Re: [Secdispatch] [lamps] IDevID considerations document to secdispatch

"Brockhaus, Hendrik" <hendrik.brockhaus@siemens.com> Wed, 22 July 2020 08:14 UTC

Return-Path: <hendrik.brockhaus@siemens.com>
X-Original-To: secdispatch@ietfa.amsl.com
Delivered-To: secdispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 135773A0FB0; Wed, 22 Jul 2020 01:14:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=siemens.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WlxnmTB8axRK; Wed, 22 Jul 2020 01:14:24 -0700 (PDT)
Received: from EUR04-HE1-obe.outbound.protection.outlook.com (mail-eopbgr70070.outbound.protection.outlook.com [40.107.7.70]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4DFF83A0FAF; Wed, 22 Jul 2020 01:14:24 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=WNLwrt4Wykme5oXH1prRcNs0vYOOjhIqde5U4lU6yyyd+bqPYnww0VdDCSMhAOmKXQMXGkiP4UTS4DYUvPGcY2YJOJpAzr9Jz0lplatFgGuuny15I/1ez0Fu8xxMWxnnMYD8YRpjPhsx42bhU6b+VmkCV+uKZSsutW2lSAbvq/dIkSGT2rn75kY/9Yk/PuuTPp0V0YW+1dcNdDeNOwDwcQjlh6orYCvxrpVVIEIa+OH/bAD02YnXmAa+9M8tt1Joc32VQ7OsFHwyLWF275RgMP+DyNhL7qs5q93YnvwEc0YpHYsUhnan+BEekZoym0g3zF5Vob3DnnXHTX98skwEUw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=SbdlfhpJYCYGsQQcuUTjQUQT+W12VkpY+HdlNyN70AI=; b=hCvYpNtEjvedDWSr//vIB5C6mpeoZCbu7R2hlrAYMHJPIF89Keg49oI27jNCq36G1KCtJW6g5QcXoWVZNWdo0X/h/cFZyJfeDBQ2eXdPp8ttTCuYhdC+gwChF11dQu5BN0X5IJUTGgezwl9mhjP78MaJLGrl5EG0SPo0hyNtYd3S6ZtUa8qxfd//wMz0l8OQ2AB5+uU2LVRqNPmpB8ZMoHLSPnUASc6KvV8V/PewiR/X++Ygf7os98SADTP8MOrJyCUliaFX5ZCHoFa75sXfse/3vx2BkW58k+6Wby253DRMPRSAdFY7ZPLeH6b40LS8a17HwCsHfA+z1ahijQYFkA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=siemens.com; dmarc=pass action=none header.from=siemens.com; dkim=pass header.d=siemens.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=siemens.onmicrosoft.com; s=selector1-siemens-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=SbdlfhpJYCYGsQQcuUTjQUQT+W12VkpY+HdlNyN70AI=; b=icXjQhb/EJXM+eGHQ+/k0MOSX6w46CAv0nViK7zKblD/8So7kxgApWdVAjt3kAPbeeq/pv5gVIASwAJOmdola7qZSquRvmDWPvJoDcgLHjLuU5IV6sqOVUvkIi7UBhCD0SsYAvommTeISEbwW+ze1OHg/4dl4S9hhljO3/QcfeM=
Received: from AM0PR10MB3153.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:208:184::10) by AM0PR10MB2787.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:208:132::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3216.20; Wed, 22 Jul 2020 08:14:20 +0000
Received: from AM0PR10MB3153.EURPRD10.PROD.OUTLOOK.COM ([fe80::288b:3b52:cf90:8fc0]) by AM0PR10MB3153.EURPRD10.PROD.OUTLOOK.COM ([fe80::288b:3b52:cf90:8fc0%9]) with mapi id 15.20.3195.028; Wed, 22 Jul 2020 08:14:20 +0000
From: "Brockhaus, Hendrik" <hendrik.brockhaus@siemens.com>
To: Michael Richardson <mcr+ietf@sandelman.ca>
CC: "secdispatch@ietf.org" <secdispatch@ietf.org>, "spasm@ietf.org" <spasm@ietf.org>, Tomas Gustavsson <tomas.gustavsson@primekey.com>
Thread-Topic: [lamps] IDevID considerations document to secdispatch
Thread-Index: AQHWP8N6k88ddaiq9U6Bs/QsBzthBajTsr2AgAV/EICAFWp0gIAApgFAgCOoroCAAJIagA==
Date: Wed, 22 Jul 2020 08:14:20 +0000
Message-ID: <AM0PR10MB315347FF0554C276E0DCB26EFE790@AM0PR10MB3153.EURPRD10.PROD.OUTLOOK.COM>
References: <159176190855.9169.7350787463977998504@ietfa.amsl.com> <10463.1591763623@localhost> <13107.1591804306@localhost> <f7cdd360-7ab7-28f6-86b9-9f8c4ae04aaf@primekey.com> <5843.1591897975@localhost> <092308c1-dc44-4989-e3a5-1a248a3c361e@primekey.com> <20595.1593377487@localhost> <AM0PR10MB2402FCE1BA25F3AB06F52282FE6E0@AM0PR10MB2402.EURPRD10.PROD.OUTLOOK.COM> <19437.1595373505@localhost>
In-Reply-To: <19437.1595373505@localhost>
Accept-Language: de-DE, en-US
Content-Language: de-DE
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_a59b6cd5-d141-4a33-8bf1-0ca04484304f_ActionId=e01786dd-8b4d-436f-b3f0-0000287cb7ac; MSIP_Label_a59b6cd5-d141-4a33-8bf1-0ca04484304f_ContentBits=0; MSIP_Label_a59b6cd5-d141-4a33-8bf1-0ca04484304f_Enabled=true; MSIP_Label_a59b6cd5-d141-4a33-8bf1-0ca04484304f_Method=Standard; MSIP_Label_a59b6cd5-d141-4a33-8bf1-0ca04484304f_Name=restricted-default; MSIP_Label_a59b6cd5-d141-4a33-8bf1-0ca04484304f_SetDate=2020-07-22T08:01:20Z; MSIP_Label_a59b6cd5-d141-4a33-8bf1-0ca04484304f_SiteId=38ae3bcd-9579-4fd4-adda-b42e1495d55a;
x-document-confidentiality: NotClassified
authentication-results: sandelman.ca; dkim=none (message not signed) header.d=none;sandelman.ca; dmarc=none action=none header.from=siemens.com;
x-originating-ip: [165.225.200.158]
x-ms-publictraffictype: Email
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: 3c8c4795-9433-4be2-b801-08d82e173c75
x-ms-traffictypediagnostic: AM0PR10MB2787:
x-microsoft-antispam-prvs: <AM0PR10MB2787BF13CEC083232F69F61BFE790@AM0PR10MB2787.EURPRD10.PROD.OUTLOOK.COM>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: E2GGaBiS9A/JRbNEukF1eoHTEcAFgJDxnLW0zQYoSMvfxwmayHwrzo7ujSG/ND8kldo6kDBjFpxSjOeCrfL3qCtCn61cXjkbtK+ewsEuvtPH/d1MxyyYDpo8TwXpMag/jf7GnyyzjxaeKorRdcgGicqD/Cmd542RQpkOCokBlUjxMfc5HWO30rCmPPQ99jw6b+9qFQ4JIh9vhNu8u3kKd6de0VZkNcwqgbM+XLZD2M7IhVZkGvKxNhn/qzgxRJXSlrYpjEsTE6btouqclHN8nmOui07B7HiCY4SbH7vPDRVQHbVDjqrk6gQ78xKZyyVbVdFch7OqGcCycLVDz4CQ16DHEtZhmRDFCY5F0Wh/+v/JOVgie8bhzhgfLHc4tagGenWaAAiOcR9GCwpqwQOKrg==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AM0PR10MB3153.EURPRD10.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFTY:; SFS:(4636009)(136003)(346002)(376002)(366004)(396003)(39860400002)(55016002)(9686003)(8676002)(478600001)(186003)(55236004)(52536014)(66446008)(7696005)(66556008)(6506007)(66476007)(64756008)(83380400001)(76116006)(66946007)(316002)(26005)(33656002)(15974865002)(54906003)(8936002)(5660300002)(4326008)(2906002)(86362001)(71200400001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: siemens.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: AM0PR10MB3153.EURPRD10.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: 3c8c4795-9433-4be2-b801-08d82e173c75
X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Jul 2020 08:14:20.5552 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 38ae3bcd-9579-4fd4-adda-b42e1495d55a
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: OtfCidSDhn8oHtKmwO1SAkKf8K0p/rR2r/H1DB3BvQGL6I3TXf71AGeUc9oP8rWtsWtUTb5cyDibQuLXvJQ6nXoIMeNs42Evb1KlBFauJY0=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR10MB2787
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/LzmTj6FewpJRjZOYzGffj4zaXag>
Subject: Re: [Secdispatch] [lamps] IDevID considerations document to secdispatch
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 22 Jul 2020 08:14:30 -0000

> Von: Michael Richardson <mcr+ietf@sandelman.ca>
> 
> Brockhaus, Hendrik <hendrik.brockhaus@siemens.com> wrote:
>     >> In particular, the self-generated (_invivo_) key suffers because the device
>     >> needs to do a write/read operation from the infrastructure.  That involves
> the
>     >> highest possible latency for interaction with the CA and therefore would
> slow
>     >> the assembly line the most.
> 
>     > We make use of the key-pair generated on the fly on the device and do
>     > not see major delay on the manufacturing line due to CA communication.
> 
> I hear this complaint as heresay, and I have yet to hear it directly from
> someone who would know.  They always seem two or three layers of
> indirection away.  I would be very happy to kill this issue as a non-issue.
> I'm aware of a major VoIP phone supplier whose CA is on a different continent,
> and it's not an issue.

We make used of a CA across continents for some years now and it works fine.

> 
>     > Finally it is a question of how you arrange your manufacturing
>     > procedures. If you experience delay due to waiting for the certificate
>     > delivery, you can do other meaningful things in the meantime.
> 
> yes, that's certainly true, but it also take some interactions among different
> layers.
> 
>     >> The invitro and shared-secret methods allows the infrastructure to
> generate a
>     >> few keys in advance (and get them signed, assigning DN-serialNumber at
> the
>     >> same time), and then injecting that key via JTAG at the same time as the
>     >> firmware.  This overlaps the CA interaction with other steps.
> 
>     > Finally this method puts higher security burden on the manufacturing
>     > infrastructure to securely handle the pre-generated key pairs. This is
>     > why I do not like it, but sometimes it is needed.
> 
> The -02 version of the document cites:
>               "Factoring RSA keys from certified smart cards:
>               Coppersmith in the wild", September 2013,
>               <https://core.ac.uk/download/pdf/204886987.pdf>.
> 
> for a story of not-quite-random-enough issues!

For smart card production the pre-generation of keys is often used. Especially if RSA keys are required.
Key generation for RSA keys is much slower and duration is unpredictable, compared to generating ECC keys.
Actually I mainly see ECC keys on embedded devices today. Today the required key length for long term used RSA keys gets inacceptable, as ECC keys key length is still acceptable. See section 4.6 in www.ecrypt.eu.org/csa/documents/D5.4-FinalAlgKeySizeProt.pdf

- Hendrik