Re: [Secret] Follow up on Michael's Comments

Matthew Byington <mbyington@apple.com> Thu, 10 March 2022 21:59 UTC

Return-Path: <mbyington@apple.com>
X-Original-To: secret@ietfa.amsl.com
Delivered-To: secret@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6D6243A1C63 for <secret@ietfa.amsl.com>; Thu, 10 Mar 2022 13:59:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.11
X-Spam-Level:
X-Spam-Status: No, score=-2.11 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=apple.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id j6w-zuHxN2S4 for <secret@ietfa.amsl.com>; Thu, 10 Mar 2022 13:59:47 -0800 (PST)
Received: from rn-mailsvcp-ppex-lapp34.apple.com (rn-mailsvcp-ppex-lapp34.rno.apple.com [17.179.253.43]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DB6713A096C for <secret@ietf.org>; Thu, 10 Mar 2022 13:59:46 -0800 (PST)
Received: from pps.filterd (rn-mailsvcp-ppex-lapp34.rno.apple.com [127.0.0.1]) by rn-mailsvcp-ppex-lapp34.rno.apple.com (8.16.1.2/8.16.1.2) with SMTP id 22ALu2nJ016207; Thu, 10 Mar 2022 13:59:45 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=apple.com; h=from : message-id : content-type : mime-version : subject : date : in-reply-to : cc : to : references; s=20180706; bh=WVMtNusFL+0uRVthg9lqoF1kwN98X+R6OR958dJ/2gU=; b=Ui4Ebd74WN5p3KaWrrhizcbO1CPJkucTVFNV/imw/p6xWGpkr0JSSBaTcnVnbwPI/kms t9FR/Gb6R1YatqHpxievv+sUf0wAWzl+CwztyULcK5UBDwHo6XyRU2QvjSehMAKgNA7u sTBSLNWO1obsOyx+WJc0WUxUV36p8THN+Tv+/k9+WhC5HZJmzqt1lm0re8DUbLc8LCpT 71BBLWkSnAx1p4rnpt6AMrvycB91gNGQWutIUk3IwWS+oIbLjFUc5VqCVYYXrJDy782p ZtbNm77h+ZlpV5oUDVeOH+oCg2BocCcIbC539dBpN7NAmTHZq+aYmGdyv/YU4m9gI6ab Mg==
Received: from rn-mailsvcp-mta-lapp02.rno.apple.com (rn-mailsvcp-mta-lapp02.rno.apple.com [10.225.203.150]) by rn-mailsvcp-ppex-lapp34.rno.apple.com with ESMTP id 3emrhn0hm5-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Thu, 10 Mar 2022 13:59:45 -0800
Received: from rn-mailsvcp-mmp-lapp04.rno.apple.com (rn-mailsvcp-mmp-lapp04.rno.apple.com [17.179.253.17]) by rn-mailsvcp-mta-lapp02.rno.apple.com (Oracle Communications Messaging Server 8.1.0.12.20210903 64bit (built Sep 3 2021)) with ESMTPS id <0R8J00RNNUFL1GE0@rn-mailsvcp-mta-lapp02.rno.apple.com>; Thu, 10 Mar 2022 13:59:45 -0800 (PST)
Received: from process_milters-daemon.rn-mailsvcp-mmp-lapp04.rno.apple.com by rn-mailsvcp-mmp-lapp04.rno.apple.com (Oracle Communications Messaging Server 8.1.0.12.20210903 64bit (built Sep 3 2021)) id <0R8J00X00UCWH200@rn-mailsvcp-mmp-lapp04.rno.apple.com>; Thu, 10 Mar 2022 13:59:45 -0800 (PST)
X-Va-A:
X-Va-T-CD: 4f730284dbb5a82fcc8b1e5c2a0835df
X-Va-E-CD: 9ce4f09d0ff8dddcecc0d71733f2c75a
X-Va-R-CD: 69c38437f2c93a737410e18d640ad0dd
X-Va-CD: 0
X-Va-ID: 43226f34-533b-444b-ab70-1dce6c3db303
X-V-A:
X-V-T-CD: 4f730284dbb5a82fcc8b1e5c2a0835df
X-V-E-CD: 9ce4f09d0ff8dddcecc0d71733f2c75a
X-V-R-CD: 69c38437f2c93a737410e18d640ad0dd
X-V-CD: 0
X-V-ID: ba2d4b50-02db-43f4-a2ef-fe440ab4242a
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.425, 18.0.816 definitions=2022-03-10_09:2022-03-09, 2022-03-10 signatures=0
Received: from smtpclient.apple (unknown [17.149.230.248]) by rn-mailsvcp-mmp-lapp04.rno.apple.com (Oracle Communications Messaging Server 8.1.0.12.20210903 64bit (built Sep 3 2021)) with ESMTPSA id <0R8J006JBUFL7L00@rn-mailsvcp-mmp-lapp04.rno.apple.com>; Thu, 10 Mar 2022 13:59:45 -0800 (PST)
From: Matthew Byington <mbyington@apple.com>
Message-id: <B1F29D2E-7151-48BF-87A8-E2C1EE18447E@apple.com>
Content-type: multipart/alternative; boundary="Apple-Mail=_266D9E5E-C9EA-42BE-BA12-8B42DBF60BF0"
MIME-version: 1.0 (Mac OS X Mail 14.0 \(3654.120.0.1.13\))
Date: Thu, 10 Mar 2022 13:59:44 -0800
In-reply-to: <23028.1646500005@localhost>
Cc: secret@ietf.org
To: Michael Richardson <mcr+ietf@sandelman.ca>
References: <E527F102-93E5-439B-836B-695039E6E416@apple.com> <23028.1646500005@localhost>
X-Mailer: Apple Mail (2.3654.120.0.1.13)
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.425, 18.0.816 definitions=2022-03-10_09:2022-03-09, 2022-03-10 signatures=0
Archived-At: <https://mailarchive.ietf.org/arch/msg/secret/Wcixies0lTBOHd2GmbvaQWIGd4E>
Subject: Re: [Secret] Follow up on Michael's Comments
X-BeenThere: secret@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Secure Credential Transfer <secret.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secret>, <mailto:secret-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secret/>
List-Post: <mailto:secret@ietf.org>
List-Help: <mailto:secret-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secret>, <mailto:secret-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 Mar 2022 21:59:52 -0000

Hi Michael,

Thank you for your feedback, questions and comments.

Here is a link to the CCC:
https://carconnectivity.org/digital-key/ <https://carconnectivity.org/digital-key/>

Referring to the name, I do believe Francesca and other ADs are working on changing the name away from “SECRET”.

I wasn’t sure exactly how much information should go into the Charter - but I can look at revising it a bit if you think it’s still unclear.

I do think some of the answers to your questions, and discussion points around them, might be better suited for the Working Group rather than informally over email.

In the case of a symmetric transfer such as an HID credential, we’d be transferring a set of data generated by HID that acts as a “voucher” of sorts.

This would be transferred from sender to recipient and then the recipient would “redeem” that with HID for a real, newly minted credential.

I think we can certainly go into additional detail on the WG, once it’s established. It’s challenging to discuss over email.

Thanks
Matt

> On Mar 5, 2022, at 9:06 AM, Michael Richardson <mcr+ietf@sandelman.ca> wrote:
> 
> 
> Please know that I'm not hostile to this work occuring.
> I just don't want to confuse people about the goals.
> (Although I really don't like the choice of BOF name)
> 
> I'm please to learn that there are protocols like SCP03, and that they handle
> delegation.  This is sorely missing in what people see today iin IoT.
> 
> I'd love to have an overview talk at IOTOPS about SCP03 and the CCC
> automotive credential protocol.
> 
> Matthew Byington <mbyington@apple.com> wrote:
>> An example of an asymmetric credential would be digital car key
>> credentials adhering to the CCC standard, or asymmetric credentials
>> used in Home or MFH (multi-family home) that adhere to the ISO18013
>> open standard.
> 
> Could you please cite the specific CCC document involved?
> ISO18013 is not publically available.
> 
>> In _no_ circumstance shall a private key, nor a symmetric secret key,
>> ever, ever be transferred to anyone else.
> 
> ...
>> In these cases, to your point, the third party would absolutely have to
>> issue the credential for the intended recipient.
> 
> So, how are we involved at all?
> 
>> The transfer protocol that we endeavor to standardize would simply facilitate that.
> 
> What would we be transfering, in a symmetric key case, where HID has to issue
> the credential?
> 
>> I don’t want to get into the solutioning here too much (let’s save that
>> for the WG) but you can almost think about it like:
> 
>> 1) Sender (with existing provisioned credential from remote credential
>> authority) asks the RCA for a “bearer token”
> 
> While one can implement Bearer Tokens as indexes into database (instead of a
> key that decrypts something like a Kerberos Ticket), by their nature, they
> have all the privacy implications of symmetric keys.
> 
>> 2) RCA issues bearer token (could be a signed piece of data, could be a
>> UUID, etc) and on their backend, ties that to the access rights/levels
>> specific to a subset of what the sender has, based on the sender’s
>> existing rights and the sender’s desired rights for the recipient
> 
>> 3) The RCA returns this BT to the sender.
>> 4) The sender sends this BT to the receiver thru the transfer protocol we’d define in the WG
>> 5) The recipient calls the credential authority and “redeems” this for
>> a valid provisioned credential with key material completely separate
>> from the sender’s.
> 
> This sure sounds a lot like OAUTH2 to me :-)
> Perhaps it would all work better if we explicitely used the terminology from
> OAUTH2.
> 
>> The security of (5) is well-established today with protocols like JCOP
>> platform running on a  device, SCP03 (secure channel protocol
>> encryption) etc etc that exist on most mobile devices today. That is
>> completely out of the scope of the transfer work flow.
> 
> Okay, then I think that we need some high-level explanation of these
> protocols.  I'd like to see the charter reference them with "such as..."
> 
> --
> Michael Richardson <mcr+IETF@sandelman.ca>   . o O ( IPv6 IøT consulting )
>           Sandelman Software Works Inc, Ottawa and Worldwide
> 
> 
> 
> 
> -- 
> Secret mailing list
> Secret@ietf.org
> https://www.ietf.org/mailman/listinfo/secret