Re: [Smart] [Secdispatch] New Version Notification for draft-lazanski-smart-users-internet-00.txt

Bret Jordan <jordan.ietf@gmail.com> Mon, 15 July 2019 16:24 UTC

Return-Path: <jordan.ietf@gmail.com>
X-Original-To: smart@ietfa.amsl.com
Delivered-To: smart@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C404C120168 for <smart@ietfa.amsl.com>; Mon, 15 Jul 2019 09:24:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.997
X-Spam-Level:
X-Spam-Status: No, score=-1.997 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, LOTS_OF_MONEY=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vE05Z7M9Ipua for <smart@ietfa.amsl.com>; Mon, 15 Jul 2019 09:24:09 -0700 (PDT)
Received: from mail-pg1-x52e.google.com (mail-pg1-x52e.google.com [IPv6:2607:f8b0:4864:20::52e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2CED812011C for <smart@irtf.org>; Mon, 15 Jul 2019 09:24:09 -0700 (PDT)
Received: by mail-pg1-x52e.google.com with SMTP id m4so7964606pgk.0 for <smart@irtf.org>; Mon, 15 Jul 2019 09:24:09 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:message-id:mime-version:subject:date:in-reply-to:cc:to :references; bh=yHZnHZQT7W1VbBLWQy2PoMdnhJkjmXv/qcHKp6GSFhs=; b=M+5o1SR15lvoyjb0o+2ZWufsaaRpGFuTX1u115CWHkN+4aj7NKKWd/lRqWtVFZqsQ9 AYEttH8RFac2BvsLp0pazt2LHAMhJCFF2WgKJKi9gir5PxuVjfqyHYT5mVIwbJHdPkjh 5Dm3rCf5hSarjxz045+fKI34Jdc9gsExUVmG0acnW06vQnqcCdtHKYlCeD9Pt9SaVVFW 73mL2CvzqXBvgG/faLWoHd4cv8f9T0ThNJDUA+Q2wFadBBO6Xen6WG1yxw0k+Y0/jXxe zEUtGf8ITqY6C70kjFSxRbzVWBROc5sSg9UKxgm6xCwYxKPlGVL+Vl98hWTdcX8bPpD8 7yzw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:message-id:mime-version:subject:date :in-reply-to:cc:to:references; bh=yHZnHZQT7W1VbBLWQy2PoMdnhJkjmXv/qcHKp6GSFhs=; b=CquyWUFYExYsi/NF5b/Lgs9VDiubsSus7tJCd0j6okiJcIXGxlbDT3nR7GwIJwcOjg 1CwJt2u1fTLgRQg/A7qrxGW07NAk4kcbMSTLDVZ0I5hV0GNZQHLYQ5lQ0hEk3HndSNeG 80Q9NZO0vSBV7XYgBEYKCzqzP1D2m2UqFiZTcZfxXHMoT3rdJxUWfnaqjGfDsem2GfjA tagSrIw9UDWloGe6qlccyH+neQNruTZwuWO2ucZtj3DaZ3j7bNa7RrMIxCncplQVRcny uf8bJyqpdp0I5zhBkxJUFwcoU0TwE447rOxURaZwFLtaGx15Qi39DPsfileJcqw3+ujP x2ow==
X-Gm-Message-State: APjAAAVAkKA8NwuRHzAzTZ1g4UJfQpRXmPAo3WXlzEt622eqdQRT1Wi0 Bxj9GzVfRnf9FEh/lzICwf0=
X-Google-Smtp-Source: APXvYqzemOfg7fCJHQZYUL4WDhv2zmEXKYX8+v5EkklN0v1BM1ehnBTQAeXFF/nRxjGjNBFiyOdc7A==
X-Received: by 2002:a63:fd50:: with SMTP id m16mr27471960pgj.192.1563207848687; Mon, 15 Jul 2019 09:24:08 -0700 (PDT)
Received: from ?IPv6:2605:a601:a990:4d00:a925:658c:7e16:1f17? ([2605:a601:a990:4d00:a925:658c:7e16:1f17]) by smtp.gmail.com with ESMTPSA id z2sm15997596pgg.58.2019.07.15.09.24.07 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 15 Jul 2019 09:24:07 -0700 (PDT)
From: Bret Jordan <jordan.ietf@gmail.com>
Message-Id: <57C9DB3F-7694-45F1-A8AF-8BC242CC1383@gmail.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_E2A33079-237E-45BF-8835-D2F9BF6D37BC"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Date: Mon, 15 Jul 2019 10:24:05 -0600
In-Reply-To: <2E98BE46-174B-4423-976C-6EB48A3A714F@cisco.com>
Cc: Phillip Hallam-Baker <phill@hallambaker.com>, smart@irtf.org, Melinda Shore <melinda.shore@nomountain.net>, IETF SecDispatch <secdispatch@ietf.org>
To: Eliot Lear <lear@CISCO.COM>
References: <0A8948DB-F97C-4F68-9173-7E627FB5019C@lastpresslabel.com> <4B10655B-8753-4B10-ACC9-16D7F78AD9F9@gmail.com> <CAMm+Lwh3KW6ZBbMktwmLcKyY8=_ysLYJF_7MsAuiOat6baQ=Kg@mail.gmail.com> <B551EF79-7E6E-4C4E-ADCA-6538F7972222@gmail.com> <CAMm+Lwg+2RFiXK43nJv7pD3OgM8y=ziVYxBkXD3F2kJyz37SxQ@mail.gmail.com> <50E59504-CA00-4792-AA72-FC08051E2486@gmail.com> <CAHbuEH5WUv-a4nKt5YAZosO-vE773Jh3xn1+-hA=4J7RBERc3g@mail.gmail.com> <45cc67f6-3dd4-9788-29e5-4cc82471e6ee@nomountain.net> <9683DFBC-1816-4C0A-8D8A-4CE36318C72C@cisco.com> <d5f05651-849f-4048-3123-8ee17a0c0a96@nomountain.net> <C2AD999E-2B53-4E17-B033-4B722ADFA677@cisco.com> <AC7FADF1-A556-46AF-9A5C-F464AA4772B9@gmail.com> <469416D4-F549-4CAD-9C81-3D4A5A271B6A@cisco.com> <A59918B5-C6B7-4632-B95F-E9AD24C16C96@gmail.com> <CAMm+LwgtM=oYCSgeNAkbRD=TaJe8O750reTQ7s6Ux954Dz=YhQ@mail.gmail.com> <2E98BE46-174B-4423-976C-6EB48A3A714F@cisco.com>
X-Mailer: Apple Mail (2.3445.104.11)
Archived-At: <https://mailarchive.ietf.org/arch/msg/smart/1ErEmOHzkOJOTz23_oZ-c07bWIM>
Subject: Re: [Smart] [Secdispatch] New Version Notification for draft-lazanski-smart-users-internet-00.txt
X-BeenThere: smart@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Stopping Malware And Researching Threats <smart.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/smart>, <mailto:smart-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/smart/>
List-Post: <mailto:smart@irtf.org>
List-Help: <mailto:smart-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/smart>, <mailto:smart-request@irtf.org?subject=subscribe>
X-List-Received-Date: Mon, 15 Jul 2019 16:24:13 -0000

My key points were due to the responses I hear form some in the IETF, specifically

“If you just patched your endpoints there would be no issue”
“All endpoints can easily run security software”



Thanks,
Bret
PGP Fingerprint: 63B4 FC53 680A 6B7D 1447  F2C0 74F8 ACAE 7415 0050
"Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg."

> On Jul 15, 2019, at 10:16 AM, Eliot Lear <lear@CISCO.COM> wrote:
> 
> Phil,
> 
> 
> 
>> On 15 Jul 2019, at 18:03, Phillip Hallam-Baker <phill@hallambaker.com <mailto:phill@hallambaker.com>> wrote:
>> 
>> I am pretty sure this is not security 101 stuff. In fact I am pretty sure that it will be quite a while before the academy really gets to grips with this stuff. They don't have the same biases we do but they have different ones. 
>> 
>> For example, the need to patch systems is brought up and this is almost always seen as a good thing. Not in the process control world it isn't. The problem of unauthorized updates is a very serious concern for them.
> 
> 
> I think I agree with your thesis statement but not your supporting statement above.  There are a great many “best practices” that are coming out, and they all to a one usually involve usernames and passwords for a good number of devices that might not require either.  And in fact, the idea of a password for machine controlled devices is Just Bad.
> 
> Patches themselves from the vendors are absolutely required to be available, but the timing of their installation needs to be left to customers based on when – if at all – those devices can allow for a window where the device may miss a beat.  But even in these cases, process control systems need in service upgrade mechanisms, because the reality is that the bugs will be there.
> 
> 
>> 
>> Devices that automatically update themselves are vulnerable to a denial of service attack by the device provider.
>> 
>> This is not an attack many device providers are worried about because it isn't an attack that is going to affect them (for a start) and they think they can trust themselves. Which may well not be true. I have seen a single employee cause $1 million worth of vandalism after being upset that his wages were being garnished for alimony. I really doubt that more than 5% of the companies that make IoT devices have effective controls.
> 
> Ok, but that is no reason to not have automated updates available.  That is more of a reason to have strong audit processes in place.
> 
>> 
>> The same is true of devices that depend on a tied service. My Revolv hub is useless because Google bought the company and shut down the service leaving me with $2500 worth of dead equipment in my walls.
>> 
>> This is not 101 stuff and in fact I don't think that a single one of the IoT vendors out there is showing that they understand it. We are still at what I call the 'narcissistic' phase of the market in which every medium sized IoT vendor thinks it is all about themselves.
>> 
>> 
>> The fact that an IoT device makes the owner dependent on the provider is totally a security issue. The fact that the device providers don't want to acknowledge it doesn't make it any less so.
> 
> I agree that this is indeed a security issue, but that doesn’t mean that it’s the wrong way to go.  There are other factors to take into consideration, not the least of which is cogs and e-Waste associated with unnecessarily shipping extra horse power to 20 million endpoints when a little elastic processing in the cloud will do.
> 
> Eliot
>