[Iotops] comments on draft-sweet-iot-acme-00.txt

Michael Richardson <mcr+ietf@sandelman.ca> Wed, 13 April 2022 17:41 UTC

Return-Path: <mcr@sandelman.ca>
X-Original-To: iotops@ietfa.amsl.com
Delivered-To: iotops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2CA613A1C06 for <iotops@ietfa.amsl.com>; Wed, 13 Apr 2022 10:41:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.909
X-Spam-Level:
X-Spam-Status: No, score=-6.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gefb95vbvSQg for <iotops@ietfa.amsl.com>; Wed, 13 Apr 2022 10:41:09 -0700 (PDT)
Received: from relay.sandelman.ca (relay.cooperix.net [IPv6:2a01:7e00:e000:2bb::1]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1BBFC3A1C07 for <iotops@ietf.org>; Wed, 13 Apr 2022 10:41:08 -0700 (PDT)
Received: from dooku.sandelman.ca (desktop4.sandelman.ca [209.87.249.16]) by relay.sandelman.ca (Postfix) with ESMTPS id 579C21F4A7; Wed, 13 Apr 2022 17:41:04 +0000 (UTC)
Received: by dooku.sandelman.ca (Postfix, from userid 179) id 1335D1A0480; Wed, 13 Apr 2022 13:03:09 -0400 (EDT)
From: Michael Richardson <mcr+ietf@sandelman.ca>
To: Michael Sweet <msweet=40msweet.org@dmarc.ietf.org>, iotops@ietf.org
In-reply-to: <B83EA69B-24B5-4FD4-BAED-6C5B34EC75B2@msweet.org>
References: <164926156380.8707.8732915494613186098@ietfa.amsl.com> <B83EA69B-24B5-4FD4-BAED-6C5B34EC75B2@msweet.org>
Comments: In-reply-to Michael Sweet <msweet=40msweet.org@dmarc.ietf.org> message dated "Wed, 06 Apr 2022 12:25:26 -0400."
X-Mailer: MH-E 8.6+git; nmh 1.7.1; GNU Emacs 26.3
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg="pgp-sha512"; protocol="application/pgp-signature"
Date: Wed, 13 Apr 2022 13:03:09 -0400
Message-ID: <387994.1649869389@dooku>
Archived-At: <https://mailarchive.ietf.org/arch/msg/iotops/9IvDJu6mh75QGjOdhWb4MXiUGQA>
Subject: [Iotops] comments on draft-sweet-iot-acme-00.txt
X-BeenThere: iotops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IOT Operations <iotops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/iotops>, <mailto:iotops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/iotops/>
List-Post: <mailto:iotops@ietf.org>
List-Help: <mailto:iotops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/iotops>, <mailto:iotops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Apr 2022 17:41:14 -0000

Michael Sweet <msweet=40msweet.org@dmarc.ietf.org> wrote:
    > A proposed solution for locally-managed (and trusted) X.509
    > certificates, to solve the "this web site will eat your child" errors.
    > I'm working on coding up a sample implementation...

    > Comments/feedback is appreciated!

As I understand it,

1) I need to teach all the browsers which I will use at my home include this new
   trust anchor, and ideally, to trust it only for .local.
   If I don't do a path restriction for .local, then the new anchor could
   impersonate any web property.   That comes with significant liability,
   since they could intercept my bank cookies, steal the end users' money, etc.

   And, even when I do that path restriction, if there are multiple places
   that do this, then I might need to trust multiple anchors to speak for .local.
   (The one at my home, my parents' home, the small nursury school, the
   church office, ....)

   I'm unaware of protocols to discover local trust anchors on a
   per-provisioning domain basis.  But actually, it's something we probably
   need.
   Perhaps that's something you'd be interested in working on?

2) The innovation here is using RFC8555 to enroll rather than, say, RFC7030,
   or CSA/MATTER, or OPC UA, or...

   * We still need to setup a local certification authority someplace.
   * We need to teach IoT devices to do RFC8555.

So for this proposal to fly, three things need to happen:

a) updates to browser.
b) updates to IoT devices
c) updates to local network to have ACME server

Please see our SUIB talks at IETF112 and IETF113.

I can't see how this is different than the requirements to deploy RFC8995 in
he home.  It also seems to include no authorized transfer of ownership, nor
does it seem to deal with how to get (unique, per-device, because RCM) WiFI
credentials to the device.

    >> Begin forwarded message:
    >>
    >> From: internet-drafts@ietf.org Subject: New Version Notification for
    >> draft-sweet-iot-acme-00.txt Date: April 6, 2022 at 12:12:43 PM EDT To:
    >> "Michael Sweet" <msweet@msweet.org>
    >>
    >>
    >> A new version of I-D, draft-sweet-iot-acme-00.txt has been
    >> successfully submitted by Michael Sweet and posted to the IETF
    >> repository.
    >>
    >> Name: draft-sweet-iot-acme Revision: 00 Title: ACME-Based Provisioning
    >> of IoT Devices Document date: 2022-04-06 Group: Individual Submission
    >> Pages: 10 URL:
    >> https://www.ietf.org/archive/id/draft-sweet-iot-acme-00.txt Status:
    >> https://datatracker.ietf.org/doc/draft-sweet-iot-acme/ Html:
    >> https://www.ietf.org/archive/id/draft-sweet-iot-acme-00.html Htmlized:
    >> https://datatracker.ietf.org/doc/html/draft-sweet-iot-acme
    >>
    >>
    >> Abstract: This document extends the Automatic Certificate Management
    >> Environment (ACME) [RFC8555] to provision X.509 certificates for local
    >> Internet of Things (IoT) devices that are accepted by existing web
    >> browsers and other software running on End User client devices.
    >>
    >>
    >>
    >>
    >> The IETF Secretariat
    >>
    >>

    > ________________________ Michael Sweet




    > ----------------------------------------------------
    > Alternatives:

    > ----------------------------------------------------
    > --
    > Iotops mailing list Iotops@ietf.org
    > https://www.ietf.org/mailman/listinfo/iotops

--
Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works
 -= IPv6 IoT consulting =-