Charlie is excited to hear more about option 4! :)

> Use MICs on EBs, with a secret key distributed during the joining
> process, and add vendor specific IE to identify the network.

This seems like a chicken and egg problem.  In order to get the secret key
for the EBs, you need to
go through the joining process...which starts with receiving an EB...

I think that the confusion here is in thinking that EBs are involved in
normal network operation.  They are not.
EBs are just used during joining, to get a new mote aware of the existence
of a network, so that it can go through
the joining process, and receive the secret keys that are used in normal
network operation.
Having Mallory forge EBs does NOT mess up the existing network.  No mote
which has joined the network
is listening to EBs.  EBs are not used in synchronization of motes that are
already in the network, or anything
else.  EBs are just used to initiate the join process, and nothing more.

Once motes are joined to a network, they use a randomly generated secret
key(s) K2.  They do not use EBs for anything.

ksjp

On Thu, Apr 23, 2015 at 6:48 AM, Tero Kivinen <[email protected]> wrote:

> Kris Pister writes:
> > Alice and Bob make wireless temperature sensors that run a 6tisch stack.
> > Charlie owns a nationwide chain grocery store and is rolling out 6tisch
> > everywhere.
> > Zelda sells wireless toys that use 802.15.4e.
> > Mallory is always lurking.
> >
> > Charlie needs to decide if and how to use message integrity checks on
> > enhanced beacons.
> > He thinks that he has three options:
> > 1) don't use MICs on EBs.
> > 2) use MICs on EBs, with a secret key
> > 3) use MICs on EBs, with a well-known key
>
> But the best option is to use option 4
>
> 4) Use MICs on EBs, with a secret key distributed during the joining
>    process, and add vendor specific IE to identify the network.
>
> In this case the EBs are authenticated with MIC, but when the Alice
> and Bob's devices try to connect it they do not know the key, so they
> cannot verify the authentication information, but as the frames are
> not encrypted they can still see the vendor specfic IE, and check that
> it matches what they expect it to match.
>
> This way they will be able to filter out EBs which they want to hear.
> I.e. after finding the EB which has suitable IE they start joining
> process  to that network. During that joining process they will get
> the secret key used to protect the EBs and secret key used to protect
> the normal data traffic.
>
> After that they can use the draft-ietf-6tisch-minimal to talk to the
> network, and they can use it securely as they can now authenticate the
> IEs sent in the EBs, and they know Mallory cannot fake those, as
> Mallory does not know the secret key, so they do not need to do any
> other protocol.
>
> If they would be using the option 3, they cannot trust anything EBs
> have, thus they cannot use draft-ietf-6tisch-minimal at all, as
> Mallory could mess up the network very easily by just sending few EBs
> with wrong data in IEs.
>
> Also now as the Charlie has IE which is used to separate the networks
> from each other, when it makes new network used for its cashier
> machines, and it does not want to share the cashier machine keys with
> the temperature sensors it wants to use different keys, and it also
> wants to make sure that the temperature sensors do not needlessly try
> to join the other network, he can just use different content for that
> IE. Also as the those two networks use different secret keys, both
> networks can trust the data sent on their EBs. This EB secret key is
> different for every site, and might even be rekeyed every now and
> then.
>
> And yes, Mallory can still send fake EBs with same IE content, trying
> to trick the temperature sensors to join his network, but as the
> joining process authentication fails, the temperature sensors will not
> join his network, but try to find better network i.e the real network.
>
> > But if Charlie uses option 3, a well-known key, Mallory will be able to
> > spoof EBs.
> > Of course, if he uses no MIC at all, Mallory will also be able to spoof
> EBs.
>
> And if Mallory can spoof EBs he can easily mess up the network
> completely. This also means that devices cannot use
> draft-ietf-6tisch-minimal as they cannot trust anything that is sent
> in the EBs, so some other protocol is used to know even the shared
> slots used to talk to anybody.
>
> > What should Charlie do?
>
> Use option 4...
> --
> [email protected]
>
_______________________________________________
6tisch mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/6tisch

Reply via email to