FYI what you all are discussing are potential changes to the normative language 
of
https://tools.ietf.org/html/draft-ietf-anima-bootstrapping-keyinfra-22#section-7.2

Probably strengthening this paragraph from MAY/SHOULD to a MUST:

   3.  The pledge MAY have an operational mode where it skips voucher
       validation one time.  For example if a physical button is
       depressed during the bootstrapping operation.  This can be useful
       if the manufacturer service is unavailable.  This behavior SHOULD
       be available via local configuration or physical presence methods
       (such as use of a serial/craft console) to ensure new entities
       can always be deployed even when autonomic methods fail.  This
       allows for unsecured imprint.

If this is a suggested change please comment on the subsequent paragraph which 
reads:

It is RECOMMENDED that "trust on first use" or any method of skipping
   voucher validation (including use of craft serial console) only be
   available if hardware assisted Network Endpoint Assessment [RFC5209]
   is supported.  This recommendation ensures that domain network
   monitoring can detect innappropriate use of offline or emergency
   deployment procedures when voucher-based bootstrapping is not used.

The use of SHOULD and RECOMMEND are strong indicators of how this should be 
done. As much so as a MUST "security requirements we write into our specs, 
we'll have no means of enforcement”.

Since Eliot has brought up other options like being able to replace the MASA 
trust anchors or some form of  “self emitted” voucher here are the current 
thoughts along those lines:

If one possessed a nonceless voucher then one possesses a permanent token to 
enable bootstrapping of the device. This is the very first point in section 7.2 
discussed above:

   1.  The pledge MUST accept nonceless vouchers.  This allows for a use
       case where the registrar can not connect to the MASA at the
       deployment time.  Logging and validity periods address the
       security considerations of supporting these use cases.

There are two ways to leverage this. Predominately his means that after a 
single BRSKI exchange any domain owner can opt out of any future BRSKI stuff 
and still be able to (re)perform over-the-wire bootstrapping (this is of course 
captured in the audit log). Additionally the privacy protections mean that this 
voucher can be tied to a transient keypair that could be distributed with the 
device for resale. So this can be passed on to entities further down the supply 
chain or during a resale of the device.

These two methods hit a large percentage of use cases being discussed while 
maintaining the audit log.

- max

On Jul 12, 2019, at 1:27 AM, Eliot Lear <[email protected]<mailto:[email protected]>> 
wrote:

Hi Adam

On 12 Jul 2019, at 00:25, Adam Roach 
<[email protected]<mailto:[email protected]>> wrote:


The smallest change that would satisfy my concern would be a statement that 
says that devices conformant to this specification MUST contain a local means 
of bootstrapping that does not rely on any specific server being available. As 
with the security requirements we write into our specs, we'll have no means of 
enforcement. But as with the security requirements we write into our specs, 
we'll give interested parties just that little bit more leverage that might tip 
the scales towards the correct behavior.


I think this is easily possible within the paradigm of the document after the 
device has first been onboarded. At this stage, I would also suggest that the 
MUST be a SHOULD for another reason: there may be cases where it is in the 
customer best interest to prevent onboarding of a device just through proof of 
possession.  I am thinking of anti-theft mechanisms.  Having a discussion of 
this and the risks of not having any on-prem method ever seems like a 
reasonable add.

Eliot

_______________________________________________
Anima mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/anima

Reply via email to