On 7/26/2016 11:20 AM, Kathleen Moriarty wrote:
Just to note, I'm interested to see Mike's response on why this higher
level of security is necessary in terms of a threat model. I'm not
convinced it is for lightbulbs, but that depends on how the threat
model/solution is scoped and the advice for use - lightbulbs of
current day capabilities and not other IoT devices with higher risk
factors.
Hi Kathleen -
Can you describe how you would prevent this protocol from being used in
"lower security threat environments"? I can't and I've thought about
how to write in various crippling conditions in the protocol structure
without any useful conclusions.
Given that, and given that public key cryptography has the desired
security properties, I remain unwilling to support symmetric key
multicast for any cyberphysical protocol. It's too risky and way too
shortsighted.
Or put another way - you might as well use hashed passwords for the
lighting problem - it has similar security properties to symmetric key
multicast for control.
If we went forward with this, you'd need one of the biggest, blackest
Black Box warnings on the protocol that we could conceive of to try to
constrain this to the "low level of security" domains:
DON'T Use this protocol for anything but lighting control.
DON'T Use this protocol where the the maximum output of the lighting
system could present a fire, thermal or blinding threat to safety.
DON'T Use this protocol to control lighting systems involved in
decontamination and sterilization. (E.g. UV decontamination).
DON'T Use this protocol to control any power outage backup lighting system.
DON'T Implement this in a way that prevents local physical override of
the lighting systems.
I'm sure there are others.
Mike
Thanks,
Kathleen
On Tue, Jul 26, 2016 at 10:52 AM, Kathleen Moriarty
<[email protected]
<mailto:[email protected]>> wrote:
Hello,
On Tue, Jul 26, 2016 at 7:10 AM, Kumar, Sandeep
<[email protected] <mailto:[email protected]>> wrote:
Hi Rene
Makes more sense this way. Need to also add replay protection
but that should be just part of the hash. Will it make things
better for user experience? That depends on how big the pool
of (good randomized) pre-computed values can be created before
they run out and causes a stuck behavior.
If things can be made better, we should of course do that.
However, there are risk tradeoffs that sometimes make sense. If
it is not possible to precompute keys for speed, storage or some
other reason, we need to figure that out and have it factored into
a threat model. This should all be part of a security
considerations section (whatever is decided). We are talking
about cyber physical devices and controllers, in this case
lightbulbs. Sure, lightbulbs are evolving, so it may make a
difference if we are talking about lightbulbs that can turn
on/off, dim, change colors, or ones that perform other functions
(MIT Media Lab type stuff). It also matters if we are talking
about use of lights within a controlled area and whether it is
connected to other networks or not (IoT devices, Internet,
protected network, etc.). No one is suggesting that the same key
be used in multiple environments, but a single group key for one
environment.
There are always tradeoffs in security and that's okay. What is
the bigger threat model?
Lights turning on/off in large buildings could result in increased
energy costs.
Lights turning on/off could result in safety issues (they could be
extreme).
What measures would mitigate these (and maybe other risks)?
Suggest dividing up large buildings into sets so that a single
group key could be used in that set. Limit connections to other
networks or have protective measures between them.
Maybe someone in this space can help more to build out the threat
model to help the WG with this decision. There are still some
unanswered questions about the capabilities of hardware, are the
alternate solutions to a group key feasible? Will blocking the
use of a single group key prevent the ability to move forward with
a standard?
Thanks,
Kathleen
Regards
Sandeep
*From:*Rene Struik [mailto:[email protected]
<mailto:[email protected]>]
*Sent:* Tuesday, July 26, 2016 3:00 AM
*To:* Kumar, Sandeep; Stephen Farrell; Somaraju Abhinav;
Michael StJohns; [email protected] <mailto:[email protected]>
*Subject:* Re: [Ace] Adoption of Low Latency Group
Communication Security Work in ACE
Hi Sandeep:
Fair enough, but with, e.g., ECDSA, computation of the
ephemeral key R:=kG can be carried out independently of the
remainder of the signature computation (where one computes
e:=h(m), and calculates s:=(1/k)(e-r*d)(mod n) and
subsequently outputs (r,s), where r is derived from R). So, if
one wishes to, one can pre-compute many ephemeral key pairs
(k, kG) and use those on demand {David Naccache, if I remember
correctly, elaborated on these types of "labor division" in a
1998 paper}. So, in the Philips high-granularity luminary, the
one simply hashes the state (still only a few-bytes entry) and
then combines e with r, d, k, to produce signature component s
-- a simple linear equation with two modular multiplies as cost.
Let's make things better...
Rene
On 7/25/2016 5:34 PM, Kumar, Sandeep wrote:
Because sometimes a lightswitch can have more than two states.
http://images.philips.com/is/image/PhilipsConsumer/6916431PH-IMS-en_GB?wid=494&hei=435&$pnglarge$
The color dial on this switch (src:
http://www.philips.co.uk/c-p/6916431PH/livingcolors-remote-control)
can set the color of lights one chooses. That would be
quite some precomputations.
Sandeep
-----Original Message-----
From: Ace [mailto:[email protected]] On Behalf Of
Stephen Farrell
Sent: Monday, July 25, 2016 9:26 PM
To: Somaraju Abhinav; Michael StJohns; [email protected]
<mailto:[email protected]>
Subject: Re: [Ace] Adoption of Low Latency Group
Communication Security Work in ACE
On 25/07/16 17:59, Somaraju Abhinav wrote:
> we essentially have 50-100 ms for the
signing+verification process and
> I do not know of a solution that does this
Just a clarifying question: why can't the signing possibly
be done asynchronously? E.g. the private key holder could
sign a value that will only be sent later - as long as it
has one of those ready to emit whenever needed one can
ignore the signing time. That can have power consumption
consequences but I'd guess that's ok for a lightswitch.
If signing can be done ahead of time, then only
verification time has to be considered.
S.
------------------------------------------------------------------------
The information contained in this message may be
confidential and legally protected under applicable law.
The message is intended solely for the addressee(s). If
you are not the intended recipient, you are hereby
notified that any use, forwarding, dissemination, or
reproduction of this message is strictly prohibited and
may be unlawful. If you are not the intended recipient,
please contact the sender by return e-mail and destroy all
copies of the original message.
_______________________________________________
Ace mailing list
[email protected] <mailto:[email protected]>
https://www.ietf.org/mailman/listinfo/ace
--
email:[email protected] <mailto:[email protected]> | Skype:
rstruik
cell:+1 (647) 867-5658 <tel:%2B1%20%28647%29%20867-5658> | US:+1 (415)
690-7363 <tel:%2B1%20%28415%29%20690-7363>
_______________________________________________
Ace mailing list
[email protected] <mailto:[email protected]>
https://www.ietf.org/mailman/listinfo/ace
--
Best regards,
Kathleen
--
Best regards,
Kathleen
_______________________________________________
Ace mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ace
_______________________________________________
Ace mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ace