Re: [Iot-onboarding] [Anima] EXTERNAL: Re: OPC and BRSKI

Jack Visoky <jmvisoky@ra.rockwell.com> Tue, 13 August 2019 01:22 UTC

Return-Path: <jmvisoky@ra.rockwell.com>
X-Original-To: iot-onboarding@ietfa.amsl.com
Delivered-To: iot-onboarding@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2BD42120043; Mon, 12 Aug 2019 18:22:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level:
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ra.rockwell.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6_PamICOn3RF; Mon, 12 Aug 2019 18:22:32 -0700 (PDT)
Received: from NAM02-CY1-obe.outbound.protection.outlook.com (mail-eopbgr760053.outbound.protection.outlook.com [40.107.76.53]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4FD36120025; Mon, 12 Aug 2019 18:22:32 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=AM7Oz2WqIeXsjYOaJ+ctJtwDFkYoH44wUp0WmIfTxZxWV1K2pQhncz0gH+DtN4PyDQWBM2OoAxm2gs+ZnSyCoB0VTPT/qiT4+uY3txGDQMHL0sW0J9V4EOv6Xy4YhIZqTnFmje5NhrOQa7uqk9rQKNEtOOdpV0vHzR1ls+8AuqJxQp1895IEQ/sVzJ6R+7SZ5RU2QaTdx0+fkVcx5HrF08G5N+1TUxX3kIkW8P+0gvSnZd9Ku1KYYeTkzg3/5G2+ZH0hubO2/bPsLhQ9jCChExHMhy889z+iAXyFGCM5UmWCuozPL50flTYOSHtRO+ZGa0EVH9EPOJykgDvlmB4qXA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=haqNEoOjlwSlesUF4t5CJdcVLPt9wgtlUNlXHGMniO0=; b=f9mKrBfgN4BwUd9QvRjE1iuxoSxyCHPHLZxfmAK3QBjXbzbbYu11lEISzP6VwlWBYdL6bDxSOuwM7oS6w2Zs3ovXOH6fCg8Ld9ykgZ02Za/UMBh/lfpQzB17e0hKf4EFZvE1tGI0ARuX8YWv/GwJRN17y921VEN/UThpxPSs8CcPlLmfhtpjdg8WcYuWqJG6jMecgfo/L14khOYY+WUM8D+eRofthZv7idgl6lwI8CdW9hhoJ4q7NrfL9V3bvHiKlDvUwxQgIBBOmkE1wUHYura05Svzd2qFDl+rYB1c5c+ioa7f25YhOfaJkEEctcg7Rfe6fIcdHRFrpeztwklhWQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ra.rockwell.com; dmarc=pass action=none header.from=ra.rockwell.com; dkim=pass header.d=ra.rockwell.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ra.rockwell.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=haqNEoOjlwSlesUF4t5CJdcVLPt9wgtlUNlXHGMniO0=; b=CfjmLSxNqRAbSqNo7YhfXyF1shVpiIjJ4OrZam8sMNGK++yx3DESjF/MwItbc9JHIl483qR8ggGA+Yznn4EWUhDTWEmN3XRzxWHdXGIupHR1dsO4D7KGAKI+H5WI5hqMTiXqeBcGMhH0ZfjatZQIrIGgAAeNcsGwdKg1Z+1zqNw=
Received: from DM5PR2201MB1340.namprd22.prod.outlook.com (10.172.46.145) by DM5PR2201MB1115.namprd22.prod.outlook.com (10.174.186.34) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2157.22; Tue, 13 Aug 2019 01:22:31 +0000
Received: from DM5PR2201MB1340.namprd22.prod.outlook.com ([fe80::ad07:c135:5d24:2d31]) by DM5PR2201MB1340.namprd22.prod.outlook.com ([fe80::ad07:c135:5d24:2d31%5]) with mapi id 15.20.2157.022; Tue, 13 Aug 2019 01:22:31 +0000
From: Jack Visoky <jmvisoky@ra.rockwell.com>
To: Toerless Eckert <tte@cs.fau.de>, Jack Visoky <jmvisoky=40ra.rockwell.com@dmarc.ietf.org>
CC: Michael Richardson <mcr+ietf@sandelman.ca>, "Randy Armstrong (OPC)" <randy.armstrong@opcfoundation.org>, "anima@ietf.org" <anima@ietf.org>, "iot-onboarding@ietf.org" <iot-onboarding@ietf.org>, "Nancy Cam-Winget (ncamwing)" <ncamwing@cisco.com>
Thread-Topic: [Anima] EXTERNAL: Re: [Iot-onboarding] OPC and BRSKI
Thread-Index: AQHVUVxdgRb6CX16R0WZfClhC8rvu6b4R7gA
Date: Tue, 13 Aug 2019 01:22:30 +0000
Message-ID: <DM5PR2201MB134013521AAA68EE4104C77F99D20@DM5PR2201MB1340.namprd22.prod.outlook.com>
References: <BYAPR08MB4903129ECDEADF61E681DE0BFAD50@BYAPR08MB4903.namprd08.prod.outlook.com> <46BF5F7B-5407-45A9-9C4F-EA553DF5814B@cisco.com> <11781.1565189957@localhost> <20190807172252.4sadxaiprm6hhmdy@faui48f.informatik.uni-erlangen.de> <BYAPR08MB490385B1BED4C665C79B1937FAD70@BYAPR08MB4903.namprd08.prod.outlook.com> <4671.1565279232@localhost> <BYAPR08MB49034F3B36F6979D59561FC3FAD70@BYAPR08MB4903.namprd08.prod.outlook.com> <DM5PR2201MB1340BD83D6CF3F95E82518C299D60@DM5PR2201MB1340.namprd22.prod.outlook.com> <19592.1565471757@localhost> <DM5PR2201MB1340616CB8E90FFEB486531999D00@DM5PR2201MB1340.namprd22.prod.outlook.com> <20190812185020.za2rtuo6bduhsu7i@faui48f.informatik.uni-erlangen.de>
In-Reply-To: <20190812185020.za2rtuo6bduhsu7i@faui48f.informatik.uni-erlangen.de>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=jmvisoky@ra.rockwell.com;
x-originating-ip: [205.175.250.244]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: aee009d3-bf05-477b-21e0-08d71f8cb645
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(4618075)(2017052603328)(7193020); SRVR:DM5PR2201MB1115;
x-ms-traffictypediagnostic: DM5PR2201MB1115:
x-ms-exchange-purlcount: 3
x-microsoft-antispam-prvs: <DM5PR2201MB1115D764D96E00188BB24D5299D20@DM5PR2201MB1115.namprd22.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 01283822F8
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(376002)(366004)(136003)(39860400002)(396003)(346002)(13464003)(199004)(189003)(8676002)(8936002)(66066001)(478600001)(81156014)(110136005)(186003)(7736002)(76116006)(6436002)(54906003)(316002)(7696005)(64756008)(66476007)(55016002)(66556008)(3846002)(2906002)(5660300002)(81166006)(6306002)(71190400001)(9686003)(14454004)(6116002)(229853002)(66446008)(33656002)(71200400001)(966005)(74316002)(6246003)(99286004)(486006)(52536014)(4326008)(86362001)(66946007)(11346002)(446003)(256004)(102836004)(53546011)(6506007)(25786009)(14444005)(305945005)(53936002)(476003)(76176011)(26005); DIR:OUT; SFP:1101; SCL:1; SRVR:DM5PR2201MB1115; H:DM5PR2201MB1340.namprd22.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: ra.rockwell.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: EC1mwASQC1u+gdiBNCgw67PslylU/eF81FwB7zOE3nOrZ2wPDANSY1EMNi1KqJWW3hEfieoXpP5BYgCDqQqwTYpkQfip94reHhbnVbfwl+uvELggXbtfZty63YHVkY1qwV+bVW7IzOQR+mwOPCQJxH4wg6zLDzet5G3xzrIrCBiavgL4twT0l5XrR0eisiLTraTI29ovBR3MFvCYWHOSPsBblf6UK0dKBpDpBrkCGGmHK6Hw/uiir0sGqQxicCXTnpte4+TJYdXNdsVEvvL/UJXirsrrj1bnKdFvuoEthQV6kFKQzT+TjzrYOjbt6hvqI7LXRnx3uPoshps4HUG3amDw3+x6ysOn7bR/jhymN2HwZpEEbSpIeWp1lt7NDjm3O4V0adncM3Q7E6B9Nn1JVEI43B8dCDZsdmZFFBw5PMw=
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: ra.rockwell.com
X-MS-Exchange-CrossTenant-Network-Message-Id: aee009d3-bf05-477b-21e0-08d71f8cb645
X-MS-Exchange-CrossTenant-originalarrivaltime: 13 Aug 2019 01:22:30.8731 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 855b093e-7340-45c7-9f0c-96150415893e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: N6/iyFmh0y/ASpJtWNxc1ho86HB6Gh2rqVhyzUdprBXgGTDzuJjhWJN7MeaMyPQqhMW+J1r3+xzKVrLSNFFNiWPRH/2chzoDVkAH2S/PFdc=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR2201MB1115
Archived-At: <https://mailarchive.ietf.org/arch/msg/iot-onboarding/ItUuloFZulDpW9l4gwv4X6HWb2A>
X-Mailman-Approved-At: Sun, 18 Aug 2019 03:11:44 -0700
Subject: Re: [Iot-onboarding] [Anima] EXTERNAL: Re: OPC and BRSKI
X-BeenThere: iot-onboarding@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussion of IoT onboarding mechanisms <iot-onboarding.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/iot-onboarding>, <mailto:iot-onboarding-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/iot-onboarding/>
List-Post: <mailto:iot-onboarding@ietf.org>
List-Help: <mailto:iot-onboarding-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/iot-onboarding>, <mailto:iot-onboarding-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 13 Aug 2019 01:22:35 -0000

Hi Toerless,

Just responding to one of your points, a colleague of mine from Cisco (Nancy Cam-Winget) and I have created a draft for authentication-only data protection for TLS 1.3.  We've registered the cipher suites and will be going through the Independent Review for this RFC soon.  If you, Michael, or even others would like to serve as reviewers we'd be grateful.

Link to RFC: https://tools.ietf.org/html/draft-camwinget-tls-ts13-macciphersuites-04 

Thanks,

--Jack

-----Original Message-----
From: Anima <anima-bounces@ietf.org>; On Behalf Of Toerless Eckert
Sent: Monday, August 12, 2019 2:50 PM
To: Jack Visoky <jmvisoky=40ra.rockwell.com@dmarc.ietf.org>;
Cc: Michael Richardson <mcr+ietf@sandelman.ca>;; Randy Armstrong (OPC) <randy.armstrong@opcfoundation.org>;; anima@ietf.org; iot-onboarding@ietf.org
Subject: Re: [Anima] EXTERNAL: Re: [Iot-onboarding] OPC and BRSKI

Agreeing to what Michael and you said, but also wanted to point out that TLS as defined by IETF is on a trajectory which may or may not be desirable for e.g.: industrial automation (where OPC is used) or other regulated/ critical environments.

For example the total elimination of any non-encryption option in the
TLS1.3 profile and the removal of the ability for passive observers to see the certificates exchanged impeeds severely on the ability to do passive diagnostics.

I at least think there are good reasons to also have a strong and independent reviewed authentication scheme without encryption that can well be diagnosed by passive observers.

Aspects like these are easily fixed IMHO by creating different profiles of TLS. Whether or not one could get such profiles through the TLS WG in the IETF is of course a different question given what seems to be a highly contentuous nature of the topic.

There also seems to be a desire of areas of industrial automation to avoid the overhead of a perceived to be redundant network layer. This was a thing back in the days of OSI where TP4 was often run in factories without CLNS, and given how IP hasn't really improved on simplified, automated address management vs. L2 switched ethernet, this still seems to be a thing. Aka: Someone would need to define TLS on top of just ethernet instead of IP/IPv6. And there may be other similar L2 "transport" technologies where its not clear if simple ethernet mappings would suffice (bluetooth, wifi,...).

Last but not least, QUIC is on a path to replace TLS and that too puts a dent into the belief that TLS as it stands would be a long term stable most-widely used protocol.

Finally: There is something said to not simply trust a design like TLS which you do not really understand just because  its widely used, and thus hopefully well reviewed, but rather make sure you have a design based on solid understanding of the cryptographic principles employed and a well defined review/control process of implementations.  Incidents like with OpenSSL show how badly reviewed even the most widely deployed crypto mechanisms can be.

Cheers
    Toerless



On Sun, Aug 11, 2019 at 09:31:22PM +0000, Jack Visoky wrote:
> > but there are significant benefits to not maintaining your own protocols, and significant benefits to getting the extensive review that TLS gets.
> 
> I could not agree more with this statement.
> 
> Thanks,
> 
> --Jack
> 
> 
> -----Original Message-----
> From: Michael Richardson <mcr+ietf@sandelman.ca>;
> Sent: Saturday, August 10, 2019 5:16 PM
> To: Jack Visoky <jmvisoky@ra.rockwell.com>;; Randy Armstrong (OPC) 
> <randy.armstrong@opcfoundation.org>;; iot-onboarding@ietf.org; 
> anima@ietf.org
> Subject: Re: EXTERNAL: Re: [Anima] [Iot-onboarding] OPC and BRSKI
> 
> 
> Jack Visoky <jmvisoky@ra.rockwell.com>; wrote:
>     > I am also involved with OPC-UA and would like to provide my/my
>     > company's perspective.  One of the major drivers of this engagement
>     > with the ANIMA group was a contentious point around whether or not TLS
>     > and EST are required for support of BRSKI.  Some of us had taken the
>     > position that these technologies are an integral part of BRSKI and
>     > shouldn't be replaced with OPC specific methods, especially given the
>     > benefit of using highly adopted security technologies, as well as the
>     > tight coupling of BRSKI to these.  So, I think the idea that OPC should
>     > just use these technologies is very much a viable answer.
> 
> If the device is powered or has enough battery to do 802.11, then it probably has enough power and code space to do TLS (particularly mbedtls from ARM).
> If it's on a very low duty cycle on battery, and/or it does 802.15.4, 
> then the question is still open.  The IETF may start work on a 
> 802.15.4 specific AKE, (see lake@ietf.org).  We believe we need these 
> for 6tisch (TSCH mode of 802.15.4 for deterministic industrial 
> networks)
> 
> It appears that the OPC UA methods provide enough security to do BRSKI, but there are significant benefits to not maintaining your own protocols, and significant benefits to getting the extensive review that TLS gets.
> 
>     > Also, I would strongly push back on any claims that low end OPC devices
>     > cannot support TLS.  Other industrial protocols have already added TLS
>     > support and are shipping products, including those with TLS client
>     > functionality.  TLS is no more heavy-weight than existing, OPC-specific
>     > security mechanisms.
> 
> The OPC-specific mechanism appears to avoid a DH operation and therefore lacks PFS.  I understand it uses RSA, which means that it's significantly more expensive than TLS with ECDSA (and ECDH) would be, and most SOCs have hardware acceleration for ECDSA's secp256v1, fewer have RSA acceleration.
> 
>     > In any event I will be sure to join the call that has been set up for
>     > later in August.
> 
> Awesome.
> 
> --
> ]               Never tell me the odds!                 | ipv6 mesh networks [
> ]   Michael Richardson, Sandelman Software Works        |    IoT architect   [
> ]     mcr@sandelman.ca  http://www.sandelman.ca/        |   ruby on rails    [
> 
> 
> --
> Michael Richardson <mcr+IETF@sandelman.ca>;, Sandelman Software Works  
> -= IPv6 IoT consulting =-
> 
> 
> 
> _______________________________________________
> Anima mailing list
> Anima@ietf.org
> https://www.ietf.org/mailman/listinfo/anima

--
---
tte@cs.fau.de

_______________________________________________
Anima mailing list
Anima@ietf.org
https://www.ietf.org/mailman/listinfo/anima