Re: [homenet] Working Group draft adoptions

2014-09-18 Thread Mark Townsley
On Sep 16, 2014, at 2:12 PM, normen.kowalew...@telekom.de wrote: > Hi, > > Regarding > > * draft-mglt-homenet-front-end-naming-delegation > * draft-mglt-homenet-naming-architecture-dhc-options > > I think this is useful work and support its adoption. > > However, I’d like to see these d

Re: [homenet] HNCP security?

2014-09-18 Thread Randy Turner
Yes I was only stating that establishing a root of trust for device authentication seems to work - as Brian said, authorization is a different thing. However, authorization might be assisted by an existing trust relationship for identity. Randy Sent from my Verizon Wireless 4G LTE smartphon

Re: [homenet] HNCP security?

2014-09-18 Thread Michael Thomas
On 9/18/14, 3:43 PM, Randy Turner wrote: Are we assuming that the home router is purchased retail, and not "fulfilled" or provided by an ISP? The method to establish trust relationships would hinge on the answer I should be able prepurpose an old PC with linux running homenet software. We

Re: [homenet] HNCP security?

2014-09-18 Thread Mark Baugher
The retail model works here. I can imagine a compliant CPE might allow the use to "take ownership" of an interior HNCP interface. That's only if the provider of that CPE wanted to be compliant to a future HNCP security standard. Mark On Sep 18, 2014, at 3:43 PM, Randy Turner wrote: > Are we

Re: [homenet] HNCP security?

2014-09-18 Thread Michael Thomas
On 9/18/14, 3:39 PM, Brian E Carpenter wrote: Yes, I agree and that's why self-signed and/or manufacturer certs are of no help. Surely they are of help for secure *identification* of devices? No more so than the naked public key. Authorisation is a separate step. Yes. There is no beli

Re: [homenet] HNCP security?

2014-09-18 Thread Randy Turner
Are we assuming that the home router is purchased retail, and not "fulfilled" or provided by an ISP? The method to establish trust relationships would hinge on the answer Randy Original message From: Mark Baugher Date:09/18/2014 5:12 PM (GMT-06:00) To: Randy Turner Cc

Re: [homenet] HNCP security?

2014-09-18 Thread Brian E Carpenter
On 19/09/2014 09:17, Michael Thomas wrote: > > On 9/18/14, 2:10 PM, STARK, BARBARA H wrote: >>> Self-signed certs bring only confusion, IMO: they are nothing more >>> than a >>> raw key with an unsubstantiated claim to another name, along with a >>> whole >>> lot more ASN.1 baggage beyond what is

Re: [homenet] HNCP security?

2014-09-18 Thread Mark Baugher
On Sep 18, 2014, at 2:37 PM, Randy Turner wrote: > How do you bootstrap trust relationships without an initial certificate > (whether installed at manufacturing or during a customer fulfillment stage) ? One way is through a user "security ceremony" (viz. Walker and Ellison) in the Wi-Fi and U

Re: [homenet] HNCP security?

2014-09-18 Thread Mark Baugher
And all of this was covered in the design for UPnP Device Protection that you referred to earlier and its progenitor UPnP Device Security. I consider HNCP security to be a small subset of the UPnP device requirements. Mark On Sep 18, 2014, at 2:10 PM, STARK, BARBARA H wrote: >> Self-signed ce

Re: [homenet] HNCP security?

2014-09-18 Thread Mark Baugher
On Sep 18, 2014, at 8:57 AM, David R Oran wrote: > > On Sep 18, 2014, at 11:46 AM, Rene Struik wrote: > >> It seems that the cryptographic literature needs to be rewritten now ... >> >> == >> Anything you can do with a cert, you can do with raw public keys, and you >> don't need CA's. See R

Re: [homenet] HNCP security?

2014-09-18 Thread STARK, BARBARA H
> How do you bootstrap trust relationships without an initial certificate > (whether installed at manufacturing or during a customer fulfillment stage) ? There's a difference between trusting (authenticating) a device when it says "this is my key; whenever you see this key you can trust that it'

Re: [homenet] HNCP security?

2014-09-18 Thread Randy Turner
How do you bootstrap trust relationships without an initial certificate (whether installed at manufacturing or during a customer fulfillment stage) ? Original message From: Michael Thomas Date:09/18/2014 4:17 PM (GMT-06:00) To: homenet@ietf.org Cc: Subject: Re: [homene

Re: [homenet] HNCP security?

2014-09-18 Thread Michael Thomas
On 9/18/14, 2:10 PM, STARK, BARBARA H wrote: Self-signed certs bring only confusion, IMO: they are nothing more than a raw key with an unsubstantiated claim to another name, along with a whole lot more ASN.1 baggage beyond what is needed to parse the modulo and exponent. And you don't get usage

Re: [homenet] HNCP security?

2014-09-18 Thread STARK, BARBARA H
> Self-signed certs bring only confusion, IMO: they are nothing more than a > raw key with an unsubstantiated claim to another name, along with a whole > lot more ASN.1 baggage beyond what is needed to parse the modulo and > exponent. > > And you don't get usage or policy restrictions without a CA

Re: [homenet] HNCP security?

2014-09-18 Thread Michael Thomas
On 9/18/14, 8:57 AM, David R Oran wrote: On Sep 18, 2014, at 11:46 AM, Rene Struik wrote: It seems that the cryptographic literature needs to be rewritten now ... == Anything you can do with a cert, you can do with raw public keys, and you don't need CA's. See RFC4871 for an example. I wou

Re: [homenet] HNCP security?

2014-09-18 Thread Michael Thomas
On 09/18/2014 08:57 AM, David R Oran wrote: On Sep 18, 2014, at 11:46 AM, Rene Struik wrote: It seems that the cryptographic literature needs to be rewritten now ... == Anything you can do with a cert, you can do with raw public keys, and you don't need CA's. See RFC4871 for an example. I w

Re: [homenet] HNCP security?

2014-09-18 Thread David R Oran
On Sep 18, 2014, at 11:46 AM, Rene Struik wrote: > It seems that the cryptographic literature needs to be rewritten now ... > > == > Anything you can do with a cert, you can do with raw public keys, and you > don't need CA's. See RFC4871 for an example. I would have thought it was the opposite

Re: [homenet] HNCP security?

2014-09-18 Thread Rene Struik
It seems that the cryptographic literature needs to be rewritten now ... == Anything you can do with a cert, you can do with raw public keys, and you don't need CA's. See RFC4871 for an example. On 9/18/2014 11:36 AM, Michael Thomas wrote: On 09/18/2014 08:31 AM, Markus Stenberg wrote: whethe

Re: [homenet] HNCP security?

2014-09-18 Thread Michael Thomas
On 09/18/2014 08:31 AM, Markus Stenberg wrote: whether your authorization policy is leap of faithy, or strict ’these are the authorized CAs/individual certs’, there is no way to express same things with raw public keys (or you wind up with new X509, which is in nobody’s best interest). Anyt

Re: [homenet] HNCP security?

2014-09-18 Thread Michael Thomas
On 09/18/2014 08:24 AM, Markus Stenberg wrote: With device certificates, you still have the original authz problem. That is, just because I can identify you reliably tells me nothing about whether I want to participate with routing updates with you. So in that way, they not any more useful th

Re: [homenet] Working Group draft adoptions

2014-09-18 Thread Ray Bellis
On 3 Sep 2014, at 14:38, Ray Bellis mailto:ray.bel...@nominet.org.uk>> wrote: This email commences a two week period for comments relating to the adoption of the following drafts by the HOMENET Working Group, as promised during our WG session in Toronto: draft-pfister-homenet-prefix-assign

Re: [homenet] HNCP security?

2014-09-18 Thread Markus Stenberg
Whether or not you do leap of faith, certificates _do_ provide extra value. - you can produce them/validate via (local / cloudy) CA (which may also imply authorization in addition to authentication, or not) - you can have them from hardware (which makes producing spurious ones much harder, assu

Re: [homenet] HNCP security?

2014-09-18 Thread Markus Stenberg
On 18.9.2014, at 18.17, Michael Thomas wrote: > On 09/18/2014 06:49 AM, Markus Stenberg wrote: >> On 18.9.2014, at 16.05, Ted Lemon wrote: >>> On Sep 18, 2014, at 7:38 AM, STARK, BARBARA H wrote: X.509 certificates can be self-signed. That is, the device acts as its own CA. In fact, t

Re: [homenet] HNCP security?

2014-09-18 Thread Michael Thomas
On 09/18/2014 06:49 AM, Markus Stenberg wrote: On 18.9.2014, at 16.05, Ted Lemon wrote: On Sep 18, 2014, at 7:38 AM, STARK, BARBARA H wrote: X.509 certificates can be self-signed. That is, the device acts as its own CA. In fact, this is the recommended approach. Of course. But if there is

Re: [homenet] Working Group draft adoptions

2014-09-18 Thread normen.kowalewski
Hi, Regarding * draft-mglt-homenet-front-end-naming-delegation * draft-mglt-homenet-naming-architecture-dhc-options I think this is useful work and support its adoption. However, I'd like to see these drafts generalized so that mechanisms to provide authorization credentials towards the DNS ar

Re: [homenet] HNCP security?

2014-09-18 Thread Steven Barth
One advantage of using X.509 certs is that the code to support them is widely available with multiple implementations. I guess then you could go all the way and use the whole DTLS for HNCP unicast traffic (and keep MC unencrypted since its more or less a signaling channel for UC and doesn't c

Re: [homenet] HNCP security?

2014-09-18 Thread Markus Stenberg
On 18.9.2014, at 16.05, Ted Lemon wrote: > On Sep 18, 2014, at 7:38 AM, STARK, BARBARA H wrote: >> X.509 certificates can be self-signed. That is, the device acts as its own >> CA. In fact, this is the recommended approach. > Of course. But if there is never going to be a CA-signed key, there

Re: [homenet] HNCP security?

2014-09-18 Thread Ted Lemon
On Sep 18, 2014, at 7:38 AM, STARK, BARBARA H wrote: > X.509 certificates can be self-signed. That is, the device acts as its own > CA. In fact, this is the recommended approach. Of course. But if there is never going to be a CA-signed key, there is no reason to have a cert at all. Self-sig

Re: [homenet] HNCP security?

2014-09-18 Thread Michael Thomas
On 09/18/2014 04:50 AM, Michael Sweet wrote: One advantage of using X.509 certs is that the code to support them is widely available with multiple implementations. Another is that the same cert can be used for TLS negotiation in embedded web services, etc. to each device. And of course if the

Re: [homenet] HNCP security?

2014-09-18 Thread Rene Struik
Dear colleagues: I have seen a lot of emails with the "HNCP security" heading. However, is there a concise technical description of the security services to be provided, the trust lifecycle of a device and network, including configuration and authorization model? The description below seems

Re: [homenet] HNCP security?

2014-09-18 Thread Michael Sweet
One advantage of using X.509 certs is that the code to support them is widely available with multiple implementations. Another is that the same cert can be used for TLS negotiation in embedded web services, etc. to each device. And of course if the registration mechanism is integrated into clie

Re: [homenet] HNCP security?

2014-09-18 Thread STARK, BARBARA H
> > UPnP Device Protection uses X.509 certificates (which can be self-signed, > > and in order not to assume a WAN connection, really should be self-signed) > >and TLS. > I think that something like this, in combination with the promiscuous > registration mechanism that I think Michael described e

Re: [homenet] HNCP security?

2014-09-18 Thread Ted Lemon
On Sep 18, 2014, at 4:27 AM, STARK, BARBARA H wrote: > UPnP Device Protection uses X.509 certificates (which can be self-signed, and > in order not to assume a WAN connection, really should be self-signed) and > TLS. I think that something like this, in combination with the promiscuous registr

Re: [homenet] HNCP security?

2014-09-18 Thread Markus Stenberg
On 16.9.2014, at 16.52, Michael Richardson wrote: >markus> 1) Can we assume secure L2 and/or appropriate device >markus> configuration by the manufacturer/ISP(/user)? (This is what I can >markus> assume in my own home.) > > I think that we can assume that wired links are secure. > The

Re: [homenet] HNCP security?

2014-09-18 Thread STARK, BARBARA H
Just to provide a pointer to a way that another org decided to handle a similar problem (and I'm not suggesting this is the right approach -- I'm just trying to provide food for thought): http://upnp.org/specs/gw/deviceprotection1/ UPnP Device Protection uses X.509 certificates (which can be sel