[Suit] suit-firmware-encryption-00
Michael Richardson <mcr+ietf@sandelman.ca> Thu, 27 May 2021 19:27 UTC
Return-Path: <mcr+ietf@sandelman.ca>
X-Original-To: suit@ietfa.amsl.com
Delivered-To: suit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E64ED3A09E4 for <suit@ietfa.amsl.com>; Thu, 27 May 2021 12:27:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1WTD5tDg_nhI for <suit@ietfa.amsl.com>; Thu, 27 May 2021 12:27:53 -0700 (PDT)
Received: from tuna.sandelman.ca (tuna.sandelman.ca [209.87.249.19]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D226A3A09DF for <suit@ietf.org>; Thu, 27 May 2021 12:27:52 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by tuna.sandelman.ca (Postfix) with ESMTP id BE5E138F58 for <suit@ietf.org>; Thu, 27 May 2021 15:37:49 -0400 (EDT)
Received: from tuna.sandelman.ca ([127.0.0.1]) by localhost (localhost [127.0.0.1]) (amavisd-new, port 10024) with LMTP id 1P6oFmS6KSGZ for <suit@ietf.org>; Thu, 27 May 2021 15:37:49 -0400 (EDT)
Received: from sandelman.ca (obiwan.sandelman.ca [209.87.249.21]) by tuna.sandelman.ca (Postfix) with ESMTP id 88D7A39EE4 for <suit@ietf.org>; Wed, 26 May 2021 20:46:32 -0400 (EDT)
Received: from localhost (localhost [IPv6:::1]) by sandelman.ca (Postfix) with ESMTP id 3813EE7 for <suit@ietf.org>; Wed, 26 May 2021 20:36:37 -0400 (EDT)
From: Michael Richardson <mcr+ietf@sandelman.ca>
To: suit@ietf.org
X-Attribution: mcr
X-Mailer: MH-E 8.6+git; nmh 1.7+dev; GNU Emacs 26.1
X-Face: $\n1pF)h^`}$H>Hk{L"x@)JS7<%Az}5RyS@k9X%29-lHB$Ti.V>2bi.~ehC0; <'$9xN5Ub# z!G,p`nR&p7Fz@^UXIn156S8.~^@MJ*mMsD7=QFeq%AL4m<nPbLgmtKK-5dC@#:k
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg="pgp-sha512"; protocol="application/pgp-signature"
Date: Wed, 26 May 2021 20:36:37 -0400
Message-ID: <19586.1622075797@localhost>
Archived-At: <https://mailarchive.ietf.org/arch/msg/suit/nNSmHBgRPjtks5CM8cGohi1o1h0>
Subject: [Suit] suit-firmware-encryption-00
X-BeenThere: suit@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Software Updates for Internet of Things <suit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/suit>, <mailto:suit-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/suit/>
List-Post: <mailto:suit@ietf.org>
List-Help: <mailto:suit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/suit>, <mailto:suit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 27 May 2021 19:27:59 -0000
I have read draft-tschofenig-suit-firmware-encryption-00 and I think that the WG should adopt it. It fits within the charter as it is within what would have been done in the manifest document. Some comments: 1) I found this sentence really awkward: In addition to offering protection against modification, which is provided by a digital signature or a message authentication code, the firmware image may also be confidentiality protected using encryption. Maybe: the firmware image may also be afforded confidentiality using encryption. 2) "This might be done to protect confidential information or prevent discovery of vulnerabilities through reverse engineering." this screams security through obscurity. I know that some people still think that this is important, so I guess I would just drop the claim. There are also some significant public policy issues around declining access to review and audit code, including defending against insertion of malware at the source, or by National Security Letter. (consider SolarWind situation) I would like some text in the Security Considerations about this. 3) Are the terms CEK and KEK from RFC3394? I didn't find it there. I wonder how they play out as acronyms in languages without a soft-C sound... where both come out as "kay eh kay" (CEK) and "kay eh kay" (KEK)... It's bad enough in DNSSEC with Zee Ess Kay vs Zed Ess Kay... 4) "However, the COSE_recipient structure can contain the same CEK encrypted with many different KEKs if needed to reach all of the authorized recipients." This is exactly like how DVDCSS works, and how the dvdcss breach occured when a KEK was all zeros. Something to think about. It seems that the HPKE version would not suffer from this mishap? 5) We had a discussion about how to have a complete CDDL during the meeting yesterday. I think that this version has the complete CDDL shown? There isn't that much copy and pasted from 8152(bis), and I think it's clearer like it is. It just needs to be noted what is coming from 8152. If 8152bis-bis *CHANGED* COSE_Encrypt in an incompatible way, then we'd still be pointing at 8152bis until we updated this document. 6) should the pseudo-code in section 4, starting with "CEK = random()", be a figure? 7) irtf-cfrg-hpke says it is in state awaiting IRSG reviews. Does that mean it is close to being published? 8) The new HPKE methods defines here might be generally useful outside of firmware-encryption. I don't propose to change the document in a way to make it generic, but are there any applicability that we need to import? 9) Given that: "Both cases require some upfront communication interaction, which is not part of the SUIT manifest." do we need to say anything about this communication? Can an ECDH be part of an IDevID? Would manufacturers be tempted to use the same ECDH in every device? In all devices made on a particular day? -- ] Never tell me the odds! | ipv6 mesh networks [ ] Michael Richardson, Sandelman Software Works | IoT architect [ ] mcr@sandelman.ca http://www.sandelman.ca/ | ruby on rails [ -- Michael Richardson <mcr+IETF@sandelman.ca> . o O ( IPv6 IøT consulting ) Sandelman Software Works Inc, Ottawa and Worldwide
- Re: [Suit] suit-firmware-encryption-00 Russ Housley
- [Suit] suit-firmware-encryption-00 Michael Richardson
- Re: [Suit] suit-firmware-encryption-00 Carsten Bormann
- Re: [Suit] suit-firmware-encryption-00 Russ Housley
- Re: [Suit] suit-firmware-encryption-00 Laurence Lundblade
- Re: [Suit] suit-firmware-encryption-00 Hannes Tschofenig
- Re: [Suit] suit-firmware-encryption-00 Russ Housley
- Re: [Suit] suit-firmware-encryption-00 Michael Richardson
- Re: [Suit] suit-firmware-encryption-00 Russ Housley
- Re: [Suit] suit-firmware-encryption-00 Dick Brooks
- Re: [Suit] suit-firmware-encryption-00 Russ Housley
- Re: [Suit] suit-firmware-encryption-00 Dick Brooks
- Re: [Suit] suit-firmware-encryption-00 Hannes Tschofenig
- Re: [Suit] suit-firmware-encryption-00 Dick Brooks
- Re: [Suit] suit-firmware-encryption-00 Hannes Tschofenig
- Re: [Suit] suit-firmware-encryption-00 Dick Brooks
- Re: [Suit] suit-firmware-encryption-00 Hannes Tschofenig
- Re: [Suit] suit-firmware-encryption-00 Dick Brooks
- Re: [Suit] suit-firmware-encryption-00 Hannes Tschofenig
- Re: [Suit] suit-firmware-encryption-00 Dick Brooks
- Re: [Suit] suit-firmware-encryption-00 Hannes Tschofenig
- Re: [Suit] suit-firmware-encryption-00 Dick Brooks
- Re: [Suit] suit-firmware-encryption-00 Brendan Moran
- Re: [Suit] suit-firmware-encryption-00 Brendan Moran
- Re: [Suit] suit-firmware-encryption-00 Dick Brooks
- Re: [Suit] suit-firmware-encryption-00 Brendan Moran
- Re: [Suit] suit-firmware-encryption-00 Hannes Tschofenig
- Re: [Suit] suit-firmware-encryption-00 Brendan Moran
- Re: [Suit] suit-firmware-encryption-00 Dick Brooks
- Re: [Suit] suit-firmware-encryption-00 Brendan Moran
- Re: [Suit] suit-firmware-encryption-00 Dick Brooks
- Re: [Suit] suit-firmware-encryption-00 Brendan Moran
- Re: [Suit] suit-firmware-encryption-00 Dick Brooks
- Re: [Suit] suit-firmware-encryption-00 Brendan Moran
- Re: [Suit] suit-firmware-encryption-00 Brendan Moran
- Re: [Suit] suit-firmware-encryption-00 Dick Brooks
- Re: [Suit] suit-firmware-encryption-00 Dick Brooks
- Re: [Suit] suit-firmware-encryption-00 Brendan Moran
- Re: [Suit] suit-firmware-encryption-00 Brendan Moran
- Re: [Suit] suit-firmware-encryption-00 Dick Brooks
- Re: [Suit] suit-firmware-encryption-00 Dick Brooks