity asserts a relationship with
> > another entity".  Specifically, unless the signing key is derived
> > from the measured boot state (a la DICE), or the claims are of a
> > certain kind, the process that this doc names "attestation" is not
> > what is meant usually.
> >     => Maybe add a few words to Section 2.2 to clarify the
> >     distinction between DRIP attestation and RATS's, e.g., by adding
> >     a disclaimer similar to that already associated with DRIP certs.
> >
> > * Apropos "remote attestation", I am wondering whether, given the
> > type of endpoints considered in the architecture - and in particular
> > provided their increased exposure to physical compromise, and the
> > potentially large impact on the overall system and beyond - the
> > architecture should provide explicit channels for securely conveying
> > the verification of the installed and booted firmware (as well as
> > any other relevant trust metrics)?
> >
> > * I haven't read the rest of the DRIP docs, so I am not sure why is
> > EdDSA specifically mentioned in Section 3.2.?  Is this a requirement
> > or just an example?  I guess the latter, but checking just in case.
> > And apropos that, in light of fault attacks on deterministic ECDSA
> > and EdDSA [0] that are potentially easier to carry out against UAs
> > (BTW, how cool is a fault attack w/ private key exfiltration carried
> > out by a chasing drone?) maybe it's worth adding to the security
> > considerations some words around physical attacks and their impact
> > on the choice of signature algorithms?
> >
> > * It'd seem that, given the very low bandwidth, DoS (as well as
> > Denial of View) attacks on communication involving the UA should be
> > quite easy to mount?  Maybe worth spending some words on the
> > argument to describe what the threats are and which mitigations are
> > available.
> >
> > * This is a question more than anything else: given the constrained
> > nature of UAs, I was wondering whether it is envisaged that the
> > end-to-end network path will be realised with the use of more
> > capable (trusted) proxy nodes?  If so, there may be a few security
> > and privacy considerations to be added.
> >
> > # Nits
> >
> > * AAA is usually intended as "Authentication, Authorization, and
> > Accounting" (see also [1]), whereas here it's got four new A's:
> > Attestation, Access Control , Attribution, Audit :-)
> >      => Maybe change it to 7A, A7, AAA+ or similar?
> >
> > * In Section 2.1, the following terms are already in the most recent
> > "RFC Editor Abbreviations List" [1] and can be removed:
> >      * EdDSA
> >      * HIP
> >      * HIT
> >      * HI
> >
> > * Some typographic inconsistency around Bluetooth: Is it 4 or 4.x?
> > 5 or 5.x?
> >      => Stick to one format. (Also maybe add an explicit reference
> >      to the Bluetooth specs.)
> >
> > [0] https://eprint.iacr.org/2020/803
> > [1] https://www.rfc-editor.org/materials/abbrev.expansion.txt
> >
> >
> >
> --
> -----------------------------------------
> Stuart W. Card, PhD, Principal Engineer
> AX Enterprize, LLC  www.axenterprize.com
> 4947 Commercial Drive, Yorkville NY 13495
> 592 Hangar Road, Rome NY 13441
>

IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.