Re: [Secdispatch] EDHOC Summary

"Christopher Wood" <caw@heapingbits.net> Wed, 10 April 2019 01:51 UTC

Return-Path: <caw@heapingbits.net>
X-Original-To: secdispatch@ietfa.amsl.com
Delivered-To: secdispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4B9BB12013F for <secdispatch@ietfa.amsl.com>; Tue, 9 Apr 2019 18:51:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.69
X-Spam-Level:
X-Spam-Status: No, score=-2.69 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, T_FROM_FMBLA_NEWDOM14=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=heapingbits.net header.b=ZTOj1z4Y; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=Sv6579bc
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id axjS2qGtcABm for <secdispatch@ietfa.amsl.com>; Tue, 9 Apr 2019 18:51:36 -0700 (PDT)
Received: from new1-smtp.messagingengine.com (new1-smtp.messagingengine.com [66.111.4.221]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4D8AB12015D for <secdispatch@ietf.org>; Tue, 9 Apr 2019 18:51:36 -0700 (PDT)
Received: from compute6.internal (compute6.nyi.internal [10.202.2.46]) by mailnew.nyi.internal (Postfix) with ESMTP id 90D1314636 for <secdispatch@ietf.org>; Tue, 9 Apr 2019 21:51:35 -0400 (EDT)
Received: from imap4 ([10.202.2.54]) by compute6.internal (MEProxy); Tue, 09 Apr 2019 21:51:35 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=heapingbits.net; h=mime-version:message-id:in-reply-to:references:date:from:to :subject:content-type:content-transfer-encoding; s=fm1; bh=dhz/A YxPECraHgjZyWg1NugLN0pZ7TG7F7XyCawZYqc=; b=ZTOj1z4Y9s64mOIRKv3Lu DNxQpLmJo3zzngvSAT41CRQKX9cm3Ch2rizF69FNl/3Ql2B9zXK+jrT/J2VmM1TQ ZsH26TsRhmN4vvfoPtbdxaDsewypuEySDYo1Vmp/bCRyY280S++3RnzD429bCWGg 5eMfjFBJF51gV2pETfnp6PYXMpfEK7Ts+7xYrXpCqDxKNToMjdwC8rl9hg4Eu8Jm z6A/TMpBbVYIUBNiXUB0ZkD7L0lSYt5W8WTkXLGKHEFcs4JEvBlRN9TnWywzloOx Hhk9sYOkJ4w2P8lPdfShcGYOvO55uc07vKNwwi/EzX6qcH9V7xnNU6OcdRRNqNJR A==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-transfer-encoding:content-type :date:from:in-reply-to:message-id:mime-version:references :subject:to:x-me-proxy:x-me-proxy:x-me-sender:x-me-sender :x-sasl-enc; s=fm2; bh=dhz/AYxPECraHgjZyWg1NugLN0pZ7TG7F7XyCawZY qc=; b=Sv6579bcbi7GRMez6gAEOzCl/MLiorsgpwYKT1rLh0aYfoDlFBFpWMl0z vJGnl3LIVlCPrjzS8o7cuAh+8R1sndrAW7+EvqAFy4blLQ9D8JdgqfycM8CT7UAd +XLfmPhhu4k3SfkD6L82E7Dgq0tK6DOElBY+Ai8verUrZdzIJhrWo8oPkDMoNsvQ P7ytULIAqL9WuIS24flvDKy+fpIYgCoOqYPr5O1ItvBXwE4+X3X4qCHTyEQts+yh givAx+t0Zpmb0rDcYIX4s0bAdd4jSxLhNGDv5x9y50Pfx0dXpAs8FEfqlevKqCBW mD722o7jukfe+v6yDEfZyHUKvjo3g==
X-ME-Sender: <xms:JkytXHSVyUY_9PYOSYKmQ7A5p4B389zpvDvzBhu6DIEeRiDg35Xh3A>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeduuddrudeigdehvdcutefuodetggdotefrodftvf curfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfghnecu uegrihhlohhuthemuceftddtnecunecujfgurhepofgfggfkjghffffhvffutgfgsehtqh ertderreejnecuhfhrohhmpedfvehhrhhishhtohhphhgvrhcuhghoohgufdcuoegtrgif sehhvggrphhinhhgsghithhsrdhnvghtqeenucffohhmrghinhepihgvthhfrdhorhhgne curfgrrhgrmhepmhgrihhlfhhrohhmpegtrgifsehhvggrphhinhhgsghithhsrdhnvght necuvehluhhsthgvrhfuihiivgeptd
X-ME-Proxy: <xmx:JkytXKr79zbOoRD5kZCp4_n_IfLpNdM3h5UqhidKdltPbvd5cLWE_A> <xmx:JkytXMexBlrOwNtmYZtPOVe46DAadN9lTa44dkeB8k6T4Uu1tRXtwQ> <xmx:JkytXDwVxS3xy44BpF0CmdHIOKwnZQ9AvzBeUN-9lOVz3TRA2cQuVQ> <xmx:J0ytXC7c8KbILCQ6PHMLhWO_szynTrFwn2baOUS1_v4J9oeJNAUgzg>
Received: by mailuser.nyi.internal (Postfix, from userid 501) id 6A0892602F; Tue, 9 Apr 2019 21:51:34 -0400 (EDT)
X-Mailer: MessagingEngine.com Webmail Interface
User-Agent: Cyrus-JMAP/3.1.6-329-gf4aae99-fmstable-20190329v1
Mime-Version: 1.0
X-Me-Personality: 94902928
Message-Id: <1bfbef5a-027a-460e-b421-fb4c3a82e583@www.fastmail.com>
In-Reply-To: <721B6044-8DA1-4173-BE73-87D37136DFEE@ericsson.com>
References: <359EC4B99E040048A7131E0F4E113AFC01B3311A9F@marchand> <012a4798-fc70-4b5d-b0da-373221c95d38@www.fastmail.com> <721B6044-8DA1-4173-BE73-87D37136DFEE@ericsson.com>
Date: Tue, 09 Apr 2019 21:51:34 -0400
From: Christopher Wood <caw@heapingbits.net>
To: secdispatch@ietf.org
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/vH-XgK05Z5GuswjDsrF_LUpIVIk>
Subject: Re: [Secdispatch] EDHOC Summary
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Apr 2019 01:51:38 -0000

Hi Göran,

Please see inline below.

On Tue, Apr 9, 2019, at 4:58 AM, Göran Selander wrote:
> Hi Martin,
> 
> Some comments inline.
> 
> On 2019-04-09, 01:18, "Secdispatch on behalf of Martin Thomson" 
> <secdispatch-bounces@ietf.org on behalf of mt@lowentropy.net> wrote:
> 
>     Hi Roman, Ben,
>     
>     I’m a little surprised to see that your conclusion from the meeting 
> we had was so clear. The summary shared at the end of the meeting 
> highlighted the need to clarify the scope and nature of the 
> requirements. There has been some discussion on the list on this 
> subject, but I haven’t seen anything that indicates consensus around 
> the problem statement.
> 
> [GS] There seems to be consensus on the summary provided by the 
> Security ADs, which includes the problem statement.
> 
>     The framing of this summary seems to imply that the goal is to work 
> on EDHOC.  That seems premature.  There seems to be agreement that the 
> authenticated key exchange (AKE) protocols we have are inefficient in 
> ways that affect these deployments. That doesn’t naturally imply that 
> EDHOC is a solution, only that there is a need to have an efficient AKE 
> protocol.
> 
> [GS] There is no competing solution to the problem statement. As been 
> witnessed, people have waited for years for this to progress. Therefore 
> I don't see anything premature with assuming EDHOC to be a starting 
> point for the WG. 
> 
>     “As cheap as possible” is not a problem statement that is 
> sufficiently precise to be acted upon.  For example, the analysis for 
> LoRaWAN seemed to support the conclusion that ANY key exchange protocol 
> would fail badly, no matter how small, fast, or efficient.  For 
> deployments with capabilities that might support an AKE, we have no 
> grounds for determining whether 5nJ or 1 octet difference is acceptable 
> or not. Concrete objectives - ideally targets with numbers - are needed 
> if we’re to assess solutions.
>    
> [GS] Concrete targets with numbers have been presented, for example here:
> https://mailarchive.ietf.org/arch/msg/secdispatch/vNR7nT20fsvYjYXhAPjOpLjZGCU
> 
>     Even assuming that requirements are settled, I believe that there 
> are considerations that go beyond the narrow definition of the problem 
> statement. In the recent review of the T2TRG, I was reminded of their 
> goal:
>     
>     > The Thing-to-Thing Research Group (T2TRG) will investigate open 
> research issues in turning a true "Internet of Things" into reality, an 
> Internet where low-resource nodes ("things", "constrained nodes") can 
> communicate among themselves and with the wider Internet, in order to 
> partake in permissionless innovation.
>     
>     Though a little wordy, I think that this is a fine goal to keep in 
> mind.  Deciding to create a working group specifically for EDHOC makes 
> a determination directly in opposition to this goal.  We’ve made 
> similar choices for application protocols like CoAP.  For CoAP, the 
> agreed fix was gateways and proxies.  For a security protocol, that is 
> not an option if you value end-to-end security.
>    
> [GS] A lightweight AKE on application layer, which this specific WG is 
> proposed to work on, is actually a missing enabler for constrained 
> nodes to  "communicate among themselves and with the wider Internet". 
> Indeed, if the security protocol is too heavy or needs to terminate in 
> a gateway due to change of transport etc., then end-to-end secure 
> communication between the endpoints will not take place, thus 
> preventing "to partake in permissionless innovation".  
> 

If what’s missing is a lightweight AKE protocol, then shouldn’t the purpose of this WG be to first identify what lightweight means? To reiterate (my understanding of) Martin’s point, it seems the requirements do not have consensus, and therefore choosing a specific AKE is a bit premature. It seems prudent to first get a shared understanding of the problem space and requirements before we trim the solution space.

Best,
Chris