Hi Pascal:
Please note that I provided suggested dispositions of all
security-related comments re draft-ietf-6tisch-architecture-05 roughly a
month ago, on Thu March 5, 2015:
a) Suggested disposition of Jonathan Simon's comments:
Please see my email of Thu March 5, 2015, 7.26pm EDT:
http://www.ietf.org/mail-archive/web/6tisch/current/msg03020.html
Note: suggested disposition discussed (and formulated) during conf call
with Kris Pister, who acted on Jonathan Simon's behalf.
b) Suggested disposition of Michael Richardson's comments:
Please see my email of Thu March 5, 2015, 7.27pm EDT:
http://www.ietf.org/mail-archive/web/6tisch/current/msg03021.html
c) Suggested disposition of my own comments:
Please see my email of Thu March 5, 2015, 8:17pm
EDT:http://www.ietf.org/mail-archive/web/6tisch/current/msg03022.html
I suggest you give this a look.
Best regards, Rene
On 4/7/2015 2:42 PM, Pascal Thubert (pthubert) wrote:
Dear all :
I published in the bucket an early version of archie 07 that takes
care of most of Michael’s comments (Michael please review my responses
in the tickets and eventually propose a better stack figure).
But some comments on section 13 need some more attention, in
particular from the security DT. Here they are:
------------
Device Authentication: The JN and the JA mutually authenticate each
other and establish a shared key, so as to ensure on-going
authenticated communications. This may involve a server as a third party.
I again say that this is incorrect, the JA will never be able to
authenticate itself to the JN. It may be able to present some
authorization from the network owner, that the JA is authorized to act
on behalf of the network owner.
Unless you consider un-authenticated DH exchange "authentication", or
you decide that it's okay for the JA to just not accept any public
(some kind of leap of faith), the JA will not have an identity that a
JN will accept.
-----------
I have also repeatedly complained that figure 10 is inaccurate,
because it fails to depict that authorization begins before
authentication finishes. Perhaps the second two unidirectional arrows
are part of the authentication phase, I don't know.
I suggest that figure 10 be omitted.
---------
Comments?
Cheers,
Pascal
_______________________________________________
6tisch mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/6tisch
--
email: [email protected] | Skype: rstruik
cell: +1 (647) 867-5658 | US: +1 (415) 690-7363
_______________________________________________
6tisch mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/6tisch