Hi Pascal,

> But what about heath devices, autonomous cars, nuclear plants,
> blockchain transfers ?. Maybe, they are not in the IoT scope...

Agreed. Therefore I wrote

>> Isn't it always a question of what to protect in which environment?

Maybe, one column with recommended (Y/N/<blank>), is not enough.

##############################
Note

    If an item is not marked as "Recommended", it does not
    necessarily mean that it is flawed; rather, it indicates that
    the item either has not been through the IETF consensus process,
    has limited applicability, or is intended only for specific use
    cases
##############################

best regards
Achim

Am 21.09.20 um 22:57 schrieb Pascal Urien:
Hi Achim

Your local network "light bulb" is likely not a big issue

But what about heath devices, autonomous cars, nuclear plants,
blockchain transfers ?. Maybe, they are not in the IoT scope...

Best Regards

Pascal


Le lun. 21 sept. 2020 à 19:57, Achim Kraus <achimkr...@gmx.net
<mailto:achimkr...@gmx.net>> a écrit :

    Hi Pascal,

    that using these ISO 7816 card is fast and save, doesn't say too much
    about the use-case without that card, or? For sure, there are
    micro-controller, which are also equipped with hw-ecc or hw-rsa. And
    there are more secure-devices protecting credentials. But there are also
    still ones without.
    I'm not sure, if I want spend too much money in my local network "light
    bulb". Isn't it always a question of what to protect in which
    environment?

    best regards
    Achim

    Am 21.09.20 um 14:53 schrieb Pascal Urien:
     > tls-se memory footprint is
     > flash 《 40KB
     > ram   《 1KB
     >
     > time to open a tls session 1.4 seconds
     >
     >
     > Le lun. 21 sept. 2020 à 14:47, Pascal Urien
    <pascal.ur...@gmail.com <mailto:pascal.ur...@gmail.com>
     > <mailto:pascal.ur...@gmail.com <mailto:pascal.ur...@gmail.com>>>
    a écrit :
     >
     >     hi Hannes
     >
     >     no openssl or wolfssl are used as client in order to check
     >     interoperability with tls-se server
     >
     >     tls-se is of course a specific implémentation for tls13 server in
     >     javacard..it is written in java but an ôter implémentation is
     >     written in c for constraint notes. as written in the draft tls-se
     >     implementation has three software blocks: crypto lib, tls state
     >     machine, and tls lib
     >
     >
     >
     >     Le lun. 21 sept. 2020 à 14:36, Hannes Tschofenig
     >     <hannes.tschofe...@arm.com <mailto:hannes.tschofe...@arm.com>
    <mailto:hannes.tschofe...@arm.com
    <mailto:hannes.tschofe...@arm.com>>> a écrit :
     >
     >         Hi Pascal, ____
     >
     >         __ __
     >
     >         are you saying that the stack on the secure element uses
    WolfSSL
     >         or OpenSSL? I am sure that WolfSSL works well but for
    code size
     >         reasons I doubt OpenSSL is possible. Can you confirm? ____
     >
     >         __ __
     >
     >         In case of WolfSSL, you have multiple options for
    credentials,
     >         including plain PSK, PSK-ECDHE, raw public keys, and
     >         certificates as I noted in my mail to the UTA list: ____
     >
     >
    https://mailarchive.ietf.org/arch/msg/uta/RJ4wU77D6f7qslfwrc16jkrPTew/____
     >
     >         __ __
     >
     >         Ciao____
     >
     >         Hannes____
     >
     >         __ __
     >
     >         *From:* Pascal Urien <pascal.ur...@gmail.com
    <mailto:pascal.ur...@gmail.com>
     >         <mailto:pascal.ur...@gmail.com
    <mailto:pascal.ur...@gmail.com>>>
     >         *Sent:* Monday, September 21, 2020 2:01 PM
     >         *To:* Hannes Tschofenig <hannes.tschofe...@arm.com
    <mailto:hannes.tschofe...@arm.com>
     >         <mailto:hannes.tschofe...@arm.com
    <mailto:hannes.tschofe...@arm.com>>>
     >         *Cc:* Filippo Valsorda <fili...@ml.filippo.io
    <mailto:fili...@ml.filippo.io>
     >         <mailto:fili...@ml.filippo.io
    <mailto:fili...@ml.filippo.io>>>; tls@ietf.org <mailto:tls@ietf.org>
    <mailto:tls@ietf.org <mailto:tls@ietf.org>>
     >         *Subject:* Re: [TLS] The future of external PSK in TLS
    1.3____
     >
     >         __ __
     >
     >         Hi Hannes____
     >
     >         __ __
     >
     >         Yes it has been tested with several  3.04 Javacards
     >         commercially available____
     >
     >         __ __
     >
     >         In the draft
    https://tools.ietf.org/html/draft-urien-tls-se-00
     >           Section 5-ISO 7816 Use Case, the exchanges are done
    with the
     >         existing implementation____
     >
     >         __ __
     >
     >         TLS-SE TLS1.3 PSK+ECDH server works with ESP8266 or
     >         Arduino+Ethernet boards ____
     >
     >         __ __
     >
     >         For client software we use OPENSSL or WolfSSL____
     >
     >         __ __
     >
     >         Pascal____
     >
     >         __ __
     >
     >         __ __
     >
     >         __ __
     >
     >         __ __
     >
     >         Le lun. 21 sept. 2020 à 12:35, Hannes Tschofenig
     >         <hannes.tschofe...@arm.com
    <mailto:hannes.tschofe...@arm.com> <mailto:hannes.tschofe...@arm.com
    <mailto:hannes.tschofe...@arm.com>>> a
     >         écrit :____
     >
     >             Hi Pascal,
     >
     >             Thanks for the pointer to the draft.
     >
     >             Since I am surveying implementations for the update
    of RFC
     >             7925 (see
     > https://datatracker.ietf.org/doc/draft-ietf-uta-tls13-iot-profile/)
     >             I was wondering whether there is an implementation of
    this
     >             approach.
     >
     >             Ciao
     >             Hannes
     >
     >
     >             From: Pascal Urien <pascal.ur...@gmail.com
    <mailto:pascal.ur...@gmail.com>
     >             <mailto:pascal.ur...@gmail.com
    <mailto:pascal.ur...@gmail.com>>>
     >             Sent: Monday, September 21, 2020 11:44 AM
     >             To: Hannes Tschofenig <hannes.tschofe...@arm.com
    <mailto:hannes.tschofe...@arm.com>
     >             <mailto:hannes.tschofe...@arm.com
    <mailto:hannes.tschofe...@arm.com>>>
     >             Cc: Filippo Valsorda <fili...@ml.filippo.io
    <mailto:fili...@ml.filippo.io>
     >             <mailto:fili...@ml.filippo.io
    <mailto:fili...@ml.filippo.io>>>; tls@ietf.org <mailto:tls@ietf.org>
     >             <mailto:tls@ietf.org <mailto:tls@ietf.org>>
     >             Subject: Re: [TLS] The future of external PSK in TLS 1.3
     >
     >             Hi All
     >
     >             Here is an example of PSK+ECDHE for IoT
     >
     > https://tools.ietf.org/html/draft-urien-tls-se-00  uses
     >             TLS1.3 server  PSK+ECDHE for secure elements
     >
     >             The security level in these devices is as high as EAL5+
     >
     >             The computing time is about 1.4s for a PSK+ECDHE session
     >             (AES-128-CCM, + secp256r1)
     >
     >             The real critical resource is the required RAM size, less
     >             than 1KB in our experiments
     >
     >             The secure element  only needs a classical TCP/IP
    interface
     >             (i.e. sockets like)
     >
     >             Trusted PSK should avoid selfie attacks
     >
     >             Pascal
     >
     >
     >
     >             Le lun. 21 sept. 2020 à 11:29, Hannes Tschofenig
     >             <mailto:hannes.tschofe...@arm.com
    <mailto:hannes.tschofe...@arm.com>
     >             <mailto:hannes.tschofe...@arm.com
    <mailto:hannes.tschofe...@arm.com>>> a écrit :
     >             Hi Filippo,
     >
     >             • Indeed, if the SCADA industry has a particular
    need, they
     >             should profile TLS for use in that industry, and not
    require
     >             we change the recommendation for the open Internet.
     >
     >             We have an IoT profile for TLS and it talks about the
    use of
     >             PSK, see https://tools.ietf.org/html/rfc7925
     >
     >             On the “open Internet” (probably referring to the Web
    usage)
     >             you are not going to use PSKs in TLS. There is a separate
     >             RFC that provides recommendations for that
    environmnent, see
     >             RFC 752. That RFC is currently being revised, see
     > https://datatracker.ietf.org/doc/draft-sheffer-uta-rfc7525bis/
     >
     >             Ciao
     >             Hannes
     >
     >             IMPORTANT NOTICE: The contents of this email and any
     >             attachments are confidential and may also be
    privileged. If
     >             you are not the intended recipient, please notify the
    sender
     >             immediately and do not disclose the contents to any other
     >             person, use it for any purpose, or store or copy the
     >             information in any medium. Thank you.
     >             _______________________________________________
     >             TLS mailing list
     >             mailto:TLS@ietf.org <mailto:TLS@ietf.org>
    <mailto:TLS@ietf.org <mailto:TLS@ietf.org>>
     > https://www.ietf.org/mailman/listinfo/tls
     >             IMPORTANT NOTICE: The contents of this email and any
     >             attachments are confidential and may also be
    privileged. If
     >             you are not the intended recipient, please notify the
    sender
     >             immediately and do not disclose the contents to any other
     >             person, use it for any purpose, or store or copy the
     >             information in any medium. Thank you.____
     >
     >         IMPORTANT NOTICE: The contents of this email and any
    attachments
     >         are confidential and may also be privileged. If you are
    not the
     >         intended recipient, please notify the sender immediately
    and do
     >         not disclose the contents to any other person, use it for any
     >         purpose, or store or copy the information in any medium.
    Thank you.
     >
     >
     > _______________________________________________
     > TLS mailing list
     > TLS@ietf.org <mailto:TLS@ietf.org>
     > https://www.ietf.org/mailman/listinfo/tls
     >


_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to