Roman Danyliw has entered the following ballot position for
draft-ietf-6lo-nfc-19: Discuss

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to 
https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-6lo-nfc/



----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------

(revised)

Multiple DISCUSes were filed during the March 2019 telechat on the basis of
concerns that the underlying normative references were not available.  In
response, the "NFC LLC v1.4" specification was shared in advance of the
December 2022 telechat. However, it appears additional normative references are
needed to evaluate the security claims of the protocol (NFC LLC v1.4).

Section 7.1 of NFC LLC v1.4 says:

Secure data transfer uses the NFC Authentication Protocol [NAP]. This
subsection defines three processes: Security Setup, Bonding Process and
Authentication Process. All three processes are mappings of the corresponding
processes with the same names defined in [NAP].

Section 7 of this I-D says:

   Ad-hoc secure data transfer can be established between two
   communication parties without any prior knowledge of the
   communication partner.  Ad-hoc secure data transfer can be vulnerable
   to Man-In-The-Middle (MITM) attacks.  Authenticated secure data
   transfer provides protection against Man-In-The-Middle (MITM)
   attacks.  In the initial bonding step, the two communicating parties
   store a shared secret along with a Bonding Identifier.  For all
   subsequent interactions, the communicating parties re-use the shared
   secret and compute only the unique encryption key for that session.
   Secure data transfer is based on the cryptographic algorithms defined
   in the NFC Authentication Protocol (NAP).

The described security properties appear to depend on the “NFC Authentication
Protocol” (NAP) which is neither formally referenced with a normative reference
(like the NFC LLC v1.4 specification) and does not appear to be available.  It
is challenging to evaluate the security claims without it.

Thank you to the document authors for responding to a preliminary version of
this DISCUSS position which said that it is not possible to share the NAP
specification. See
https://mailarchive.ietf.org/arch/msg/6lo/ii9ANOvsJKr08kr7oOCWQ635GtI/.  If the
specification is not available, it isn’t clear how the IETF consensus review
process is possible.  The shepherd write-up says “Access to the NFC spec has
been available for those that have needed it.”


----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

** Section 1.  Editorial.
As of the writing, NFC is supported
   by the main smartphone operating systems.

In what way is this germane?  Will this text age well?

** Section 3.4.  Most of these normative statement appear to be restatements of
Section 4.5.2 of NFC Forum’s LLCP version 1.4.  The style of this document
seems to be specifying behavior that is in fact already specified
authoritatively elsewhere.

** Section 4.2.  Per the use of RFC713 to generate the interface identifiers,
is there any guidance to provide on:

-- which hash function is to be used for F()

-- how to generate the Network_ID

-- generating the secret_key

** Section 4.2.  Editorial. What is Figure 4 showing that isn’t already stated
in the previous sentence of “interface identifiers of all unicast addresses for
NFC-enabled devices are 64 bits long and constructed by using the generation
algorithm of random (but stable)    identifier (RID)”

** Section 7.
   Ad-hoc secure data transfer can be established between two
   communication parties without any prior knowledge of the
   communication partner.  Ad-hoc secure data transfer can be vulnerable
   to Man-In-The-Middle (MITM) attacks.  Authenticated secure data
   transfer provides protection against Man-In-The-Middle (MITM)
   attacks.  In the initial bonding step, the two communicating parties
   store a shared secret along with a Bonding Identifier.  For all
   subsequent interactions, the communicating parties re-use the shared
   secret and compute only the unique encryption key for that session.
   Secure data transfer is based on the cryptographic algorithms defined
   in the NFC Authentication Protocol (NAP).

-- This entire text is cut-and-paste from Section 3.2.5 of NFC Forum LLC. 
Given that this text is used verbatim shouldn’t it be cited?

-- If the text is going to be restated, in the spirit of inclusive language,
please consider alternative language to “MiTM”.



_______________________________________________
6lo mailing list
6lo@ietf.org
https://www.ietf.org/mailman/listinfo/6lo

Reply via email to