Re: [Iot-onboarding] OPC and BRSKI

"Randy Armstrong (OPC)" <randy.armstrong@opcfoundation.org> Tue, 06 August 2019 14:57 UTC

Return-Path: <randy.armstrong@opcfoundation.org>
X-Original-To: iot-onboarding@ietfa.amsl.com
Delivered-To: iot-onboarding@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8FAA1120173 for <iot-onboarding@ietfa.amsl.com>; Tue, 6 Aug 2019 07:57:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=opcfoundation.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6TBFFR1s86cw for <iot-onboarding@ietfa.amsl.com>; Tue, 6 Aug 2019 07:57:44 -0700 (PDT)
Received: from NAM05-DM3-obe.outbound.protection.outlook.com (mail-eopbgr730076.outbound.protection.outlook.com [40.107.73.76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C18CA120284 for <iot-onboarding@ietf.org>; Tue, 6 Aug 2019 07:57:42 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ha3YuIouK1Kw+TW4LEBusbowkHA23cc/aHUYJzeAZ+ccbeHYDcYsuDXsSk1tz0/rnQcT50FWKANH6xd2sJ44HlCUje40iLbeYbhYM5SMhqUreMr8dVqQNRcTLrQoOTwRETB5+pCagaOg9S4zGva8X6PcRe/IyD8NIqlCLStosado49uE03mYZlvOtRY6PTlfiFRWtMXs5ew8OJcCDDyIHMHiZEHFbsIvIJGZyHYGKIR28KRzFrV0vZcE4sJ1MbEX6qBfLL7nEGPzmgegF5Qu/gRZgS9I97x4RtPK3xlzUWLiBcVAQiaeaaSmiWsHGnXSozG4A8Ckew1JPjMADrG6FA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=aTFkIrIGBZrwmkBL7qi88yM044u7KwV396xawoAj8kU=; b=BTAW78y4oTkdvqtje4RoBc2dfMR/HizdHxQ/48G4meAwrhjX5mKRWgrk/ID2RVki2XvUREatMoR1ELdtiP53dvOaH1wE+KCR8xSyloKHMRwcprxNCdogUrkHgto330B1qPVB0Ube8bdXsLOHYba8Ehp/XYOkqI/4vqTTmsopCvvUwdK+tez2uhMsv2OUEmStiNmPy06bPHHa/hgcUACo23DoE8icrb5n7Az7M5UY+k+xVho4KqxMC4EkLzpVdkQyTpDnqU8xwu9Xzgvr6y4ofTxVZBZkhxKwtFA/Wux5BEJTWCrHWSZ+rBwH+UyszrP3Dyi2P2gJ6xE4M4xcchrFBg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1;spf=pass smtp.mailfrom=opcfoundation.org;dmarc=pass action=none header.from=opcfoundation.org;dkim=pass header.d=opcfoundation.org;arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=opcfoundation.onmicrosoft.com; s=selector1-opcfoundation-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=aTFkIrIGBZrwmkBL7qi88yM044u7KwV396xawoAj8kU=; b=hAtoVX9VMbmwVPrQk7qW50nYIhCt94ry8Kh66gAveBdSN20fICspNkSRHBWomCAyreDGfDFRjwqNgVhAgs5WLRZEOnPJ/K/wLfw7C80H7OGRdQMoynOTEam3svjoBKzCpOe7IgFuN2g6X4yWWjaBjfPQT+kuW0XlBgy/3HeHTVA=
Received: from BYAPR08MB4903.namprd08.prod.outlook.com (20.176.255.96) by BYAPR08MB4567.namprd08.prod.outlook.com (52.135.234.25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2136.20; Tue, 6 Aug 2019 14:57:39 +0000
Received: from BYAPR08MB4903.namprd08.prod.outlook.com ([fe80::149d:d834:7df3:fc53]) by BYAPR08MB4903.namprd08.prod.outlook.com ([fe80::149d:d834:7df3:fc53%4]) with mapi id 15.20.2094.017; Tue, 6 Aug 2019 14:57:39 +0000
From: "Randy Armstrong (OPC)" <randy.armstrong@opcfoundation.org>
To: "iot-onboarding@ietf.org" <iot-onboarding@ietf.org>
Thread-Topic: [Iot-onboarding] OPC and BRSKI
Thread-Index: AdVMZzs5EDHMP+c/QWCVcWuK34MU/Q==
Date: Tue, 06 Aug 2019 14:57:39 +0000
Message-ID: <BYAPR08MB4903F02A37ED9AE092A59B8EFAD50@BYAPR08MB4903.namprd08.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=randy.armstrong@opcfoundation.org;
x-originating-ip: [24.80.80.10]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 5f7db2be-32b1-4275-538c-08d71a7e6d44
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(7021145)(8989299)(4534185)(7022145)(4603075)(4627221)(201702281549075)(8990200)(7048125)(7024125)(7027125)(7023125)(5600148)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:BYAPR08MB4567;
x-ms-traffictypediagnostic: BYAPR08MB4567:
x-ms-exchange-purlcount: 4
x-microsoft-antispam-prvs: <BYAPR08MB45677727D653F394F8AED722FAD50@BYAPR08MB4567.namprd08.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-forefront-prvs: 0121F24F22
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(136003)(396003)(366004)(39840400004)(346002)(376002)(199004)(189003)(53754006)(102836004)(8676002)(81166006)(81156014)(6246003)(68736007)(54896002)(6306002)(14454004)(6506007)(9686003)(76116006)(66946007)(66446008)(53546011)(66556008)(64756008)(55016002)(508600001)(606006)(53936002)(86362001)(9326002)(26005)(33656002)(2501003)(99286004)(186003)(66476007)(966005)(25786009)(66066001)(236005)(7696005)(7736002)(71190400001)(316002)(52536014)(8936002)(71200400001)(5024004)(256004)(6436002)(5660300002)(2351001)(476003)(486006)(5640700003)(6116002)(74316002)(790700001)(3846002)(6916009)(229853002)(2906002); DIR:OUT; SFP:1101; SCL:1; SRVR:BYAPR08MB4567; H:BYAPR08MB4903.namprd08.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: opcfoundation.org does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: tRgoJqlXmcJzznoN9Wkbo44ip8//68+thPOeP1x+aRKF6tNybUW7ZsgLZsk0moBLZIbM+54sJSjtLIpIxkIc+6QbTYAdh2cHJvLHFlVr/0iXMWI7aUD+IW64MtcLbkOC5ocaFaTw5nIdq8IHGliuynr6B7xVjHRV4+aZjsNPBlINDsnfWUt7N4epAb+hwajmKWYSMJxwNxILjCtbOcwsdBne8ZhSD1cbtfSf8X7kg2O1bKQUfkrWwimMHmnxxlnH0s3fzgL2Tgc9lolR1jqvxZviTbDTT/LTpzGUjxD7GBN8P+ClEbAqn1geIePEjou46niaYQ0wmmN/jN5mZd0bfq8w072EOmeK/cRXfm2UVEOWbjgg1ZhHBSFIjg1ocqps7gpeaSVUucni1BTjuAdfgfdPGZMczVaLT8QHNYi5f9E=
Content-Type: multipart/alternative; boundary="_000_BYAPR08MB4903F02A37ED9AE092A59B8EFAD50BYAPR08MB4903namp_"
MIME-Version: 1.0
X-OriginatorOrg: opcfoundation.org
X-MS-Exchange-CrossTenant-Network-Message-Id: 5f7db2be-32b1-4275-538c-08d71a7e6d44
X-MS-Exchange-CrossTenant-originalarrivaltime: 06 Aug 2019 14:57:39.5181 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 2d8ef4e4-d41c-489c-8004-bb99304b60fe
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: randy.armstrong@opcfoundation.org
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR08MB4567
Archived-At: <https://mailarchive.ietf.org/arch/msg/iot-onboarding/wH-T9au1a1j64tKlchD4ZGFDxZ4>
Subject: Re: [Iot-onboarding] OPC and BRSKI
X-BeenThere: iot-onboarding@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussion of IoT onboarding mechanisms <iot-onboarding.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/iot-onboarding>, <mailto:iot-onboarding-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/iot-onboarding/>
List-Post: <mailto:iot-onboarding@ietf.org>
List-Help: <mailto:iot-onboarding-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/iot-onboarding>, <mailto:iot-onboarding-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 06 Aug 2019 14:57:48 -0000

Hello All,

I work with the OPC Foundation and we are currently trying to solve a problem similar to what BRSKI is trying to solve for industrial automation devices. However, there are a number of unique requirements in our space which appear to create impedance mismatches between what BRKSI assumes and what we need. I would like to start a discussion on those differences and see if they can be resolved in a way to allow OPC Specifications to incorporate BRSKI.

Is this the right forum for such discussions?

Regards,

Randy Armstrong
https://opcfoundation.org/

From: Iot-onboarding <iot-onboarding-bounces@ietf.org> On Behalf Of Owen Friel (ofriel)
Sent: August 6, 2019 7:38 AM
To: Owen Friel (ofriel) <ofriel@cisco.com>; Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>; anima@ietf.org; iot-onboarding@ietf.org
Subject: Re: [Iot-onboarding] Device Certificate Deployment Automation with ACME using BRSKI

FYI, Its up on github now:

https://github.com/upros/brski-cloud


From: Anima <anima-bounces@ietf.org<mailto:anima-bounces@ietf.org>> On Behalf Of Owen Friel (ofriel)
Sent: 06 August 2019 14:05
To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com<mailto:rifaat.ietf@gmail.com>>; anima@ietf.org<mailto:anima@ietf.org>; iot-onboarding@ietf.org<mailto:iot-onboarding@ietf.org>
Subject: Re: [Anima] [Iot-onboarding] Device Certificate Deployment Automation with ACME using BRSKI

Hi guys,

After the meeting and from corridor conversations with Toerless, I had actually already started on such a draft.

What I have started so far is attached. Its not on a public repo yet, but will put it there. You are already named on it Rifaat, happy to add you too Michael and you can help figure out some of the open redirect options outlined in it ☺

My high level thoughts on this were to keep the ACME specifics out of the draft, and use the draft to define the cloud RA behaviour, and the pledge behaviour when interacting with the cloud RA, and the various cert, CA, TLS, redirect, etc. details. The fact that the RA (whether cloud or local) *may* use ACME to talk to the CA is transparent to the pledge.

I was thinking that the ACME specifics could be covered in a different draft based on merging draft-yusef-acme-3rd-party-device-attestation and draft-friel-acme-integrations, but leave the BRSKI clarifications/specifics in this one.

Thoughts?
Owen




From: Iot-onboarding <iot-onboarding-bounces@ietf.org<mailto:iot-onboarding-bounces@ietf.org>> On Behalf Of Rifaat Shekh-Yusef
Sent: 02 August 2019 19:09
To: anima@ietf.org<mailto:anima@ietf.org>; iot-onboarding@ietf.org<mailto:iot-onboarding@ietf.org>
Subject: [Iot-onboarding] Device Certificate Deployment Automation with ACME using BRSKI

All,

During the last IETF meeting in Montreal we had a side meeting to discuss the
deployment automation of ACME issued certificates to devices, and the potential
use of the BRSKI mechanism to help with this. It was clear from the discussion
that BRSKI can be used to help address this use case, and that further discussion is
needed to define the needed enhancements to BRSKI.

The current BRSKI mechanism only briefly discusses the Cloud Registrar option in
section 2.7, which could be used to help address this use case.

Michael Richardson and I had another meeting over lunch yesterday to further
discuss this and we decided to work on a new draft to describe the issue and
define a solution.

Because of vacations and other commitments, we will try to publish the first
version of the draft early October.

Regards,
 Rifaat & Michael