Re: [smartpower-interest] Smart Grid Architecture Committee meeting 17 February
Russ Housley <housley@vigilsec.com> Fri, 19 February 2010 17:27 UTC
Return-Path: <housley@vigilsec.com>
X-Original-To: smartpower-interest@core3.amsl.com
Delivered-To: smartpower-interest@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix)
with ESMTP id 75BD83A819E for <smartpower-interest@core3.amsl.com>;
Fri, 19 Feb 2010 09:27:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.4
X-Spam-Level:
X-Spam-Status: No, score=-102.4 tagged_above=-999 required=5 tests=[AWL=-0.116,
BAYES_00=-2.599, SARE_MILLIONSOF=0.315, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com
[127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QWBpeXs1ZZVH for
<smartpower-interest@core3.amsl.com>; Fri, 19 Feb 2010 09:27:31 -0800 (PST)
Received: from odin.smetech.net (mail.smetech.net [208.254.26.82]) by
core3.amsl.com (Postfix) with ESMTP id 3EDEE3A8194 for
<smartpower-interest@ietf.org>; Fri, 19 Feb 2010 09:27:31 -0800 (PST)
Received: from localhost (unknown [208.254.26.81]) by odin.smetech.net
(Postfix) with ESMTP id 7A618F24015; Fri, 19 Feb 2010 12:29:24 -0500 (EST)
X-Virus-Scanned: amavisd-new at smetech.net
Received: from odin.smetech.net ([208.254.26.82]) by localhost
(ronin.smetech.net [208.254.26.81]) (amavisd-new, port 10024) with ESMTP id
LS5RWa1h19sN; Fri, 19 Feb 2010 12:29:17 -0500 (EST)
Received: from [192.168.2.104] (pool-96-255-37-236.washdc.fios.verizon.net
[96.255.37.236]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits))
(No client certificate requested) by odin.smetech.net (Postfix) with ESMTP id
65C34F24014; Fri, 19 Feb 2010 12:29:23 -0500 (EST)
Message-ID: <4B7ECA70.1060909@vigilsec.com>
Date: Fri, 19 Feb 2010 12:29:20 -0500
From: Russ Housley <housley@vigilsec.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US;
rv:1.9.1.7) Gecko/20100111 Thunderbird/3.0.1
MIME-Version: 1.0
To: Fred Baker <fred@cisco.com>
References: <55FA0F33-F37F-4429-92D0-9E99162BA496@cisco.com>
In-Reply-To: <55FA0F33-F37F-4429-92D0-9E99162BA496@cisco.com>
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Cc: smartpower-interest@ietf.org
Subject: Re: [smartpower-interest] Smart Grid Architecture Committee meeting
17 February
X-BeenThere: smartpower-interest@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Smart Power Interest <smartpower-interest.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/smartpower-interest>,
<mailto:smartpower-interest-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/smartpower-interest>
List-Post: <mailto:smartpower-interest@ietf.org>
List-Help: <mailto:smartpower-interest-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/smartpower-interest>,
<mailto:smartpower-interest-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 19 Feb 2010 17:27:32 -0000
Fred: I have a few comments about IPv6 and security. > I am forwarding in case you folks have not seen this. It is the proposed > IP architecture from NERC, which is a US regulatory body. > > One important statement it makes is: > >> A final note is that this document will not make the distinction >> between IP version 4 or version 6 for the purpose of analysis or >> standardization. The point is simply to support IP with the version >> number left to be an implementation detail determined by the utility >> or service provider that would install the AMI network. That being >> said, any competent network planner can easily do the math - many >> investor-owned utilities have literally millions of electric meters >> installed (a distinct challenge in a version 4 environment), with this >> "volume problem" being compounded by the presence of other devices >> including some quantity of electric vehicles as potential roaming >> users in the future. That means the utility would either have to use >> IPv4 very judiciously and replicate private IP space over and over >> again, or move to IPv6 and address a greater number of devices uniquely. > > This is not as strong a statement re IPv6 as the IETF and ARIN have > proposed, but is at least a sensible one in the near term. This allows NAT upon NAT. I would prefer NERC to more strongly advocate IPv6. NERC does not even say that IPv6 is the long-term solution. I wish they had gone that far. > The architecture doesn't say a lot about security, but does say this: > >> The C12.22 protocol also includes AES-128 security mechanisms. >> Additional IP transport security protocols may be provided to enhance >> and preserve the upper layer security provisions but not as a >> substitute of such. > > Personally, I think that's an inadequate statement. The key issues are > in identification, authentication, authorization, and confidentiality > where appropriate. I agree that these are the right security services to include as long as you consider access control to be part of authorization. > It would be nice if [...] the architecture could specify the use of "suite b > cryptographic standards". For those that don't know what that means, it > refers to the use of elliptic curve public key cryptography without the > IPR considerations that have crippled the industry's ability to use it. Suite B is composed of algorithms that are publicly specified, and it is defined here: http://www.nsa.gov/ia/programs/suiteb_cryptography. Suite B includes: Encryption: AES with 128- and 256-bit keys Key Exchange: Elliptic Curve One-Pass Diffie Hellman (called ECDH) using the curves with 256- and 384-bit prime moduli Digital Signature: Elliptic Curve Digital Signature Algorithm (called ECDSA) using the curves with 256- and 384-bit prime moduli) Hashing: SHA-256 and SHA-384 The smaller size in each of these choices seems quite reasonable for Smart Grid. There are intellectual property issues with Elliptic Curve Cryptography (ECC), but McGrew seems to have found at least one way to implement these algorithms that avoids the known patents. See: http://tools.ietf.org/html/draft-mcgrew-fundamental-ecc-01 > [...] The lack of a key management > infrastructure is a problem, which I would entertain useful proposals for. As a starting point for this discussion, can we leverage the work done by CableLabs and the WiMAX Forum. Devices that follow the specifications from these groups ship with an embedded private key and a certificate. This is not the complete answer, but it allows anyone to authenticate the device. At some point prior to installation, the device still needs to be told some things about the network that it will be connected. This might be as simple as the insertion of some configuration data that includes a trust anchor to validate certificates from the utility. Russ
- [smartpower-interest] Smart Grid Architecture Com… Fred Baker
- Re: [smartpower-interest] Smart Grid Architecture… Joe DiAdamo
- Re: [smartpower-interest] Smart Grid Architecture… Fred Baker
- Re: [smartpower-interest] Smart Grid Architecture… Phil Roberts
- Re: [smartpower-interest] Smart Grid Architecture… Bob Hinden
- Re: [smartpower-interest] Smart Grid Architecture… Russ Housley
- Re: [smartpower-interest] Smart Grid Architecture… Zach Shelby
- Re: [smartpower-interest] Smart Grid Architecture… Paul Duffy
- Re: [smartpower-interest] Smart Grid Architecture… Greg Daley
- Re: [smartpower-interest] Smart Grid Architecture… Greg Daley
- Re: [smartpower-interest] Smart Grid Architecture… Davis, Terry L
- Re: [smartpower-interest] Smart Grid Architecture… Douglas Otis