Hi Markus -

I needed to think about how to reply to this specifically and explain why its still a bad idea to try and scale things. See below.

On 7/27/2016 8:34 AM, Grunwald, Markus wrote:

Hello,

sorry to break the threading by not replying directly to a post, but until now I have only been reading the list passively. So I have no mail to reply to…

I followed your discussion regarding group multicast and how to encrypt them. I see the problem, but I think one single approach to solve it either way will not be enough:

-The 200ms barrier for lighting products is quite fix. If we build products with a reaction time that is too long, nobody is going to use it.

-On the other hand, I am scared of IoT products that could have bigger latency, but still use a somewhat weaker crypto. I’m thinking of Fire/Smokedetectors at big airports or the like. Even toggling all lights of an airport in a one-second rhythm could cause huge problems.

-So we need both, but can hardly have it.

For me, this leads to multiple security levels:

1)Basic security: fast response, low cost with lower security: use symmetric keys. Use this where the risk is low.

2)High security, low cost: Allow slow(er) response times, because of the ECC calculations. Kind of a compromise…

3)High security, higher cost: add some crypto hardware. For high risk environments with low latency


Analogies are sometimes suspect and are never exact matches, but let me try one:

You want to build the equivalent of three different types of motor powered vehicles: a go-cart, a family car and a high end luxury vehicle.

You obviously don't want to put in all the safety stuff into the go-cart. It's cheap, it's meant for fun, and it won't be driving on the roads, so why bother and besides which it would hurt your bottom line?

In the real world, there are lots of things that keep a go-kart off of the highway - two of which are fear of death (both the go-cart driver's and everyone else) and police and laws (e.g. a go-cart is not "street legal") acting as enforcement mechanisms.

My question - what enforcement mechanism do you propose to keep your cheap, unsafe at speed, go-cart symmetric key multicast system off the rest of the information superhighway? How do you propose to keep someone from strapping on a physical access control management system to the back of your go-cart and taking it for a ride in the real world?

I think go-carts are fun, but I would never propose that they be allowed on the highway, or for that matter any public road.



I don’t think that we will be able to cover the whole range of requirements with one single approach. Implementing the lowest level would be relatively easy for first concepts.


You really mean simple, and simple != easy. Symmetric key multicast is a simple concept. It is not *easy* to get right, and it is not *easy* to mitigate the threats from that approach. The threats are not necessarily limited to the original field of use (lighting...).

Later, Mike

ps - way back when - maybe 1990 - I was trying to debug why a telnet connections through a terminal server that one of the other parts of the organization had bought would silently stop working. It took me a while to figure it out, but it would stop working if any packet got dropped. It turns out that the terminal server did not implement TCP retransmits. When we asked the vendor about it they said that they'd never seen a drop so they didn't see any need to implement it. When questioned further, it turns out they did all their implementation work on a single segment of ethernet and really never saw any dropping whereas the real-world network had a router that occasionally dropped packets it couldn't queue. The point of this story is that you as a vendor may not necessarily be able to control what me as the customer does with your product. You may think its safe given specific constraints, but imposing those constraints on an end user is - hard? Impossible?

Best regards,


Markus Grunwald
Development Engineer

OSRAM GmbH
DS D LMS-COM DE-1
Parkring 33
85748 Garching, Deutschland
Tel. +49 89 6213-3678
mailto:[email protected]
www.osram.com

*Bitte prüfen Sie der Umwelt zuliebe, ob der Ausdruck dieser Mail erforderlich ist!
*
OSRAM GmbH: Vorsitzender des Aufsichtsrates: Peter Bauer; Geschäftsführung: Dr. Olaf Berlien (Vorsitzender), Dr. Stefan Kampmann; Sitz der Gesellschaft: München; Registergericht: München, HRB 201526; WEEE-Reg.-Nr. DE 71568000



_______________________________________________
Ace mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ace


_______________________________________________
Ace mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ace

Reply via email to