Internet DRAFT - draft-richardson-smartobject-security
draft-richardson-smartobject-security
Smart Object Security Workshop M. Richardson
Internet-Draft SSW
Intended status: Informational February 7, 2012
Expires: August 10, 2012
Challenges in Smart Object Security: too many layers, not enough ram
draft-richardson-smartobject-security-00
Abstract
This is a position paper for the pre-IETF83 Workshop on Smart Object
Security. The author contends that layer-2 security solutions are
not only in-adequate, but may in fact be harmful when deployed into
smart object systems. While layer-2 security services may be
valuable, they must be channel bound up to the layer-7 application
layer.
Status of this Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on August 10, 2012.
Copyright Notice
Copyright (c) 2012 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
Richardson Expires August 10, 2012 [Page 1]
Internet-Draft Abbreviated Title February 2012
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. What we need . . . . . . . . . . . . . . . . . . . . . . . . . 3
3. Security Considerations . . . . . . . . . . . . . . . . . . . . 5
4. References . . . . . . . . . . . . . . . . . . . . . . . . . . 5
4.1. Normative References . . . . . . . . . . . . . . . . . . . 5
4.2. Informative References . . . . . . . . . . . . . . . . . . 6
Appendix A. Additional Stuff . . . . . . . . . . . . . . . . . . . 6
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 6
Richardson Expires August 10, 2012 [Page 2]
Internet-Draft Abbreviated Title February 2012
1. Introduction
The ROLL RPL specification provides an optional layer-3 security
mechanism. The WG did not focus very much on making this security
system useable, as most WG participants assumed that layer-2 would
provide all the security that most deployments would want.
While the ZigBee 2007 is provides a stack up to the application, and
clearly articulates the role of the application in the security
system, if ROLL RPL applicability statements specify Zigbee at all
(XXX), from Zigbee's point of view the "application" is IPv6. The
security provided by Zigbee 2007 does not get translated up to the
IPv6 application, and certainly is not leveraged for end-to-end
security.
Other specifications, including 6LowPAN (mesh-over) and ISA100 use a
network key essentially identical to the 802.11 WEP. While many of
these specifications propose to upgrade their mechanisms to include
WPA-like usage of EAP, this does not solve the fundamental security
problem of *authorization*. Except for auditing purposes, the
network does not care who the nodes are, but rather, are they
authorized to perform a particular function. In the context of RPL,
one of these key functions is routing of packets.
A good example of the lack of security feature is that it is
impossible in RPL to create a network where some nodes are authorized
to route packets, while other nodes are not. While the specification
supports this when doing layer-3 security, it only supports it for
asymmetric security methods, widely regarded as too expensive for
small devices. If the security is provided by a layer-2, then even
if asymmetric methods are used in that layer, they are not available
to the RPL (or higher) layers.
2. What we need
What we need is a security service implemented in layer-2 or layer-3,
which not only provides for the privacy and integrity that is
typically sought, but also can be leveraged by upper layers
(including the layer-3 routing layer), to make authorization
decisions.
Layer 2 alliances have created detailed and complex security
specifications for wireless connectivity of smart objects. The
requirements seems to have driven by existing early adopters of
building and industrial automation. For many of the participants,
security has become magic pixie dust provided by the vendor of the
layer 2 MAC/radio.
Richardson Expires August 10, 2012 [Page 3]
Internet-Draft Abbreviated Title February 2012
I had believed that layer 3 security was more appropriate and easier
to deploy/update. While requiring possibly more software code space,
it might have a lower transitor count as flash is sometimes cheaper
than complex logic in a MAC. But, I wondered who would need such
flexibility among current industrial and smartgrid users of ROLL?
Maybe it just my desire to do ubiquitous l3 networking with strangers
on the bus, and I should shut up and believe that l2 security is
enough.
Then the ROLL WG came to applicability statements, and it has obvious
to me that people installing industrial equipement have much more
complex requirements than I could even imagine on the bus. On the
bus, I most trust everyone exactly the same: if they get my
cryptographically signed packets to my intended destination, then I'm
happy. I have really only one level of authorization: I either let
you route my packets, or I do not. If I do not trust you to route, I
might still trust you to have a cached copy of some data I want, and
I have a way to authenticate the data itself.
The home automation users of ROLL was where I figured the most
complexity would occur, and this relates mostly to how guests and
children in the home will interact with the home system(s). While
the lighting and appliance control network in the home looks very
much like an commercial building system, how the occupants of the
home interact with this system is not well defined as yet. It is
likely that initially all interaction will be via hard controls
("light switches"), or via a gateway system that not only connected
the 802.11 and 802.15.4 networks, but also provided an authentication
and authorization system between the two networks. The ROLL provided
security need concern itself only with whether or not a device was
part of the home network or not, something that layer-2 security can
do.
However, smart phones and personal area networks will begin to get
802.15.4 interfaces, and in some cases home automation is escrewing
802.15.4, claiming that 802.11 is now so cheap (power and bill-of-
material) that it makes no sense to assume/require a gateway device.
This is where, I thought, the multi-level authorization security
would be required, and this would be subject to much innovation, with
a number of home automation systems proving inadequate and being
upgraded or replaced over time.
I thought that only when we have house guests (consider a teenage
child to be an extended stay house guest) that we would run into
troubles: we definitely want to authorize our guests to do many
things in our homes, but there are many things we do not want them to
do.
Richardson Expires August 10, 2012 [Page 4]
Internet-Draft Abbreviated Title February 2012
What I did I not expect was that industrial users would in fact
require a multi-level authorization system, and have rekeying and
trust issues more complex than that of the home. It was once
explained that the militaries aren't into authorization: they care
about authentication and auditing. A soldier must always have the
ability to exceed their authority, because sometimes it's the right
thing to do, and if they did the wrong thing, they have the court
martial to solve this problem.
The court martial is not a solution for the industrial ROLL user.
The various modes of operation described in
[I-D.phinney-roll-rpl-industrial-applicability] require several
levels of trust. While layer-2 security has a place, it seems that
the installers of the devices (who would have to configure the
layer-2 security) are not to be trusted in the long term, and
therefore some way to change layer-2 keying material needs to be
standardized.
If during any unplanned (i.e. emergency) situation new equipment will
be brought into the plant to aid in recovery, that this equipment
either will need to be configured (by regular plant personal) with
the right security, or it will be necessary to either turn off or
revert security to some other more minimal configuration, such that
the equipment can be used.
It appears that not only is LAYER 2 security is not only inadequate,
but may be actually too difficult to configure, simply because
devices can not configure once installed. I am concerned that
without a better answer, every building and plant will -- like most
BlueTooth heads -- have PIN 0000!
We need something more sophisticated: sophisticated enough to be
simple.
3. Security Considerations
This document does not propose any changes to existing or new
systems, but rather details limitations of a current security model
4. References
4.1. Normative References
[I-D.phinney-roll-rpl-industrial-applicability]
Phinney, T., Thubert, P., and R. Assimiti, "RPL
applicability in industrial networks",
Richardson Expires August 10, 2012 [Page 5]
Internet-Draft Abbreviated Title February 2012
draft-phinney-roll-rpl-industrial-applicability-00 (work
in progress), October 2011.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
4.2. Informative References
[RFC2629] Rose, M., "Writing I-Ds and RFCs using XML", RFC 2629,
June 1999.
Appendix A. Additional Stuff
This becomes an Appendix.
Author's Address
Michael C. Richardson
Sandelman Software Works
470 Dawson Avenue
Ottawa, ON K1Z 5V7
CA
Email: mcr@sandelman.ca
URI: http://www.sandelman.ca/mcr/
Richardson Expires August 10, 2012 [Page 6]