On 11/12/2016 5:11 PM, Michael Richardson wrote:
I realize that this thread is months old: I haven't seen any newer
conversation, so I'll continue anyway.

I would concur with MSJ's view that having an informational draft might be a
way to let this work go forward, but I suggest instead the right track might
be experimental.
I suggested Informational as the IETF has a long history of republishing things developed elsewhere as "Here's how we did it documents". Experimental documents generally describe ideas either where we know there is a way forward, but we're not sure which of several paths work, or ideas where the general utility may not be readily apparent. I could live with experimental/non-WG.

I'm less sure that I agree with the subsequent view that we can't adopt this
item until we have assurance; I'd say that asking for the issue to be
addressed as part of the adoption process is reasonable, and objecting at
WGLC if it has not been addressed is the right way.

http://www.techworm.net/2016/11/researchers-use-drones-hijack-philips-hue-smart-lights.html describes how the use of multi-party symmetric key systems weakens even minimal security guarantees in a IOT system. In this article, its noted that the HUE lights have firmware that's signed/encrypted by a symmetric key (which - by definition then needs to be included in every device to decrypt/verify the firmware), and that the attackers were able to extract the key from a lightbulb with relative ease; craft their own firmware and cause the lightbulbs to load it in a chain reaction.

There really isn't a lot of difference in the key extraction attack for the above vs extracting a symmetric key used for group communications. The only saving grace in group comms is that the group is smaller than unity.

So I'd turn this around and ask for a offer of proof that we can find a way to do this safely *BEFORE* having the IETF invest time and resources in the work. I don't expect a fully fleshed out solution, but I haven't seen even a hint that anyone knows how to mitigate the risks.




I will say I'm scared that garage door actuators and doors and security
systems will be sold with "lighting" interfaces.  This same thing happened in
USB space: zillions of inappropriate USB devices were given HID designations
because the windows drivers were easier to write/get-signed.


At least most of those weren't cyber physical (except maybe the USB nerf turret and its ilk http://weburbanist.com/2009/11/18/truly-geeky-gadgets-15-usb-weapons-from-fail-to-fantastic/).

Mike


_______________________________________________
Ace mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ace

Reply via email to