Re: [perpass] Tiny stacks

Richard Barnes <rlb@ipv.sx> Mon, 09 December 2013 23:03 UTC

Return-Path: <rlb@ipv.sx>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2CB7D1A8028 for <perpass@ietfa.amsl.com>; Mon, 9 Dec 2013 15:03:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.377
X-Spam-Level:
X-Spam-Status: No, score=-1.377 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, J_CHICKENPOX_102=0.6, RCVD_IN_DNSWL_LOW=-0.7] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GSPsaB296hNw for <perpass@ietfa.amsl.com>; Mon, 9 Dec 2013 15:03:12 -0800 (PST)
Received: from mail-ob0-f180.google.com (mail-ob0-f180.google.com [209.85.214.180]) by ietfa.amsl.com (Postfix) with ESMTP id B07311AD84D for <perpass@ietf.org>; Mon, 9 Dec 2013 15:03:12 -0800 (PST)
Received: by mail-ob0-f180.google.com with SMTP id wo20so4489852obc.39 for <perpass@ietf.org>; Mon, 09 Dec 2013 15:03:07 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc:content-type; bh=JOJgIBUJ0/U8OW4Yd0zLK/3l8HGbwvTdzYtGoZUyDsI=; b=GahLcB0l8QGkTdl3UB8/G/3B2jApYG1xkpaLgHIi4SM852YuTCbDzON/tI12iEWDcU Mbz7Mq+CLKkDon5MPEFEXKTgOdGxMjB/XTcL1OWmv9IbNhbDsKiV4TxWcEB1BFphgsly zNuVquHyMw/7nNFE8Fb5+TtHNz+uihj5Ict5vE8N/rgYlriHEnobYekNjGXrg+Ne89BY 2T0ZbMFTjbkG0zv7ncHJFUm8zsrGzZw1zuZXbu80DOl/ZH1kFGUqO8ZjNdb7M+WXDvlW GfwnOop+0AKhXNl7jtTJ6A19hXommkeaYdBK0rt/a/nP91ZfDFnSbj78lstkVKhnFjEg arng==
X-Gm-Message-State: ALoCoQnRbpiZbryKJsu+lk4fmrLsM0ZkwtxQPBlwhD3IfCuJAD/Om9hOaCHmN8v/GvQ4rC0IuGjQ
MIME-Version: 1.0
X-Received: by 10.60.146.229 with SMTP id tf5mr14552301oeb.27.1386630187581; Mon, 09 Dec 2013 15:03:07 -0800 (PST)
Received: by 10.60.31.74 with HTTP; Mon, 9 Dec 2013 15:03:07 -0800 (PST)
In-Reply-To: <52A63CF9.7020303@gmail.com>
References: <290E20B455C66743BE178C5C84F1240847E5103799@EXMB01CMS.surrey.ac.uk> <2C66A416-5F07-4803-A4C0-BB61734BA42E@nominum.com> <290E20B455C66743BE178C5C84F1240847E510379A@EXMB01CMS.surrey.ac.uk> <529F7690.2050302@gmx.net> <290E20B455C66743BE178C5C84F1240847E510379C@EXMB01CMS.surrey.ac.uk> <52A1BBBC.9090509@cs.tcd.ie> <290E20B455C66743BE178C5C84F1240847E510379D@EXMB01CMS.surrey.ac.uk> <52A4D7D9.9000603@cs.tcd.ie> <52A4E412.4030804@gmail.com> <72B86100-E73E-46BD-ABD6-8E35D56DBDDA@cisco.com> <52A61E4C.6020403@gmail.com> <52A62E98.2060705@gmx.net> <52A63CF9.7020303@gmail.com>
Date: Mon, 09 Dec 2013 18:03:07 -0500
Message-ID: <CAL02cgRYNNC7Emx=98a621PTPHDweLRTc=wjVhpRo-5yhVD=-Q@mail.gmail.com>
From: Richard Barnes <rlb@ipv.sx>
To: Brian E Carpenter <brian.e.carpenter@gmail.com>
Content-Type: multipart/alternative; boundary="047d7b5d98e9c41aae04ed21ff54"
Cc: perpass <perpass@ietf.org>, Hannes Tschofenig <hannes.tschofenig@gmx.net>, "Stewart Bryant (stbryant)" <stbryant@cisco.com>
Subject: Re: [perpass] Tiny stacks
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Dec 2013 23:03:14 -0000

On Mon, Dec 9, 2013 at 4:58 PM, Brian E Carpenter <
brian.e.carpenter@gmail.com> wrote:

> Hannes,
>
> On 10/12/2013 09:56, Hannes Tschofenig wrote:
> > Many of us are actually thinking about how to get the IP stack on these
> > devices.
> >
> > The IAB had a workshop in 2011 on smart objects and the report can be
> > found here: http://tools.ietf.org/html/rfc6574
> >
> > We then had a workshop specifically dedicated to security in 2012:
> >
> http://tools.ietf.org/html/draft-gilger-smart-object-security-workshop-02
> > (pending publication as an RFC).
>
> Fair enough, but did you consider specifically the privacy and
> surveillance aspects? I'm concerned that counter-measures that can
> be easily incorporated in full size devices may be too heavy for
> tiny devices. If this is not a real concern, I will be delighted
> of course.
>
> And there is the usual problem of converting workshop conclusions
> into WG action.
>

As I recall, the major upshot of the workshop, from a security point of
view, was that (1) security protocols are tough but tractable, and (2) the
really hard problem is the introduction problem.  By which I mean:
Smart/IoT devices are going to, by their nature, talk to something else
(otherwise they wouldn't need connectivity).  The "introduction problem" is
the challenge of telling devices whom they should talk to, and how to
authenticate them, in such a way that doesn't allow an attacker to insert
himself, with the very limited interfaces that IoT devices tend to have.
 At one layer, it's just an authentication / authorization problem, but
it's one that has much more impact on hardware/software configuration than
on protocol.

That is my understanding, at least, of how we arrived at the current state,
where most of the protocol work is focused on making the security protocols
nicer (e.g., CoAP, DICE).  Nobody has found an approach to the introduction
problem that applies everywhere^Wa lot of places.

In point of fact, most of the interesting IoT vulnerabilities we've seen so
far have not been due to either of the above problems, but rather to
manufacturers making stupid decisions that couldn't have been fixed by any
number of RFCs.

--Richard




>     Brian
>
> > There is even an IAB document in development that touches this topic:
> > http://tools.ietf.org/html/draft-iab-smart-object-architecture-03
> > (Comments welcome)
> >
> > [Recent comments indicated that there is a desire to talk more about
> > IPv6, and the transition mechanisms. Great that we worked on so many --
> > will for sure make it easier to fit them all on these devices.]
> >
> > As you know, we even have the IETF LWIG group that discusses these
> issues.
> >
> > If you look at recent events, like the Internet census
> > http://internetcensus2012.bitbucket.org/paper.html, then it should be
> > clear that even "small device" need security since otherwise we are
> > building the next generation botnet. This would not be good (tm).
> >
> > Ciao
> > Hannes
> >
> >
> > On 12/09/2013 07:47 PM, Brian E Carpenter wrote:
> >> On 09/12/2013 11:04, Stewart Bryant (stbryant) wrote:
> >> (on a different list and under a differeny Subject header)
> >> ...
> >>
> >>> Remembering of course that some platforms which wish
> >>> to use the Internet simply do not have the capability for
> >>> other than a very tiny very basic stack.
> >>>
> >>> I always use the PIC and the Arduino to remind myself what the
> >>> lower end of the franchise looks like.
> >> It seems to me that perpass should think a little bit about
> >> privacy and anti-surveillance issues for devices with tiny
> >> stacks, and see if that calls for any specific IETF work items.
> >>
> >>     Brian
> >> _______________________________________________
> >> perpass mailing list
> >> perpass@ietf.org
> >> https://www.ietf.org/mailman/listinfo/perpass
> >
> >
> _______________________________________________
> perpass mailing list
> perpass@ietf.org
> https://www.ietf.org/mailman/listinfo/perpass
>