Re: [Dtls-iot] Diversion to multicast again - was Re: (paper and RFC of potential interest) Re: IOT and security - thoughts on the "Tyranny of the Lightswitch"

Mališa Vučinić <Malisa.Vucinic@imag.fr> Fri, 11 July 2014 08:39 UTC

Return-Path: <Malisa.Vucinic@imag.fr>
X-Original-To: dtls-iot@ietfa.amsl.com
Delivered-To: dtls-iot@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F41AF1B27B2 for <dtls-iot@ietfa.amsl.com>; Fri, 11 Jul 2014 01:39:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level:
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_FR=0.35, MIME_8BIT_HEADER=0.3, RP_MATCHES_RCVD=-0.651, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NcwWO-eDOiRn for <dtls-iot@ietfa.amsl.com>; Fri, 11 Jul 2014 01:39:10 -0700 (PDT)
Received: from shiva.imag.fr (mx1.imag.fr [IPv6:2001:660:5301:6::5]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C4F3A1B27D5 for <dtls-iot@ietf.org>; Fri, 11 Jul 2014 01:39:09 -0700 (PDT)
Received: from globule.imag.fr (globule.imag.fr [129.88.34.238]) by shiva.imag.fr (8.13.8/8.13.8) with ESMTP id s6B8cGRq007240 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Fri, 11 Jul 2014 10:38:16 +0200
Received: from stradioti.imag.fr (stradioti.imag.fr [129.88.49.44]) (authenticated bits=0) by globule.imag.fr (8.13.8/8.13.8) with ESMTP id s6B8cGao020018 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Fri, 11 Jul 2014 10:38:16 +0200
Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\))
Content-Type: text/plain; charset="utf-8"
From: Mališa Vučinić <Malisa.Vucinic@imag.fr>
In-Reply-To: <53BF2C6F.5040902@gmail.com>
Date: Fri, 11 Jul 2014 10:38:17 +0200
Content-Transfer-Encoding: quoted-printable
Message-Id: <80DFF0E9-1E73-44F0-A14F-6E2052755901@imag.fr>
References: <53BE8B94.1000008@nthpermutation.com> <64ece5afedae4a439750577bc36e8508@BLUPR07MB611.namprd07.prod.outlook.com> <53BEAA79.8030102@gmail.com> <BE6D13F6A4554947952B39008B0DC0153E7D1635@DBXPRD9003MB059.MGDPHG.emi.philips.com>, <53BEC4C3.8000101@nthpermutation.com> <d7c91d00ea7f49349a1d0ea35c2f583c@BLUPR07MB611.namprd07.prod.outlook.com> <53BF0F64.1080802@nthpermutation.com> <BE6D13F6A4554947952B39008B0DC0153E7D1C86@DBXPRD9003MB059.MGDPHG.emi.philips.com> <53BF2C6F.5040902@gmail.com>
To: Rene Struik <rstruik.ext@gmail.com>
X-Mailer: Apple Mail (2.1878.6)
X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.0.1 (shiva.imag.fr [129.88.30.5]); Fri, 11 Jul 2014 10:38:16 +0200 (CEST)
X-IMAG-MailScanner-Information: Please contact MI2S MIM for more information
X-MailScanner-ID: s6B8cGRq007240
X-IMAG-MailScanner: Found to be clean
X-IMAG-MailScanner-SpamCheck:
X-IMAG-MailScanner-From: malisa.vucinic@imag.fr
MailScanner-NULL-Check: 1405672697.7388@meHZoB0j+Mnng5EViW8d/A
Archived-At: http://mailarchive.ietf.org/arch/msg/dtls-iot/uwReDbTqIUUePncH2Oa-t24QP-U
Cc: "dtls-iot@ietf.org" <dtls-iot@ietf.org>, "Malisa VUCINIC (malisa.vucinic@st.com) (malisa.vucinic@st.com)" <malisa.vucinic@st.com>, "Kumar, Sandeep" <sandeep.kumar@philips.com>, Michael StJohns <msj@nthpermutation.com>
Subject: Re: [Dtls-iot] Diversion to multicast again - was Re: (paper and RFC of potential interest) Re: IOT and security - thoughts on the "Tyranny of the Lightswitch"
X-BeenThere: dtls-iot@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: DTLS for IoT discussion list <dtls-iot.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dtls-iot>, <mailto:dtls-iot-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dtls-iot/>
List-Post: <mailto:dtls-iot@ietf.org>
List-Help: <mailto:dtls-iot-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dtls-iot>, <mailto:dtls-iot-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Jul 2014 08:39:13 -0000

Hi all,

In support of Rene’s mail, I just wanted to stress that we use a similar approach at STMicroelectronics in France with pre-signed/pre-verified objects and group keys. Your light bulb then only needs to check if the received command (signed object) is identical to the one cached in memory.

Obviously, if one considers compromised nodes within the group, an attacker may replay the signed command on behalf of the source and change the destination state.

Depending on your network capabilities, to reduce the attacker’s gain in that case, one could:

- Include an expiry date within the signed command, if time synchronization is available.
- If no time synchronization is available, play with sequence numbers, again within the signed command and declare that a command with the same sequence number can be used for at most N state changes at destination (cache hits). 

Essentially, the cost of the verification is then amortized either over N commands or over the expiry interval. On the source side, as Rene said, signing can be well anticipated such that it does not affect the latency.

The idea and the approach are described in our OSCAR paper: http://arxiv.org/abs/1404.7799

Best regards.
Mališa Vučinić


On 11 Jul 2014, at 02:14, Rene Struik <rstruik.ext@gmail.com> wrote:

> Hi all:
> 
> I think this discussion would benefit from less position-based arguing and more of a fine-grained, analytical approach that stipulates communication and computational time latencies expected, expected packet sizes, potential fragmentation/re-assembly, and the-like. Right now, it is not even clear to me that the time latencies with multi-hop communications will be dominated by security-related aspects (with 6TiSCH, time slot spacing may dominate propagation effects, for example, and Richard Kelsey's email suggested [from my understanding] that multicast may consume quite a bit of the "time latency budget").
> 
> Just a pragmatic note:
> a) with signed messages in use case scenarios where state changes can be reversed without too much impact (as seems the case with lighting), one can already act on a received message presuming source authentication and revert this once one finds out signature verification fails. This by itself may make computational time latencies vanish from a human experience perspective (except, perhaps, when packets are spoofed). {Obviously, this approach should not be tried with critical infrastructure (or other non-reversible state change scenarios).}
> b) when signing a message, most computations are intrinsically offline computations and can be anticipated.
> Note: Obviously, a) also applies if one simply uses a message authentication code, but then authentication is relative to a random group member.
> 
> So, there are simple tricks one can do to make life easy, even when one, at first thought, balks at *perceived* cost.
> 
> I only gave the examples above as reminder that, please, let us try and be a little bit creative over here!
> 
> There are other schemes that are really efficient, cryptographically sound, and also work in non-reversible uses cases (such as critical infrastructure). For those, please contact me offline and we will work on those.
> 
> Best regards, Rene
> 
> 
> On 7/10/2014 6:38 PM, Kumar, Sandeep wrote:
>> 
>>> -----Original Message-----
>>> From: dtls-iot [mailto:dtls-iot-bounces@ietf.org] On Behalf Of Michael
>>> StJohns
>>> 
>>> So to translate to mike speak - what you're saying is that there's a certain
>>> budget, and all of the budget has been taken up by multicast transmission so
>>> we can't spend more than a pittance on multicast security. Hmm....
>>> 
>>> Have you considered that for most commercial lights, the latency for going
>>> from off to on is usually in the 1-2 seconds range making the latency of both
>>> transmission and verification in the noise?  (I've replaced most of my floods
>>> with LED - there's a noticeable delay - call it 750ms - between throwing the
>>> switch and having the light turn on - and let's not even talk about CFL - so the
>>> latency comment probably applies to consumer products in the home as
>>> well).
>>> 
>> [SK] Richard is right in terms of latency expectations that the industry wants to achieve with such systems. There will always be manufacturers who will not manage to get those results and consumers willing to (or rather unwillingly)  buy them, but that’s a completely different issue. You may not see much annoyance now, but get some dimmable light and try dimming to the required level with that latency, you can spend some fun time dimming up and down.
>> 
>>> Have you considered that for consumer products in the home, you get much
>>> more  protection from your firewall and from your RF link layer security
>>> mechanisms than you would get from pretty much any symmetric key
>>> multicast solution so why bother?
>> [SK] Sure the RF link provides security however this is shared with all the other Internet connected devices at home/office. A weakness in one would mean that everything else is affected. I would rather have one more additional layer (maybe weak) as a buffer to virtually separate the traffic on the same link. As more devices connect externally and are controlled from the backend clouds, I really do not think that just link layer security would be enough when they all share the same link.
>> 
>> 
>>> Mike
>>> 
>>> 
>>> 
>>>> -Richard Kelsey
>>>> This email and any attachments may be confidential. If so, do not distribute
>>> or forward this email or any attachments without the sender’s authorization.
>>> If you are not the intended recipient, please delete this email and notify the
>>> sender. Email transmissions cannot be guaranteed to be error-free or virus-
>>> free and Silicon Labs accepts no liability for such transmissions. Silicon Labs
>>> does not intend or authorize emails to act as legally binding contracts.
>>>> _______________________________________________
>>>> dtls-iot mailing list
>>>> dtls-iot@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/dtls-iot
>>> _______________________________________________
>>> dtls-iot mailing list
>>> dtls-iot@ietf.org
>>> https://www.ietf.org/mailman/listinfo/dtls-iot
>> ________________________________
>> The information contained in this message may be confidential and legally protected under applicable law. The message is intended solely for the addressee(s). If you are not the intended recipient, you are hereby notified that any use, forwarding, dissemination, or reproduction of this message is strictly prohibited and may be unlawful. If you are not the intended recipient, please contact the sender by return e-mail and destroy all copies of the original message.
>> _______________________________________________
>> dtls-iot mailing list
>> dtls-iot@ietf.org
>> https://www.ietf.org/mailman/listinfo/dtls-iot
> 
> 
> -- 
> email: rstruik.ext@gmail.com | Skype: rstruik
> cell: +1 (647) 867-5658 | US: +1 (415) 690-7363
> 
> _______________________________________________
> dtls-iot mailing list
> dtls-iot@ietf.org
> https://www.ietf.org/mailman/listinfo/dtls-iot