Dear Rafa,
Thanks for the comments! Please, see inline.
Le 13/07/2015 00:38, Rafa Marin Lopez a écrit :
Hi Alexander
This is interesting work and use case.
Some comments:
"It can be used during all stages of the lifecycle of the network,
e.g. discovery, authentication, operation. " --> Basically authentication
is based on DTLS... is that what you mean?
Actually, here we are referring to the use of your draft - EAP-over-CoAP
- for the authentication. Upon authentication, the exchanges may be
protected with DTLS (which uses the MSK generated after the EAP
exchanges), or with the AUTH option you are proposing. I think that this
should be the recommended way to do authentication in LRWANs.
However, one can imagine having DTLS negotiation (e.g. with PSK), but
this seems less flexible and appropriate for this types of networks.
What do you think?
Figure 3 says associated then authenticated but in the text is different
authenticated -> associated
That's a typo. Thanks for catching that - the text is correct, the
schema is wrong. It should be "authenticated -> associated".
In semi-associated state you mention: "In that state, the Node-F broadcasts
frames, handled by the Node-G,
but the network cannot join the Node-F on a regular basis." What do you
mean? The node-G cannot contact node-F?
The goal behind the semi-associated state is that there are some network
operators that rely heavily on uni-directional traffic (node-F to
node-G). Also, there are services which can be implemented in that way
(e.g. tracking goods). There CAN be L2 interaction (e.g. L2 ACK), or in
some cases even CoAP ACK, but that is not a necessary condition for many
applications.
To sum up, the case to imagine is a device, which wakes up periodically,
and without checking any connectivity or other types of information,
sends a message to the network, after which it sleeps again. If there is
a network present, and a node-G willing to process the message, then
everything works.
I strongly believe that this behavior should be managed carefully (e.g.
a node-F MUST send a CoAP CONfirmable message every N messages), giving
the opportunity to the network to actually interact with the node-F from
time to time.
Once again, this is a real-world operation scheme of an IoT network
operator.
In section 3.3.1:
"The frames SHOULD be signed,
so that they could be authenticated by the network." This signing process
is before the authentication and key management. How is it possible to sign the
frames? Any pre-shared key?
In fact, you say:
"and enough information for the Node-G to
authenticate the message sender. This can be achieved through a
Confirmable CoAP message, where the user data are POSTed to a well-
known resource defined on the Node-G. DTLS with integrity check can
be used, with long-lived keys negotiated by the Node-F and the
network."
DTLS is established for protection (Confirmable CoAP message does not achieve
authentication by itself). Again, if DTLS is used and those messages are
authenticated, why do you need authentication phase?
Here I think that one of the transitions in Figure 3 is making the
things more complex than it should (and is causing a lot of questions).
The Disconnected -> Semi-associated state should be removed. The
reasoning behind is, that the device (node-F) MUST authenticate at least
once to the network before entering the semi-associated state. This way,
there is a secure association between the network and the node-F. The
node-F can then sleep for (very) long periods, wake up, and send a
signed message to the network.
The tricky part is that in the mean time the node-F could have moved and
could be located in a different part of the network, e.g. located under
a different node-G. For that reason, the sent message should contain
enough information, so that a node-G receiving a signer CoAP message
could determine the secure association (e.g. to which other node-G in
the network it is associated), and forward the message. Note that it may
be appropriate to use Constrained Object Signing and Encryption (COSE),
instead (in addition of) DTLS.
In section 3.3.3:
"For example, it may provide the AAA server, which could authenticate
the Node-F, or its EAP-Identity. " --> Assuming that an AAA infrastructure
is used for authentication ( I think that assumption should be expressed in the
document), typically Node G will have the AAA client and, actually, it does not need to
know the IP address of the AAA server that authenticates the node F, just the next hop
AAA server. On the other hand, Node G will not typically provide the EAP identity, are
you referring to that?
Yes, you are correct.
In section 3.3.4
The reference to EAP-over-CoAP is
https://tools.ietf.org/html/draft-marin-ace-wg-coap-eap-01 and not
[I-D.garcia-core-security] where the general problem of bootstrapping is
explained.
Thanks for catching this!
Hope this helps.
Best Regards.
Thanks a lot for your remarks!
Best,
Alexander
El 06/07/2015, a las 17:27, Alexander Pelov <[email protected]> escribió:
Dear all,
I'd like to bring to your attention a new document, which was submitted this
weekend: draft-pelov-core-cosol-00
It presents a new type of far-reaching, low-rate radio technologies (such as
Semtech LoRa and SigFox) and an extensible mechanism to operate these networks
based on CoAP. We document the way REST can be used to manage these networks.
You can find the current text at the following address:
https://tools.ietf.org/html/draft-pelov-core-cosol-00
We would be happy to discuss with anyone interested the contents of the draft
and the possible future works on it. Also, we will be glad if there is any
possibility to present even briefly during a session.
Best,
Alexander
_______________________________________________
6tisch mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/6tisch
-------------------------------------------------------
Rafael Marin Lopez, PhD
Dept. Information and Communications Engineering (DIIC)
Faculty of Computer Science-University of Murcia
30100 Murcia - Spain
Telf: +34868888501 Fax: +34868884151 e-mail: [email protected]
-------------------------------------------------------
_______________________________________________
6tisch mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/6tisch