[T2TRG] draft-richardson-secdispatch-idevid-considerations

Amyas Phillips <amyas@ambotec.org> Wed, 19 August 2020 10:43 UTC

Return-Path: <amyas@ambotec.org>
X-Original-To: t2trg@ietfa.amsl.com
Delivered-To: t2trg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 073763A174F for <t2trg@ietfa.amsl.com>; Wed, 19 Aug 2020 03:43:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=ambotec.org
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wOKUPd8mt0LD for <t2trg@ietfa.amsl.com>; Wed, 19 Aug 2020 03:43:45 -0700 (PDT)
Received: from mail-wr1-x431.google.com (mail-wr1-x431.google.com [IPv6:2a00:1450:4864:20::431]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8F1953A1751 for <t2trg@irtf.org>; Wed, 19 Aug 2020 03:43:45 -0700 (PDT)
Received: by mail-wr1-x431.google.com with SMTP id a5so21025050wrm.6 for <t2trg@irtf.org>; Wed, 19 Aug 2020 03:43:45 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ambotec.org; s=google; h=from:content-transfer-encoding:mime-version:subject:message-id:date :to; bh=XI3J38hu7U3RVdFYj4prUvs538/VSeNiVU+oRvv6USA=; b=GskcXl8rUjqgBJuyl+y/lZ5+/oTWqc2cm1JEN670us8GD8uBJ+yb3dhQG7v1yZvuDR LkmSGQJq/PSfG8xCBYIioB74QJiR9GgZwRHbVU3b9zMXXGdby+SL6Rqqn0kZHjieEC4a Zq5c+A9LLLR9NGHZulznxVbf8Q29hBE9j1Z1dOZBDWMCv7EwL+yHb2gdCdsLy7Ey42jB 2F/93ZbMX34gLYIIMS0TeyToluyn8C9qT26Tsfp7E6ATDCEd6YoIVV1lwmTvLMLnqKL+ +wJ9wuP1Rhi9CFYBjJQ4dMflze0X7Mf93j+zd+FY1sdv0KqZ6gbO1vHO5WzbPQocL2vh w+wA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:content-transfer-encoding:mime-version :subject:message-id:date:to; bh=XI3J38hu7U3RVdFYj4prUvs538/VSeNiVU+oRvv6USA=; b=lZ5bphUTBy0U52rWiP9qc4/LhviTgP3TWgqBHRO8/gzqJovSdCC2xnw2sQjnbVOgGF 51JQC6Rg2t3ipVeQjbriWoBy9NUxKZ2mLcQC/7Cr4/3qpyY8fk3DK/nti/nHXnVag8uP 9+4zAa4OR3X9NzcSF6h7x/htsu0ZvtMduUbdJwfZwYMPh+3Ru67nBA60xM+sz0Lgsz4i yZUOr/dxwK/DPRRenfca73f6mx55MyFCVZEntRSKJdWo2O0od0mRQ9Y0rU85KLaLEzHI a/kXDrFQka85zW/Or5cNhhMwEHG+uhBIbckBVqPFAMuJqc03wADbJnebC4/ApRnSpJSU oTQQ==
X-Gm-Message-State: AOAM533bfGrAc8j7BujhS06XTH33t/unJuywSMeumoDAISdM37+jRYiW oN5d9EiZs8VPZf/Jj0Un4ZipEzrxay7jqyarJnjbZA==
X-Google-Smtp-Source: ABdhPJwHXO65pnbFeHD4Vd+nwmEF3oVvGhv2t05PXo6YY3FEEkQx2f03/jzhANvE14vyE41AI12tpw==
X-Received: by 2002:a5d:51c9:: with SMTP id n9mr25785884wrv.423.1597833823312; Wed, 19 Aug 2020 03:43:43 -0700 (PDT)
Received: from [10.6.3.53] ([194.35.233.230]) by smtp.gmail.com with ESMTPSA id a23sm9768963wme.0.2020.08.19.03.43.42 for <t2trg@irtf.org> (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Wed, 19 Aug 2020 03:43:42 -0700 (PDT)
From: Amyas Phillips <amyas@ambotec.org>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.120.23.2.1\))
Message-Id: <8D15C3E4-18EA-49A0-8DEE-9C002D750C49@ambotec.org>
Date: Wed, 19 Aug 2020 11:43:42 +0100
To: t2trg@irtf.org
X-Mailer: Apple Mail (2.3608.120.23.2.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/t2trg/Gj2vvcTMdbPOGkCMDjtlfGh7W3Q>
Subject: [T2TRG] draft-richardson-secdispatch-idevid-considerations
X-BeenThere: t2trg@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IRTF Thing-to-Thing Research Group <t2trg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/t2trg>, <mailto:t2trg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/t2trg/>
List-Post: <mailto:t2trg@irtf.org>
List-Help: <mailto:t2trg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/t2trg>, <mailto:t2trg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Aug 2020 10:48:32 -0000

Great document, Michael and Jay. 

This is where your concepts elucidation and terminology coining work was heading? I'll have to study it again more carefully, but first reading looks fully unambiguous and systematic. This area (provisioning) really needs a breakdown of well understood concepts to permit description and discussion of specific instances. I'll try to use these in ongoing IoTSF work on supply chain security. 

- I like that you've tackled trust anchors and device identities together. 
- I appreciate the discussion about where manufacturing test fits - that is easy to overlook (from my position anyway) but it has to be accounted for in provisioning processes.
- I like your use of number of individuals with access to ROT establishment as a metric (first-stage-initialization). ROT establishment is a critical operation but in my observation it is not always recognised as such. The trustworthiness of ROTs is often taken as given.
- I like how you've directed the discussion of vulnerability to abuse of trust anchors mostly towards the external PKI, not limiting it to the
TAs provisioned onto the device. For any discussion of ROT trustworthiness I agree this needs to be in scope.

Although I understand this as an informative document for manufacturers and users of IDevID I wonder if you could explicitly address a wider audience, who may be provisioning TAs and identities for other purposes. Or, separate the general concepts and terminology development from the discussion of application to IDevID. Just a thought. Either way this is a great contribution and I hope it will raise understanding more widely of how important the integrity of provisioning processes is to creating trustworthy devices.

Thanks for this contribution.

Amyas Phillips
Supply Chain Integrity Working Group chair, IoTSF