Hi Christian,

Thank you again for reviewing this document, and a very happy new year
of 2018 :)

Could you help review the update according to authors' update and see
if you have further concerns? so that as shepherd I can see if I can
move it further.

BR,
Zhen

On Tue, Dec 26, 2017 at 12:27 AM, Mohit Sethi
<mohit.m.se...@ericsson.com> wrote:
> Dear Christian,
>
> Thanks for the detailed review and positive comments. We have now submitted
> an updated version which can be found here:
> https://tools.ietf.org/html/draft-ietf-lwig-crypto-sensors-05.  The diff
> from the previous version can be found here:
> https://www.ietf.org/rfcdiff?url2=draft-ietf-lwig-crypto-sensors-05.
>
> You had  raised an important point about identifiers and privacy. To address
> this, we have added new text in section 3 (Challenges), section 4.1
> (Provisioning) and section 8.1 (Feasibility). I provide snippets of the
> added text here for your convenience:
>
> small resource-constrained devices
>    are often shipped with a single static identity.  In many cases, it
>    is a single raw public key.  These long-term static identities makes
>    it easy to track the devices (and their owners) when they move.  The
>    static identities may also allow an attacker to track these devices
>    across ownership changes.
>
> long-term static identities
>    negatively affect the privacy of the devices and their owners.
>    Therefore, it is beneficial for devices to generate new identities at
>    appropriate times during their lifecycle.  For example, after a
>    factory reset or an ownership handover.  Thus, in our proposed
>    deployment model, the devices would generate a new asymmetric key
>    pair and use the new public-key P' to generate the new identity I'.
>    It is also desirable that these identities are only used during the
>    provisioning stage.  Temporary identities (such as IPv6 addresses)
>    can be used for network communication protocols once the device is
>    operational.
>
>  we
>    did note that it is possible for such devices to generate a new key
>    pair.  Given that this operation would only occur in rare
>    circumstances (such as a factory reset or ownership change) and its
>    potential privacy benefits, developers should provide mechanisms for
>    generating new identities.  It is however extremely important to note
>    that the security of this operation relies on access to
>    cryptographic-quality randomness.
>
>
> Let us know if the ideas or the text here is not sufficient.
>
> --Mohit
>
> On 10/15/2017 07:38 PM, Christian Huitema wrote:
>
> Reviewer: Christian Huitema
> Review result: Has Nits
>
> This is an early review of draft-ietf-lwig-crypto-sensors-04 on behalf of
> the Security Directorate.
>
> The document is almost ready, but would benefit from a bit more further
> work.
>
> This draft examines a series of risks and challenges posed by securing small
> devices,
> proposes solutions for provisioning, and an architecture for securing the
> devices.
> The implementation experience section (section 8) provides measurements for
> the
> memory and CPU costs of various cryptographic operations using the Arduino
> platform. It will be good to see these results published and become a useful
> reference in further debates. In fact, I like this document a lot. My only
> concern is that it misses an opportunity to discuss identifiers and privacy.
>
> I like the discussion of platform constraints in section 3, and the
> statement that "at
> the end of the day, if strong cryptographic security is needed, the
> implementations
> have to support that." I think it is an important message, and it it might
> be
> good to reinfore it with examples. For example, we do ship medecine in
> child-proof
> containers. It would be cheaper to use ordinary containers, but we pay the
> cost
> because as a society we want to mitigate the risk of children mistaking
> pills for candy.
> Similarly, it is cheaper to build devices with no security, but we may want
> society
> to mandate that risks should be mitigated.
>
> The challenge section, and the document in general, would be even better if
> it included
> a discussion of identifiers and privacy. The general concern is that because
> small
> devices have limited resource, they end up using just one identity, maybe
> just one
> public key. This makes them easy to track when they move, and by extension
> track the
> movements of their owners for wearable devices, or associated objects such
> as cars for
> general devices. There are certainly mitigations, such as provisioning new
> identities
> at appropriate times, or using temporary identities in communication
> protocols, but
> these mitigations certainly require the kind of trade-offs discussed in the
> draft. It
> would thus be very nice to introduce the privacy challenges in the
> "challenge"
> section, and to discuss the privacy mitigations in the other sections, e.g.,
> architecture
> and provisioning.
>
>
>
>
>
>

_______________________________________________
Lwip mailing list
Lwip@ietf.org
https://www.ietf.org/mailman/listinfo/lwip

Reply via email to