Re: [Suit] Éric Vyncke's No Objection on draft-ietf-suit-architecture-14: (with COMMENT)

Hannes Tschofenig <Hannes.Tschofenig@arm.com> Fri, 20 November 2020 07:19 UTC

Return-Path: <Hannes.Tschofenig@arm.com>
X-Original-To: suit@ietfa.amsl.com
Delivered-To: suit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 086793A1996; Thu, 19 Nov 2020 23:19:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=UDNNxxvd; dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=UDNNxxvd
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TwM1bRiH1muP; Thu, 19 Nov 2020 23:19:10 -0800 (PST)
Received: from EUR03-AM5-obe.outbound.protection.outlook.com (mail-eopbgr30072.outbound.protection.outlook.com [40.107.3.72]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 314463A1993; Thu, 19 Nov 2020 23:19:08 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=8D/5Mc8XrfVvrnD2trcED0Srd0a1+0va8hqhtAtJVCA=; b=UDNNxxvdGhIEfkkFV8viLmjRIc5TrJ2njizY1ZDMcdFey0BCPTCwL1okjzoLuewSzkkn5yvsKHpl6MXOFfpH24h0RaMURdYSYnJYbW0KRk4R1MeKcWMvcZmQnLHa23jwnjaF+pAAncbH831eWeurZLbeZzXRwTEVCdAMhfxpah0=
Received: from AM6PR10CA0076.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:209:8c::17) by VE1PR08MB5839.eurprd08.prod.outlook.com (2603:10a6:800:1a0::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3589.22; Fri, 20 Nov 2020 07:19:06 +0000
Received: from VE1EUR03FT020.eop-EUR03.prod.protection.outlook.com (2603:10a6:209:8c:cafe::10) by AM6PR10CA0076.outlook.office365.com (2603:10a6:209:8c::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3589.20 via Frontend Transport; Fri, 20 Nov 2020 07:19:05 +0000
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; ietf.org; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;ietf.org; dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by VE1EUR03FT020.mail.protection.outlook.com (10.152.18.242) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3589.20 via Frontend Transport; Fri, 20 Nov 2020 07:19:05 +0000
Received: ("Tessian outbound fcd5bc555ddc:v71"); Fri, 20 Nov 2020 07:19:04 +0000
X-CR-MTA-TID: 64aa7808
Received: from d72e19e8b05c.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id C86E7EAD-9046-4F1A-ACBE-EC8082C2FF9C.1; Fri, 20 Nov 2020 07:18:59 +0000
Received: from EUR01-VE1-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id d72e19e8b05c.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Fri, 20 Nov 2020 07:18:59 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=OjhnYXKC+xWUbizhxqmhCpEycD4k4eXDujZ8AcDqHpBm2/FSi0f7JfRCPfgApYzuyxNp2PrkbIV+SaQToG576TUwa9oa7r+KDOltE9qiPvRPwCYaDCAJDOhWdy57prw5uzeu2bmUfyRzhLJu1ybNQpF3kb+NgWxrbpaQPmEcHw9ps3B0gS0oFddvVO+Py/VlMmnhZ1XnKZXTeAhJmArdN8x03HCcdoDZEJ1ykKEq7SxEdQAKCyaRUZa4unj0jb6viJewYNTzZaJ/bjPrR6UKIhEkiAILrWgjwwS3b7xW2bTEhxkkPBbORLghthNny24oHVhEYnkSJgilDMK+iuBx1w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=8D/5Mc8XrfVvrnD2trcED0Srd0a1+0va8hqhtAtJVCA=; b=ASvhEO51LQmjfaZnxCaTqQzXkw+CYO6dbjWHqW/+bwTz12NVD15ZuxjGZpzX9Jp8YrjdLQMuBhaDvTDs/Ncn6TAmMeSGsNebL9mOdaB4NmFs/lH158pnopRk2ncVIE3BqNK5EMa6EALAXNv3FxIxWg1DC50uUhSBjBZMU+bdt8aJXXDYwH1CjApzJQlCd8MtYIefLmqxQjn0iq/P+2iAyyioJQ0CQTYxJvKR6big2knJnWMPGC1sGVBmXV7XmSfG76HAU9vXS51PStil2KCNdtHg6/d6W+sebKpfZnXLlgNciQn1cd7nWFMhwJrZ5v7P/MflrfON9JJnVer0+TREPA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=8D/5Mc8XrfVvrnD2trcED0Srd0a1+0va8hqhtAtJVCA=; b=UDNNxxvdGhIEfkkFV8viLmjRIc5TrJ2njizY1ZDMcdFey0BCPTCwL1okjzoLuewSzkkn5yvsKHpl6MXOFfpH24h0RaMURdYSYnJYbW0KRk4R1MeKcWMvcZmQnLHa23jwnjaF+pAAncbH831eWeurZLbeZzXRwTEVCdAMhfxpah0=
Received: from AM0PR08MB3716.eurprd08.prod.outlook.com (2603:10a6:208:106::13) by AM4PR0802MB2241.eurprd08.prod.outlook.com (2603:10a6:200:5e::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3589.20; Fri, 20 Nov 2020 07:18:57 +0000
Received: from AM0PR08MB3716.eurprd08.prod.outlook.com ([fe80::a80c:38e:8da2:8b48]) by AM0PR08MB3716.eurprd08.prod.outlook.com ([fe80::a80c:38e:8da2:8b48%7]) with mapi id 15.20.3564.028; Fri, 20 Nov 2020 07:18:57 +0000
From: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
To: Éric Vyncke <evyncke@cisco.com>, The IESG <iesg@ietf.org>
CC: "draft-ietf-suit-architecture@ietf.org" <draft-ietf-suit-architecture@ietf.org>, "suit-chairs@ietf.org" <suit-chairs@ietf.org>, "suit@ietf.org" <suit@ietf.org>, Russ Housley <housley@vigilsec.com>, "mohit.m.sethi@ericsson.com" <mohit.m.sethi@ericsson.com>
Thread-Topic: Éric Vyncke's No Objection on draft-ietf-suit-architecture-14: (with COMMENT)
Thread-Index: AQHWs1dckbpCnHchiE+wiGMEkrVk6qnQp8nA
Date: Fri, 20 Nov 2020 07:18:57 +0000
Message-ID: <AM0PR08MB3716272ABA18ECC70648B395FAFF0@AM0PR08MB3716.eurprd08.prod.outlook.com>
References: <160456906093.24545.13517793229178865274@ietfa.amsl.com>
In-Reply-To: <160456906093.24545.13517793229178865274@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: 930FFA7D1B3FDF4484DDFF59F11604FD.0
x-checkrecipientchecked: true
Authentication-Results-Original: cisco.com; dkim=none (message not signed) header.d=none;cisco.com; dmarc=none action=none header.from=arm.com;
x-originating-ip: [80.92.118.246]
x-ms-publictraffictype: Email
X-MS-Office365-Filtering-HT: Tenant
X-MS-Office365-Filtering-Correlation-Id: e6e2f044-c6b6-439a-5e7e-08d88d24909d
x-ms-traffictypediagnostic: AM4PR0802MB2241:|VE1PR08MB5839:
X-Microsoft-Antispam-PRVS: <VE1PR08MB5839B7157F4E3ECF2C1868C1FAFF0@VE1PR08MB5839.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
x-ms-oob-tlc-oobclassifiers: OLM:10000;OLM:10000;
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original: LcAzDH6bWoSRakXBfa5YAyp/Sezt9ujMMjl04KigsZvpBio0vS2zYqy0nVogTP2xm3DJrwYGvbHK3ZU776IDV9vtZuWih3vTtAacGv3paI9d5XoVuTSK03XJCLCydPjYgym5Z4OA4JmYx36cuHf8+/Q54IoDuQoXWwcooaJiV9gP2CBNLXr+U57wOq0tsesFi9tFHXENydyn5z++1tYprF9UTkBVqYTmmkMCtPO2TyjQXS5SnozHnYGlsvATaS7CXn2czwqFXtFbrnaRvudMMoOBSY9VyrpQFmKflOIl7HP1LMeTe5OnntGTwk35mWaI0zF/zG3A77ztEE6Yz/P9m8DUzxv2N8M40njJl9egU2tD6pRAZJqGYF6bvkem5+AEVGdJHs6fUsoRf9iAdF2pbQ==
X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AM0PR08MB3716.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(366004)(39850400004)(346002)(136003)(396003)(376002)(71200400001)(52536014)(9686003)(4001150100001)(66556008)(64756008)(66476007)(8936002)(86362001)(186003)(66946007)(26005)(83380400001)(224303003)(33656002)(2906002)(316002)(53546011)(478600001)(6506007)(66446008)(966005)(54906003)(76116006)(110136005)(4326008)(5660300002)(55016002)(7696005); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM4PR0802MB2241
Original-Authentication-Results: cisco.com; dkim=none (message not signed) header.d=none;cisco.com; dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped: VE1EUR03FT020.eop-EUR03.prod.protection.outlook.com
X-MS-Office365-Filtering-Correlation-Id-Prvs: c1131ae1-6c1a-4077-04e3-08d88d248b8c
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: oHy+0owwr5oWk3VC4uvFt1yBKbOBwQQKMKWIp9/krU2eNGMdjQmg4o4xsyr3opXyZezfgboc1w//HRi3AnQsiCTJWcGPsADm6oDK4PWqJbg3E5Zm2ynSjARbB0NIxDDyAKoTFEgkrtwGhtQmacv0dXgzmMZQ1g9f8/EO2+snkdMkJNsSmaXC0GJ7hddiPP1zFzKFBQywTn6kQQ9LJmUqS0KSmyN2xd/mjgEngg41PQCGfTu5dDYMbmUBJJTJc2VLQBp+hztjd0M976OPup1ce807CBv3sb4d6TIqlYYoOFGdfy/Ieux+pNOoIWmPJcIjBAPn9zsemB+wukewGxKbKd+51hDG/HfJAthskgMoW2YUW6DUBpc5lr/GO6o88g+1SU5+F3qIAeAJS108HSrz7yiqJ1bawL+TkdSG9kwvBA+MviLUKu7fuf7Gjh/UfjyGLU4Dt5D2woVBKX9dkLUkLIChRmsklhwT3Nwt4v6GaBs=
X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFS:(4636009)(39850400004)(396003)(346002)(136003)(376002)(46966005)(70206006)(53546011)(7696005)(70586007)(6506007)(224303003)(82310400003)(316002)(55016002)(81166007)(356005)(83380400001)(336012)(52536014)(4326008)(47076004)(86362001)(33656002)(478600001)(8936002)(107886003)(2906002)(82740400003)(450100002)(9686003)(54906003)(26005)(4001150100001)(966005)(5660300002)(186003)(110136005); DIR:OUT; SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 20 Nov 2020 07:19:05.4548 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: e6e2f044-c6b6-439a-5e7e-08d88d24909d
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource: VE1EUR03FT020.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VE1PR08MB5839
Archived-At: <https://mailarchive.ietf.org/arch/msg/suit/uPMcaIEX4Om0Q8-owlkWwTliM68>
Subject: Re: [Suit] Éric Vyncke's No Objection on draft-ietf-suit-architecture-14: (with COMMENT)
X-BeenThere: suit@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Software Updates for Internet of Things <suit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/suit>, <mailto:suit-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/suit/>
List-Post: <mailto:suit@ietf.org>
List-Help: <mailto:suit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/suit>, <mailto:suit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Nov 2020 07:19:13 -0000

Hi Eric,

Brendan has addressed most of the review comments from Mohit listed at
https://datatracker.ietf.org/doc/review-ietf-suit-architecture-13-iotdir-telechat-sethi-2020-10-20/

I wanted to provide a few minor remarks nevertheless.

Mohit wrote:

"
How about rephrasing the text: "are expected to work automatically, i.e. without user involvement. Automatic updates that do not require human intervention are key to a scalable solution for fixing software vulnerabilities." to "are o a large extent expected to work automatically, i.e. with minimal human interaction. Automatic updates that require minimal or no interaction are key to a ....". The reason for requesting this change is simple: in many scenarios you would want user approval before the actual update. For example, updating lights at night during dinner is perhaps not ideal. The draft does discuss the importance of device operator approval in some circumstances so updating the text would make sense.
"

It is true that someone has to initiate the update and different decisions will influence on when this happens. In many systems the user of the device is asked by the device to download the update and to apply it. With devices that are have user interfaces this is often the case. Bob Briscoe shared his experience with BIOS updates on desktop systems that wasn't smooth despite having a great user interface. The IoT ecosystem is quite broad and there will be cases that can work fine with non-automated software updates. When you want to update a large number of unattended devices then there is, however, a challenge. We are addressing the latter rather than the former.

I changed the text to
"
Firmware updates  for IoT devices are **largely** expected to work automatically, i.e. without user involvement.
"
If there is a better way to get this story across, please let me know.


Mohit asked

"
I wonder if you want to state the difference between software and firmware update. Are they the same thing for this document? The text in the draft at some point says "Moreover, this architecture is not limited to managing software updates". But most of the other text talks about "firmware updates".
"

Since this was a question that surfaced in the group before we have (in previous versions of the draft) expanded the description about what a firmware image is. Here is the text:

"
   -  Firmware Image: The firmware image, or image, is a binary that may
      contain the complete software of a device or a subset of it.  The
      firmware image may consist of multiple images, if the device
      contains more than one microcontroller.  Often it is also a
      compressed archive that contains code, configuration data, and
      even the entire file system.  The image may consist of a
      differential update for performance reasons.

      The terms, firmware image, firmware, and image, are used in this
      document and are interchangeable.  We use the term application
      firmware image to differentiate it from a firmware image that
      contains the bootloader.  An application firmware image, as the
      name indicates, contains the application program often including
      all the necessary code to run it (such as protocol stacks, and
      embedded operating system).
"

Software is a very generic term. Comparing firmware with software would require us to go into the details of a specific piece of software. Software that is distributed at higher layers has typically their own software distribution system and unique security challenges based on the environment it is run in.

The reference to "Moreover, this architecture is not limited to managing software updates" was introduced because we use SUIT also for TEEP where trusted applications run in a special mode of the processor.

Mohit also writes:

"
I think most readers will be more familiar with the term Original Equipment Manufacture (OEM) rather than Original Design Manufacturer (ODM). I understand that ARM has a slightly complicated ecosystem and business model. So perhaps the text could say "in some cases, the OEM or the ODM act as a TPA and may decide to remain in full control...."
"

This is not terminology we came up with. On the surface, the manufacturing process for embedded devices looks quite simple but in practice this is not the case. This is why there is now so much interest in supply chain security today because the final product is created with so many different components that all come from different parties. This process is a by-product of how the economy works where specialization is common.

Another item is:

"
The draft uses TAs for trusted applications (TAs). But RFC 6024 referenced by this document uses TAs for Trust anchors. Can we avoid using TA abbreviations for trusted applications for ?
"

2- and 3-letter acronymous will lead to collisions, as we have the case here. Since we cannot change the acronymous I hope we made clear in the context which one we talk about.

Ciao
Hannes

-----Original Message-----
From: Éric Vyncke via Datatracker <noreply@ietf.org>
Sent: Thursday, November 5, 2020 10:38 AM
To: The IESG <iesg@ietf.org>
Cc: draft-ietf-suit-architecture@ietf.org; suit-chairs@ietf.org; suit@ietf.org; Russ Housley <housley@vigilsec.com>; housley@vigilsec.com; mohit.m.sethi@ericsson.com
Subject: Éric Vyncke's No Objection on draft-ietf-suit-architecture-14: (with COMMENT)

Éric Vyncke has entered the following ballot position for
draft-ietf-suit-architecture-14: No Objection

When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-suit-architecture/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

Thank you for the work put into this document.

Please add reference to LwM2M in Section 1.

Please also address all comments raised by Mohit Sethi during the IoT directorate review (I saw that Brendan has already replied):
https://datatracker.ietf.org/doc/review-ietf-suit-architecture-13-iotdir-telechat-sethi-2020-10-20/

I hope that this helps to improve the document,

Regards,

-éric



IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.