Re: [Iotops] maintain ownership (was: can we create protocols that securely transfer ownership?)

Toerless Eckert <tte@cs.fau.de> Tue, 03 November 2020 19:09 UTC

Return-Path: <eckert@i4.informatik.uni-erlangen.de>
X-Original-To: iotops@ietfa.amsl.com
Delivered-To: iotops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6B3023A0100 for <iotops@ietfa.amsl.com>; Tue, 3 Nov 2020 11:09:24 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.869
X-Spam-Level:
X-Spam-Status: No, score=-0.869 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.25, SPF_HELO_NONE=0.001, SPF_NEUTRAL=0.779, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id X01l4cErB4lQ for <iotops@ietfa.amsl.com>; Tue, 3 Nov 2020 11:09:22 -0800 (PST)
Received: from faui40.informatik.uni-erlangen.de (faui40.informatik.uni-erlangen.de [IPv6:2001:638:a000:4134::ffff:40]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7B6A13A0061 for <iotops@ietf.org>; Tue, 3 Nov 2020 11:09:11 -0800 (PST)
Received: from faui48f.informatik.uni-erlangen.de (faui48f.informatik.uni-erlangen.de [131.188.34.52]) by faui40.informatik.uni-erlangen.de (Postfix) with ESMTP id 24C03548686; Tue, 3 Nov 2020 20:09:06 +0100 (CET)
Received: by faui48f.informatik.uni-erlangen.de (Postfix, from userid 10463) id 1BC75440059; Tue, 3 Nov 2020 20:09:06 +0100 (CET)
Date: Tue, 03 Nov 2020 20:09:06 +0100
From: Toerless Eckert <tte@cs.fau.de>
To: Qin Wu <bill.wu@huawei.com>
Cc: "iotops@ietf.org" <iotops@ietf.org>, anima@ietf.rg
Message-ID: <20201103190906.GD48111@faui48f.informatik.uni-erlangen.de>
References: <B8F9A780D330094D99AF023C5877DABAADB1F8C6@dggeml511-mbs.china.huawei.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <B8F9A780D330094D99AF023C5877DABAADB1F8C6@dggeml511-mbs.china.huawei.com>
User-Agent: Mutt/1.10.1 (2018-07-13)
Archived-At: <https://mailarchive.ietf.org/arch/msg/iotops/im97sSpqcPEuIKJsikMd4zuBgBA>
Subject: Re: [Iotops] maintain ownership (was: can we create protocols that securely transfer ownership?)
X-BeenThere: iotops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IOT Operations <iotops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/iotops>, <mailto:iotops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/iotops/>
List-Post: <mailto:iotops@ietf.org>
List-Help: <mailto:iotops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/iotops>, <mailto:iotops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 03 Nov 2020 19:09:24 -0000

Thanks, Qin

Cross-posting to anima, because i think these discussions apply to any type
of (physical) device level certificate wrt. ownership:

Most IDevID in TPMs can not be renewed, so they either have infinite lifetime,
or the device is preordained trash when the certificate expires. 

The security problem you are pointing to is called key exhaustion, aka: it
does not come from the lifetime, but from how often you use it. One
simple way to solve this is not to use such infinite lifetime certs often.
This is true for IDevIDs unless you start to do bad protocols that use them
often.

One simple way IMHO to solve this problem is to make the infinite lifetime
certs a local CA and use it to periodically generate new local cert(s) that
you use actively. Increases amount of data for cert-chain signaling required though.

Wrt. overwriting existing certs: i was just giving an example. Agree that there
are various options.

Cheers
    Toerless

On Tue, Nov 03, 2020 at 01:32:29PM +0000, Qin Wu wrote:
> [Qin]: Not sure lifetime long certs is a good idea. I feel it is more vulnerable.
> Also I think the current cert doesn't need to be overwritten by cert of the new owner.
> The current Cert can be embedded in the Cert of new owner, see delegation voucher
> https://tools.ietf.org/html/draft-richardson-anima-voucher-delegation-02
> when the device is in resale, wrong?
> 
> JUst a line of thoughts.
> 
> On Sat, Oct 31, 2020 at 08:58:27AM +1300, Brian E Carpenter wrote:
> > On 31-Oct-20 06:25, Michael Richardson wrote:
> > >
> > > Andrew G. Malis <agmalis@gmail.com<mailto:agmalis@gmail.com>> wrote:
> > >     > Yes, in addition to being a good story, the point is who controls the
> > >     > firmware in our things, and how bad it can get not only when the
> > >     > manufacturer enforces DRM, but the gov't enables the behavior
> > >     > (criminalizing jailbreaking).
> > >
> > >     > Or the issues that arise when the manufacturer fails to properly maintain
> > >     > the firmware, or goes out of business.
> > >
> > > All major concerns.  What do you think the IETF can/should do?
> > > I have some very specific ideas which I think are manageable and specific.
> >
> > Both BRSKI and SUIT have minor references to the latter problem, and I
> > think that when considering tiny cheap devices it isn't a theoretical issue,
> > but one that's highly likely. There is also (as for incandescent light
> > bulbs) a strong incentive for manufacturers to sell devices that are
> > designed to break after a while. An expiring certificate would be a great
> > way to break devices remotely, for example.
> 
> Indeed, before even thinking about transferring ownership i would to see what
> IETF security community can do to remove the current problem of even just
> MAINTAINING OWNERSHIP in face of (if i am not mistaken) current PKI
> recommendations:
> 
> My TivoHD for example had its certificate expire few years into its lifetime,
> even though i had upfront bought a so-called "lifetime service" for it.
> Of course, the lifetime-service did not include "maintaining a current cert for the
> lifetime of the device".
> 
> And that is just the most egregious example i ran across because of me having
> to learn how to hack up all the software that was talking to the TiVo via
> TLS - to ignore the expired cert.
> 
> I am saying the IETF is partially to blame because i think we also proliferate
> the notion that certificates have to be renewed periodically with maximum
> usual lifetimes of now i think one year ? (was two years)
> 
> Of course, this is specifically a consumer-IoT problem, because industrial
> customers should typically be in a stronger position to avoid these vendor
> abuse of principally sound technical guidance.
> 
> As much as i like to explore short lived certificates more in environments
> where i can set up the right environment to support that, we should IMHO
> also think about the simplicity of lifetime-long-certificates. Which we
> currently do not have in web PKI.
> 
> The fact alone that we do only have in browsers one single TA space (Internet)
> seems to be the worst offender, proliferated by the fact that that is the
> only domain that most big contributors in the IETF are interested in.
> Nevertheless, to support what we classically did without crypto, namely
> private networks (with private addresses), we should also have a crypto
> strategy for such private networks. And in most cases, lifetime-long certs
> will be the only reasonable solution there.
> 
> But, and to get back to the topic: One way on how to get to lifetime-long
> certs would be an actual transfer of ownership from whaever the vendor
> put in as certs to a cert from the current owner and using a lifelong
> expiry time (e.g.: infinite). This could be hosted in a private TA.
> The question is primarily how to have browsers support different TA
> domains without confusing the user.
> 
> And of course, when you sell the device, you would need to do transfer
> of ownership again by overwriting the current cert with one of the
> new owner.
> [Qin]: Not sure lifetime long certs is a good idea. I feel it is more vulnerable.
> Also I think the current cert doesn't need to be overwritten by cert of the new owner.
> The current Cert can be embedded in the Cert of new owner, see delegation voucher
> https://tools.ietf.org/html/draft-richardson-anima-voucher-delegation-02
> when the device is in resale, wrong?
> 
> JUst a line of thoughts.
> 
> Cheers
>     Toerless
> 
> -- 
> Iotops mailing list
> Iotops@ietf.org
> https://www.ietf.org/mailman/listinfo/iotops


-- 
---
tte@cs.fau.de