[Tm-rid] IETF trustworthy IDs alternatives for tm-rid

Robert Moskowitz <rgm@labs.htt-consult.com> Thu, 17 October 2019 13:22 UTC

Return-Path: <rgm@labs.htt-consult.com>
X-Original-To: tm-rid@ietfa.amsl.com
Delivered-To: tm-rid@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D16F81200C5 for <tm-rid@ietfa.amsl.com>; Thu, 17 Oct 2019 06:22:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.5
X-Spam-Level:
X-Spam-Status: No, score=-0.5 tagged_above=-999 required=5 tests=[BAYES_05=-0.5, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RihITctRIb6t for <tm-rid@ietfa.amsl.com>; Thu, 17 Oct 2019 06:22:09 -0700 (PDT)
Received: from z9m9z.htt-consult.com (z9m9z.htt-consult.com [23.123.122.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 771781200E3 for <tm-rid@ietf.org>; Thu, 17 Oct 2019 06:22:09 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by z9m9z.htt-consult.com (Postfix) with ESMTP id 404606211B for <tm-rid@ietf.org>; Thu, 17 Oct 2019 09:22:08 -0400 (EDT)
X-Virus-Scanned: amavisd-new at htt-consult.com
Received: from z9m9z.htt-consult.com ([127.0.0.1]) by localhost (z9m9z.htt-consult.com [127.0.0.1]) (amavisd-new, port 10024) with LMTP id VUcSuVzIwLUP for <tm-rid@ietf.org>; Thu, 17 Oct 2019 09:22:03 -0400 (EDT)
Received: from lx140e.htt-consult.com (unknown [192.168.160.12]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by z9m9z.htt-consult.com (Postfix) with ESMTPSA id B0FB76211A for <tm-rid@ietf.org>; Thu, 17 Oct 2019 09:22:03 -0400 (EDT)
To: "tm-rid@ietf.org" <tm-rid@ietf.org>
From: Robert Moskowitz <rgm@labs.htt-consult.com>
Message-ID: <e6445e3b-93ff-ea50-f06e-7111b9fc70d7@labs.htt-consult.com>
Date: Thu, 17 Oct 2019 09:21:55 -0400
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.1.1
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/tm-rid/tiel_Bra1akmNP6TlO4kV_hDu3k>
Subject: [Tm-rid] IETF trustworthy IDs alternatives for tm-rid
X-BeenThere: tm-rid@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Trustworthy Multipurpose RemoteID <tm-rid.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tm-rid>, <mailto:tm-rid-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tm-rid/>
List-Post: <mailto:tm-rid@ietf.org>
List-Help: <mailto:tm-rid-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tm-rid>, <mailto:tm-rid-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 17 Oct 2019 13:22:13 -0000

Eric challenged me to show why HIP/HITs for UAS RemoteID, and not 
something else in the IETF toolbox, so here goes:

Just a couple of requirements:

1)    The ID MUST be 20 bytes or smaller.

2)    It MUST be non-spoofable within the context of RemoteID broadcast 
messages (some collection of messages provides proof of UA ownership of ID).

3)    In context (that is in a RemoteID broadcast message), just the ID 
provides enough information on how at least the observer's USS (UAS 
Service Supplier) can provide both public and private information on the 
UAS.

Now a little 'context' setting.  ASTM has already defined a set of 
textual RemoteIDs:

1: Serial Number (ANSI/CTA-2063)
2: CAA Assigned ID
3: UTM Assigned ID (UUID RFC4122)

The work here MUST surpass these in terms of Trustworthy.

The options I have found in my research over the past couple weeks (and 
please add your knowledge to the list):

1)    X.509 certs where something like the cert sequenceNumber is the 
RemoteID
2)    RFC 6920 (Naming Things with Hashes), sec 8.2
3)    SSH keyID
4)    HIT (Host Identity Tag)

Option 1 is no better than what ASTM/FAA is considering for any of the 
current proposed types.  Somehow, there will be a PKI and from that 
knowledge of the UAS is gained.  This REQUIRES Internet Access (think 
disaster or other non-Internet situations) and a GLOBAL PKI (the UA flew 
from Canada to the US or UK to France post Brexit).

Option 2 meets requirements 1 & 2, but needs to be augmented so that the 
Hash provides context for 3.  Is it supported for IPsec and/or QUIC for 
UAS/observer secure communications (phase 2).

Option 3 is similar to 2, but has a significant collision issue for 
global use.

Option 4 is similar to 2, but needs significantly less augmentation.

If I look at the work to make any of these a real value-add to US 
Remote/NetworkID, my money is on HIT/HIP as the most complete.

More details to follow in the ID that Stu and I are supposedly writing 
and for the BOF.

Bob