Since the document has been returned to the WG by the AD, I've left the IESG
out of this email.

Roman Danyliw via Datatracker <nore...@ietf.org> wrote:
    } ** Section 4.1
    } The current firmware model of the device is sometimes provided and
    } then the authoritative server provides a determination if a new
    } version is required and, if so, what version.

    > What’s the authoritative server in this model?  Is it the “vendor system”
    > mentioned in the previous sentence?

Yes, changed to add word "vendor"

} The current firmware model of the device is sometimes provided and then the
} vendor's authoritative server provides a determination if a new version is
} required and, if so, what version.

    > ** Section 5.  What is the actionable BCP or design guidance from this 
section?

I have added:

} If the IoT device does not use the DNS servers provided to it via DHCP or
} Router Advertisements, then the MUD controller will need to be told which
} servers will in fact be used.
} As yet, there is no protocol to do this, but future work could provide this
} as an extension to MUD.

} Until such time as such a protocol exists, the best practice is for the IoT
} device to always use the DNS servers provided by DHCP or Router
} Advertisements.

    > ** Section 6.
    > The difficult part is determining what to put into the MUD file
    > itself.  There are currently tools that help with the definition and
    > analysis of MUD files, see [mudmaker].  The remaining difficulty is
    > now the actual list of expected connections to put in the MUD file.
    > An IoT manufacturer must now spend some time reviewing the network
    > communications by their device.

    > How is this germane to MUD and DNS?

Each connection listed in the MUD file which uses a DNS name needs to be
reviewed to determine if the name is stable or not.  That's the topic of the
entire document.

    > ** Section 7.  I found this Privacy Considerations lacking a basic 
explanation
    > of the DNS-focused threat model.  I think the start of that threat 
assessment
    > is that “many IoT devices are automatically configured to connect to the 
public
    > internet to enable automatic updates, send telemetry to the 
manufacturers, or
    > enable integration with manufacturer or third-party services”.

You seem to have reviewed a previous version, since the version posted in
April has section 8 as privacy considerations.

    > Using the tradeoff template of the security considerations in Section 8, a
    > privacy consideration trade-off might be that “device owners/operators 
want to
    > leak as little onto the internet and to the device manufacturer while 
still
    > getting the functionality of the IoT device”.

Yes. I'm not really sure what I can/should revise.

    > ** Section 7.

    > IoT devices that reach out to the manufacturer at regular intervals
    > to check for firmware updates are informing passive eavesdroppers of
    > the existence of a specific manufacturer's device being present at
    > the origin location.

    > -- Is it common in an enterprise setting for IoT devices to be able to
    > auto-updated themselves from firmware download off the internet?

Yes.  And brick themselves if/when they fail.
This is now common news.

    > In my limited
    > enterprise experience, other end-points and network device are typically
    > managed.  Is there some nuance that these devices can only be managed the
    > manufacturer?

Yes, in well managed enterprises end-points are actively managed.
We just had a discussion about firmware update systems/trackers, and *those*
systems, which are non-standard, are the ways they are managed.  But, it's
highly verticalized today, with lots of vendor-lock-in, and yes, lots of
cases where only the manufacturer can manage the device.

    > -- In an enterprise setting wouldn’t it be best practice to prevent 
devices
    > from beaconing out to the internet with DNS blackholing or IP address 
filters?

Yes, that could be done by overriding/extending the MUD file by the
enterprise operator.  Many people have suggested this, but in general, it's a
value-add, and does seem to need standardization.   Those filters would need
to be of the drop-without-flagging kind, because enterprises have too many
false positives already.  Of course, the moment there is a device
mis-function, the manufacturer will ask if there are any extra filters, and
then the filters will get removed, and disaster restarts.

    > ** Section 7.
    > IoT device manufacturers are encouraged to find ways to anonymize
    > their update queries.  For instance, contracting out the update
    > notification service to a third party that deals with a large variety
    > of devices would provide a level of defense against passive
    > eavesdropping.

    > This is good advice.

    > -- Is the DNS footprint of most IoT devices predominately queries for 
updates?
    > To revisit the previous comment about the threat model, don’t some IoT 
devices
    > use DNS to initiate traffic for more things than just update queries 
negating
    > the benefit of a third-party update infrastructure?

1. I don't think one could characterize the DNS footprint this way.
2. Those other things might or might not be privacy violations, but the one
   thing that I know all devices *ought* to be doing is updates.

    > -- Not knowing much about this is done in production, is this realistic
    > guidance based on current IoT manufacturer practices?  Collecting less 
data
    > from device owner/operators seems to be opposite of the trends I have 
seen.

Yes.  Lots of manufacturers suck.
My estimation is that 95% of residential IoT devices will be landfill within
a year of their release.  That's really aweful.  None of those manufacturers
have read this document, will ever read it, or will know what MUD is.

A major concern is false positives: devices that appear to be doing bad
things, but actually, it's just a (MUD) ruleset problem.  This ties up
operator time, and I think is one reason why many are reluctant to deploy a
MUD controller: if it creates more work, nobody wants it.  So getting rid of
false positives due to DNS mis-use seems like a big deal.

--
Michael Richardson <mcr+i...@sandelman.ca>   . o O ( IPv6 IøT consulting )
           Sandelman Software Works Inc, Ottawa and Worldwide

Attachment: signature.asc
Description: PGP signature

_______________________________________________
OPSAWG mailing list -- opsawg@ietf.org
To unsubscribe send an email to opsawg-le...@ietf.org

Reply via email to