Re: [Iot-onboarding] [Anima] Device Certificate Deployment Automation with ACME using BRSKI

Kent Watsen <kent+ietf@watsen.net> Fri, 09 August 2019 16:16 UTC

Return-Path: <0100016c772b24b7-7ece8b90-1343-4579-9f11-73809b33755e-000000@amazonses.watsen.net>
X-Original-To: iot-onboarding@ietfa.amsl.com
Delivered-To: iot-onboarding@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BE96F120020; Fri, 9 Aug 2019 09:16:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=amazonses.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cyYirVQhc8jY; Fri, 9 Aug 2019 09:16:53 -0700 (PDT)
Received: from a8-64.smtp-out.amazonses.com (a8-64.smtp-out.amazonses.com [54.240.8.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 872F4120019; Fri, 9 Aug 2019 09:16:53 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/simple; s=6gbrjpgwjskckoa6a5zn6fwqkn67xbtw; d=amazonses.com; t=1565367412; h=From:Message-Id:Content-Type:Mime-Version:Subject:Date:In-Reply-To:Cc:To:References:Feedback-ID; bh=JdRFJ7M+VfNKDYWQ2vzVEUwqWpmRvIaFBpnGBfVHcTM=; b=EwgY2LVPBoS27Zf8e6Ey6efQHubStQhnHFgqn5X9vC/Yo1IYtDuzKCzth//U23qq YsUDvXqlb0IYaS2YDXozAFyknb/8jvXRi21GkNu9p6Qyc9H7cqCAXMYqb9RBkrad3FN GzsyWkkpC9f792sixSqi8wA6yL/lBjQ7chEQNtjg=
From: Kent Watsen <kent+ietf@watsen.net>
Message-ID: <0100016c772b24b7-7ece8b90-1343-4579-9f11-73809b33755e-000000@email.amazonses.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_6BEACBD8-C205-4145-9141-92C040E4514E"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Date: Fri, 09 Aug 2019 16:16:51 +0000
In-Reply-To: <18641.1565363784@localhost>
Cc: "iot-onboarding@ietf.org" <iot-onboarding@ietf.org>, "anima@ietf.org" <anima@ietf.org>
To: Michael Richardson <mcr+ietf@sandelman.ca>
References: <CAGL6epJRmAvDB4=M6RiQaC93wvy1XDgcbhOmuKUtqmEhBWC72w@mail.gmail.com> <DM6PR11MB3385FD834E826E25160B53AADBD50@DM6PR11MB3385.namprd11.prod.outlook.com> <DM6PR11MB33851A9026943624FC5BD478DBD50@DM6PR11MB3385.namprd11.prod.outlook.com> <0100016c6772e4e8-8ce5598b-2c2a-488e-b7c2-414d9003e46b-000000@email.amazonses.com> <3508.1565212944@localhost> <0100016c71fac426-ec2033bc-fe7d-4540-8ec4-0a2812b818ac-000000@email.amazonses.com> <16648.1565297443@localhost> <0100016c73206135-bb6429cc-539e-4166-b54f-552e79c9f221-000000@email.amazonses.com> <18641.1565363784@localhost>
X-Mailer: Apple Mail (2.3445.104.11)
X-SES-Outgoing: 2019.08.09-54.240.8.64
Feedback-ID: 1.us-east-1.DKmIRZFhhsBhtmFMNikgwZUWVrODEw9qVcPhqJEI2DA=:AmazonSES
Archived-At: <https://mailarchive.ietf.org/arch/msg/iot-onboarding/oFFWAB_l9hRRwvGv1KIEv64dY_Y>
Subject: Re: [Iot-onboarding] [Anima] Device Certificate Deployment Automation with ACME using BRSKI
X-BeenThere: iot-onboarding@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussion of IoT onboarding mechanisms <iot-onboarding.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/iot-onboarding>, <mailto:iot-onboarding-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/iot-onboarding/>
List-Post: <mailto:iot-onboarding@ietf.org>
List-Help: <mailto:iot-onboarding-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/iot-onboarding>, <mailto:iot-onboarding-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 09 Aug 2019 16:16:56 -0000


> On Aug 9, 2019, at 11:16 AM, Michael Richardson <mcr+ietf@sandelman.ca> wrote:
> 
> 
> Kent Watsen <kent+ietf@watsen.net> wrote:
>>> But, more interestingly, it can be used to update the trust anchors, to
>>> enable a resale/transfer of ownership!
> 
>> But, seriously, no.  It's expected that decommissioning will returned a
>> device back to its factory default state.  No manufacturer will agree
>> that it is anything other than the state of the device when it was
>> manufactured.   Anything other than that could be leveraged to mount an
>> attack.  Change in ownership-assignment needs to occur through some
>> other means, of which there are many but, in the end, if the 2nd-owner
>> cares about the security (not just the convenience) of bootstrapping,
>> then they are strongly advised to purchase never before used
>> equipment.
> 
> This is indeed the tussle the BRSKI document has been dealing with
> in its IESG review.  If we can't change the trust anchors used to verify
> the voucher, then how can the device be onboarded after the MASA
> has gone away?

Oh, wait, my prior response wasn't wholly accurate.

The factory default state reflects zero remnants, but it doesn't necessarily mean the same OS-version as the day the device left the factory.   Many devices don't have enough NV storage to keep the original OS forever, not to mention that it would be rather silly as, better, would be to keep what's considered the last known-good OS image (which may not be the same thing).   Many devices will effectively overwrite the previous OS image ("don't touch the power button during install!") and thus what happens when pressing the "reset to factory default" button is a reflection of what "factory default" means to the new OS image.   The good news is that new OS images can contain new CA certificates, for authenticating well-known services (e.g., MASA, OVIS, etc.).  What cannot change is the IDevID certificate (LDevIDs are wiped).

Of course, all this assumes the manufacturer is still around to release OS updates, but this is simply part of the business decision that customers need to consider when purchasing equipment.   The probability of a successful bootstrap shortly after fresh purchase directly from the manufacturer is very high, but lowers over time as risks around businesses going belly-up start to creep in.  A device sitting on a shelf for a decade, or devices bought on eBay, may not bootstrap without an OS upgrade.

None of the above reflects how to support change in ownership, though.   A device reset to factory default has no "owner", just some trust anchors that can be used to verify an entity claiming to be its owner.  What backend sale-channel integration or customer-handoff protocol might be used to support change in ownership is out of scope.



> I don't understand how RFC8572 slipped through the IESG without resolving this.

Perhaps because BRSKI leads with ephemeral vouchers and hence the need for online MASAs (with offline support tacked on the side), whereas SZTP leads with optional use of vouchers but, when used, they're mostly non-ephemeral and accessible at time or purchase (with ephemeral voucher support tacked on the side).   The shift in emphasis begs the question, so they're asking it.  Still, it seems more like a customer/business issue than something IESG should worry about.


Kent