Anoop Kumar Pandey <an...@cdac.in> wrote:
    > When a device is purchased in real world, usually an invoice is issued in 
the
    > name of the purchaser with stamp of vendor/manufacturer.

    > I propose that similarly, a digital invoice can be issued which will 
contain
    > the public key(s) of the <domain owner(s)/JRC(s)> and digitally signed by 
the
    > manufacturer. The digital invoice may be embedded in the pledge along with
    > the IDevID.

That's an interesting idea, perhaps you could write it up in the form of an
Internet-Draft?  Then I could make sure that I fully understand your
proposal.

It seems very difficult to make digitally signed invoices occur in the real
world, given the constrained of the supply chain.  Still, BRSKI makes
provisions for higher security if the supply chain is integrated.

I once proposed something similar using signed certficates:
  
https://mailarchive.ietf.org/arch/msg/6tisch-security/2kObJLkLlhuI-HU9s5yqfRm0n00

In effect, the voucher artifact that we created in RFC8366 replaces these
certificates with purpose built signed artifacts that expresses what the
invoice attempts to express.

    > When a pledge starts the registration process, it will present the digital
    > invoice along with IDevID. The JRC can verify the digital signature of the
    > manufacturer on the digital invoice and sent a signed note of acceptance 
to
    > the pledge. The pledge can verify the signed note using the public key(s)
    > mentioned in the digital invoice, thereby verifying its true owner.

A pledge which has sat in a warehouse for a year before being sold to an
owner will not have the invoice on it yet.  That's okay, because the invoice,
being digitally signed, could be retrieved from another place, and that's
effectively what the BRSKI-MASA protocol *does*.

If the invoice needs to be loaded into the Pledge via a secure-out-of-band
mechanism, (i.e. during the manufacturing process), then the Pledge could
also be fully configured, and could include a simple PSK too.  This is the
approach which is being used in draft-ietf-6tisch-minimal-security.

Ultimately, it's not the JRC which is suspicious of who the Pledge's owner
is, it's the Pledge which does not know who owns it.

    > This process with eliminate all the communication overhead with MASA and
    > multiple level verification (voucher request, voucher, telemetry etc at
    > JRC/MASA/Pledge).

Yes, it does, at the cost of making every device in the warehouse unique to a
specific customer.   If I may make an analogy to distribution of movies,
you are suggesting that netflix go back to mailing DVDs to people.

    > From security point of view: Given that the digital invoice is digitally
    > signed by manufacturer, the public key of domain owner embedded in the
    > digital invoice can’t be changed, otherwise verification of digital 
signature
    > of manufacturer at JRC end will fail.

    > Requesting you to give your comments as it will simplify the protocol.

    > P.S.: As you had earlier mentioned “On resale, the device should be put
    > through a factory reset to clear things. The MASA will have to be willing 
to
    > issue a new voucher to the new domain owner..”; here also, manufacturer 
may
    > issue a new digital invoice in case of resale.

yes, that's true.  But, since you said that the invoice is in the Pledge, the
manufacturer would have to take the device back to do that.

The reason for all the JRC,MASA etc, is so that we do not need to have the
manufacturer touch the device a second time.

--
]               Never tell me the odds!                 | ipv6 mesh networks [
]   Michael Richardson, Sandelman Software Works        | network architect  [
]     m...@sandelman.ca  http://www.sandelman.ca/        |   ruby on rails    [


--
Michael Richardson <mcr+i...@sandelman.ca>, Sandelman Software Works
 -= IPv6 IoT consulting =-



Attachment: signature.asc
Description: PGP signature

_______________________________________________
Anima mailing list
Anima@ietf.org
https://www.ietf.org/mailman/listinfo/anima

Reply via email to