Re: [Lwip] Secdir early review of draft-ietf-lwig-crypto-sensors-04

Mohit Sethi <mohit.m.sethi@ericsson.com> Mon, 25 December 2017 16:42 UTC

Return-Path: <mohit.m.sethi@ericsson.com>
X-Original-To: lwip@ietfa.amsl.com
Delivered-To: lwip@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 17A42126C89; Mon, 25 Dec 2017 08:42:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.22
X-Spam-Level:
X-Spam-Status: No, score=-4.22 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6pORXU9rK8Jo; Mon, 25 Dec 2017 08:42:22 -0800 (PST)
Received: from sessmg22.ericsson.net (sessmg22.ericsson.net [193.180.251.58]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A3848126C23; Mon, 25 Dec 2017 08:42:21 -0800 (PST)
X-AuditID: c1b4fb3a-34dff700000037f2-19-5a4126e47ec1
Received: from ESESSHC003.ericsson.se (Unknown_Domain [153.88.183.27]) by sessmg22.ericsson.net (Symantec Mail Security) with SMTP id 95.55.14322.4E6214A5; Mon, 25 Dec 2017 17:27:17 +0100 (CET)
Received: from nomadiclab.fi.eu.ericsson.se (153.88.183.153) by smtp.internal.ericsson.com (153.88.183.29) with Microsoft SMTP Server id 14.3.352.0; Mon, 25 Dec 2017 17:27:16 +0100
Received: from nomadiclab.fi.eu.ericsson.se (localhost [127.0.0.1]) by nomadiclab.fi.eu.ericsson.se (Postfix) with ESMTP id C7DB153690; Mon, 25 Dec 2017 18:30:38 +0200 (EET)
Received: from [127.0.0.1] (localhost [127.0.0.1]) by nomadiclab.fi.eu.ericsson.se (Postfix) with ESMTP id 3AF9F4E97E; Mon, 25 Dec 2017 18:30:38 +0200 (EET)
To: Christian Huitema <huitema@huitema.net>
CC: lwip@ietf.org, draft-ietf-lwig-crypto-sensors.all@ietf.org
References: <150808549717.12118.1993584722866227993@ietfa.amsl.com>
From: Mohit Sethi <mohit.m.sethi@ericsson.com>
Message-ID: <121e1979-62f2-5152-ab0e-0f20e3c22802@ericsson.com>
Date: Mon, 25 Dec 2017 18:27:15 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.5.0
MIME-Version: 1.0
In-Reply-To: <150808549717.12118.1993584722866227993@ietfa.amsl.com>
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha-256"; boundary="------------ms070505030604080404060205"
X-Virus-Scanned: ClamAV using ClamSMTP
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFjrLIsWRmVeSWpSXmKPExsUyM2K7tO5TNccog8lvOSwu3vzAYjG5cTa7 xbx9wg7MHrdmnGLxWLLkJ1MAUxSXTUpqTmZZapG+XQJXxuP/D9kL9rUwVkw89p2lgfFpYRcj J4eEgInEp0WT2bsYuTiEBA4zSjT034VydjBKnN7QwQrhbGSUuL/+PROEs4BRovfRGRaQfmEB V4l//S/AbBEBbYk1s+8xgdjMAk4SM243gsWFBJwl3v2+wg5iswnoSXSeO84MYvMK2EvsXtPE CGKzCKhKfFzbAlYvKhAh0TRzLitEjaDEyZlPwOKcAi4St7+/AjuPWaCbUeL44u+MEE+oSVw9 t4kZYpm6xNaOA4wTGIVmIemfhaxnFtiBYRIHd/5lhrDFJW49mc8EYZtJzNv8ECquLbFs4Wsg mwPIVpNY1qqEKgxiW0vM+HWQDcJWlJjS/ZAdwjaVeH30I9QqY4ll6/6yLWDkWcUoWpxaXJyb bmSkl1qUmVxcnJ+nl5dasokRGLEHt/y22sF48LnjIUYBDkYlHt61Yo5RQqyJZcWVuYcYVYDm PNqw+gKjFEtefl6qkgiv8zSHKCHelMTKqtSi/Pii0pzU4kOM0hwsSuK8TmkWUUIC6Yklqdmp qQWpRTBZJg5OqQZG5fkyZVvTOaOOd1378W7t0beVU/pnbSlqbGbc/mHSx9MiDhbHMvNn1U3J qdof48vzfcpVgbMX/3uIKDI31fZ7/hP0bXw1a/7nqLlGJbGTfr7XF2J+t3/jWxHVyVJfusvT ylo1O88lyh/kvnWYJ2duzv8mnivtD5Q6W9eF554x2BSW53OXMTBQiaU4I9FQi7moOBEASyVz TuACAAA=
Archived-At: <https://mailarchive.ietf.org/arch/msg/lwip/Dh6Pgr10f1EW6LyQPLzVjilFRcM>
Subject: Re: [Lwip] Secdir early review of draft-ietf-lwig-crypto-sensors-04
X-BeenThere: lwip@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Lightweight IP stack <lwip.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lwip>, <mailto:lwip-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lwip/>
List-Post: <mailto:lwip@ietf.org>
List-Help: <mailto:lwip-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lwip>, <mailto:lwip-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 25 Dec 2017 16:42:25 -0000

Dear Christian,

Thanks for the detailed review and positive comments. We have now 
submitted an updated version which can be found here: 
https://tools.ietf.org/html/draft-ietf-lwig-crypto-sensors-05. The diff 
from the previous version can be found here: 
https://www.ietf.org/rfcdiff?url2=draft-ietf-lwig-crypto-sensors-05.

You had raised an important point about identifiers and privacy. To 
address this, we have added new text in section 3 (Challenges), section 
4.1 (Provisioning) and section 8.1 (Feasibility). I provide snippets of 
the added text here for your convenience:

> small resource-constrained devices
>     are often shipped with a single static identity.  In many cases, it
>     is a single raw public key.  These long-term static identities makes
>     it easy to track the devices (and their owners) when they move.  The
>     static identities may also allow an attacker to track these devices
>     across ownership changes.
> long-term static identities
>     negatively affect the privacy of the devices and their owners.
>     Therefore, it is beneficial for devices to generate new identities at
>     appropriate times during their lifecycle.  For example, after a
>     factory reset or an ownership handover.  Thus, in our proposed
>     deployment model, the devices would generate a new asymmetric key
>     pair and use the new public-key P' to generate the new identity I'.
>     It is also desirable that these identities are only used during the
>     provisioning stage.  Temporary identities (such as IPv6 addresses)
>     can be used for network communication protocols once the device is
>     operational.
>   we
>     did note that it is possible for such devices to generate a new key
>     pair.  Given that this operation would only occur in rare
>     circumstances (such as a factory reset or ownership change) and its
>     potential privacy benefits, developers should provide mechanisms for
>     generating new identities.  It is however extremely important to note
>     that the security of this operation relies on access to
>     cryptographic-quality randomness.

Let us know if the ideas or the text here is not sufficient.

--Mohit
On 10/15/2017 07:38 PM, Christian Huitema wrote:
> Reviewer: Christian Huitema
> Review result: Has Nits
>
> This is an early review of draft-ietf-lwig-crypto-sensors-04 on behalf of the Security Directorate.
>
> The document is almost ready, but would benefit from a bit more further work.
>
> This draft examines a series of risks and challenges posed by securing small devices,
> proposes solutions for provisioning, and an architecture for securing the devices.
> The implementation experience section (section 8) provides measurements for the
> memory and CPU costs of various cryptographic operations using the Arduino
> platform. It will be good to see these results published and become a useful
> reference in further debates. In fact, I like this document a lot. My only
> concern is that it misses an opportunity to discuss identifiers and privacy.
>   
> I like the discussion of platform constraints in section 3, and the statement that "at
> the end of the day, if strong cryptographic security is needed, the implementations
> have to support that." I think it is an important message, and it it might be
> good to reinfore it with examples. For example, we do ship medecine in child-proof
> containers. It would be cheaper to use ordinary containers, but we pay the cost
> because as a society we want to mitigate the risk of children mistaking pills for candy.
> Similarly, it is cheaper to build devices with no security, but we may want society
> to mandate that risks should be mitigated.
>
> The challenge section, and the document in general, would be even better if it included
> a discussion of identifiers and privacy. The general concern is that because small
> devices have limited resource, they end up using just one identity, maybe just one
> public key. This makes them easy to track when they move, and by extension track the
> movements of their owners for wearable devices, or associated objects such as cars for
> general devices. There are certainly mitigations, such as provisioning new identities
> at appropriate times, or using temporary identities in communication protocols, but
> these mitigations certainly require the kind of trade-offs discussed in the draft. It
> would thus be very nice to introduce the privacy challenges in the "challenge"
> section, and to discuss the privacy mitigations in the other sections, e.g., architecture
> and provisioning.
>
>
>
>
>