Re: [Anima] [Iot-onboarding] OPC and BRSKI

2019-08-07 Thread Eliot Lear
Randy, Thanks. We have irregular calls, but I will poll for one in the 3rd week of August to discuss your use case. In an OPC UA environment, might one expect that the join registrar and the certificate manager be co-resident? This would be where EST/SCEP would happen (BRSKI can be viewed

Re: [Anima] [Iot-onboarding] OPC and BRSKI

2019-08-07 Thread Randy Armstrong (OPC)
HI Eliot, Yes, the Operator needs to ensure that only Devices they authorize can connect and the zero touch provisioning is a feature we desire. Regards, Randy From: Eliot Lear Sent: August 7, 2019 1:50 AM To: Randy Armstrong (OPC) Cc: Toerless Eckert ; iot-onboard...@ietf.org;

Re: [Anima] [Iot-onboarding] OPC and BRSKI

2019-08-07 Thread Randy Armstrong (OPC)
Hi Eliot, 1) In an OPC UA environment, might one expect that the join registrar and the certificate manager be co-resident? Yes that is the expectation. 2) My bigger question is whether you want to use all of this for network authentication to avoid unauthorized devices joining the network in

Re: [Anima] [Iot-onboarding] OPC and BRSKI

2019-08-07 Thread Eliot Lear
Hi Randy, Thanks again for your comments. Please see below. > On 7 Aug 2019, at 10:32, Randy Armstrong (OPC) > wrote: > > Hi Eliot, > > 1) In an OPC UA environment, might one expect that the join registrar and the > certificate manager be co-resident? > > Yes that is the expectation. > >

Re: [Anima] [Iot-onboarding] OPC and BRSKI

2019-08-07 Thread Eliot Lear
Randy, Thanks. I will be away on holiday for the next week. However, before I go I will kick off a doodle for the week of the 19th for on onboarding meeting to discuss this. Please everyone indicate your interest in participating by answering the doodle poll. Eliot > On 7 Aug 2019, at

[Anima] Doodle poll for IoT Onboarding Meeting

2019-08-07 Thread Eliot Lear
Hi everyone, Please if you could, respond to the doodle poll below by the 12th. While I will be on holiday next week, I’ll be sure to send along the meeting details for the meeting once the poll has closed. Proposed Agenda: OPC use case BRSKI IESG review status Other draft status

Re: [Anima] comments on draft-ietf-anima-grasp-api

2019-08-07 Thread Michael Richardson
Brian E Carpenter wrote: > On 07-Aug-19 05:24, Michael Richardson wrote: >> >> I read draft-ietf-anima-grasp-api from the expired drafts list. > Right, the -03 draft expired while we were in Montreal. Our plan is to > make the next update after the two promised reviews

Re: [Anima] [Iot-onboarding] OPC and BRSKI

2019-08-07 Thread Toerless Eckert
On Wed, Aug 07, 2019 at 10:59:17AM -0400, Michael Richardson wrote: > > How does OPC handle such devices? I think this is also coming up > > elsewhere. One question is whether TLS is required. Without TLS one > > does lose confidentiality, but so long as the client can sign the >

Re: [Anima] [Iot-onboarding] Device Certificate Deployment Automation with ACME using BRSKI

2019-08-07 Thread Michael Richardson
Kent Watsen wrote: > True, but it seems that getting a domain certificate and getting an > initial configuration are at least two distinct steps in ANIMA, whereas > they're rolled into one step with SZTP. I'm missing where SZTP gets a domain certificate in a standard way. I totally

Re: [Anima] [Iot-onboarding] OPC and BRSKI

2019-08-07 Thread Michael Richardson
Randy Armstrong (OPC) wrote: > Counterfeit devices are huge issue in industrial automation. We need > this infrastructure so the Operators can assure themselves that the > Devices they plug into their network are genuine. So, just to inject some existential angst: If the MASA

Re: [Anima] [Iot-onboarding] Device Certificate Deployment Automation with ACME using BRSKI

2019-08-07 Thread Michael Richardson
Kent Watsen wrote: > Skimming quickly, I see now the direction to go to a cloud registrar to > be redirected to a local registrar. I feel compelled to point out that > this is exactly what SZTP (RFC 8572) does, or at least, supports. > Actually, as a more general statement, it

Re: [Anima] [Iot-onboarding] OPC and BRSKI

2019-08-07 Thread Kent Watsen
> On Aug 7, 2019, at 4:50 AM, Eliot Lear wrote: > > The purpose, as I see it, of the voucher, is simply to provide zero-touch > network provisioning. I was asking a slightly different question: for > purposes of network connectivity will operators want to know that only > devices they

Re: [Anima] [Iot-onboarding] OPC and BRSKI

2019-08-07 Thread Michael Richardson
Randy Armstrong (OPC) wrote: > It would be easy to drop in a OPC UA aware registrar and implement all > of the BRKSI flows back to the MASA. The only nuisance factor is the > 'prior-signed-voucher-request'. If MASA's are willing allow this field > to be omitted and to trust the

Re: [Anima] [Iot-onboarding] OPC and BRSKI

2019-08-07 Thread Randy Armstrong (OPC)
> If the MASA goes away or is compromised, then all the devices > from that manufacturer can not be proved to not be counterfeit. If each Device has a manufacturer issued Certificate with the private key in secure storage like a TPM then the verification of a Device can happen as long as the

Re: [Anima] [Iot-onboarding] OPC and BRSKI

2019-08-07 Thread Randy Armstrong (OPC)
Toerless, > Thats what i referred to in my prior email: We would need to understand how > to most easily duplicate the mutual authentication with certificates during > TLS connection setup with OPC TCP UA messages.: OPC UA CP requires mutual authentication with Certificates bound to the

[Anima] Hold for IoT Onboarding Virtual Meeting

2019-08-07 Thread Eliot Lear (elear)
BEGIN:VCALENDAR METHOD:REQUEST PRODID:Microsoft Exchange Server 2010 VERSION:2.0 BEGIN:VTIMEZONE TZID:W. Europe Standard Time BEGIN:STANDARD DTSTART:16010101T03 TZOFFSETFROM:+0200 TZOFFSETTO:+0100 RRULE:FREQ=YEARLY;INTERVAL=1;BYDAY=-1SU;BYMONTH=10 END:STANDARD BEGIN:DAYLIGHT