Re: [Ace] EST over CoAP

2018-05-14 Thread Michael StJohns
Hi Hannes - Basically, the argument I'm hearing again is that we have to have common protocols that work with the least capable devices in the same way that they work with more capable devices.   Which then is taken to mean that we have to limit the security of said protocols to what's availab

Re: [Ace] EST over CoAP: Randomness

2019-05-19 Thread Michael StJohns
On 5/14/2019 7:29 PM, Hannes Tschofenig wrote: Hi Paul, My understanding from reading the draft text was that the "cost" was actually talking about "energy cost" rather than "monetary cost". The monetary cost may also be interesting. It is difficult to judge the extra cost of a RNG in an MCU b

Re: [Ace] Adoption of Low Latency Group Communication Security Work in ACE

2016-07-20 Thread Michael StJohns
As I mentioned at the microphone I'm opposed to pursuing symmetric key multicast solutions. WRT to the current set of proposal documents, I see no substantive improvement on the rejected proposals from the DICE (https://mailarchive.ietf.org/arch/search/?email_list=dtls-iot) working group. The

Re: [Ace] Adoption of Low Latency Group Communication Security Work in ACE

2016-07-21 Thread Michael StJohns
On 7/21/2016 5:29 AM, Ludwig Seitz wrote: On 2016-07-21 11:04, Michael Richardson wrote: Why will ACE succeed when DICE failed? Does ACE now have some knowledge or mechanism that DICE couldn't have created because it was out of scope? ACE is (also) about authorization, which DICE wasn't. A

Re: [Ace] Adoption of Low Latency Group Communication Security Work in ACE

2016-07-21 Thread Michael StJohns
On 7/21/2016 5:26 AM, Carsten Bormann wrote: Michael Richardson wrote: Why will ACE succeed when DICE failed? Because DICE tried to hack something into TLS. That had no support. Actually, that's not the complete story. It was one of the things that finally killed this off (e.g. DICE was su

Re: [Ace] Group Communication Security Disagreements

2016-07-21 Thread Michael StJohns
On 7/21/2016 5:04 AM, Hannes Tschofenig wrote: Some other folks, including myself, believe that we would not just use the group key to determine the authorization decision but would instead rely on the authorization mechanism to prevent larger harm. This means that a compromised luminare would in

Re: [Ace] on signature verification times for sec192r1

2016-07-23 Thread Michael StJohns
On 7/23/2016 11:10 AM, Pascal Urien wrote: Hi All J3A081M is a javacard device from NXP The micocontroller should be the P5CD081V1A, which comprises a crypto processor There's a number of these from a number of vendors. I'd actually look at the A7xxx series of chips as they're designed to

Re: [Ace] Adoption of Low Latency Group Communication Security Work in ACE

2016-07-25 Thread Michael StJohns
On 7/25/2016 8:21 AM, Somaraju Abhinav wrote: Hi Mike, The group key is also the authorization key in the model proposed. Any entity that holds that key can forge a message that can cause the action authorized by the issuance of that key. In your example, assuming that the door lock and th

Re: [Ace] Adoption of Low Latency Group Communication Security Work in ACE

2016-07-25 Thread Michael StJohns
On 7/25/2016 12:59 PM, Somaraju Abhinav wrote: Let's try one more time here. [AS] Good. Much clearer now. 1) If a group of devices share a key, and 2) If some of that group of devices are controllers, and 3) The majorit

Re: [Ace] Adoption of Low Latency Group Communication Security Work in ACE

2016-07-26 Thread Michael StJohns
il.com <mailto:rstruik@gmail.com>] *Sent:* Tuesday, July 26, 2016 3:00 AM *To:* Kumar, Sandeep; Stephen Farrell; Somaraju Abhinav; Michael StJohns; ace@ietf.org <mailto:ace@ietf.org> *Subject:* Re: [Ace] Adoption of Low Latency Group Co

Re: [Ace] Adoption of Low Latency Group Communication Security Work in ACE

2016-07-27 Thread Michael StJohns
On 7/26/2016 7:55 PM, Robert Cragie wrote: Mike, My concern with this thread is that you seem to have a very black/white assumption regarding the use of a symmetric group key. Defining a protocol which allows use of a symmetric group key does not in itself imply that it will be misused. It's

Re: [Ace] Group Communication Security Disagreements

2016-07-27 Thread Michael StJohns
On 7/27/2016 5:56 PM, Michael Richardson wrote: Kathleen Moriarty wrote: >> Mohit Sethi wrote: >> > designed/developed/specified for their use-case. I could definitely >> > see some IoT startup building a solution that switches on the lights >> > in a room as soon as you unl

Re: [Ace] Adoption of Low Latency Group Communication Security Work in ACE

2016-07-29 Thread Michael StJohns
Hi Markus - I needed to think about how to reply to this specifically and explain why its still a bad idea to try and scale things. See below. On 7/27/2016 8:34 AM, Grunwald, Markus wrote: Hello, sorry to break the threading by not replying directly to a post, but until now I have only be

Re: [Ace] Group Communication Security Disagreements

2016-09-09 Thread Michael StJohns
Hi - It's been over a month since there's been any further discussion on this topic. Given the record I would suggest a lack of consensus to proceed on basis of two items: 1) A roughly even split on the vocal yays and nays on the subject of symmetric key multicast for control functions and

Re: [Ace] Group Communication Security Disagreements

2016-09-15 Thread Michael StJohns
Hi Elliot et al - Sorry, I think you're still missing the point: * Source Authentication (A) cannot be accomplished securely by Symmetric Key Multicast (^B): (A -> ^B) * Cyber Physical control functions (C) require source authentication (A): (C -> A) * Turning on and off lights (

Re: [Ace] Group Communication Security Disagreements

2016-09-16 Thread Michael StJohns
On 9/16/2016 6:03 AM, Eliot Lear wrote: Hi Mike, On 9/15/16 5:36 PM, Michael StJohns wrote: Hi Elliot et al - Sorry, I think you're still missing the point: * Source Authentication (A) cannot be accomplished securely by Symmetric Key Multicast (^B): (A -> ^B) * Cyber

Re: [Ace] Summary of ACE Group Communication Security Discussion

2016-09-26 Thread Michael StJohns
On 9/26/2016 8:30 AM, kathleen.moriarty.i...@gmail.com wrote: Without a hat on, you can add my support to Abhinav's proposal. Perfect is ideal, but you often can not make any progress if you accept nothing less. The security considerations section will have to be thorough. Hi Kathleen et al

Re: [Ace] Summary of ACE Group Communication Security Discussion

2016-09-26 Thread Michael StJohns
On 9/26/2016 12:10 PM, Eliot Lear wrote: Hi Mike, Just one clarification: On 9/26/16 5:41 PM, Michael StJohns wrote: With respect to Eliot's comment, it doesn't really matter if the key management protocol is asymmetric if the multicast session keys are symmetric and used for cont

Re: [Ace] Summary of ACE Group Communication Security Discussion

2016-09-26 Thread Michael StJohns
On 9/26/2016 12:31 PM, kathleen.moriarty.i...@gmail.com wrote: This time as AD. Please excuse typos, sent from handheld device On Sep 26, 2016, at 11:41 AM, Michael StJohns wrote: On 9/26/2016 8:30 AM, kathleen.moriarty.i...@gmail.com wrote: Without a hat on, you can add my support to

Re: [Ace] Summary of ACE Group Communication Security Discussion

2016-11-12 Thread Michael StJohns
On 11/12/2016 5:11 PM, Michael Richardson wrote: I realize that this thread is months old: I haven't seen any newer conversation, so I'll continue anyway. I would concur with MSJ's view that having an informational draft might be a way to let this work go forward, but I suggest instead the right

Re: [Ace] Summary of ACE Group Communication Security Discussion

2016-11-16 Thread Michael StJohns
On 11/16/2016 9:08 AM, Kepeng Li wrote: Hello all, We had a long discussion about group communication security topic since the previous F2F meeting. Hannes and I have tried to make a summary about the discussion as follows: · The solution needs to define both, symmetric and an asymmet

Re: [Ace] Summary of ACE Group Communication Security Discussion

2016-11-23 Thread Michael StJohns
" arguments", but that is a corporate mindset issue}. On 11/17/2016 12:50 AM, Michael StJohns wrote: On 11/16/2016 9:08 AM, Kepeng Li wrote: Hello all, We had a long discussion about group communication security topic since the previous F2F meeting. Hannes and I have tried to

Re: [Ace] Summary of ACE Group Communication Security Discussion

2016-11-24 Thread Michael StJohns
Comments inline. Also see particularly, the comments underlined and in bold. On 11/24/2016 9:09 AM, Hannes Tschofenig wrote: Hi Mike On 11/17/2016 06:50 AM, Michael StJohns wrote: There is no case (absent hardware mitigation) in which a symmetric group key solution can be made secure/safe and

Re: [Ace] Summary of ACE Group Communication Security Discussion

2016-11-25 Thread Michael StJohns
me immediately by email, and delete the original message and any attachments. Unless expressly stated in this e-mail, nothing in this message or any attachment should be construed as a digital or electronic signature. *From:*Ace [mailto:ace-boun...@ietf.org] *On Behalf Of *Michael StJohns *Se

Re: [Ace] where are we with draft-somarju-ace-multicast?

2016-12-22 Thread Michael StJohns
On 12/22/2016 3:42 AM, Eliot Lear wrote: Hi, This working group has been in a state of indecision about this draft for quite some time and I would like to gain some clarity on the matter. On the one hand, we have a draft that there seems to be unanimous agreement would be useful to the lighti

Re: [Ace] where are we with draft-somarju-ace-multicast?

2016-12-23 Thread Michael StJohns
On 12/23/2016 3:24 AM, Eliot Lear wrote: On 12/22/16 11:36 PM, Michael StJohns wrote: On 12/22/2016 3:42 AM, Eliot Lear wrote: Hi, This working group has been in a state of indecision about this draft for quite some time and I would like to gain some clarity on the matter. On the one hand

Re: [Ace] Doodle for ACE virtual interim meeting

2017-01-13 Thread Michael StJohns
On 1/13/2017 4:44 AM, Kepeng Li wrote: Hallo all, According to the doodle poll, let’s have a call on 14th Feb, GMT 15:00 ~ 15:59. We have the same amount of participants about Option 1, 2, and 4. Considering that Mike has strong position about this draft, so I accommodate his choice to allo

Re: [Ace] draft-somaraju-ace-multicast

2017-02-07 Thread Michael StJohns
I haven't had a chance to comment on the document, but I have a few comments on the below that will depend on getting the requirements correct. In the introduction of the document you list three requirements and Jim has taken you to task for them. There are actually four requirements, one of

[Ace] Asymmetric signature performance

2017-02-07 Thread Michael StJohns
Hi - This is sort of non-obvious, but one or two articles I read suggest that RSA 1024 performance may be better than the ECDSA equivalent. The tradeoff here is obviously the size of the signature and the transmission thereof, but... While 1024 bits isn't an ideal security strength for RSA,

Re: [Ace] Asymmetric signature performance

2017-02-08 Thread Michael StJohns
ngs are not nails and can never be made to be nails. This lighting multicast, cheap, low latency, control system is really not looking like a nail. Mike Abhinav -------- *From:* Ace on behalf of Michael StJohns *Sent:* We

Re: [Ace] Asymmetric signature performance

2017-02-08 Thread Michael StJohns
Hope this helps the discussion. Thanks Mohit On 02/08/2017 04:55 AM, Michael StJohns wrote: Hi - This is sort of non-obvious, but one or two articles I read suggest that RSA 1024 performance may be better than the ECDSA equivalent. The tradeoff here is obviously the size of the signature

Re: [Ace] Asymmetric signature performance

2017-02-08 Thread Michael StJohns
imitations. Panos -Original Message- From: Ace [mailto:ace-boun...@ietf.org] On Behalf Of Michael StJohns Sent: Tuesday, February 07, 2017 9:55 PM To: ace@ietf.org Subject: [Ace] Asymmetric signature performance Hi - This is sort of non-obvious, but one or two articles I read sugges

Re: [Ace] Call for adoption for draft-somaraju-ace-multicast-02

2017-03-07 Thread Michael StJohns
On 3/6/2017 8:55 PM, Jim Schaad wrote: After thinking about this for a long time, I will reluctantly state a position. I do not believe that the WG should adopt this document at least until such a time as a version has been released which does a substantially better job of restricting the s

[Ace] Charter boundaries?

2017-07-17 Thread Michael StJohns
As I'm sitting in the ACE wig session in Prague I'm struck by the number of extra-charter documents being reviewed or proposed or in progress. Some (most?) of these are the specific profiles for given protocols for ace auth, but reading all of the documents as a whole I get a sense of creeping fea

Re: [Ace] IETF#100 Presentations

2017-09-28 Thread Michael StJohns
On 9/26/2017 9:48 AM, Hannes Tschofenig wrote: Hi all, at the last few IETF meetings we had plenty of presentations based on new document submissions. Our security AD, Kathleen, raised concerns that many of the presented documents had not seen prior mailing list discussion. Hence, the approach

Re: [Ace] Doodle for ACE virtual interim meeting in Oct

2017-09-28 Thread Michael StJohns
On 9/27/2017 1:29 PM, Kathleen Moriarty wrote: Goran has a good point here. Actually - I don't think he does.   If there is a sufficiently interested group of people that want to talk certificate enrollment and there is a chair available and willing then do an interim on that.  If there is a

Re: [Ace] Doodle for ACE virtual interim meeting in Oct

2017-09-29 Thread Michael StJohns
efforts on re-chartering and hold off on all new items including the whole profiling wiki stuff?  At the same time pruning the list of Active and Related IDs for the group to something manageable? Mike Sent from my iPhone On Sep 28, 2017, at 1:21 PM, Michael StJohns wrote: On 9

Re: [Ace] multicast

2017-10-19 Thread Michael StJohns
On 10/19/2017 10:59 AM, Hannes Tschofenig wrote: I suspect the idea is the following: 1) First, you would decrypt the packet and validate the mac (assuming that it is an AEAD cipher) 2) You execute the operation to meet the latency requirements. 3) Then, you can take time to verify the digital

[Ace] Re: IoT certificate profile vs TLS SNI and subjectAltName

2025-01-07 Thread Michael StJohns
Working off of https://www.ieee802.org/secmail/msg00396.html EUI-MAC-OtherNames-2025 { iso(1) identified-organization(3) dod(6) internet(1) security(5)     mechanisms(5) pkix(7) id-mod(0) id-mod-pkix1-eui-mac-othername-00 (tbd0)} DEFINITIONS BEGIN IMPORTS OTHER-NAME FROM PKIX1Implicit-2009 {