Qin,
Any feedback on Michel's question?
Thanks,
Thomas
On Tue, Jul 14, 2015 at 5:45 PM, Michel Veillette <
[email protected]> wrote:
> Hi Michael
>
> Why keys are defined using "leaf-list uint8" (RFC 6020 section 7.7)
> instead of "binary" (RFC 6020 section 9.8) ?
> And why min-elements 128? It's not 16 bytes?
>
> leaf-list define an array of nodes all sharing the same data type.
> A binary define a single node.
>
> See below:
> > leaf-list PSK {
> > type uint8;
> > min-elements 128;
> > description "A list of bytes for the PSK while using PSK method";
> > }
>
> Should it be replaced by
> > leaf PSK {
> > type binary;
> > length 16;
> > description "Pre-Shared Key while using PSK method";
> > }
>
> Michel Veillette
> System Architecture Director
> Trilliant Inc.
> Tel: 450-375-0556 ext. 237
> [email protected]
> www.trilliantinc.com
>
>
> -----Original Message-----
> From: 6tisch [mailto:[email protected]] On Behalf Of Michael
> Richardson
> Sent: 13 juillet 2015 17:36
> To: tisch; Qin Wang
> Cc: Thomas Watteyne; Pascal Thubert (pthubert); Xavier Vilajosana
> Subject: Re: [6tisch] attributes of 6top interface YANG model
> corresponding to K1 and K2
>
>
> Qin Wang <[email protected]> wrote:
> > Thank you very much for your comments. Can I bring the discussion
> thread to
> > 6tisch ML?
>
> Yes, you can forward, or I can reply. I will include my entire email if
> you want... yeah let me just write.
>
> I was asked privately if I could provide some YANG content for the 6top
> document wrt to the K1/K2 usage specified in MINIMAL.
>
> I wrote:
> > So, I'm trying to figure out, in the context of *MINIMAL* why there
> would
> > be a way to set K1 and K2.
>
> I amend to:
> > By definition, K1 is used to "authenticate" the beacon (MIC only
> mode)
> > It may be well known, or might be provisioned through
> > out-of-scope-magic to some value.
> >
> > A node that does not know the correct K1 can still get on the network
> > by observing the beacon, but it won't be able to authenticate it.
>
> I then wrote:
> > K2 would be used to authenticate and encrypt the rest of the traffic,
> > including the Informational Elements on which the 6top-layer-2
> commands
> > would be sent. So setting K2' would require knowing K2.
>
> So knowing K2, one can set K1 and/or K2 (or program
> schedules/timeslots/etc).
> Since K2 is shared across the network, it's a pretty weak group key, and I
> feel squimish about allowing K2 to be replaced knowing only K2.
>
> Further:
> > And one could set K1/K2 on a device, and then bring the device to a
> new
> > network. So having this available is useful for doing key management
> once
> > joined, but I'm not convinced it belongs in *minimal*
>
> But, if we want to have some YANG, the definition we have for 6top
> security is exactly what we need:
>
> > leaf-list PSK {
> > type uint8;
> > min-elements 128;
> > description "A list of bytes for the PSK while using PSK method";
> > }
>
> So, maybe rename it to PSK_K1_beacon, and add PSK_K2_production.
>
>
> --
> Michael Richardson <[email protected]>, Sandelman Software Works -=
> IPv6 IoT consulting =-
>
>
>
> _______________________________________________
> 6tisch mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/6tisch
>
_______________________________________________
6tisch mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/6tisch