Re: [Suit] Benjamin Kaduk's No Objection on draft-ietf-suit-architecture-14: (with COMMENT)

Brendan Moran <Brendan.Moran@arm.com> Wed, 18 November 2020 22:06 UTC

Return-Path: <Brendan.Moran@arm.com>
X-Original-To: suit@ietfa.amsl.com
Delivered-To: suit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AA6E03A0DAC; Wed, 18 Nov 2020 14:06:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=DgYqf8uU; dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=DgYqf8uU
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XV_1Uk6G85L9; Wed, 18 Nov 2020 14:06:06 -0800 (PST)
Received: from EUR04-HE1-obe.outbound.protection.outlook.com (mail-eopbgr70044.outbound.protection.outlook.com [40.107.7.44]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BE8433A0DB5; Wed, 18 Nov 2020 14:05:55 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=tUyrxpiTI4HfY1yvxFvE6HucmA5qgwecAlUyX5Vtqis=; b=DgYqf8uUvQ6mfmtZnzvSuuUX8dbSNJ5zN0nThlVaUsHrMu/b39X9rX5/NK6UXuShhXowatoegbmLEle7YrIMnP4h/0SUKhhx4QSEt8bvmhNvgk65Qf6aPZEJnUbVvfY+1z5gSkZRe+FhXCFQVEdmf7GnuP0kGX0W4D4z3pGuDs0=
Received: from AM6P195CA0033.EURP195.PROD.OUTLOOK.COM (2603:10a6:209:81::46) by AM9PR08MB6193.eurprd08.prod.outlook.com (2603:10a6:20b:282::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3589.21; Wed, 18 Nov 2020 22:05:52 +0000
Received: from AM5EUR03FT049.eop-EUR03.prod.protection.outlook.com (2603:10a6:209:81:cafe::6) by AM6P195CA0033.outlook.office365.com (2603:10a6:209:81::46) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3589.20 via Frontend Transport; Wed, 18 Nov 2020 22:05:52 +0000
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; ietf.org; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;ietf.org; dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by AM5EUR03FT049.mail.protection.outlook.com (10.152.17.130) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3589.20 via Frontend Transport; Wed, 18 Nov 2020 22:05:52 +0000
Received: ("Tessian outbound d6c201accd3c:v71"); Wed, 18 Nov 2020 22:05:52 +0000
X-CheckRecipientChecked: true
X-CR-MTA-CID: 6570d17567ee91a0
X-CR-MTA-TID: 64aa7808
Received: from 27545d210f84.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 9256CF65-0D0A-41E7-8A32-D25B60429A26.1; Wed, 18 Nov 2020 22:05:46 +0000
Received: from EUR04-DB3-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 27545d210f84.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Wed, 18 Nov 2020 22:05:46 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=KfRwwYU94cDaP5jdRTbCyjtvmtzRp3NXU1yt562hmN3+lgT1fh8nsxAmJ87kT5sKX/s/UhhQ6uRWAkVVSsI4O0LEo3O3yU6mqFd8Z+FbZbexh7D3N/kLFCVh3eCecBp+m+A5vROcBlZSlVhJikH2TyH/fWy94FsI8LMDY0q66enJOol9icHXVgdeYxwvTFkq2wkZJ2AAKlWasSDfxkx2uxsouq9e54jbSImTdPhZmIsc1M4JGdxZ82CDILvtT9hOTiIzPEjJnO9AY0AyaNrP04c/w6l60op9R55ZqAPrgAwvdzxgeYm5JPZkzgHRSuF/FtYpLdauMhaRuXsSVLszWw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=tUyrxpiTI4HfY1yvxFvE6HucmA5qgwecAlUyX5Vtqis=; b=mJJQ4+mD5wTmxzEDgzKk958j/A/w3TyzX6u08IhJpRKhLL9l20wf7CbHypOsLpLfp1RQ1VXfc+hY/Cc19ZCosBc9VnxjtZLnDsXWIOBZTl99Zu1PrvuRKZJr6y3S4vkPzH0beh8IJiODZO9wjWmBnsD2Ln/u3JVr0FZTBpuCMT09v91Pw0F2jRJ0KCp4uFujr4MuaveQsfsH7tp83BLonM99cXQvrFHZmzUdTpj4fvD/42UmDOSVosb1O+ORulHKoR7pWU790AsiU94X2NjTFnJZ5bsPXxPAASes6ouhC2YBmRD9b5VCcKMF65v0ddn+TR4vp2ShTVqTSd4fDXqIZA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=tUyrxpiTI4HfY1yvxFvE6HucmA5qgwecAlUyX5Vtqis=; b=DgYqf8uUvQ6mfmtZnzvSuuUX8dbSNJ5zN0nThlVaUsHrMu/b39X9rX5/NK6UXuShhXowatoegbmLEle7YrIMnP4h/0SUKhhx4QSEt8bvmhNvgk65Qf6aPZEJnUbVvfY+1z5gSkZRe+FhXCFQVEdmf7GnuP0kGX0W4D4z3pGuDs0=
Received: from AM9PR08MB6146.eurprd08.prod.outlook.com (2603:10a6:20b:2db::17) by AM9PR08MB6097.eurprd08.prod.outlook.com (2603:10a6:20b:280::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3564.25; Wed, 18 Nov 2020 22:05:45 +0000
Received: from AM9PR08MB6146.eurprd08.prod.outlook.com ([fe80::c848:df2:1b39:78d5]) by AM9PR08MB6146.eurprd08.prod.outlook.com ([fe80::c848:df2:1b39:78d5%4]) with mapi id 15.20.3589.021; Wed, 18 Nov 2020 22:05:45 +0000
From: Brendan Moran <Brendan.Moran@arm.com>
To: Benjamin Kaduk <kaduk@mit.edu>
CC: The IESG <iesg@ietf.org>, "draft-ietf-suit-architecture@ietf.org" <draft-ietf-suit-architecture@ietf.org>, "suit-chairs@ietf.org" <suit-chairs@ietf.org>, suit <suit@ietf.org>, Russ Housley <housley@vigilsec.com>
Thread-Topic: Benjamin Kaduk's No Objection on draft-ietf-suit-architecture-14: (with COMMENT)
Thread-Index: AQHWs1eEcjyU/Z29aUm24cS5YMgJianOhzuA
Date: Wed, 18 Nov 2020 22:05:44 +0000
Message-ID: <AB676068-F487-4366-9986-B97690CA35F8@arm.com>
References: <160456913386.24093.10722400425795162498@ietfa.amsl.com>
In-Reply-To: <160456913386.24093.10722400425795162498@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3608.120.23.2.1)
Authentication-Results-Original: mit.edu; dkim=none (message not signed) header.d=none;mit.edu; dmarc=none action=none header.from=arm.com;
x-originating-ip: [80.7.184.196]
x-ms-publictraffictype: Email
X-MS-Office365-Filtering-HT: Tenant
X-MS-Office365-Filtering-Correlation-Id: 4e67a4ba-3db7-4182-f50e-08d88c0e1d93
x-ms-traffictypediagnostic: AM9PR08MB6097:|AM9PR08MB6193:
X-Microsoft-Antispam-PRVS: <AM9PR08MB61934E5428A18B0D534E1223EAE10@AM9PR08MB6193.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
x-ms-oob-tlc-oobclassifiers: OLM:8882;OLM:9508;
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original: oUT+1yA3J/0OS9nolpUqUUMEphi478GdQflrY6lhEw17eGRn71ZYQgiJTNN5waj1cojcJxZYfbq3mZdRbLKgzdVZXwn0lhOAOdHKz/hSla+yuW6fSsuNBHD4Em/UXKDUL2RwlJqzbPi+md0LQ01f9tlOEFYxTJY/xxYbaDyEDVM0LmkjwT1yhbPxVdEJL18ASGf1K+jPogfpOVBi/13Es90C5y6Z2+w0Jilzl66Z37JbgVBFTvdk59Elmgvm3WSKlUJCSVzNaPcaYeP29EJlXUwOvsx/RYq/EG6h4fo5GS9gBlzOOjklgzcWmAd2iDWhLpWlMlZFQLFfX8Snk0vBxHQYmRI75q+JHUQFh2oV/rivfo2u2J6Uz8GlC9yBsnOXCrDG5458biKk3IUylEz3lQ==
X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AM9PR08MB6146.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(39850400004)(136003)(396003)(346002)(376002)(366004)(71200400001)(66946007)(316002)(6916009)(26005)(33656002)(4326008)(66556008)(66476007)(8936002)(36756003)(6506007)(66446008)(54906003)(91956017)(5660300002)(76116006)(53546011)(64756008)(2616005)(8676002)(6486002)(86362001)(83380400001)(186003)(6512007)(2906002)(966005)(478600001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="us-ascii"
Content-ID: <7DC6F3F8BFB04E4B94BBECBC0FE4AF1C@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR08MB6097
Original-Authentication-Results: mit.edu; dkim=none (message not signed) header.d=none;mit.edu; dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped: AM5EUR03FT049.eop-EUR03.prod.protection.outlook.com
X-MS-Office365-Filtering-Correlation-Id-Prvs: d8c836d4-ee99-4927-c4c8-08d88c0e191c
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: +bhYqzzak8BIKQPPiyRaIe0+jZj6DZk9HyP+RbsVP2/3T8JPEYmTd8DJ2p7i2CERRJ2OvB/h2FpYO8oIjZJEl/x89gSWJaxfMUVPvqjqLKz/ywsMxF/HMqR0zwNqU3nxBFZfZb0gln8WaT8nmCd22EliDpy7dsX1y8yRFKvyO2VRrM5w1CLft3OLAR5inxuOeZ1czy3ctXZigxoc0TjbS32mOGw26QfbWgEAb8eOc8GrJmnWrJ0WwKXg8mfxWX8h8f30cVUrL8WyHYfymZzcyqsifAJAa9S85zcC14UUQ8pbMKDJVU415KIFYsfbxEyljJVWiq/lE0B1YQ206wzxmBym9CwiQ3NKc1X6G7jzbflcojWVAlWYpiVHuSYeaaGM3wXuqRzaNNbXE8kHzRYVVoZn+o8Md9roA2zl2TyHeu92aah55kjGDEFS3RODgkkYdBfBEEwNCX4UTSE/H49o374Y+2l6MUVLwdEsDlYUCF4=
X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFS:(4636009)(346002)(136003)(396003)(39850400004)(376002)(46966005)(450100002)(107886003)(82310400003)(83380400001)(186003)(36756003)(33656002)(8676002)(6512007)(6862004)(26005)(4326008)(6506007)(5660300002)(53546011)(966005)(54906003)(478600001)(36906005)(8936002)(86362001)(2906002)(316002)(70206006)(82740400003)(356005)(336012)(6486002)(47076004)(81166007)(70586007)(2616005); DIR:OUT; SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 18 Nov 2020 22:05:52.5442 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 4e67a4ba-3db7-4182-f50e-08d88c0e1d93
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource: AM5EUR03FT049.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR08MB6193
Archived-At: <https://mailarchive.ietf.org/arch/msg/suit/Ao2OlGo0yhjLncVftTLAJ2jjw2E>
Subject: Re: [Suit] Benjamin Kaduk's No Objection on draft-ietf-suit-architecture-14: (with COMMENT)
X-BeenThere: suit@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Software Updates for Internet of Things <suit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/suit>, <mailto:suit-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/suit/>
List-Post: <mailto:suit@ietf.org>
List-Help: <mailto:suit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/suit>, <mailto:suit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Nov 2020 22:06:11 -0000

We will take on board the majority of these comments.

WRT the PQC time horizon, quantum annealing attacks on RSA are dependent commercial quantum annealers.

The paper in nature shows the factorisation of 376,289 in 94 qubits. In fact, other researchers have factored 1,005,973 with only 89 qubits [1]. With this second algorithm, characterised as O(log^2(N)), RSA-768 would require 147,454 qubits. D-Wave has shipped quantum computers with 5640 qubits already. They have a historical average of doubling the number of qubits every two years. Based on this trajectory, they should be shipping a quantum computer that can break RSA-768 in approximately 2030 (log_2(147454/5640)) = 4.7 => 9.4 years. RSA-2048, then, would be broken between 2 and 4 years later, and RSA-4096 a mere 2 years after that.

This is a naive analysis. However, it is intended to show that a scalable general purpose quantum computer is not the only threat to current cryptographic techniques, that the time horizon is not long, and that urgent action is required to ensure that devices with long lifetimes account for EITHER cryptographic agility or quantum safety, preferably the latter, since quantum safe algorithms require much more data than classical asymmetric crypto and, therefore, require extra considerations, particularly when used in constrained IoT.

Obviously, the hole in this analysis is that RSA is not common in IoT. I have not yet found equivalent research that shows how a quantum annealer could attack ECDSA or EDDSA. I assume that there are research teams working on this. We should prepare ourselves for the potential of that particular revelation.

We have not gone into this detail in the architecture because it seems both orthogonal to the general discussion in the architecture, extremely time-sensitive, and extremely algorithm-sensitive. It will be an irrelevant prediction and analysis within a handful of years.

Best Regards,
Brendan

[1] https://link.springer.com/article/10.1007/s11433-018-9307-1


> On 5 Nov 2020, at 09:38, Benjamin Kaduk via Datatracker <noreply@ietf.org> wrote:
>
> Benjamin Kaduk has entered the following ballot position for
> draft-ietf-suit-architecture-14: No Objection
>
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut this
> introductory paragraph, however.)
>
>
> Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
> for more information about IESG DISCUSS and COMMENT positions.
>
>
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-suit-architecture/
>
>
>
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
>
> Does the XIP case mean that repeated firmware updates would have
> potential to cause undue wear on the fixed flash cells that hold the
> firmware image?  If so, this might be noted in the security
> considerations.
>
> I am not sure that I have fully digested Bob Briscoe's detailed review
> comments, but it seems like we may want to continue to reflect on which
> portions of the architecture will be optional to implement, and how we
> might indicate that in the document.
>
> I also made a pull request for some editorial nits at
> https://github.com/suit-wg/architecture/pull/15 .
>
> Section 1
>
>   otherwise difficult.  Firmware updates
>   for IoT devices are expected to work automatically, i.e. without user
>   involvement.  Conversely, IoT devices are expected to account for
>   user preferences and consent when scheduling updates.  Automatic
>
> I can't quite tell if the "Conversely" case is intending to refer to IoT
> or non-IoT devices.
>
>   The firmware update process has to ensure that
>
>   -  The firmware image is authenticated and integrity protected.
>      [...]
>
>   -  The firmware image can be confidentiality protected so that
>      attempts by an adversary to recover the plaintext binary can be
>      [...]
>
> Perhaps it's just because Bob Briscoe's comments are fresh in my mind,
> but there seems to be something of a mismatch across these texts -- we
> "have to ensure" that the firmware *is* authenticated and integrity
> protected, but only that the image *can be* confidentiality protected.
> Is it really the case that we can ensure that an update process *can be*
> confidentiality protected, or is the confidentiality requirement more of
> a requirement on the architecture than on actual deployment?
>
>   While the IETF standardization work has been focused on the manifest
>   format, a fully interoperable solution needs more than a standardized
>   manifest.  For example, protocols for transferring firmware images
>   and manifests to the device need to be available as well as the
>   status tracker functionality.  Devices also require a mechanism to
>   discover the status tracker(s) and/or firmware servers, for example
>   using pre-configured hostnames or [RFC6763] DNS-SD.  These building
>   blocks have been developed by various organizations under the
>   umbrella of an IoT device management solution.  The LwM2M protocol is
>   one IoT device management protocol.
>
> We might put some forward references to things we do cover (like status
> tracker(s)), and a reference for LwM2M as well.
>
> Section 3
>
>   Hence, the following components are necessary on a device for a
>   firmware update solution:
>   [...]
>   -  a status tracker.
>
> Earlier we said that having the status tracker on the device was fairly
> uncommon.
>
> Section 7
>
>   time horizon for quantum-accelerated key extraction.  The worst-case
>   estimate, at time of writing, for the time horizon to key extraction
>   with quantum acceleration is approximately 2030, based on current
>   research [quantum-factorization].
>
> I'm not sure that I see how the reference suports the "approximately
> 2030" statement.
>
>
>

IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.