[smartpower-interest] [Fwd: Re: NIST_PAP_01-IP_in_Smart_Grid_v.1.0-Oct_30th_2009]
Ed Jankiewicz <edward.jankiewicz@sri.com> Wed, 17 February 2010 19:44 UTC
Return-Path: <edward.jankiewicz@sri.com>
X-Original-To: smartpower-interest@core3.amsl.com
Delivered-To: smartpower-interest@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix)
with ESMTP id 3D5BC3A71FA for <smartpower-interest@core3.amsl.com>;
Wed, 17 Feb 2010 11:44:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.913
X-Spam-Level:
X-Spam-Status: No, score=-0.913 tagged_above=-999 required=5 tests=[AWL=-1.133,
BAYES_00=-2.599, HELO_MISMATCH_COM=0.553, J_CHICKENPOX_23=0.6,
SARE_FWDLOOK=1.666]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com
[127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mBPdks7xFmer for
<smartpower-interest@core3.amsl.com>; Wed, 17 Feb 2010 11:44:44 -0800 (PST)
Received: from mail1.sri.com (srimail.SRI.COM [128.18.30.17]) by
core3.amsl.com (Postfix) with ESMTP id C0EBA3A785D for
<smartpower-interest@ietf.org>; Wed, 17 Feb 2010 11:44:44 -0800 (PST)
MIME-version: 1.0
Content-transfer-encoding: 7BIT
Content-type: text/plain; CHARSET=US-ASCII; format=flowed
Received: from [192.168.1.2] ([unknown] [71.0.230.5]) by mail.sri.com (Sun
Java(tm) System Messaging Server 7u2-7.05 32bit (built Jul 30 2009)) with
ESMTPSA id <0KY00025S49AK4A0@mail.sri.com> for smartpower-interest@ietf.org;
Wed, 17 Feb 2010 11:46:23 -0800 (PST)
Message-id: <4B7C4798.7040205@sri.com>
Date: Wed, 17 Feb 2010 14:46:32 -0500
From: Ed Jankiewicz <edward.jankiewicz@sri.com>
User-Agent: Thunderbird 2.0.0.23 (Windows/20090812)
To: smartpower-interest@ietf.org
X-Mailman-Approved-At: Wed, 17 Feb 2010 11:47:50 -0800
Subject: [smartpower-interest] [Fwd: Re:
NIST_PAP_01-IP_in_Smart_Grid_v.1.0-Oct_30th_2009]
X-BeenThere: smartpower-interest@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Smart Power Interest <smartpower-interest.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/smartpower-interest>,
<mailto:smartpower-interest-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/smartpower-interest>
List-Post: <mailto:smartpower-interest@ietf.org>
List-Help: <mailto:smartpower-interest-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/smartpower-interest>,
<mailto:smartpower-interest-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Feb 2010 19:44:46 -0000
FYI some support I posted to NIST based on Fred's comments -------- Original Message -------- Subject: Re: NIST_PAP_01-IP_in_Smart_Grid_v.1.0-Oct_30th_2009 Date: Wed, 17 Feb 2010 14:44:50 -0500 From: Ed Jankiewicz <edward.jankiewicz@sri.com> To: ipaction@nist.gov CC: Fred Baker <fred@cisco.com> References: <D7A0423E5E193F40BE6E94126930C49307907D504F@MBCLUSTER.xchange.nist.gov> <E68E60A8-3134-4C8D-A203-AC5392CA757D@cisco.com> <5F40C253-7CC5-4142-9B87-E6D4F96498DE@cisco.com> As an observer here, let me strongly state my concurrence with Fred Baker's two main points 1. given the costs to roll out an IP network with constrained and widely distributed elements, it would be highly irresponsible to do so with IPv4 at what is certainly the 11th hour of its existence. Utilities may not be able to obtain sufficient IPv4 space today to roll out such a network, and by 2012 it is almost certain that they will not be able to get any large allocations. The US DoD and civilian agencies have mandated that ALL acquisitions of network equipment MUST be IPv6 capable (currently effective now for DoD, effective July 2010 for civilian agencies). In my personal opinion, smart grid should be IPv6 by design, with any initial implementations based on IPv4 being the exception, and requiring some kind of waiver, with a stated plan to convert to IPv6 ASAP. IPv4 should be considered for use only where IPv6 is not possible (i.e. existing implementations not amenable to software upgrade) and should only be used as a fall-back for any new implementation. 2. Security issues, in particular authentication, are fundamental and should be considered from the earliest stages as non-negotiable. Scalable and manageable key distribution is essential to ubiquitous implementation of any protection scheme. I personally agree with Fred's points on the intractability of almost anything but public key cryptography given the scale of this problem space - very many distributed sensor/actuators in the network under central control, where authentication is an absolute requirement. Public key exchange will minimize operational complexity and enable future growth of the network. It is much easier to grant "temporary" permission to operate at reduced levels (e.g. IPv4, shared secret cryptography) than it is to go back later and impose "new" requirements on legacy implementations. If this discussion is about establishing standards for the future of smartgrid technology, they should be forward-looking and based on the best published standards, rather than settling for standards that are already in "sunset" mode. Ed Jankiewicz speaking as an individual On 2/17/2010 12:11 PM, Fred Baker wrote: > > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > oops - forgot to actually sign it :-) > > Let me follow up on my comment regarding public key cryptography. This > is in case someone missed the thrust of my comment operationally. > > Symmetric key crypto technologies are technologies in which both > sender and receiver of a message have a shared key; if I tell you for > example that I will encrypt a message by changing all of the zeroes to > ones and all the ones to zeroes (silly, yes), you can apply the same > rule and derive the original. AES and DES are symmetric key > technologies that actually have some security value. But they also > imply that pairs of systems share keys, which means that a given > system that talks with a long list of others has a long list of keys > to choose from, and we have to communicate keys securely. > > Asymmetric key crypto technologies are for some reason not usually > called that; they are called "public key". In this kind of a system > each system develops a pair of keys, one called a "private" key and > one called a "public" key. A message encrypted in the public key can > only be decrypted using the private key and vice versa. In this case, > each communicating system needs exactly one key pair, and the public > key can be posted on a billboard if one likes. If I want to send a > message that any person can verify is from me, I encrypt or sign it > using my private key and post my public key; to verify the > authenticity of the message, anyone can apply the public key. I have > done that with this email, signing it with my private PGP key; if you > have PGP software, you can download my public key from pgp.com and do > so. If I want to make a message private to you, I would encrypt it > using your public key, knowing that only you have your private key and > therefore only you can read it. Generally speaking, when using this, > people sign with their private key and encrypt using their peer's > public key. > > In general, I think there is value in a subset (not all) messages > exchanged in the smart grid being signed or encrypted. I would suggest > that a meter, which is read perhaps every six hours, wants to sign its > meter-read message and encrypt it in the public key of the system that > needs to consume the data. That preserves the privacy of the consumer > of the service that the meter is measuring and ensures that everyone > now and forever knows that the meter reading data is in fact what the > meter said it was. I would similarly suggest that pricing messages or > demand management messages be signed by the utility, so that it is > clear that they are what they are. They need not be encrypted. Part of > that is the question of a chain of authority; while many things in my > home can be turned on or off at will, some may be life-supporting or > otherwise need special authorization to control. Even for a light > switch, before I toggle its state I will want to know that the person > flipping it is not the kid down the street doing the 21st century > equivalent of TP'ing his friend's house - or something more sinister. > There are quite a variety of other messages in the exchange that need > neither be signed nor encrypted, as they simply support the ongoing > communication. > > On Feb 17, 2010, at 10:08 AM, Fred Baker wrote: > >> >> I have done a quick review on this. I hope you're on the >> SmartPower-Interest@ietf.org list; if you are, you have already seen >> my comment to that list. >> >> I would have preferred that the document made a stronger statement >> about IPv6; the current statement will, I fear, result in utilities >> trying to push IPv4 usage in the near term, creating a need to >> transition from IPv4 to IPv6 in the relatively near future. Utilities >> would do better to go straight to IPv6 up front for operational >> reasons, as transition is messy and can be expensive if it means >> upgrading firmware with a new image that may not fit in the target >> memory system. I would hope that the architecture would make clear >> that IPv6 support is mandatory in products deployed in the Smart >> Grid, even if the utility deploys IPv4 in the near term, to overcome >> those issues. >> >> I also don't find the statement regarding security adequate. It says >> that C12.22's use of AES-128 is fundamental, and overlooks the use of >> Suite B technologies that enable IPR-free verifiable public key >> authentication, such as one might find in >> http://tools.ietf.org/html/draft-mcgrew-fundamental-eccSymmetric key >> cryptography has its place, but I think public key cryptography would >> be far more scalable. To give you an idea of the implications, with >> symmetric key crypto, either every system in a domain uses the same >> key (which is not very secure) or every pair of systems shares a key, >> which means that central controllers have a key for each meter that >> they might speak with. With public key, every system including the >> central controller has a single key pair, public and private, and >> either encrypts in its own private or its peer's public key depending >> on the intent (does this prove that the message came from a given >> system or is read by a given system, or both?) or signs using its own >> private key. I also didn't see any attention given to the process of >> changing keys, which will be an issue. I further see no attention to >> threats at the Transport, Network, or Data Link layers. In an IEEE >> 802.15.4g network such as suggested by Zigbee, if I wanted to attack >> the system, I would either generate a high power radio signal to >> drown out communication or intercept/interdict exchanges on the >> "wire". I see no attention to those issues. >> >> The thing I find most surprising is that it focuses not on TCP/UDP >> over IPv4/IPv6, but on the use of the ANSI C12.19 and C12.22 >> standards, which are an application, and are in the January standards >> document downgraded from "mandatory" to "we really aught to think >> about these". I frankly think the industry would be better served >> with a NetConf exchange of XML objects using an appropriate schema, >> perhaps that suggested by OASYS. >> > > http://www.ipinc.net/IPv4.GIF > > -----BEGIN PGP SIGNATURE----- > > iD8DBQFLfCHRbjEdbHIsm0MRAv9HAKD8XNcUQHgOH9K5D022LS/n2AJSrwCgjf57 > lv/DaS1agEEuTK/IVeeY8SE= > =oL1B > -----END PGP SIGNATURE----- > > > -- Ed Jankiewicz - SRI International Fort Monmouth Branch Office - IPv6 Research Supporting DISA Standards Engineering Branch 732-389-1003 or ed.jankiewicz@sri.com
- [smartpower-interest] Fwd: NIST_PAP_01-IP_in_Smar… Fred Baker
- [smartpower-interest] Latest SmartGrid benefits -… Richard Shockey
- [smartpower-interest] [Fwd: Re: NIST_PAP_01-IP_in… Ed Jankiewicz
- Re: [smartpower-interest] [Fwd: Re: NIST_PAP_01-I… Igor Faynberg
- [smartpower-interest] FW: NIST_PAP_01-IP_in_Smart… Koodli, Rajeev