Re: [Iot-onboarding] [Secdispatch] DANE IOT proposed outcome

"Panwei (William)" <william.panwei@huawei.com> Mon, 16 November 2020 15:17 UTC

Return-Path: <william.panwei@huawei.com>
X-Original-To: iot-onboarding@ietfa.amsl.com
Delivered-To: iot-onboarding@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BA48F3A1154; Mon, 16 Nov 2020 07:17:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RPv7qrZQoSLx; Mon, 16 Nov 2020 07:17:21 -0800 (PST)
Received: from frasgout.his.huawei.com (frasgout.his.huawei.com [185.176.79.56]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 93DC73A1148; Mon, 16 Nov 2020 07:17:21 -0800 (PST)
Received: from fraeml709-chm.china.huawei.com (unknown [172.18.147.207]) by frasgout.his.huawei.com (SkyGuard) with ESMTP id 4CZXh438rtz67DmL; Mon, 16 Nov 2020 23:15:32 +0800 (CST)
Received: from nkgeml707-chm.china.huawei.com (10.98.57.157) by fraeml709-chm.china.huawei.com (10.206.15.37) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1913.5; Mon, 16 Nov 2020 16:17:18 +0100
Received: from nkgeml705-chm.china.huawei.com (10.98.57.154) by nkgeml707-chm.china.huawei.com (10.98.57.157) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1913.5; Mon, 16 Nov 2020 23:17:16 +0800
Received: from nkgeml705-chm.china.huawei.com ([10.98.57.154]) by nkgeml705-chm.china.huawei.com ([10.98.57.154]) with mapi id 15.01.1913.007; Mon, 16 Nov 2020 23:17:16 +0800
From: "Panwei (William)" <william.panwei@huawei.com>
To: Toerless Eckert <tte@cs.fau.de>
CC: "iot-onboarding@ietf.org" <iot-onboarding@ietf.org>, "secdispatch@ietf.org" <secdispatch@ietf.org>, Eliot Lear <lear=40cisco.com@dmarc.ietf.org>
Thread-Topic: [Secdispatch] [Iot-onboarding] DANE IOT proposed outcome
Thread-Index: AQHWvCdupHu9Et5uqESJweqP6x79banK3KVg
Date: Mon, 16 Nov 2020 15:17:16 +0000
Message-ID: <5d902684f6a940448ca986d0466bc941@huawei.com>
References: <2786E31F-2A4F-4901-8ECC-7AEF4B4D81E2@cisco.com> <b178d5066d6b4371a59ffe59bb6d6447@huawei.com> <A8214369-216E-440B-8757-172416CDF02B@cisco.com> <20201116144715.GL39343@faui48f.informatik.uni-erlangen.de>
In-Reply-To: <20201116144715.GL39343@faui48f.informatik.uni-erlangen.de>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.52.234.111]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/iot-onboarding/OhyoB7X-Oj_rW2GyA5Rp7fHfb2I>
Subject: Re: [Iot-onboarding] [Secdispatch] DANE IOT proposed outcome
X-BeenThere: iot-onboarding@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussion of IoT onboarding mechanisms <iot-onboarding.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/iot-onboarding>, <mailto:iot-onboarding-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/iot-onboarding/>
List-Post: <mailto:iot-onboarding@ietf.org>
List-Help: <mailto:iot-onboarding-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/iot-onboarding>, <mailto:iot-onboarding-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 16 Nov 2020 15:17:24 -0000

Hi Toerless,

You're right, there're many ways to identify the device. But In the DANE client authentication case, the device's identity can only be the certificate or a public key pair, I think, because the DNS Server needs to store the public key hash values.
Except the initial identity, the device may be allocated a local identity after onboarding. So if the device has an initial identity of symmetric key, it has to be allocated a local identity of certificate or public key pair, then the local identity can be bound to a DNS domain name.

Regards & Thanks!
Wei Pan

-----Original Message-----
From: Secdispatch [mailto:secdispatch-bounces@ietf.org] On Behalf Of Toerless Eckert
Sent: Monday, November 16, 2020 10:47 PM
To: Eliot Lear <lear=40cisco.com@dmarc.ietf.org>
Cc: iot-onboarding@ietf.org; secdispatch@ietf.org; Panwei (William) <william.panwei@huawei.com>
Subject: Re: [Secdispatch] [Iot-onboarding] DANE IOT proposed outcome


Wrt. beyond thin device requiring at least a public key pair:

I thought there where also mechanisms by which the thin (IOT) device might only have a unique symmetric key that is only shared with some less constrained proxy ("in the cloud") that is supporting the thin device in all more complex (crypto)  operations and avoid the need for the thin device to support symmetric crypto - if thats the component beyond its capabilities. 

Aka: Many ways to cut the cake. 

On Mon, Nov 16, 2020 at 01:50:30PM +0100, Eliot Lear wrote:
> Hi Wei Pan,
> 
> I agree with you that there is a need for something that doesn???t require devices to have a full PKI built in.  But there needs to be something unique about the device that it can express and prove.  Also, we should separate out two problems:
> 
> Proving the peer to the device
> Providing the device to the peer
> 
> Each has slightly different characteristics, especially when it comes to certificates.  Nobody should expect a huge cert store to be on a light weight client.  As was said in the chat, that is one thing that BRSKI solves.  But DPP/POK also solves it without certificates, but still requires at least a public/private key pair. Less than that I do not know how to work the problem.
> 
> Eliot
> 
> > On 16 Nov 2020, at 13:02, Panwei (William) <william.panwei@huawei.com> wrote:
> > 
> > Thanks to Eliot for summarizing these.
> > 
> > I think the core concept of using DANE in IoT scenario is to get rid of certificates and PKIX. The solution of how to securely onboard the IoT devices and allocate the DNS domain name, both with and without initial certificates, is the key part to figure out.
> > If the IoT devices have no initial certificates, such as 802.1AR IDevID certificate, as their initial identity, then the BRSKI mechanism won???t be appropriate for these devices because BRSKI has a requirement of IDevID.
> > If the IoT devices have an IDevID certificate, I think it can still use BRSKI to onboard, but it won???t use EST to request a certificate any more, instead, it will apply for a DNS domain name by using some protocols.
> > 
> > That???s my preliminary thoughts, maybe not right.
> > 
> > Regards & Thanks!
> > Wei Pan
> > 
> > From: Secdispatch [mailto:secdispatch-bounces@ietf.org 
> > <mailto:secdispatch-bounces@ietf.org>] On Behalf Of Eliot Lear
> > Sent: Monday, November 16, 2020 6:55 PM
> > To: secdispatch@ietf.org <mailto:secdispatch@ietf.org>
> > Subject: [Secdispatch] DANE IOT proposed outcome
> > 
> > Thanks to Shumon for presenting the DANE use case for IOT.
> > 
> > We discussed taking this to the iot-onboarding@ietf.org <mailto:iot-onboarding@ietf.org> list as there were a number of rather big open issues that people wanted to discuss.
> > 
> > We also discussed a non-WG forming BOF to look at, as Ted put it, the broader context for onboarding.  To give people a feel for the sort of related work that is available, here are a list of related activities:
> > 
> > draft-ietf-anima-bootstrapping-keyinfra (BRSKI) is a request/response mechanism that uses RFC 8366 vouchers to introduce devices and network infrastructure.
> > Intel???s SDO provides an application level introduction using vouchers as well.  This work has been taken up by the FIDO alliance.
> > The Wifi Alliance has Device Provisioning Protocol (DPP) which does not attach to a global name space prior to provisioning having occurred, but does represent a minimum case (just public keys).
> > draft-friel-eap-tls-eap-dpp borrows from DPP, intended mostly for wired use, where DPP is focused on 802.11 networks.
> > There are a number of BRSKI related drafts by Owen as well, relating to cloud-based registrars.
> > There is also work by Michael Richardson and Peter Van Der Stock on constrained vouchers.  That work is taking place in ACE.
> > 
> > Understanding the landscape might help us understand where DANE fits in.
> > 
> > Regards,
> > 
> > Eliot
> > --
> > Iot-onboarding mailing list
> > Iot-onboarding@ietf.org <mailto:Iot-onboarding@ietf.org> 
> > https://www.ietf.org/mailman/listinfo/iot-onboarding 
> > <https://www.ietf.org/mailman/listinfo/iot-onboarding>
> 



> --
> Iot-onboarding mailing list
> Iot-onboarding@ietf.org
> https://www.ietf.org/mailman/listinfo/iot-onboarding


-- 
---
tte@cs.fau.de

_______________________________________________
Secdispatch mailing list
Secdispatch@ietf.org
https://www.ietf.org/mailman/listinfo/secdispatch