Re: [Iot-onboarding] [Secdispatch] DANE IOT proposed outcome

Toerless Eckert <tte@cs.fau.de> Tue, 17 November 2020 07:43 UTC

Return-Path: <eckert@i4.informatik.uni-erlangen.de>
X-Original-To: iot-onboarding@ietfa.amsl.com
Delivered-To: iot-onboarding@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6C4583A116F for <iot-onboarding@ietfa.amsl.com>; Mon, 16 Nov 2020 23:43:39 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.649
X-Spam-Level:
X-Spam-Status: No, score=-1.649 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.25, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jpkA2qcqvlOC for <iot-onboarding@ietfa.amsl.com>; Mon, 16 Nov 2020 23:43:36 -0800 (PST)
Received: from faui40.informatik.uni-erlangen.de (faui40.informatik.uni-erlangen.de [131.188.34.40]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B24143A116E for <iot-onboarding@ietf.org>; Mon, 16 Nov 2020 23:43:35 -0800 (PST)
Received: from faui48f.informatik.uni-erlangen.de (faui48f.informatik.uni-erlangen.de [IPv6:2001:638:a000:4134::ffff:52]) by faui40.informatik.uni-erlangen.de (Postfix) with ESMTP id 93DD454843F; Tue, 17 Nov 2020 08:43:30 +0100 (CET)
Received: by faui48f.informatik.uni-erlangen.de (Postfix, from userid 10463) id 8C52D440059; Tue, 17 Nov 2020 08:43:30 +0100 (CET)
Date: Tue, 17 Nov 2020 08:43:30 +0100
From: Toerless Eckert <tte@cs.fau.de>
To: Eliot Lear <lear=40cisco.com@dmarc.ietf.org>
Cc: Ash Wilson <ash.wilson=40valimail.com@dmarc.ietf.org>, "iot-onboarding@ietf.org" <iot-onboarding@ietf.org>, Shumon Huque <shuque@gmail.com>, "Panwei (William)" <william.panwei@huawei.com>
Message-ID: <20201117074330.GP39343@faui48f.informatik.uni-erlangen.de>
References: <2786E31F-2A4F-4901-8ECC-7AEF4B4D81E2@cisco.com> <b178d5066d6b4371a59ffe59bb6d6447@huawei.com> <CAHPuVdXo1o0d_WzLqTZ5s9+JNG=3kbNdTO1BrS7BdEBDd2F1Lw@mail.gmail.com> <CAEfM=vRotGf-SuYz8PKNop8zdCCA_-x+3xU81rMS6Le6EUOOFw@mail.gmail.com> <2FE1E13B-E313-43F9-932E-6682DF72E18D@cisco.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <2FE1E13B-E313-43F9-932E-6682DF72E18D@cisco.com>
User-Agent: Mutt/1.10.1 (2018-07-13)
Archived-At: <https://mailarchive.ietf.org/arch/msg/iot-onboarding/yhn-GiCt9f9Nhdj2PL_00ErTgyQ>
Subject: Re: [Iot-onboarding] [Secdispatch] DANE IOT proposed outcome
X-BeenThere: iot-onboarding@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussion of IoT onboarding mechanisms <iot-onboarding.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/iot-onboarding>, <mailto:iot-onboarding-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/iot-onboarding/>
List-Post: <mailto:iot-onboarding@ietf.org>
List-Help: <mailto:iot-onboarding-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/iot-onboarding>, <mailto:iot-onboarding-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Nov 2020 07:43:39 -0000

> > On 16 Nov 2020, at 20:13, Ash Wilson <ash.wilson=40valimail.com@dmarc.ietf.org> wrote:
> > One of the processes we are seeking to simplify is that of establishing trust directly between devices in the field, both of which may have only a keypair, and not the benefit of PKI that chains to a publicly trusted CA.
> 
> Yes.  I think this is a great use of DANE.

Would like to se a description of a more complete IoT use-casse workflow:

As a human i have a lot of backend processes that let's say make me "trust" that
"www.google.com" is a trustworthy source of search results (or not ;-).
In IoT environments its not entirely clear to me what this backend processes
would be to decide on whether a particular domain name is somethin to
"trust" to do something well...

> > Supporting x.509 certificates is in the interest of providing broad protocol compatibility (including the support of other adjacent standards like MUD: https://tools.ietf.org/id/draft-ietf-opsawg-mud-22.html#mudx509 <https://tools.ietf.org/id/draft-ietf-opsawg-mud-22.html#mudx509>). By using TLSA for client auth, we allow devices with only a raw public key in DNS, as well as devices with metadata-rich x.509 certificates, to mutually authenticate without requiring the distribution of CA certificates, just based on knowledge of the communicating peer's DNS name.

Ultimately from the trust perspective its not really that different. I for once wouldn't know how to compare
my trust into the DNSSEC trust anchors vs. those "browser vendor" ? maintained list of trust anchors. 

> What is configured at build time, what is configured at provisioning time, and what is accessed real time can mean trading off complexity against dependencies.  Absent OCSP there may be no external dependencies.  With OCSP (even with stapling) the situation might prove a little different.  This is worth discussion.

Yes, lot of devils in details.

> > SIM/UICC identity providers may provision public keys in DNS, and leave a record of the device's DNS name in the SIM card (likely to be found in the certificate). This gives the device that receives the SIM card the ability to do all the things that the PKI ecosystem supports now, with the additional benefit of being able to mutually authenticate without the other side of the handshake needing to possess and trust the CA certificate used to sign the certificate that ships with the SIM card. Naming collisions are prevented by binding the public key to the DNS name- only the possessor of the private key corresponding to the TLSA record is the 'real' identity holder.
> 
> One thing we should look at is privacy considerations.  Who gets to query for this information?  What happens when they have it?  What is their authorization to have it?

It's called "public" keys ;-)) But indeed, DNS makes it easier for discovery of public keys == identities
of devices. And their names. I am probably more worried about the publicity of names.

> > In a similar fashion, device manufacturers may provision a DANE identity for devices before they ship. These device identities may reside in a DNS zone under the manufacturer's control, or the implementer may present the device certificates in a DNS zone under the implementer's control. This allows the identity to more naturally indicate the party responsible for the device's behavior, and can make the mitigation of some types of network abuse a little more straightforward.
> > 
> 
> This is very close to the MASA function in BRSKI.  Worth discussing.
> 
> I wonder if we should have ???side meeting???, either this week or in one of the following weeks, to discuss all of this.  Would people be interested?

Time permitting, sure.

Cheers
    Toerless

> Eliot