I haven't had a chance to comment on the document, but I have a few
comments on the below that will depend on getting the requirements correct.
In the introduction of the document you list three requirements and Jim
has taken you to task for them. There are actually four requirements,
one of which no one is willing to state in this document. The fourth
being "The security can't cost anything in terms of either latency or
hardware assistance" - or something similar. Otherwise, we wouldn't be
having the argument about symmetric key multicast.
Finally, we're missing an actual security requirement that may or may
not be optional: "The compromise of any given end point will not give
the attacker more privileges in the group that the compromised end point
nominally has been granted". This one is where the applicability
statement comes in.
On 2/6/2017 3:00 PM, Somaraju Abhinav wrote:
Jim, All,
please see a proposal for the Applicability statement that can be used
as a starting point for the Webex.
Abhinav
5.1 Applicability statement
This document describes two architectures based on symmetric group
keys in Section 3 and asymmetric keys in Section 4.
The symmetric key solution is based on a group key that is shared
between all group members including senders and receivers. As all
members of the group posses the same key, it is only possible to
authenticate group membership for the source of a message. In
particular, it is not possible to authenticate the unique source of
a message and consequently it is not possible to authorize a single
node to control a group. This implies in particular that any hacked
receiver in a group could then be used to control all the receivers in
the group.
Moreover, because the group key is shared across multiple nodes, it
may be easier for an attacker to determine the group key by attacking
any member of the group (note that this group key is dynamically
generated and is usually stored in volatile memory which offers some
additional protection). The probability of a stolen key increases with
the number of nodes that are in possession of the key. Moreover,
subsequent to such an attack, it is also difficult to determine which
of the group members was compromised and this makes it difficult to
return the system to normal operation after an attack.
The asymmetric key solution distinguishes between a sender in the
group and the receivers. In particular, the sender is in possession of
a private key and the receivers are in possession of the corresponding
public key. This allows the unique source of any group message to be
authenticated. Moreover, an attacker cannot compromise the system by
breaking into any of the receiving nodes. However, for constrained
devices, the asymmetric key solution comes at a processing cost with
cryptographic computations taking rather long.
See below - you need to provide some proof of this. Or at least figure
out the asymmetric key size and implementation where it takes too long.
Therefore, it is recommended that whenever possible, the architecture
with source authentication SHOULD be used to secure all multicast
communication. However, in less sensitive applications where
low-latency group communication is important (e.g. controlling
luminaires in non-emergency applications), the architecture without
source authentication MAY be used. In sensitive applications such as
health and safety, building security and emergency applications the
symmetric key based solution SHOULD not be used.
This paragraph is pretty much wishful thinking and hand waving. It makes
an unproved assumption that source authentication is too expensive (in
latency or hardware) and that some measure of security may be gained by
using the group key to protect the group message integrity - including
the control messages.
Even a weak asymmetric key (which evidence suggests *can* be used in a
manner to meet latency requirements) will provide a more secure source
authentication mechanism than a symmetric key system.
When using the symmetric key solution two mitigating factors could
improve system security. It is possible to achieve source
authentication of messages at lower layers by requiring unique MAC
layer keys for all devices within the network. The symmetric group
keys are dynamically generated and therefore SHOULD be stored in
volatile memory.
Seriously - no. To validate a MAC signed object, you need the MAC key
which means you can forge things as if they came from the MAC key
owner. Unless you're talking specifically about pair-wise MAC keys,
this makes no sense whatsoever.
For the meeting, what I'd like to hear about is:
1) The actual minimum latency value and how it was picked.
2) The target minimum hardware and how it was picked.
3) The security policy for "Controlling luminaries in a non-emergency
application". E.g. Do you actually care about security here, or is this
just marketing? Or put another way, what security assurances do you get
from implementing symmetric key multicast in a control system? What is
the liability to the product provider if the system is hacked? What's
the detection mechanism for figuring out you've been hacked (besides the
obvious one of the lights going on and off without the switch being
thrown)? Can this protocol be used in this specific mode for any other
application - and if so, which ones?
_______________________________________________
Ace mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ace