Re: [homenet] Follow-up on HNCP security / trust draft

2014-11-21 Thread Steven Barth

Hi Brian,

thanks for your feedback.


Certainly it's reasonable to include HNCP-specific security measures
in the HNCP protocol specification. However, I'm not yet convinced that
the mechanisms you describe really only apply to HNCP (see below).
Correct, this is intended for merge with the HNCP draft so I kept its 
scope relatively narrow. I agree a generic - but separated - homenet 
threats document would be useful nevertheless such a document would 
actually need to reference a security evaluation of HNCP so I think it 
actually makes sense to have the HNCP security evaluation beforehand.




I have a feeling that these mechanisms need to apply more widely than
to HNCP transactions. If they are done well, they could be used for just
about anything. That remark could be transcribed directly into the anima
discussion, too, so we definitely need to coordinate here.
Indeed, the current proposal uses a well known and RFC'ed mechanism to 
secure the unicast channel which can and also is already applied to 
various other applications.


The only "original" addition here is the trust consensus mechanism as an 
alternative to the usual PSK and PKI trust management (which can also be 
used). If you think that this consensus mechanism is useful for Anima 
then I'd be happy to incorporate feedback from your side.



Cheers,

Steven

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


Re: [homenet] Follow-up on HNCP security / trust draft

2014-11-20 Thread Brian E Carpenter
Steven,

First, I'd like to repeat a comment I made about a month ago:

> So, what we *really* need is a full homenet threat analysis.

In other words I think there's a real risk of overlooking exposures
if we rely only on a threat analysis for HNCP itself.

More below:

On 20/11/2014 22:30, Steven Barth wrote:
> Hello Everyone,
> 
> unfortunately the presentation of the security and trust draft was bit
> rushed in Hawaii.
> 
> I intent to merge that draft with the main HNCP one if there are no
> blocking objections.

Certainly it's reasonable to include HNCP-specific security measures
in the HNCP protocol specification. However, I'm not yet convinced that
the mechanisms you describe really only apply to HNCP (see below).

> So if you have some time please review it so we can get any issues or
> unclarities out of the way soon.
> 
> 
> Here is a quick outline of the draft's contents:
> 
> * Threats to homenet border determination (with focus on automatic
> algorithm)
> * Threats to HNCP payloads (multicast, unicast)
> * Ways to secure the unicast channel
> * 3 security models: PSK, PKI, Trust Consensus
> * Details about the Trust Consensus Mechanism
> * Means to bootstrap Trust Relationships

I have a feeling that these mechanisms need to apply more widely than
to HNCP transactions. If they are done well, they could be used for just
about anything. That remark could be transcribed directly into the anima
discussion, too, so we definitely need to coordinate here.

Brian

> * Dealing with additional (routing) protocols (lack of) security features
> 
> 
> Please see the slides for a short content summary.
> http://tools.ietf.org/agenda/91/slides/slides-91-homenet-6.pdf
> 
> And the full draft for reference.
> http://tools.ietf.org/html/draft-barth-homenet-hncp-security-trust-01
> 
> 
> 
> Cheers,
> 
> Steven
> 
> ___
> homenet mailing list
> homenet@ietf.org
> https://www.ietf.org/mailman/listinfo/homenet
> 

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet


[homenet] Follow-up on HNCP security / trust draft

2014-11-20 Thread Steven Barth

Hello Everyone,

unfortunately the presentation of the security and trust draft was bit 
rushed in Hawaii.


I intent to merge that draft with the main HNCP one if there are no 
blocking objections.
So if you have some time please review it so we can get any issues or 
unclarities out of the way soon.



Here is a quick outline of the draft's contents:

* Threats to homenet border determination (with focus on automatic 
algorithm)

* Threats to HNCP payloads (multicast, unicast)
* Ways to secure the unicast channel
* 3 security models: PSK, PKI, Trust Consensus
* Details about the Trust Consensus Mechanism
* Means to bootstrap Trust Relationships
* Dealing with additional (routing) protocols (lack of) security features


Please see the slides for a short content summary.
http://tools.ietf.org/agenda/91/slides/slides-91-homenet-6.pdf

And the full draft for reference.
http://tools.ietf.org/html/draft-barth-homenet-hncp-security-trust-01



Cheers,

Steven

___
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet