On 11/12/2016 5:11 PM, Michael Richardson wrote:
I realize that this thread is months old: I haven't seen any newer
conversation, so I'll continue anyway.
I would concur with MSJ's view that having an informational draft might be a
way to let this work go forward, but I suggest instead the right track might
be experimental.
I suggested Informational as the IETF has a long history of republishing
things developed elsewhere as "Here's how we did it documents".
Experimental documents generally describe ideas either where we know
there is a way forward, but we're not sure which of several paths work,
or ideas where the general utility may not be readily apparent. I
could live with experimental/non-WG.
I'm less sure that I agree with the subsequent view that we can't adopt this
item until we have assurance; I'd say that asking for the issue to be
addressed as part of the adoption process is reasonable, and objecting at
WGLC if it has not been addressed is the right way.
http://www.techworm.net/2016/11/researchers-use-drones-hijack-philips-hue-smart-lights.html
describes how the use of multi-party symmetric key systems weakens even
minimal security guarantees in a IOT system. In this article, its noted
that the HUE lights have firmware that's signed/encrypted by a symmetric
key (which - by definition then needs to be included in every device to
decrypt/verify the firmware), and that the attackers were able to
extract the key from a lightbulb with relative ease; craft their own
firmware and cause the lightbulbs to load it in a chain reaction.
There really isn't a lot of difference in the key extraction attack for
the above vs extracting a symmetric key used for group communications.
The only saving grace in group comms is that the group is smaller than
unity.
So I'd turn this around and ask for a offer of proof that we can find a
way to do this safely *BEFORE* having the IETF invest time and resources
in the work. I don't expect a fully fleshed out solution, but I haven't
seen even a hint that anyone knows how to mitigate the risks.
I will say I'm scared that garage door actuators and doors and security
systems will be sold with "lighting" interfaces. This same thing happened in
USB space: zillions of inappropriate USB devices were given HID designations
because the windows drivers were easier to write/get-signed.
At least most of those weren't cyber physical (except maybe the USB nerf
turret and its ilk
http://weburbanist.com/2009/11/18/truly-geeky-gadgets-15-usb-weapons-from-fail-to-fantastic/).
Mike
_______________________________________________
Ace mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ace