Re: [Ace] Summary of ACE Group Communication Security Discussion
Michael StJohnswrote: >> I'm less sure that I agree with the subsequent view that we can't >> adopt this item until we have assurance; I'd say that asking for the >> issue to be addressed as part of the adoption process is reasonable, >> and objecting at WGLC if it has not been addressed is the right way. > http://www.techworm.net/2016/11/researchers-use-drones-hijack-philips-hue-smart-lights.html > describes how the use of multi-party symmetric key systems weakens even > minimal security guarantees in a IOT system. In this article, its > noted that the HUE lights have firmware that's signed/encrypted by a > symmetric key (which - by definition then needs to be included in every > device to decrypt/verify the firmware), and that the attackers were > able to extract the key from a lightbulb with relative ease; craft > their own firmware and cause the lightbulbs to load it in a chain > reaction. I had read all about this, and I wondered how they had gotten the bogus firmware accepted; I thought that this was the "bug", but I hadn't read (or I had missed) that the firmware was symmetric signed. That's really really dumb. > So I'd turn this around and ask for a offer of proof that we can find a > way to do this safely *BEFORE* having the IETF invest time and > resources in the work. I don't expect a fully fleshed out solution, > but I haven't seen even a hint that anyone knows how to mitigate the > risks. I see your point. -- Michael Richardson , Sandelman Software Works -= IPv6 IoT consulting =- signature.asc Description: PGP signature ___ Ace mailing list Ace@ietf.org https://www.ietf.org/mailman/listinfo/ace
Re: [Ace] Summary of ACE Group Communication Security Discussion
On 11/12/2016 5:11 PM, Michael Richardson wrote: I realize that this thread is months old: I haven't seen any newer conversation, so I'll continue anyway. I would concur with MSJ's view that having an informational draft might be a way to let this work go forward, but I suggest instead the right track might be experimental. I suggested Informational as the IETF has a long history of republishing things developed elsewhere as "Here's how we did it documents". Experimental documents generally describe ideas either where we know there is a way forward, but we're not sure which of several paths work, or ideas where the general utility may not be readily apparent.I could live with experimental/non-WG. I'm less sure that I agree with the subsequent view that we can't adopt this item until we have assurance; I'd say that asking for the issue to be addressed as part of the adoption process is reasonable, and objecting at WGLC if it has not been addressed is the right way. http://www.techworm.net/2016/11/researchers-use-drones-hijack-philips-hue-smart-lights.html describes how the use of multi-party symmetric key systems weakens even minimal security guarantees in a IOT system. In this article, its noted that the HUE lights have firmware that's signed/encrypted by a symmetric key (which - by definition then needs to be included in every device to decrypt/verify the firmware), and that the attackers were able to extract the key from a lightbulb with relative ease; craft their own firmware and cause the lightbulbs to load it in a chain reaction. There really isn't a lot of difference in the key extraction attack for the above vs extracting a symmetric key used for group communications. The only saving grace in group comms is that the group is smaller than unity. So I'd turn this around and ask for a offer of proof that we can find a way to do this safely *BEFORE* having the IETF invest time and resources in the work. I don't expect a fully fleshed out solution, but I haven't seen even a hint that anyone knows how to mitigate the risks. I will say I'm scared that garage door actuators and doors and security systems will be sold with "lighting" interfaces. This same thing happened in USB space: zillions of inappropriate USB devices were given HID designations because the windows drivers were easier to write/get-signed. At least most of those weren't cyber physical (except maybe the USB nerf turret and its ilk http://weburbanist.com/2009/11/18/truly-geeky-gadgets-15-usb-weapons-from-fail-to-fantastic/). Mike ___ Ace mailing list Ace@ietf.org https://www.ietf.org/mailman/listinfo/ace
Re: [Ace] Summary of ACE Group Communication Security Discussion
see inline as well. In the summary, it was unclear if I was against the symmetric method or not. I will admit that I'm sitting on the fence here. I would prefer not to have a standardized symmetric method. My preference would be to start running code that shows the price/performance of asymmetric methods in a lighting context. It would have to be done by a sufficiently resourced group motivated to show positive results. Michael StJohnswrote: >> Without a hat on, you can add my support to Abhinav's proposal. >> Perfect is ideal, but you often can not make any progress if you >> accept nothing less. The security considerations section will have to >> be thorough. > Hi Kathleen et al - > To attain "rough consensus", RFC 7282 requires that "all issues be > addressed" even if not all issues are accommodated. So far the basic > issues of "this is unsafe as a mechanism for 'securing' a control > protocol" or even "how the heck do we keep this off the broader > internet" have not been addressed. > I once again suggest that the lighting folk go off and write something > that they implement as a group, and bring it back to the IETF as an > informational "here's how we did it" document, rather than adopting > this as a WG item. The ONLY thing that even argues for considering > symmetric key multicast (vice asymmetric key multicast) is the latency > claims for lighting. I haven't yet heard of another use case with the > particular combination of cheapness and latency of lighting which would > suggest this particular combination is useful elsewhere. I realize that this thread is months old: I haven't seen any newer conversation, so I'll continue anyway. I would concur with MSJ's view that having an informational draft might be a way to let this work go forward, but I suggest instead the right track might be experimental. I'm less sure that I agree with the subsequent view that we can't adopt this item until we have assurance; I'd say that asking for the issue to be addressed as part of the adoption process is reasonable, and objecting at WGLC if it has not been addressed is the right way. I will say I'm scared that garage door actuators and doors and security systems will be sold with "lighting" interfaces. This same thing happened in USB space: zillions of inappropriate USB devices were given HID designations because the windows drivers were easier to write/get-signed. signature.asc Description: PGP signature ___ Ace mailing list Ace@ietf.org https://www.ietf.org/mailman/listinfo/ace