Hi all,

as I mentioned in the past I consider this document problematic.

The selected hardware gives the impression that IoT devices need very
low requirements. This gives inexperienced readers the wrong impression.

At no point in the document it explains why a typical software stack
required for an IoT device would fit on hardware that has 2 kB of SRAM,
and 32 kB of flash memory. What did you put on that device? (CoAP, DTLS,
Resource Directory, SENML -- protocol talk about in Section 9) I suspect
that there is no firmware update mechanism in place, which is a
typically demanded feature for IoT devices in order to address bugs.

Other IETF publications recommend key sizes of at least 112 bits
(symmetric). Here is the relevant table from RFC 4492:

                       Symmetric  |   ECC   |  DH/DSA/RSA
                      ------------+---------+-------------
                           80     |   163   |     1024
                          112     |   233   |     2048
                          128     |   283   |     3072
                          192     |   409   |     7680
                          256     |   571   |    15360

The document, however, describes RSA key sizes of 64, 128, 512 and 2014
bits! It makes no sense to illustrate performance, and memory
requirements of key sizes that shouldn't be used in today's IoT hardware.

The document says that it describes smart object implementation
experience but clearly this is far away from real world product
experience. The need for a random number generator is essentially
missing and a reference to a software library does not help either.

I believe you have started with some hardware and then created the
software & performance measurements. The recommended approach is,
however, to first think about security and the requirements and
subsequently think about what hardware supports the security
requirements and therefore mitigates the threats.

The document references several work in progress specifications. Also
the pointers to specifications like HIP or IPsec for use with IoT
devices is misleading since they are not reflecting industry practice.
They are at best university research projects.

Ciao
Hannes


On 03/06/2017 10:35 AM, Mudugodu Seetarama Raghavendra wrote:
> +1
> 
> 
> Regards,
> 
> Raghavendra
> 
> 
> 
> ------------------------------------------------------------------------
> *From:* Lwip <lwip-boun...@ietf.org> on behalf of Rahul Jadhav
> <rahul.i...@gmail.com>
> *Sent:* Saturday, March 4, 2017 7:30 PM
> *To:* lwip@ietf.org
> *Subject:* Re: [Lwip] WGLC for draft-ietf-lwig-crypto-sensors-02
>  
> The draft provides useful information to implementors about different
> challenges related to security aspects especially towards using low-end
> hardware. The deployment model described with the experiences will prove
> helpful to implementors. Will be helpful to take this work forward.
> 
> Regards,
> Rahul
> 
> On 22 February 2017 at 08:45, Zhen Cao <zhencao.i...@gmail.com
> <mailto:zhencao.i...@gmail.com>> wrote:
> 
>     Hello everyone,
> 
>     This email starts the WGLC for draft-ietf-lwig-crypto-sensors-02
>     (https://tools.ietf.org/html/draft-ietf-lwig-crypto-sensors-02
>     <https://tools.ietf.org/html/draft-ietf-lwig-crypto-sensors-02>)
> 
>     Could you help review the document and send your comments to the
>     mailing list. Thank you in advance.
> 
>     The WGLC will end in two weeks from now.
> 
>     BR,
>     Zhen
> 
>     _______________________________________________
>     Lwip mailing list
>     Lwip@ietf.org <mailto:Lwip@ietf.org>
>     https://www.ietf.org/mailman/listinfo/lwip
>     <https://www.ietf.org/mailman/listinfo/lwip>
> 
> 
> 
> 
> _______________________________________________
> Lwip mailing list
> Lwip@ietf.org
> https://www.ietf.org/mailman/listinfo/lwip
> 

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Lwip mailing list
Lwip@ietf.org
https://www.ietf.org/mailman/listinfo/lwip

Reply via email to