Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

security review issue 11: what if MASA refuses to provide a voucher #88

Closed
mcr opened this issue Sep 30, 2018 · 6 comments
Closed

security review issue 11: what if MASA refuses to provide a voucher #88

mcr opened this issue Sep 30, 2018 · 6 comments

Comments

@mcr
Copy link
Member

mcr commented Sep 30, 2018

  1. Attacks by the MASA. What happens if the MASA refuses to provide a voucher,
    or provides a wrong voucher? Can the MASA be used to restrain commerce
    with specific countries? Is that a feature or a bug?
@mcr mcr changed the title security review issue 11 security review issue 11: what if MASA refuses to provide a voucher Sep 30, 2018
@pritikin
Copy link
Collaborator

pritikin commented Oct 1, 2018

If the MASA refuses to issue a voucher then use of the BRSKI protocol flow to bootstrap the device does not work. There are a number of methods a vendor can use to "restrain commerce" (e.g. make their own product less valuable) particularly when the device is paired with a cloud service.

The only protocol method would be to examine the IP address of the registrar and perform geolocation from there. If certain IP ranges were excluded by the vendor it would be relatively trivial to work around using either ip location masking or obtaining nonceless vouchers from acceptable locations.

@mcr
Copy link
Member Author

mcr commented Oct 26, 2018

... "although the MASA can be used to restrain the voucher, it can not be used to restrain the device"

@mcr
Copy link
Member Author

mcr commented Oct 26, 2018

reduces friction for authenticated direct customers, but does not change the situation for indirect (used, grey-market, etc.) customers.

@mcr mcr self-assigned this Oct 26, 2018
@mcr
Copy link
Member Author

mcr commented Oct 26, 2018

"Privacy Considerations" section, discussed possible subsection "Used, Stolen or Grey Market equipment"... but MASA does not need to do such close tracker.
Does the protocol provide new opportunities for the vendor to insert themselves into the life-cycle of the device, but only in this protocol.
What about in the Trust Model section? Where is the right place to explain the tradeoffs of using this protocol, vs not.
Decide to put this into 8.0 section, to explain how to this protocol facilities complete transfer of the device to the owners' network, dis-engaging the vendor from the day-to-day operation of the device.

@mcr
Copy link
Member Author

mcr commented Nov 30, 2018

@mcr
Copy link
Member Author

mcr commented Dec 2, 2018

@pritikin I would like your review, and if you like it, merge it.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants