Re: [Drip] I-D Action: draft-ietf-drip-rid-11.txt

Adam Wiethuechter <adam.wiethuechter@axenterprize.com> Sat, 23 October 2021 03:10 UTC

Return-Path: <adam.wiethuechter@axenterprize.com>
X-Original-To: tm-rid@ietfa.amsl.com
Delivered-To: tm-rid@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6D4CC3A0972 for <tm-rid@ietfa.amsl.com>; Fri, 22 Oct 2021 20:10:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.8
X-Spam-Level:
X-Spam-Status: No, score=-1.8 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URI_HEX=0.1] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=axenterprize.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0ImxaSYlCL_n for <tm-rid@ietfa.amsl.com>; Fri, 22 Oct 2021 20:10:34 -0700 (PDT)
Received: from NAM10-BN7-obe.outbound.protection.outlook.com (mail-bn7nam10on2125.outbound.protection.outlook.com [40.107.92.125]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4404E3A0967 for <tm-rid@ietf.org>; Fri, 22 Oct 2021 20:10:34 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=QGfBQeKXxTo6MXXbSoE/kNXyOgBasySiiKmT6jXzt5dM1fhtUb21VR9FMbZvwhK+BMHJQP2ZBlQKSPVqvS4Cun353wLCMC5xmYN2e5vIOiK42s2vonbyd5HtMgglAZH66GE0S9Eai7sVd5mDv7ZgOXxe5QACYlKdTA4cemXVLzJXO/j74sc8liKXktAxA6nAwms+tIGZ8DY1QTMVylJhFaCac/emTRjlbf4qsl/ian2i3donXHzs6g11Ils/HK4ZjpAeJZl3o8GNYeUs3KklTv27/OQ5x1sbAMGMzRaNLmKh9pk1qEVNnlNFvImZlg+dLXqXJLtJ9fwmOG25tkzAFg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Y3NtX2jQW2VHo23okgACEzOzTB68SgICIqcr8WMMrHs=; b=TjXwANKenLCIkHITPthboPxZYrVd+Mcisv1eFuSNpdYgfnj/ZUuLTk2KnDhta0jGBi4HeiQMFHinV4Eg8gVer1/CQBkoX7bi55A+DCHnROaDNw45Um4B+CiZoIHaHF4ji1QLF5BKd0ByhBGQ1wIo18ICZKBB97K8A3/xEIgCYkRWuKaedCfCzC0K3ajktp2l+wMCs9q0HbMCkbq1Sf+jjYSCBEdgMEzQwX9lTDczaf7EUVJmCjZsHetcWq1SiedSWl9earWfev+3yyUB6e4KGlnczGFq+paxze5jQxfoc9gh2xq0IlcJ2Xb9xS2OFaNdYwhlJx3569WcG3BEXl/d8g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=axenterprize.com; dmarc=pass action=none header.from=axenterprize.com; dkim=pass header.d=axenterprize.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=axenterprize.onmicrosoft.com; s=selector1-axenterprize-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Y3NtX2jQW2VHo23okgACEzOzTB68SgICIqcr8WMMrHs=; b=jHXInkU77o4SVppPe5d9pMmmsI9nFkMasI/mLuXAi76daiPUaGOss3As6szXZbNH3c7+lT5JrVzipRJUkilY68OgWaCuy4AwXk7liIFxhK2VPERrMWUZRcUi7R/QL2U+6N53CEBFYysLk7O8s7ASXgN+r1qftAsJAASXA9g3ANU=
Received: from SN6PR13MB2446.namprd13.prod.outlook.com (2603:10b6:805:5f::26) by SA1PR13MB5467.namprd13.prod.outlook.com (2603:10b6:806:232::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4649.11; Sat, 23 Oct 2021 03:10:31 +0000
Received: from SN6PR13MB2446.namprd13.prod.outlook.com ([fe80::541:db4f:a52a:b41b]) by SN6PR13MB2446.namprd13.prod.outlook.com ([fe80::541:db4f:a52a:b41b%5]) with mapi id 15.20.4628.016; Sat, 23 Oct 2021 03:10:31 +0000
From: Adam Wiethuechter <adam.wiethuechter@axenterprize.com>
To: Robert Moskowitz <rgm@labs.htt-consult.com>, "tm-rid@ietf.org" <tm-rid@ietf.org>
Thread-Topic: [Drip] I-D Action: draft-ietf-drip-rid-11.txt
Thread-Index: AQHXxe8FJ8uPQinRkku0O61TsbSC4qvcU5KAgAOGhmc=
Date: Sat, 23 Oct 2021 03:10:30 +0000
Message-ID: <SN6PR13MB24469A1037BA0600B72A080188819@SN6PR13MB2446.namprd13.prod.outlook.com>
References: <163476083017.12374.12735080713762694901@ietfa.amsl.com> <d74188f4-4713-f6de-31de-d19324157cc6@labs.htt-consult.com>
In-Reply-To: <d74188f4-4713-f6de-31de-d19324157cc6@labs.htt-consult.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
suggested_attachment_session_id: da2e4344-5c61-766a-a90b-07d8fd794bc9
authentication-results: labs.htt-consult.com; dkim=none (message not signed) header.d=none;labs.htt-consult.com; dmarc=none action=none header.from=axenterprize.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 42007712-a675-4dd6-d010-08d995d2abf6
x-ms-traffictypediagnostic: SA1PR13MB5467:
x-microsoft-antispam-prvs: <SA1PR13MB546726D1AEED60D7E2AC2C1188819@SA1PR13MB5467.namprd13.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:6108;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:SN6PR13MB2446.namprd13.prod.outlook.com; PTR:; CAT:NONE; SFS:(376002)(136003)(346002)(366004)(39830400003)(396003)(38070700005)(66446008)(53546011)(186003)(66476007)(66556008)(66574015)(4001150100001)(6506007)(52536014)(316002)(33656002)(9686003)(166002)(64756008)(71200400001)(86362001)(38100700002)(5660300002)(44832011)(26005)(19627405001)(83380400001)(55016002)(8936002)(966005)(76116006)(66946007)(110136005)(122000001)(21615005)(508600001)(8676002)(2906002)(7696005)(91956017); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_SN6PR13MB24469A1037BA0600B72A080188819SN6PR13MB2446namp_"
MIME-Version: 1.0
X-OriginatorOrg: axenterprize.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: SN6PR13MB2446.namprd13.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 42007712-a675-4dd6-d010-08d995d2abf6
X-MS-Exchange-CrossTenant-originalarrivaltime: 23 Oct 2021 03:10:30.8966 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 00ad0178-ead0-441e-96ff-0c72baf3a6fa
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: kUAFsjoIwq361Zx+SAG2AgsQVKDXAwVoreaj82rNOsqjz6ye5aZ5Oez4o/6tLbmfFuBVqoOD2PgGDTbBye0apauem5UtKgIyrCfYho8xM1Wp1kDY6977gMdMW//Xue0H
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA1PR13MB5467
Archived-At: <https://mailarchive.ietf.org/arch/msg/tm-rid/ryJKXsb8bkKXx5hlAW8PQ9LgN3Y>
Subject: Re: [Drip] I-D Action: draft-ietf-drip-rid-11.txt
X-BeenThere: tm-rid@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Drone Remote Identification Protocol <tm-rid.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tm-rid>, <mailto:tm-rid-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tm-rid/>
List-Post: <mailto:tm-rid@ietf.org>
List-Help: <mailto:tm-rid-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tm-rid>, <mailto:tm-rid-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 23 Oct 2021 03:10:40 -0000

Bob,

Here is my list of changes for you and some discussion points.

/s/HITs are statistically unique through the cryptographic hash feature of second-preimage resistance./
HHITs are statistically unique through the cryptographic hash feature of second-preimage resistance.

Section 2.2 -- is this needed here if its in -arch/-registries? It is also outdated compared to -arch.

Section 4 -- You should add TYPE-4 and clarify that a TYPE-4, subtype 1 is a DRIP Entity Tag (its already in F3411).

Section 4.2 -- /s/Basic Message/Basic ID Message

Section 4.6 -- See Appendix B discussions below

Section 5

Change the DET reverse lookup to:

a3ad1952ad0a69e.5.20.10.det.remoteid.aero

I do not understand why we are included the prefix in this when its static for the DET format (2001:30/28) and why we were breaking the HHIT up by its hextets instead of its fields. I have been using the following form for DET FQDNs:

<hash_hex>.<ogaid_hex>.<hda_int>.<raa_int>.det.remoteid.aero

I question if the HDA and RAA value should stay in hex form. I have been using the full form (included the padding 0s) - your example uses a condensed version. Be warned that DNS that is a different FQDN, meaning we would need records for them.

In my implementation work I have found that DNS is case-sensitive (something I did not know!). We need to decided if its upper or lower case (for both DETs and Serial Numbers). This is probably a -registries thing rather than this draft.

A lot of this should become clearer as -registries finally gets fleshed out.

Section 9 -- already present in F3411?

Section 11.1 -- /s/ASTM Basic Message/ASTM Basic ID Message

Appendix B -- should just be the SelfAttestation (-auth-formats B.1)

Appendix B.1

This is just a BroadcastAttestation (-auth-formats B.6) but not signed by the UA dynamically. See -auth-formats security considerations on replay attacks for the reason myself and Stu thought of a few months ago.

You mentioned in a review of my -auth-formats that you think a 2-byte offset instead of a full 4-byte expiration timestamp would be better.

First even if we switch to a 2-byte offset format for expiration time (on ALL Attestations/Certificates) we will still blow the Authentication Data limit of 200. By 4-bytes in fact.

Second, two bytes can only offset by ~45 days. This is arguably not enough time for longer lasting attestations (such as the BroadcastAttestation).

We either have an expiration timestamp (and do not dynamically sign the BroadcastAttestation) or we don't (and the BroadcastAttestation is a static item being broadcast by the UA) - the size limit gives us those two options.

We _could_ do something like the psuedo-TCP header for this "special" format (potentially requiring another SAM Type allocation). We dynamically sign the BroadcastAttestation (136-bytes) and append the signature, using the ASTM Authentication Message timestamp as part of the signing operation. This will require F3411 implementations allowing the higher layers to set/get the timestamp of the Authentication Message before it is sent. For a highly embedded design where the F3411 implementation is buried deep and interconnect with the Bluetooth/Wi-Fi stack this could be impossible - an implementation may not even allow you to see the timestamp as its part of the F3411 framing, only giving the application an API to set/get data.

Another option, one I do NOT like, is to have another Attestation format defined that looks the same as the BroadcastAttestation but missing a timestamp and special rules about how it is used. To me, that sounds like a recipe for confusion no matter what we write in the documents.

Overall, I think this is all avoided by the following: In -auth-formats I specify that the BroadcastAttesation (carried by DRIP Link) is not enough. You MUST also send dynamically signed data, using either DRIP Wrapper or DRIP Manifest. We can extend this to also have the option to send AuthType 0x1 (UA SelfAttestation) with a freshly generated SelfAttestation of the aircraft.

On a related note:

Stu brought up in a discussion today with me that a protentional vulnerability is that someone registers you in a valid registry by stealing your HI, forging a new HHIT with it and registering it somewhere else. '

An Observer would obtain the BroadcastAttestation, check its signature (made by the registry) and it would validate. This Observer would then start to make assumptions based on registry metadata and could potentially go after someone for being in a registry "they don't like".

There are a few problems with this:

1) is that the registry should be validating any SelfAttestations being sent in. If the registry is flawed (or in on the scheme) this could get past such a check.
2) an Observer with just the BroadcastAttestation would think everything is fine, but as soon as other signed data appears the signatures would start to fail (all they have is the public HI, not the private key). If the bad actor just doesn't send dynamic data, it is already suspicious as -auth-formats has that they MUST do so.

Mitigating 1) is by having a vetting process before being added to the hierarchy and periodically checking to confirm conformance.
Mitigating 2) is self-discipline of the receiver device code. A rabbit hole we probably shouldn't go down.

We need to discuss this specific issue in more detail and determine if such a corner case should be worried about.

My brain is now fried -- I will use what remaining power I have to work on -registries some more.

--------
73,
Adam T. Wiethuechter
Software Engineer; AX Enterprize, LLC
________________________________
From: Tm-rid <tm-rid-bounces@ietf.org> on behalf of Robert Moskowitz <rgm@labs.htt-consult.com>
Sent: Wednesday, October 20, 2021 4:19 PM
To: tm-rid@ietf.org <tm-rid@ietf.org>
Subject: Re: [Drip] I-D Action: draft-ietf-drip-rid-11.txt

Changes in sec 4.2 and 11.  Please review.

Adam and I are discussing sec 5, as he actually has done some
implementation demos and I may make adjusts along what he has done.

Also Adam and I need to work out App B and drip-auth.

So there may be yet an update before the cutoff.  Of course comments are
welcome and I will make adjusts as needed.



On 10/20/21 4:13 PM, internet-drafts@ietf.org wrote:
> A New Internet-Draft is available from the on-line Internet-Drafts directories.
> This draft is a work item of the Drone Remote ID Protocol WG of the IETF.
>
>          Title           : DRIP Entity Tag (DET) for Unmanned Aircraft System Remote Identification (UAS RID)
>          Authors         : Robert Moskowitz
>                            Stuart W. Card
>                            Adam Wiethuechter
>                            Andrei Gurtov
>        Filename        : draft-ietf-drip-rid-11.txt
>        Pages           : 29
>        Date            : 2021-10-20
>
> Abstract:
>     This document describes the use of Hierarchical Host Identity Tags
>     (HHITs) as self-asserting IPv6 addresses and thereby a trustable
>     identifier for use as the Unmanned Aircraft System Remote
>     Identification and tracking (UAS RID).  Within the context of RID,
>     HHITs will be called DRIP Entity Tags (DET).  HHITs self-attest to
>     the included explicit hierarchy that provides Registrar discovery for
>     3rd-party identifier attestation.
>
>
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-drip-rid/
>
> There is also an HTML version available at:
> https://www.ietf.org/archive/id/draft-ietf-drip-rid-11.html
>
> A diff from the previous version is available at:
> https://www.ietf.org/rfcdiff?url2=draft-ietf-drip-rid-11
>
>
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>
>

--
Tm-rid mailing list
Tm-rid@ietf.org
https://www.ietf.org/mailman/listinfo/tm-rid