On 09/12/2014 03:23 AM, Markus Stenberg wrote:
I decided to take a look at the homenet architecture draft and compare the 
requirements there with what is defined for HNCP as of now.

Section 3.6 describes security. It seems to be concerned mainly with filtering 
of traffic between different networks - for example, guest, home, and Internet. 
Section 3.8.2 adds potential need for manual provisioning of wireless keys.

Current HNCP draft provides for both automated border discovery (to determine 
between home and Internet being plugged on different ports) that is not really 
dependant on HNCP itself, but neither is it very secure, as in the 
zero-configuration case there is no way to authenticate ISP _or_ the hosts. 
Given provisioning by manufacturer/ISP, or  configuration by the end user, the 
automated border discovery can be disabled, and fixed categories assigned to 
interfaces. In that mode, HNCP fullfills the security specified in the draft.

What the draft does not cover is what is the assumption about security of 
protocols within it. If HNCP is run only over either physically or 
cryptographically secured link layer, there are no real extra requirements for 
HNCP.

I'm pretty certain that the answer to this is going to be "no". does zigbee even have link layer crypto, for example? and even if it does, new ones as they come on line are likely to have flaws
for a long time (cf wifi).


So, question time:

1) Can we assume secure L2 and/or appropriate device configuration by the 
manufacturer/ISP(/user)? (This is what I can assume in my own home.)

2) If not, should the solution be some sort of pre-shared key scheme? (If not, 
please explain your alternative solution.)

2.1) And if so, should it be manually keyed IPsec (multicast prevents e.g. 
IKE)? (This is what is in the draft currently.)

2.2) Or should we roll our own in-HNCP scheme?



It would be better to turn this around and ask what the attacks you're trying to defend against, and who the actors are. Also: PSK are not very zeroconf like, and they're not even particularly friendly littleconf if they are meant as strong machine-machine keying (rather than crappy human
to machine password-like things).

Mike

_______________________________________________
homenet mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/homenet

Reply via email to