Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

security review issue 5: tampering during drop ship process #78

Closed
mcr opened this issue Sep 30, 2018 · 4 comments
Closed

security review issue 5: tampering during drop ship process #78

mcr opened this issue Sep 30, 2018 · 4 comments
Assignees

Comments

@mcr
Copy link
Member

mcr commented Sep 30, 2018

  1. Device tampering during the drop ship process, maybe by some kind of
    Tailored Access Operation group. I think that BRSKI does nothing against
    that attack, but maybe we should just say so.

6

@mcr mcr changed the title security review issue 5 security review issue 5: tampering during drop ship process Sep 30, 2018
@pritikin
Copy link
Collaborator

pritikin commented Oct 2, 2018

Well, section 6.2 "pledge security reductions" recommends a hardware supported NEA method if non-brski methods are allows. This is effectively the case that leads to "tampering during drop ship".

It is RECOMMENDED that "trust on first use" or skipping voucher
validation only be available if hardware assisted Network Endpoint
Assessment [RFC5209] is supported. This recommendation ensures that
domain network monitoring can detect innappropriate use of offline or
emergency deployment procedures.

@mcr
Copy link
Member Author

mcr commented Oct 10, 2018

Scope addition.
6.2 does not forbid the device from being bootstrapped by other means,

@mcr
Copy link
Member Author

mcr commented Oct 10, 2018

Add a few words:
It is RECOMMENDED that "trust on first use" or any method of skipping voucher
validation (including use of craft serial console) only be available if hardware assisted
Network Endpoint Assessment [RFC5209] is supported. This recommendation ensures that
domain network monitoring can detect in-appropriate use of offline or
emergency deployment procedures when voucher-based bootstrapping is used.

  • Reference section 6.2 and 6.3 from Security Considerations, "Tampering during drop-ship"

  • section 1.1: These Touch Methods....
    The existence of zero-touch methods does not preclude co-existence of touch methods, see section 6.2.

@pritikin
Copy link
Collaborator

pritikin commented Nov 5, 2018

modified as per 93041f4

Didn't put in section 1.1. sentence. maybe should have.

Did add a paragraph at the start of security considerations to backpoint to the reduced modes and attempt to each into what is effectively a bulleted list (the next paragraphs) and then the subsections.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants