On 12/22/2016 3:42 AM, Eliot Lear wrote:
Hi,

This working group has been in a state of indecision about this draft
for quite some time and I would like to gain some clarity on the matter.

On the one hand, we have a draft that there seems to be unanimous
agreement would be useful to the lighting people.
Actually, we have a draft that the lighting people unanimously agree that would be useful to the lighting people. Not quite the same thing.

And, as I've said before, if this is ONLY applicable to the lighting people then they should go off and write an Informational "Here's how we do it" document and not try for an internet standard.

On the other hand, we
have some concern that the draft might be misapplied to environments
where PSK/symmetric keys should not be employed.

As Hannes wrote, security is not a black and white matter.  We need to
acknowledge that fact.  This, to me, seems to boil down to an
applicability statement.

I don't know why people think I'm just going to let things pass without trying to inject some rigor.

My last question: What is the security requirement for an ACE Group comm protocol?

My current minimum bid: Compromise of a single device shall not result in the attacker gaining privileges over the group greater than those nominally granted to the device being attacked. or less nuanced: Compromise of a single device shall not result in the compromise of the entire group.

I asked the above question a month ago in response to Hannes' email and received no answer. None.

As far as I can glean from the discussion (this one and the 2 year one in DTLS), the current answer from the lighting folk to "What is the security requirement" is "we don't really care as long it is weak enough that we don't have to pay for hardware or endure latency for validation so we can use this fundamentally insecure symmetric key group system". I apologize if that's unfair, but I literally haven't been able to find ANY indication that there's any consideration in selecting the "security" solution than this.

And as far as I can tell, that means that their security requirement is the empty set - which is sort of an appropriate name for security theater.

Can ANYONE provide me with a parseable and non-empty security requirement for symmetric key group communications?


On the matter of status, it is not appropriate to release this as an
experiment.  People want to code, release that code and see their
customers use that code.  This is precisely what a proposed standard is for.

For an "ACE Group comm" protocol, it has to be generally applicable to the ACE space, and not just this this tiny hardware and cost constrained corner. An Informational RFC by the lighting folk provided as whole cloth is the appropriate approach - not an internet standard in any way shape or form.


I would like to see this draft adopted by the working group, an
appropriate applicability statement added, and see it shipped.

I would like a security group to actually produce secure protocols. I'm not even sure this approach is applicable to the lighting scenario in any meaningful way.

Mike


Eliot




_______________________________________________
Ace mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ace


_______________________________________________
Ace mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ace

Reply via email to