Re: [Suit] suit-firmware-encryption-00
Dick Brooks <dick@reliableenergyanalytics.com> Mon, 31 May 2021 17:07 UTC
Return-Path: <dick@reliableenergyanalytics.com>
X-Original-To: suit@ietfa.amsl.com
Delivered-To: suit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EC9A43A1EEB for <suit@ietfa.amsl.com>; Mon, 31 May 2021 10:07:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=messagingengine.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GcPYL69iFD4k for <suit@ietfa.amsl.com>; Mon, 31 May 2021 10:07:13 -0700 (PDT)
Received: from forward5-smtp.messagingengine.com (forward5-smtp.messagingengine.com [66.111.4.239]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B8FFC3A1EE9 for <suit@ietf.org>; Mon, 31 May 2021 10:07:13 -0700 (PDT)
Received: from compute6.internal (compute6.nyi.internal [10.202.2.46]) by mailforward.nyi.internal (Postfix) with ESMTP id B7E75194052A; Mon, 31 May 2021 13:07:12 -0400 (EDT)
Received: from mailfrontend1 ([10.202.2.162]) by compute6.internal (MEProxy); Mon, 31 May 2021 13:07:12 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-transfer-encoding:content-type :date:from:in-reply-to:message-id:mime-version:references :reply-to:subject:to:x-me-proxy:x-me-proxy:x-me-sender :x-me-sender:x-sasl-enc; s=fm2; bh=Sz8O5NdwOW+DzBxZkPkbmiSTBmD2n kkDPaniTR+Hkzc=; b=V0cK0YFrZCeGHKHkq+i5nr1P2sXRRyhyIU5Fdlt09Z7px tXOgvJLREANP0uki2s0GxDj1Jig4tGTMsq+q9uTYhkv8B6XGzF0LGOmrTSloRWH2 nx2dkF20GEn8i8TGuwPIb8z3zWjJt2S92Em62xGWpeUJShfrxcUiBzRR9Qlyiqhi UT6vpPCIHS2nw1n8C5qcxWbjV9fje68R0esYMY3opOBgah3/LG2P+a9Jgu+XNc7M VtC0k//WRnWBGPR93jQ5P8L531eUbmINau8tkL1tgPPgnJf0aZjsYNPVRNSTquXk KhNIlIBywRkHZG8OK65w45a9hExYnyWpilgFaFjtg==
X-ME-Sender: <xms:wBe1YETtdBeZIV8G3jE1ihMcqU68Ar1yINitZC8ZfB4QoKox8x8kqw> <xme:wBe1YBw6mgTI7viyisq1mUwBZMle9YQVDISaNkcpZwDU1BZ8mT3BCwcaA9JFcDUBR siaGy-6xWuhvlJimQ>
X-ME-Received: <xmr:wBe1YB0-EFfP0945JgLK5BJbOnIxDYQ6jEQJ1Us4uoS1vEyhWCjO-wY>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeduledrvdelfedguddutdcutefuodetggdotefrod ftvfcurfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfgh necuuegrihhlohhuthemuceftddtnecusecvtfgvtghiphhivghnthhsucdlqddutddtmd enfghrlhcuvffnffculddqhedmnecujfgurheprhfhvfhfjgfuffhokfggtgfgofhtseht jehgtddvtddvnecuhfhrohhmpedfffhitghkuceurhhoohhkshdfuceoughitghksehrvg hlihgrsghlvggvnhgvrhhghigrnhgrlhihthhitghsrdgtohhmqeenucggtffrrghtthgv rhhnpeefudejgfdvffeuhfefledvuefhueeguedtjeeltdduteejledtgffhtdduheegvd enucffohhmrghinhepfihhihhtvghhohhushgvrdhgohhvpdhrvghlihgrsghlvggvnhgv rhhghigrnhgrlhihthhitghsrdgtohhmpdhivghtfhdrohhrghenucevlhhushhtvghruf hiiigvpedtnecurfgrrhgrmhepmhgrihhlfhhrohhmpeguihgtkhesrhgvlhhirggslhgv vghnvghrghihrghnrghlhihtihgtshdrtghomh
X-ME-Proxy: <xmx:wBe1YIDsV1cB2cUVXuMTGfIrN_V1lJxiUwa8fuMcTsQ4r--iEUDL_g> <xmx:wBe1YNh2LnHWb3MGmAxOprRF09bUsxw2XhQRJuqhBDyUZz5p7uqLtA> <xmx:wBe1YEpGlU9SRrcZ11MNPK_V9rRjqeScBhpEtGElnA-vZGY0Bi9jUw> <xmx:wBe1YNYHEKiTLP4nVJG69ShclRrKU3upIa4uOdnBEuy0orjf0U0sTA>
Received: by mail.messagingengine.com (Postfix) with ESMTPA; Mon, 31 May 2021 13:07:11 -0400 (EDT)
Reply-To: dick@reliableenergyanalytics.com
From: Dick Brooks <dick@reliableenergyanalytics.com>
To: 'Russ Housley' <housley@vigilsec.com>
Cc: 'Michael Richardson' <mcr+ietf@sandelman.ca>, 'Hannes Tschofenig' <Hannes.Tschofenig@arm.com>, suit@ietf.org
References: <19586.1622075797@localhost> <DBBPR08MB5915CEC125579D78C108D540FA3F9@DBBPR08MB5915.eurprd08.prod.outlook.com> <F6C86CC2-3AF8-4CC5-BB47-AC6579DAA0C4@vigilsec.com> <13894.1622479289@localhost> <64BDF7A0-4B70-4EB3-A764-2BD6CAA3921A@vigilsec.com> <132601d7563d$7097f680$51c7e380$@reliableenergyanalytics.com> <E2D893E5-8462-4F69-88D0-29167B6DB1B3@vigilsec.com>
In-Reply-To: <E2D893E5-8462-4F69-88D0-29167B6DB1B3@vigilsec.com>
Date: Mon, 31 May 2021 13:07:07 -0400
Organization: Reliable Energy Analytics LLC
Message-ID: <140a01d7563f$65d2a130$3177e390$@reliableenergyanalytics.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQI/QDB0THmT0m+iwpMcIJ7U5AyVWwGeOG6MAhV23QADMtNZAgELPwAdAnBC4M8B5S+ZkanLw2DQ
Content-Language: en-us
Archived-At: <https://mailarchive.ietf.org/arch/msg/suit/sEXxckRdBHdpNY5-Drm3A3adhYI>
Subject: Re: [Suit] suit-firmware-encryption-00
X-BeenThere: suit@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Software Updates for Internet of Things <suit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/suit>, <mailto:suit-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/suit/>
List-Post: <mailto:suit@ietf.org>
List-Help: <mailto:suit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/suit>, <mailto:suit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 31 May 2021 17:07:19 -0000
I agree, Russ. Parties subject to the 5/12 Executive Order (https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/ex ecutive-order-on-improving-the-nations-cybersecurity/) will likely want to perform a proactive SCRM risk assessment prior to installation, if my interpretation of the EO is accurate. Thanks, Dick Brooks Never trust software, always verify and report! T http://www.reliableenergyanalytics.com Email: dick@reliableenergyanalytics.com Tel: +1 978-696-1788 -----Original Message----- From: Russ Housley <housley@vigilsec.com> Sent: Monday, May 31, 2021 12:56 PM To: Dick Brooks <dick@reliableenergyanalytics.com> Cc: Michael Richardson <mcr+ietf@sandelman.ca>; Hannes Tschofenig <Hannes.Tschofenig@arm.com>; suit@ietf.org Subject: Re: [Suit] suit-firmware-encryption-00 Dick: Yes, and there are other use cases that require encryption. Russ > On May 31, 2021, at 12:53 PM, Dick Brooks <dick@reliableenergyanalytics.com> wrote: > > " If a trustworthy party in the middle of the distribution path is > able to detect a problem with cleartext (but signed) firmware, they > can report a vulnerability and refuse to pass the update along." > > This is precisely the function SCRM vendors are performing today. > Encrypting a binary object would be an impediment to software supply > chain risk assessment functions in place today. > > Thanks, > > Dick Brooks > > Never trust software, always verify and report! T > http://www.reliableenergyanalytics.com > Email: dick@reliableenergyanalytics.com > Tel: +1 978-696-1788 > > -----Original Message----- > From: Suit <suit-bounces@ietf.org> On Behalf Of Russ Housley > Sent: Monday, May 31, 2021 12:49 PM > To: Michael Richardson <mcr+ietf@sandelman.ca> > Cc: Hannes Tschofenig <Hannes.Tschofenig@arm.com>; suit@ietf.org > Subject: Re: [Suit] suit-firmware-encryption-00 > > Michael: > >>>> I agree that there are also challenges with certification schemes >>>> that prevent developers from seeing the source code (or from >>>> publishing the source code). That's yet another issue. >> >>> SUIT is using signature for the authentication and integrity of the >>> firmware. If the signature remains in place, a party in the middle >>> of the distribution cannot insert any malware. >> >> The encryption of the firmware keeps third parties from auditing the >> software updates to determine if malware has been inserted at the > "factory" >> Both white and black hats are currently using binary diff systems to >> look at patches. Black hats use this to develop exploits in the gap >> between 9am EST and 9am PST! >> I am suggesting that this is a "Security Consideration" > > Yes, this is a reasonable thing to add to the Security Considerations. > > If a trustworthy party in the middle of the distribution path is able > to detect a problem with cleartext (but signed) firmware, they can > report a vulnerability and refuse to pass the update along. > > Russ > _______________________________________________ > Suit mailing list > Suit@ietf.org > https://www.ietf.org/mailman/listinfo/suit >
- Re: [Suit] suit-firmware-encryption-00 Russ Housley
- [Suit] suit-firmware-encryption-00 Michael Richardson
- Re: [Suit] suit-firmware-encryption-00 Carsten Bormann
- Re: [Suit] suit-firmware-encryption-00 Russ Housley
- Re: [Suit] suit-firmware-encryption-00 Laurence Lundblade
- Re: [Suit] suit-firmware-encryption-00 Hannes Tschofenig
- Re: [Suit] suit-firmware-encryption-00 Russ Housley
- Re: [Suit] suit-firmware-encryption-00 Michael Richardson
- Re: [Suit] suit-firmware-encryption-00 Russ Housley
- Re: [Suit] suit-firmware-encryption-00 Dick Brooks
- Re: [Suit] suit-firmware-encryption-00 Russ Housley
- Re: [Suit] suit-firmware-encryption-00 Dick Brooks
- Re: [Suit] suit-firmware-encryption-00 Hannes Tschofenig
- Re: [Suit] suit-firmware-encryption-00 Dick Brooks
- Re: [Suit] suit-firmware-encryption-00 Hannes Tschofenig
- Re: [Suit] suit-firmware-encryption-00 Dick Brooks
- Re: [Suit] suit-firmware-encryption-00 Hannes Tschofenig
- Re: [Suit] suit-firmware-encryption-00 Dick Brooks
- Re: [Suit] suit-firmware-encryption-00 Hannes Tschofenig
- Re: [Suit] suit-firmware-encryption-00 Dick Brooks
- Re: [Suit] suit-firmware-encryption-00 Hannes Tschofenig
- Re: [Suit] suit-firmware-encryption-00 Dick Brooks
- Re: [Suit] suit-firmware-encryption-00 Brendan Moran
- Re: [Suit] suit-firmware-encryption-00 Brendan Moran
- Re: [Suit] suit-firmware-encryption-00 Dick Brooks
- Re: [Suit] suit-firmware-encryption-00 Brendan Moran
- Re: [Suit] suit-firmware-encryption-00 Hannes Tschofenig
- Re: [Suit] suit-firmware-encryption-00 Brendan Moran
- Re: [Suit] suit-firmware-encryption-00 Dick Brooks
- Re: [Suit] suit-firmware-encryption-00 Brendan Moran
- Re: [Suit] suit-firmware-encryption-00 Dick Brooks
- Re: [Suit] suit-firmware-encryption-00 Brendan Moran
- Re: [Suit] suit-firmware-encryption-00 Dick Brooks
- Re: [Suit] suit-firmware-encryption-00 Brendan Moran
- Re: [Suit] suit-firmware-encryption-00 Brendan Moran
- Re: [Suit] suit-firmware-encryption-00 Dick Brooks
- Re: [Suit] suit-firmware-encryption-00 Dick Brooks
- Re: [Suit] suit-firmware-encryption-00 Brendan Moran
- Re: [Suit] suit-firmware-encryption-00 Brendan Moran
- Re: [Suit] suit-firmware-encryption-00 Dick Brooks
- Re: [Suit] suit-firmware-encryption-00 Dick Brooks