Re: [Spud] OS updates on embedded devices

Brian Trammell <ietf@trammell.ch> Thu, 09 April 2015 21:45 UTC

Return-Path: <ietf@trammell.ch>
X-Original-To: spud@ietfa.amsl.com
Delivered-To: spud@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C4D301B3395 for <spud@ietfa.amsl.com>; Thu, 9 Apr 2015 14:45:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.912
X-Spam-Level:
X-Spam-Status: No, score=-1.912 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hLUcxxFcOLMF for <spud@ietfa.amsl.com>; Thu, 9 Apr 2015 14:45:20 -0700 (PDT)
Received: from trammell.ch (trammell.ch [5.148.172.66]) by ietfa.amsl.com (Postfix) with ESMTP id 742F51B3390 for <spud@ietf.org>; Thu, 9 Apr 2015 14:45:20 -0700 (PDT)
Received: from [IPv6:2001:470:26:9c2::7ea] (unknown [IPv6:2001:470:26:9c2::7ea]) by trammell.ch (Postfix) with ESMTPSA id 603F01A01CB; Thu, 9 Apr 2015 23:44:49 +0200 (CEST)
Mime-Version: 1.0 (Mac OS X Mail 8.2 \(2070.6\))
Content-Type: multipart/signed; boundary="Apple-Mail=_9469EDCA-1529-49EA-AD3A-B0EC91518C77"; protocol="application/pgp-signature"; micalg=pgp-sha512
X-Pgp-Agent: GPGMail 2.5b6
From: Brian Trammell <ietf@trammell.ch>
In-Reply-To: <CALx6S35n6VXOm4WN_efG9e0DQvTZGYpCS+VZ=MZ6BdxoaZrFcw@mail.gmail.com>
Date: Thu, 9 Apr 2015 23:44:48 +0200
Message-Id: <EEFC75DA-31EF-4AB7-8B1B-6CF3E67FDA10@trammell.ch>
References: <CAMm+LwgQ30qRyQufBTqFvyjTZ0GT6_jvgf0Z0yOPF8SD-N=ujg@mail.gmail.com> <CALx6S35n6VXOm4WN_efG9e0DQvTZGYpCS+VZ=MZ6BdxoaZrFcw@mail.gmail.com>
To: Tom Herbert <tom@herbertland.com>
X-Mailer: Apple Mail (2.2070.6)
Archived-At: <http://mailarchive.ietf.org/arch/msg/spud/at4SW4M6hBqg_xuavYbqPBrzI5c>
Cc: Toerless Eckert <eckert@cisco.com>, Phillip Hallam-Baker <phill@hallambaker.com>, Yoav Nir <ynir.ietf@gmail.com>, Daniel Kahn Gillmor <dkg@fifthhorseman.net>, "spud@ietf.org" <spud@ietf.org>
Subject: Re: [Spud] OS updates on embedded devices
X-BeenThere: spud@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Session Protocol Underneath Datagrams <spud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spud>, <mailto:spud-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/spud/>
List-Post: <mailto:spud@ietf.org>
List-Help: <mailto:spud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spud>, <mailto:spud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Apr 2015 21:45:22 -0000

What I take away from this tangent: avoiding certain types of badness is probably a necessary function of any minimal common transport such as SPUD. Which types of badness those are is a point for detailed discussion, but it probably includes avoiding anything that looks like reflection or amplification, and anything that looks like trivial state exhaustion, which we need to consider very carefully in a protocol designed to make state establishment on path explicit.

Thanks, cheers,

Brian

> On 09 Apr 2015, at 23:38, Tom Herbert <tom@herbertland.com> wrote:
> 
> On Thu, Apr 9, 2015 at 2:09 PM, Phillip Hallam-Baker
> <phill@hallambaker.com> wrote:
>> We are quite a way afield here. But there are very good reasons for
>> NOT wanting automatic updates.
>> 
>> Security for me means that the device does what I want it to and
>> nothing else. Having the system change behavior because some code
>> monkey decided to add some Kewl features is a security vulnerability
>> as far as I am concerned.
>> 
>> I have Sonos devices in some of the rooms. They are practically
>> unusable because the idiots who make the app insist on making changes
>> that require the already sluggish iPhone app to be updated regularly.
>> 
>> When I want to turn the radio on I want it to take less than a second.
>> Sonos is already slow. But when it asks for an update of the app,
>> someone has to bring the phone to me and have me enter the password to
>> update it. Then the device will often fail to find the app store. If
>> it does find it then it is another five minutes to load the new app.
>> 
>> 
>> If a network device did the same thing it would undoubtedly break my network.
> 
> This discussion is probably more relevant in the IoT and security
> lists. But anyway, as we start attaching more and more devices to the
> the Internet they eventually become targets. One known problem we face
> is that security vulnerabilities, unlike simple bugs, are usually not
> caught in initial development. It's only after significant deployment
> that would-be attackers get interest in this. So our choices are:
> don't connect devices, update software (wherever it is) on running
> devices, live with security vulnerabilities, buy new HW, have devices
> live behind other devices that provide security, etc. Given that these
> devices are targeted to end users and that some serve life critical
> functions (like you smoke detector), a transparent solution seems
> essential.
> 
> Tom
> 
> _______________________________________________
> Spud mailing list
> Spud@ietf.org
> https://www.ietf.org/mailman/listinfo/spud