Re: [Secdispatch] EDHOC Summary

Hannes Tschofenig <Hannes.Tschofenig@arm.com> Thu, 18 April 2019 12:20 UTC

Return-Path: <Hannes.Tschofenig@arm.com>
X-Original-To: secdispatch@ietfa.amsl.com
Delivered-To: secdispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E1B65120300 for <secdispatch@ietfa.amsl.com>; Thu, 18 Apr 2019 05:20:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id C45HW8n4TR15 for <secdispatch@ietfa.amsl.com>; Thu, 18 Apr 2019 05:20:55 -0700 (PDT)
Received: from EUR03-VE1-obe.outbound.protection.outlook.com (mail-ve1eur03on0608.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe09::608]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 16077120052 for <secdispatch@ietf.org>; Thu, 18 Apr 2019 05:20:54 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector1-arm-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=aAxobwUpzDDHAfM24YLLHb7KHRNoZBjcN6fAP1WyNJg=; b=n7B9P0AY4J2alFrSjmAywBgCXJ1Om/jUUTcDOUVsg499fjODL6WwwY2XLtgsnBa2BaElUGutfLsIlfBHDghAxy//Wb1hWevPw0I86B3DvNBiMwX11kA/oZf7ZXGDwhlRLt9IoWlpreiQyu5kwRax35s+flEgToj56DLPES4wwd4=
Received: from AM6PR08MB3686.eurprd08.prod.outlook.com (20.178.91.22) by AM6PR08MB4739.eurprd08.prod.outlook.com (10.255.97.78) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1813.11; Thu, 18 Apr 2019 12:20:51 +0000
Received: from AM6PR08MB3686.eurprd08.prod.outlook.com ([fe80::7025:fc8a:7d0a:cb91]) by AM6PR08MB3686.eurprd08.prod.outlook.com ([fe80::7025:fc8a:7d0a:cb91%3]) with mapi id 15.20.1813.011; Thu, 18 Apr 2019 12:20:51 +0000
From: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
To: Göran Selander <goran.selander@ericsson.com>, "Owen Friel (ofriel)" <ofriel@cisco.com>, Richard Barnes <rlb@ipv.sx>, Michael Richardson <mcr+ietf@sandelman.ca>
CC: Carsten Bormann <cabo@tzi.org>, "secdispatch@ietf.org" <secdispatch@ietf.org>, Martin Thomson <mt@lowentropy.net>
Thread-Topic: [Secdispatch] EDHOC Summary
Thread-Index: AQHU9bryBp4FMEo1v0OmeS0uE21muKZBv2TQgAA2YwD//97IsA==
Date: Thu, 18 Apr 2019 12:20:51 +0000
Message-ID: <AM6PR08MB3686F22C994D48D399033701FA260@AM6PR08MB3686.eurprd08.prod.outlook.com>
References: <8BCAAD78-74D7-414C-82B2-EFB98D711D1E@ericsson.com> <AM6PR08MB36860F9597EBB248142E357EFA260@AM6PR08MB3686.eurprd08.prod.outlook.com> <2C9EADDC-2221-4321-9DE1-688DD7F97D34@ericsson.com>
In-Reply-To: <2C9EADDC-2221-4321-9DE1-688DD7F97D34@ericsson.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Hannes.Tschofenig@arm.com;
x-originating-ip: [80.92.121.58]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: ff13daea-e62f-4838-edf6-08d6c3f84c36
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(5600141)(711020)(4605104)(4618075)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(2017052603328)(7193020); SRVR:AM6PR08MB4739;
x-ms-traffictypediagnostic: AM6PR08MB4739:
x-microsoft-antispam-prvs: <AM6PR08MB47391127AF460E83EC481D70FA260@AM6PR08MB4739.eurprd08.prod.outlook.com>
x-forefront-prvs: 0011612A55
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(136003)(39860400002)(396003)(346002)(366004)(376002)(40434004)(189003)(199004)(476003)(66574012)(66066001)(97736004)(6246003)(76176011)(86362001)(229853002)(81166006)(8936002)(72206003)(9686003)(55016002)(81156014)(6436002)(110136005)(14454004)(7696005)(99286004)(478600001)(54906003)(8676002)(71200400001)(68736007)(71190400001)(53936002)(7736002)(305945005)(186003)(74316002)(446003)(256004)(5024004)(14444005)(316002)(26005)(25786009)(4326008)(102836004)(6506007)(11346002)(3846002)(33656002)(486006)(5660300002)(6116002)(2906002)(52536014); DIR:OUT; SFP:1101; SCL:1; SRVR:AM6PR08MB4739; H:AM6PR08MB3686.eurprd08.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: arm.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: PdpC2pnkGfoOeid+jdfYEoty+NpTS7aVWX94dUSSIPw64ooAOHzgcUJ2ywLTYJb/6mi4OlF5P2KVd+ZU3xoTXNnniMyTCEvZM25F4j2g08lKVwVW81yoVA1GW9BERySPaXojYC0Sqlv8zrvvB4JQJYryzpfcZXh81G4mtfXMxV40EhJJmLVe+JHPXLqZB0j2ZIpXTEgcpZPsyH0Xnf2JaBWB5pNOYf1ejHuOyXVuCJ+ItUVUUr4VFfrpI1PL9CxDybROYZuL7ln5c2sGu7Z9eBUOr4/QofrmnCIiriTVwajz296W61gugve4glswuvybYRqj1M9eJQ1CGsvMn3nRMBsjMmwMYGcHe/ELyydMa07QLMcq7k+AxX28DVxnklmO5uhlN3w+Z5eqfPnZdYAu/eBvdg7I5ttQ/noffEdIshk=
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-Network-Message-Id: ff13daea-e62f-4838-edf6-08d6c3f84c36
X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Apr 2019 12:20:51.5846 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB4739
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/ZdrkNgb4pIyZnkIy4PmnU_W_k0M>
Subject: Re: [Secdispatch] EDHOC Summary
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 18 Apr 2019 12:20:58 -0000

Hi Goeran,


Hi Hannes,

On 2019-04-18, 13:01, "Hannes Tschofenig" <Hannes.Tschofenig@arm.com> wrote:

    Hi Goeran,

     [GS] The AKE for OSCORE clearly must support the same transport as OSCORE.

    No, it doesn't.

[GS] Strike "clearly", this is a requirement coming from use cases implementing OSCORE and in need for an AKE.

[Hannes] I don't see where this requirement comes from. From the DTLS/TLS experience I have seen several solutions in the IETF where the handshake was separate from the protection of the data.
It wasn't a problem there...

I actually see advantages if we untangle it from the transport because we keep inventing new transports. FWIW I see QUIC as a new transport as well and one that has not been explored enough in the IoT space.

    > From first individual submission to the approved version of OSCORE, the introduction section states that OSCORE may or may not be used over TLS/DTLS.
    > (The approved version recommends the use of additional TLS for certain hops, but not over constrained networks.)
    You see what I am talking about...

[GS] No.

[Hannes] First you say "it may be used over TLS/DTLS" even in the draft. Later, you add that it shouldn't be done over constrained networks. I am sure I can dig out meeting meetings where you deny that OSCORE/EDHOC are in any competition to TLS/DTLS.


    > OSCORE/AKE over TLS is similar to TLS over IPsec/IKEv2.
    You know that nobody uses IPsec / IKEv2 in an IoT context (even though some of your co-workers even argued for it some time ago).

[GS] The analogy I wanted to make is that security protocols may be applied at multiple layers on a particular leg of a communication path.
This has nothing to do with IoT context.

[Hannes] But it was a good example because back then I was also the only one voicing concerns about the large number of security options we provide in the IoT space. It seems that you agree with me in the meanwhile. More options does not necessarily lead to better interoperability.

Ciao
Hannes


Göran



IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.