Simon,

For me, vendor IDs have to problems: (1) it's a pain to manage that space
and (2) what do you do if a company does NOT want to announce it's vendor
it in each EB.

Thomas

On Thu, Apr 23, 2015 at 10:37 AM, Simon Duquennoy <[email protected]> wrote:

>
> On Thu, Apr 23, 2015 at 10:19 AM, Thomas Watteyne <
> [email protected]> wrote:
>
>> Simon,
>>
>> Welcome to the list!!
>>
>> My general impression is that using MIC for network segregation only is
>>> overkill.
>>
>>
>> I respectfully disagree :-) CCM* is in all motes, and auth+enc mod is
>> used on all data packets. On well designed chips, both the time and energy
>> spent for running CCM* is negligible.
>> I might be missing your point completely. Can you provide more info about
>> what you mean by overkill?
>>
>
> Fair enough. I find this overkill conceptually but on good chips this will
> be cheap enough, agreed.
>
>
>>
>> * How about defining a 6TiSCH-specific IE (with an ID from the
>>> "unmanaged" space) to uniquely identify vendors?
>>>
>>
>> I consider the MIC key to essentially play that role. Yet, instead of
>> sending a explicit field with a vendor identifier it is (e.g. in an IE),
>> the "vendor identifier" is used as a key for MIC.
>> If you want the IE to provide the same 16-byte "segregation power" than
>> CCM, is has to be 2+16 bytes long. A MIC is 4-8 bytes.
>> Using an IE doesn't prevent from mistaking a random IEEE802.15.4 frame in
>> the air for a vaid EB.
>>
>
> If you enforce checking of the vendor ID on incoming EB then you filter
> out others' traffic don't you?
> One point in favor of having an IE vs. MIC: it makes explicit that we do
> segregation, nothing else. No-one will be mistaken thinking we're trying to
> achieve security. For troubleshooting it may also be nice to be able to
> sniff packets and see vendor IDs rather than having to deal with
> (non-constant and cryptic) MICs.
>
>
>>
>>> * If I were Charlie and really needed security, I would ask Alice and
>>> Bob to provide their sensors with a pre-deployment key setup mechanism, and
>>> use a pre-shared secret key.
>>
>>
>> This is similar to my conclusion a couple of e-mails ago in this thread,
>> although I need to insist that the key used for EB authentication doesn't
>> impact the "security" of your netwokr, as the ream gatekeeper is the JCE.
>>
>
> Agreed.
>
> Simon
>
>
>> Thomas
>>
>>
>> On Thu, Apr 23, 2015 at 9:07 AM, Simon Duquennoy <[email protected]>
>> wrote:
>>
>>> Dear all,
>>>
>>> As I'm new to this list I apologize in advance if I'm missing the
>>> obvious.
>>>
>>> My general impression is that using MIC for network segregation only is
>>> overkill.
>>>
>>>
>>> Best regards,
>>> Simon Duquennoy
>>>
>>>
>>> On Thu, Apr 23, 2015 at 5:14 AM, Xavier Vilajosana <
>>> [email protected]> wrote:
>>>
>>>> Kris,
>>>>
>>>> can you explain me
>>>>
>>>> "Charlie does some testing of option 1, and finds that when there is a
>>>> Zelda's Toy Shop
>>>> near one of his stores, his networks take a *really* long time to
>>>> join.  It seems that
>>>> Zelda's toys send 15.4e EBs too, and they send a lot of them.  The
>>>> sensors that
>>>> Alice and Bob sell spend a lot of time and battery energy trying to
>>>> join the wrong network.
>>>> Charlie would really like something better than option 1."
>>>>
>>>> why if there is no authentication it takes longer that if there is
>>>> authentication? I understand that if a network sends a lot of EBs other
>>>> networks will receive the frames despite there is authentication or not.
>>>>  if there is no authentication a node parses the EB and decides to
>>>> join or not. If the nodes uses a MIC it has to receive the packet as well
>>>> and check the MIC then decides to join or not. In both cases the nodes
>>>> receive a lot of EBs so the situation is similar (the only difference is
>>>> that if we use MIC and the node can decode it the node knows that it is
>>>> allowed to join that network).
>>>>
>>>> I only see benefit if the MIC is used as a filter and this is done
>>>> automatically by the hw.
>>>>
>>>> regards,
>>>> Xavi
>>>>
>>>> 2015-04-22 19:15 GMT+02:00 Kris Pister <[email protected]>:
>>>>
>>>>> Alice and Bob make wireless temperature sensors that run a 6tisch
>>>>> stack.
>>>>> Charlie owns a nationwide chain grocery store and is rolling out
>>>>> 6tisch everywhere.
>>>>> Zelda sells wireless toys that use 802.15.4e.
>>>>> Mallory is always lurking.
>>>>>
>>>>> Charlie needs to decide if and how to use message integrity checks on
>>>>> enhanced beacons.
>>>>> He thinks that he has three options:
>>>>> 1) don't use MICs on EBs.
>>>>> 2) use MICs on EBs, with a secret key
>>>>> 3) use MICs on EBs, with a well-known key
>>>>>
>>>>> Charlie does some testing of option 1, and finds that when there is a
>>>>> Zelda's Toy Shop
>>>>> near one of his stores, his networks take a *really* long time to
>>>>> join.  It seems that
>>>>> Zelda's toys send 15.4e EBs too, and they send a lot of them.  The
>>>>> sensors that
>>>>> Alice and Bob sell spend a lot of time and battery energy trying to
>>>>> join the wrong network.
>>>>> Charlie would really like something better than option 1.
>>>>>
>>>>> Charlie decides to use option 2, a MIC with a secret key, and it works
>>>>> great!  The sensors
>>>>> ignore EBs from Zelda's, and only respond to EBs from his networks. He
>>>>> asks Alice and Bob
>>>>> if they are willing to install that secret key before they ship the
>>>>> sensors to his various
>>>>> stores, and he's such a big customer that they say sure.  He is
>>>>> driving an industry standard.
>>>>>
>>>>> But then Charlie gets worried.  He's probably going to end up buying
>>>>> sensors from
>>>>> Aaron, Abu, Acacia, and Ada as well.  How will he keep his key
>>>>> secret?  Eventually
>>>>> someone will find it or leak it, and then there will be a big news
>>>>> story "Charlie's
>>>>> Markets Hacked!"  He imagines himself trying to explain to reporters
>>>>> that the
>>>>> MIC key on the EB is just there for network segregation and message
>>>>> integrity.
>>>>> He imagines that wouldn't go very well, so he decides option 2 is
>>>>> out.  Maybe
>>>>> he can just publish the MIC key in the standard?
>>>>>
>>>>> But if Charlie uses option 3, a well-known key, Mallory will be able
>>>>> to spoof EBs.
>>>>> Of course, if he uses no MIC at all, Mallory will also be able to
>>>>> spoof EBs.
>>>>>
>>>>> What should Charlie do?
>>>>>
>>>>> ksjp
>>>>>
>>>>> _______________________________________________
>>>>> 6tisch mailing list
>>>>> [email protected]
>>>>> https://www.ietf.org/mailman/listinfo/6tisch
>>>>>
>>>>
>>>>
>>>> _______________________________________________
>>>> 6tisch mailing list
>>>> [email protected]
>>>> https://www.ietf.org/mailman/listinfo/6tisch
>>>>
>>>>
>>>
>>> _______________________________________________
>>> 6tisch mailing list
>>> [email protected]
>>> https://www.ietf.org/mailman/listinfo/6tisch
>>>
>>>
>>
>
_______________________________________________
6tisch mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/6tisch

Reply via email to