Re: [Lwip] (on PUFs) Re: [IoT-DIR] Iotdir early review of draft-ietf-lwig-crypto-sensors-04

Hannes Tschofenig <Hannes.Tschofenig@arm.com> Wed, 08 November 2017 07:31 UTC

Return-Path: <Hannes.Tschofenig@arm.com>
X-Original-To: lwip@ietfa.amsl.com
Delivered-To: lwip@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 62A181300CE; Tue, 7 Nov 2017 23:31:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level:
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8oE_awBXqC9m; Tue, 7 Nov 2017 23:31:55 -0800 (PST)
Received: from EUR02-HE1-obe.outbound.protection.outlook.com (mail-eopbgr10087.outbound.protection.outlook.com [40.107.1.87]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3D8F112ECCA; Tue, 7 Nov 2017 23:31:54 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector1-arm-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=FKFtntYh9z75Fo9CDMkJ5hQG3pC8Pn5/6AHvuoA8RaQ=; b=aPjshZP08+EwE3IdO7LluHt0HCt9WVLzEsKbTJKPiUKNBYP2mC0UZFzECmp7bN2uXkRl2x1ij0+hujUdcozRmSQPjkRATmEYrAw75z4I3TREElmt63c/ptQfg6fhldTcAHHXhKhyD9zJzFQBaQIHKp+X/tOonrniWJSQ9IKgfJ4=
Received: from AM4PR0801MB2706.eurprd08.prod.outlook.com (10.167.90.148) by AM4PR0801MB2708.eurprd08.prod.outlook.com (10.167.90.150) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.218.12; Wed, 8 Nov 2017 07:31:50 +0000
Received: from AM4PR0801MB2706.eurprd08.prod.outlook.com ([fe80::403b:850e:c32c:fad6]) by AM4PR0801MB2706.eurprd08.prod.outlook.com ([fe80::403b:850e:c32c:fad6%13]) with mapi id 15.20.0218.011; Wed, 8 Nov 2017 07:31:50 +0000
From: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
To: Rene Struik <rstruik.ext@gmail.com>, Samita Chakrabarti <samitac.ietf@gmail.com>
CC: "lwip@ietf.org" <lwip@ietf.org>, "draft-ietf-lwig-crypto-sensors.all@ietf.org" <draft-ietf-lwig-crypto-sensors.all@ietf.org>, "Iot-dir@ietf.org" <Iot-dir@ietf.org>
Thread-Topic: (on PUFs) Re: [Lwip] [IoT-DIR] Iotdir early review of draft-ietf-lwig-crypto-sensors-04
Thread-Index: AQHTVuLgMbcCfn77r0W39rAq/y/2u6MHGB4AgAE59YCAALA8gIABFnLw
Date: Wed, 08 Nov 2017 07:31:50 +0000
Message-ID: <AM4PR0801MB2706EEB884B77C30C508E340FA560@AM4PR0801MB2706.eurprd08.prod.outlook.com>
References: <150996104393.8207.2811572203550087788@ietfa.amsl.com> <AM4PR0801MB270650AF0ED72FABD13EA028FA500@AM4PR0801MB2706.eurprd08.prod.outlook.com> <CAKmdBpeP9A8VNGB9tCE=wYyBvAMzvZs4vBJq3uS6QoTbVsa4zg@mail.gmail.com> <a3ca29f7-e2ef-175e-0348-babd97d71ae1@gmail.com>
In-Reply-To: <a3ca29f7-e2ef-175e-0348-babd97d71ae1@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Hannes.Tschofenig@arm.com;
x-originating-ip: [80.92.118.86]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; AM4PR0801MB2708; 6:oy2Fjn0t0MqrIs8Y3/kgUISPg1J/QBoAS6/EeY2GPHcrmQkE/ZpZ1IHGVg4ORiIN6eUWh/J3fiIYJcDHnngvbwYSQrdzSuB2skw41f4u7vzsNYua7iylfy5PDUTc8xi0JTd/8hMa1cNe/QjGAyu/jqxzcd5t4c64XeBJlDD5ejGMwU+vLlL5Nfeu4ECvI2wa8ylIYCA9BEMd/nAIjAqpDnNU+/GKx7kiQsyYV9nPnQXRs9pcriIy3BfIlkFt8xqJfhnUB4Wp+n9OCtq3/DzAoe9pLXqpGb14Wfqp4K5cCGDL0XF1sVT9UHWM3s0dgKkDxW+zyt7Sb0rZJg+f95et9TY3bcQIMSg1bwtbYAk/PJk=; 5:/vzLqtYNYEcM2QHkfi5n3rZfBvuzGjFioqlQuz5cxAXZ2nj9Pim3i9IsoUBwLWsxJLXw7Fa23V8lmv2GQCF8o5niCSwsoB73FPg0MUp89oLh5ekLhSBd92wZuP3BlNvNcFXdM4EL9W4Ge6NFk0KyZo1mbFxMi47BmGea3dYlz84=; 24:k3o6w22h3/rUFWKZAhSaNztLbmo7SZvPVo4CCpk85Pm1f+Yx7bTpI8/E6PspnGlyw++O0CC5okvOqm9olQVoomWhz3eHWlffXPb+08hcuKU=; 7:a5UhemYT1NmIhPXHTDP7nhk60FZ7QEBzKeclEbEbW+nq3ySX0gYBJkL83gq0++oxLC811NoSO7hqVqc1yMxgw+eVSX6Keq6W1LoVfJ9wiO37O9qrJmIzz+xuy1X4xkZeLhMwFuNn9tM4SjmTmtZvZDfIkPcYOUyXoB8cwrN/pdF0URRaiZGeC2GAwK33djUFImNPN8h7TeTnUe6ZkXVFbVT97R1bVNCiTrXYWdg0plpCUiQJJlxxSUGO2MsKQkT8
x-ms-exchange-antispam-srfa-diagnostics: SSOS;
x-ms-office365-filtering-correlation-id: c951ecf8-d69b-4cf9-b3a2-08d5267ac703
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(48565401081)(4534020)(4602075)(4627115)(201703031133081)(201702281549075)(2017052603249); SRVR:AM4PR0801MB2708;
x-ms-traffictypediagnostic: AM4PR0801MB2708:
x-exchange-antispam-report-test: UriScan:(158342451672863)(180628864354917)(65766998875637)(192374486261705)(131022147185803)(21748063052155);
x-microsoft-antispam-prvs: <AM4PR0801MB270800CA8D1DA5A8E8D00647FA560@AM4PR0801MB2708.eurprd08.prod.outlook.com>
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(2401047)(5005006)(8121501046)(3231021)(100000703101)(100105400095)(93006095)(93001095)(10201501046)(3002001)(6055026)(6041248)(20161123555025)(20161123564025)(20161123558100)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123560025)(20161123562025)(6072148)(201708071742011)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:AM4PR0801MB2708; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:AM4PR0801MB2708;
x-forefront-prvs: 0485417665
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(346002)(39860400002)(376002)(13464003)(24454002)(189002)(51914003)(199003)(40434004)(68736007)(101416001)(8936002)(33656002)(74316002)(966005)(7736002)(478600001)(2900100001)(5250100002)(14454004)(3660700001)(99286004)(72206003)(81166006)(2906002)(81156014)(66066001)(3846002)(6116002)(325944009)(54356999)(50986999)(2950100002)(76176999)(5890100001)(102836003)(236005)(54906003)(54896002)(8676002)(6306002)(9686003)(106356001)(606006)(7696004)(53936002)(790700001)(55016002)(97736004)(53546010)(110136005)(105586002)(230783001)(86362001)(6506006)(6436002)(189998001)(3280700002)(39060400002)(5660300001)(316002)(4326008)(229853002)(93886005)(6246003)(25786009); DIR:OUT; SFP:1101; SCL:1; SRVR:AM4PR0801MB2708; H:AM4PR0801MB2706.eurprd08.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en;
received-spf: None (protection.outlook.com: arm.com does not designate permitted sender hosts)
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_AM4PR0801MB2706EEB884B77C30C508E340FA560AM4PR0801MB2706_"
MIME-Version: 1.0
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-Network-Message-Id: c951ecf8-d69b-4cf9-b3a2-08d5267ac703
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Nov 2017 07:31:50.8786 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM4PR0801MB2708
Archived-At: <https://mailarchive.ietf.org/arch/msg/lwip/ERd7x38VKuHmLbMTpFhPdgrhKVo>
Subject: Re: [Lwip] (on PUFs) Re: [IoT-DIR] Iotdir early review of draft-ietf-lwig-crypto-sensors-04
X-BeenThere: lwip@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Lightweight IP stack <lwip.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/lwip>, <mailto:lwip-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lwip/>
List-Post: <mailto:lwip@ietf.org>
List-Help: <mailto:lwip-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/lwip>, <mailto:lwip-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 Nov 2017 07:31:58 -0000

Thanks for sharing your presentation, Rene.

Do you consider PUFs useful for IoT security? That’s a point I couldn’t really see from your slide deck.

Ciao
Hannes

From: Rene Struik [mailto:rstruik.ext@gmail.com]
Sent: 07 November 2017 15:53
To: Samita Chakrabarti; Hannes Tschofenig
Cc: lwip@ietf.org; draft-ietf-lwig-crypto-sensors.all@ietf.org; ietf@ietf.org; Iot-dir@ietf.org
Subject: (on PUFs) Re: [Lwip] [IoT-DIR] Iotdir early review of draft-ietf-lwig-crypto-sensors-04

Hi Samita, Hannes, et al:

I gave a presentation on physically unclonable functions at NIST key management workshop 5 years ago (see [1]), which explains the main concepts. Please note that the "unique device property" is lost as soon as the PUF f or a deterministically-derived key K=H(f) is exposed (see Slide 6 -- hence, the color coding in "red", not to be exposed material). One needs to do extra tricks, i.e., design a challenge-response protocol that witnesses possession of f without revealing this, to use this for ongoing authentication. There are ways to do this, though.

Best regards, Rene

[1] R. Struik, “Secure Key Storage and True Random Number Generation,” presented at NIST-KMW: NIST Cryptographic Key Management Workshop, Gaithersburg, MD, September 10-11, 2012

Available from https://csrc.nist.gov/csrc/media/events/cryptographic-key-management-workshop-2012/documents/struik_nist_kmw_2012.pdf

On 11/6/2017 11:21 PM, Samita Chakrabarti wrote:
Hi Hannes,
I have not done comparison with other technologies. But as I mentioned that it exists. I like the fact it can generate unique 'intrinsic-id' based on the physical properties of the chip-set. If IOT-DIR folks like to know more, perhaps I can find out if there is a remote presentation and Q&A session possible from the Intrinsic-id folks sometime in the near future. ( Disclaimer: I have no particular interest other than knowing more about the feasibility  of application of that technology) I was thinking that this ID can be used in any mutual authentication protocols ( especially generating the private key). Do you have more information on them or think otherwise ?

Regards,
-Samita

On Mon, Nov 6, 2017 at 1:39 AM, Hannes Tschofenig <Hannes.Tschofenig@arm.com<mailto:Hannes.Tschofenig@arm.com>> wrote:
Hi Samita,

Do you think PUFs are useful authentication technologies for IoT devices?

Ciao
Hannes

-----Original Message-----
From: IoT-DIR [mailto:iot-dir-bounces@ietf.org<mailto:iot-dir-bounces@ietf.org>] On Behalf Of Samita Chakrabarti
Sent: 06 November 2017 10:37
To: Iot-dir@ietf.org<mailto:Iot-dir@ietf.org>
Cc: lwip@ietf.org<mailto:lwip@ietf.org>; ietf@ietf.org<mailto:ietf@ietf.org>; draft-ietf-lwig-crypto-sensors.all@ietf.org<mailto:draft-ietf-lwig-crypto-sensors.all@ietf.org>
Subject: [IoT-DIR] Iotdir early review of draft-ietf-lwig-crypto-sensors-04

Reviewer: Samita Chakrabarti
Review result: Ready with Nits

I have reviewed draft-ietf-lwig-crypto-sensors-04 document for  IOT-Directorate review. The following are my comments:

General : The document is easy reading and informative about current and previous work. It is ready to publish with minor changes based on review comments.

Other comments:
Introduction:
 It might be useful to discuss/clarify that multi-level security may be  important for IOT devices  all the way from 'bootstrapping and management' to  application security. That perhaps can include obtaining IP-addresses  securely, mutual authentication between server and devices , etc. ( see
 https://tools.ietf.org/html/draft-ietf-6lo-ap-nd-03) in those cases where each  device has an IP address.

Section 2:
Regarding problems of provisioning and management of networks for the IOT devices there may be additional issues – 1) different types of IOT devices and the lack of standards way to provision them as they might be talking different RF technologies and running L2 protocols only. 2) The iot nodes may be moving individually or collectively and change networks; identifying the movement of the iot nodes or identifying a particular node at any point of time uniquely requires an intrinsic identification which might be useful to set during bootstrapping of the node

Regarding related work – does it consider IETF IOT security work only? There have been some work and thought process going on regarding blockchain IOT security in the industry. Perhaps that is out-of-scope of this document, but I wanted to mention for authors’ considerations.

Section 5:
Authors of the document may also want to browse a SRAM PUF based technology which provides unique ID based authentication mechanism.
https://www.intrinsic-id.com/intrinsic-id-joins-wi-sun-alliance/

Section 9:
Does the example simulate any particular deployment model or research experiments ? It might be good to clarify that. Section 10 and 11: Looks like section 11 is closely related to section 10. Should they be combined together ?
Else some more text is needed in section 10 on design trade-offs.

Section 13:
Does this document recommend one layer of security to IOT devices ? There are different types of IOT devices – some of them are very tiny and some are more capable. Some definitely benefit for multi-level security  than single layer of security.  L2 security is generally recommended for for all IOT networks. Does data object protection only protect the  application data (payload)  or more ?

Thanks for the initiative in documenting the valuable work in IOT security implementation and crypto comparison. -Samita


_______________________________________________
IoT-DIR mailing list
IoT-DIR@ietf.org<mailto:IoT-DIR@ietf.org>
https://www.ietf.org/mailman/listinfo/iot-dir
IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.





_______________________________________________

Lwip mailing list

Lwip@ietf.org<mailto:Lwip@ietf.org>

https://www.ietf.org/mailman/listinfo/lwip



--

email: rstruik.ext@gmail.com<mailto:rstruik.ext@gmail.com> | Skype: rstruik

cell: +1 (647) 867-5658 | US: +1 (415) 690-7363

IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.