secure home gateway project - iot security foundation

46
SECURE HOME GATEWAY PROJECT - WHO AM I - PROJECT VISION AND ORIGIN - SYSTEM ARCHITECTURE - MUD AND APIS - CHALLENGES Initiated by: Jacques Latour, CTO, CIRA Labs Canadian Internet Registration Authority Presented by: Michael Richardson <[email protected]> These slides at: https://tinyurl.com/udmq8ns f0b0 2607 2 ffee c0 3

Upload: others

Post on 09-Apr-2022

10 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: SECURE HOME GATEWAY PROJECT - IoT Security Foundation

SECURE HOME GATEWAY PROJECT

- WHO AM I- PROJECT VISION AND ORIGIN- SYSTEM ARCHITECTURE- MUD AND APIS- CHALLENGES

Initiated by:

Jacques Latour, CTO, CIRA LabsCanadian Internet Registration Authority

Presented by: Michael Richardson

<[email protected]>

These slides at: https://tinyurl.com/udmq8ns

f0b0

2607

2

ffee

c0

3

Page 2: SECURE HOME GATEWAY PROJECT - IoT Security Foundation

Who am I?Internet technologist, doing IP since

1988. “Garage Entrepreneur”

#4 at Milkyway Networks (1994)

IETF standard security:IPsec/VPN

(1998-2001)FreeS/WAN (2001-2004)

RFC4322RFC4025RFC5386RFC8415RFC7416RFC8366BRSKIconstrained-BRSKI

Xelerance Corp 2003-2007,2014-

ROLL – RFC65502012-

1996-

(2007-2009)

2009-2017 RFC8366

BRSKI

Page 3: SECURE HOME GATEWAY PROJECT - IoT Security Foundation

3

f0b0

2607

2

ffee

c0

3SandelmanSoftware Works

Secure Home Gateway (SHG) Primary Project Goal

• The primary goal of this project is to develop a secure home gateway that;

– protects the internet from IoT devices attacks and

– protects home IoT devices from the internet attacks

CIRA Labs - Secure Home Gateway - 2019-11

x

x

Page 4: SECURE HOME GATEWAY PROJECT - IoT Security Foundation

4

f0b0

2607

2

ffee

c0

3SandelmanSoftware Works

Why are we working on this?-> Risk mitigation

• For many internet organizations like CIRA the #1 risk on the risk register is a large scale (Dyn like) DDoS attack.

• One of the mitigation mechanisms for this risk is to prevent ‘weaponization’ of IoT devices

• Tightly controlling access ‘to’ and ‘from’ IoT devices inside the home or small office network is key to preventing ‘weaponization’ and causing harm on the internet.

• The threat that IoT devices bring is the scale of attacks. The uncontrolled access of million/billions of IoT devices to and from the internet is the threat we need to mitigate.

CIRA Labs - Secure Home Gateway - 2019-11

Page 5: SECURE HOME GATEWAY PROJECT - IoT Security Foundation

5

f0b0

2607

2

ffee

c0

3SandelmanSoftware Works

ManufacturerUsage

DescriptionRFC8520

How can we protect IoT devices?-> Best practice & new standards

• Rule #1: Identify IoT devices on your home network

• Rule #2: Place a policy around the IoT device that restricts it to a specific function (default is no access)

• Rule #3: Monitor for behavioural changes in the device and quarantine at the first sign of change.

Home SecurityPDAP

AppliancesPDAP

SensorsPDAP

ManagementApplication

IoT CloudServices

CIRA Labs - Secure Home Gateway - 2019-11

PDAP: Per Device Access Policy

Page 6: SECURE HOME GATEWAY PROJECT - IoT Security Foundation

6

f0b0

2607

2

ffee

c0

3SandelmanSoftware Works

MUD ControllerMUD Controller

High Level MUD & IoT Device Provisioning Workflow

CIRA Labs - Secure Home Gateway - 2019-11

(1)Scan MUD (RFC8520)

QR code &send to MUD

controller

CIRA SHGMUD Repository

SHGApp

(2)Send to

CIRA

(2)Get vendor

MUD file

ACME.CORP MUD

Repository

SHG

ACME.CORPIoT Water Sensor

(1)

(3)User acceptsprovisioninginstructions

MUD QR Code

(1) (4)IoT device added to network with specific network access controls

Network Access control:Allow access to ACME.CORPAllow to send alerts internallyAllow to be configured by appDeny all other internet access

(4)

(IP Tables)

MUD SupervisorMUD Supervisor

https://www.sandelman.ca/SSW/ietf/mud-links

Page 7: SECURE HOME GATEWAY PROJECT - IoT Security Foundation

7

f0b0

2607

2

ffee

c0

3SandelmanSoftware Works

• Gateway provisioning, device discovery, device provisioning must be as simple as possible, intuitive for non experienced users, available as framework for default open source app.

Simple user interface is key to this project: Swipe UP, DOWN, LEFT and RIGHT

CIRA Labs - Secure Home Gateway - 2019-11

Tinder for IoT Devices!

Page 8: SECURE HOME GATEWAY PROJECT - IoT Security Foundation

8

f0b0

2607

2

ffee

c0

3SandelmanSoftware Works

Risks for an API for MUD devices

MUD ControllerMUD Controller

SHG

(IP Tables)

MUD SupervisorMUD SupervisorSHGApp

GOOD GUYS

Page 9: SECURE HOME GATEWAY PROJECT - IoT Security Foundation

9

f0b0

2607

2

ffee

c0

3SandelmanSoftware Works

Risks for an API for MUD devices

MUD ControllerMUD Controller

SHG

(IP Tables)

MUD SupervisorMUD SupervisorSHGApp

GOOD GUYS

Page 10: SECURE HOME GATEWAY PROJECT - IoT Security Foundation

10

f0b0

2607

2

ffee

c0

3SandelmanSoftware Works

Risks for an API for MUD devices

MUD ControllerMUD Controller

SHG

(IP Tables)

MUD SupervisorMUD SupervisorSHGApp

API: NewAccessControlListAdded

GOOD GUYS

Page 11: SECURE HOME GATEWAY PROJECT - IoT Security Foundation

11

f0b0

2607

2

ffee

c0

3SandelmanSoftware Works

Risks for an API for MUD devices

MUD ControllerMUD Controller

SHG

(IP Tables)

MUD SupervisorMUD SupervisorSHGApp

API: NewAccessControlListAdded

MUD ControllerMUD Controller

SHG

(IP Tables)

MUD SupervisorMUD Supervisor

GOOD GUYS BAD GUYS

Page 12: SECURE HOME GATEWAY PROJECT - IoT Security Foundation

12

f0b0

2607

2

ffee

c0

3SandelmanSoftware Works

Risks for an API for MUD devices

MUD ControllerMUD Controller

SHG

(IP Tables)

MUD SupervisorMUD SupervisorSHGApp

API: NewAccessControlListAdded

MUD ControllerMUD Controller

SHG

(IP Tables)

MUD SupervisorMUD Supervisor

GOOD GUYS BAD GUYS

Page 13: SECURE HOME GATEWAY PROJECT - IoT Security Foundation

13

f0b0

2607

2

ffee

c0

3SandelmanSoftware Works

Risks for an API for MUD devices

MUD ControllerMUD Controller

SHG

(IP Tables)

MUD SupervisorMUD SupervisorSHGApp

API: NewAccessControlListAdded

MUD ControllerMUD Controller

SHG

(IP Tables)

MUD SupervisorMUD Supervisor

GOOD GUYS

ATTACKER

API: Let me

attackexample.com

BAD GUYS

Page 14: SECURE HOME GATEWAY PROJECT - IoT Security Foundation

14

f0b0

2607

2

ffee

c0

3SandelmanSoftware Works

Risks for an API for MUD devices

MUD ControllerMUD Controller

SHG

(IP Tables)

MUD SupervisorMUD SupervisorSHGApp

API: NewAccessControlListAdded

MUD ControllerMUD Controller

SHG

(IP Tables)

MUD SupervisorMUD Supervisor

GOOD GUYS

ATTACKER

API: Let me

attackexample.com

BAD GUYS

login/pw

Page 15: SECURE HOME GATEWAY PROJECT - IoT Security Foundation

15

f0b0

2607

2

ffee

c0

3SandelmanSoftware Works

Risks for an API for MUD devices

MUD ControllerMUD Controller

SHG

(IP Tables)

MUD SupervisorMUD SupervisorSHGApp

API: NewAccessControlListAdded

MUD ControllerMUD Controller

SHG

(IP Tables)

MUD SupervisorMUD Supervisor

GOOD GUYS

ATTACKER

API: Let me

attackexample.com

BAD GUYS

login/pw login: admin

Page 16: SECURE HOME GATEWAY PROJECT - IoT Security Foundation

16

f0b0

2607

2

ffee

c0

3SandelmanSoftware Works

Risks for an API for MUD devices

MUD ControllerMUD Controller

SHG

(IP Tables)

MUD SupervisorMUD SupervisorSHGApp

API: NewAccessControlListAdded

MUD ControllerMUD Controller

SHG

(IP Tables)

MUD SupervisorMUD Supervisor

GOOD GUYS

ATTACKER

API: Let me

attackexample.com

BAD GUYS

login/pw login: adminpw: admin

Page 17: SECURE HOME GATEWAY PROJECT - IoT Security Foundation

17

f0b0

2607

2

ffee

c0

3SandelmanSoftware Works

Risks for an API for MUD devices

MUD ControllerMUD Controller

SHG

(IP Tables)

MUD SupervisorMUD SupervisorSHGApp

API: NewAccessControlListAdded

MUD ControllerMUD Controller

SHG

(IP Tables)

MUD SupervisorMUD Supervisor

GOOD GUYS

ATTACKER

API: Let me

attackexample.com

BAD GUYS

login/pw login: adminpw: admin

Page 18: SECURE HOME GATEWAY PROJECT - IoT Security Foundation

18

f0b0

2607

2

ffee

c0

3SandelmanSoftware Works

Solution: use some good crypto

MUD ControllerMUD Controller

SHG

(IP Tables)

MUD SupervisorMUD Supervisor

SHGApp

more info:www.sandelman.ca/SSW/ietf/brski-links

Page 19: SECURE HOME GATEWAY PROJECT - IoT Security Foundation

19

f0b0

2607

2

ffee

c0

3SandelmanSoftware Works

Solution: use some good crypto

MUD ControllerMUD Controller

SHG

(IP Tables)

MUD SupervisorMUD Supervisor

SHGApp

Authenticate withTLS ClientCertificate

more info:www.sandelman.ca/SSW/ietf/brski-links

Page 20: SECURE HOME GATEWAY PROJECT - IoT Security Foundation

20

f0b0

2607

2

ffee

c0

3SandelmanSoftware Works

Solution: use some good crypto

MUD ControllerMUD Controller

SHG

(IP Tables)

MUD SupervisorMUD Supervisor

SHGApp

Authenticate withTLS ClientCertificate

HOW DO WE SET THIS UP?

more info:www.sandelman.ca/SSW/ietf/brski-links

Page 21: SECURE HOME GATEWAY PROJECT - IoT Security Foundation

21

f0b0

2607

2

ffee

c0

3SandelmanSoftware Works

Solution: use some good crypto

MUD ControllerMUD Controller

SHG

(IP Tables)

MUD SupervisorMUD Supervisor

SHGApp

Authenticate withTLS ClientCertificate

HOW DO WE SET THIS UP?

RFC8366

BRSKI

more info:www.sandelman.ca/SSW/ietf/brski-links

Page 22: SECURE HOME GATEWAY PROJECT - IoT Security Foundation

22

f0b0

2607

2

ffee

c0

3SandelmanSoftware Works

Solution: use some good crypto

MUD ControllerMUD Controller

SHG

(IP Tables)

MUD SupervisorMUD Supervisor

SHGApp

Authenticate withTLS ClientCertificate

HOW DO WE SET THIS UP?

RFC8366

BRSKI

more info:www.sandelman.ca/SSW/ietf/brski-links

Page 23: SECURE HOME GATEWAY PROJECT - IoT Security Foundation

Roles are a changin’

● Consider Home Router router to be a Pledge at first.

● Consider Smartphone to be a new type of Join Proxy at first

● Change roles later on

Internet

MASA(2: request VR)

voucher

(1: scan)

(3)voucher-request VR

(3)voucher-request VR

DPP-inspired,upward compatible

RFC8366

BRSKI

Page 24: SECURE HOME GATEWAY PROJECT - IoT Security Foundation

Time Sequence Diagram

Page 25: SECURE HOME GATEWAY PROJECT - IoT Security Foundation

Time Sequence Diagram

AR

Page 26: SECURE HOME GATEWAY PROJECT - IoT Security Foundation

Time Sequence Diagram

AR

Page 27: SECURE HOME GATEWAY PROJECT - IoT Security Foundation

Time Sequence DiagramMASA

AR

Page 28: SECURE HOME GATEWAY PROJECT - IoT Security Foundation

Time Sequence DiagramMASA

AR

Page 29: SECURE HOME GATEWAY PROJECT - IoT Security Foundation

Time Sequence DiagramMASA

AR Scan QRCode on

Page 30: SECURE HOME GATEWAY PROJECT - IoT Security Foundation

Time Sequence DiagramMASA

AR Scan QRCode on

Generate Self-signed

Page 31: SECURE HOME GATEWAY PROJECT - IoT Security Foundation

Time Sequence DiagramMASA

AR Scan QRCode on

Generate Self-signedUse as ClientCertificate

Page 32: SECURE HOME GATEWAY PROJECT - IoT Security Foundation

Time Sequence DiagramMASA

AR Scan QRCode on

Generate Self-signedUse as ClientCertificate

Visit URLGiven QRDo OAUTH2 dance?

Page 33: SECURE HOME GATEWAY PROJECT - IoT Security Foundation

Time Sequence DiagramMASA

AR Scan QRCode on

Generate Self-signedUse as ClientCertificate

Visit URLGiven QRDo OAUTH2 dance?

Get Certificate (optional?) signed by MASA

Page 34: SECURE HOME GATEWAY PROJECT - IoT Security Foundation

Time Sequence DiagramMASA

AR Scan QRCode on

Generate Self-signedUse as ClientCertificate

Visit URLGiven QRDo OAUTH2 dance?

Get Certificate (optional?) signed by MASA

Connect to BRSKI port/requestvoucherrequest (+ SPnonce)

Page 35: SECURE HOME GATEWAY PROJECT - IoT Security Foundation

Time Sequence DiagramMASA

AR Scan QRCode on

Generate Self-signedUse as ClientCertificate

Visit URLGiven QRDo OAUTH2 dance?

Get Certificate (optional?) signed by MASA

Connect to BRSKI port/requestvoucherrequest (+ SPnonce)

Encrypt (ECIES)With publicKey of AR

Page 36: SECURE HOME GATEWAY PROJECT - IoT Security Foundation

Time Sequence DiagramMASA

AR Scan QRCode on

Generate Self-signedUse as ClientCertificate

Visit URLGiven QRDo OAUTH2 dance?

Get Certificate (optional?) signed by MASA

Connect to BRSKI port/requestvoucherrequest (+ SPnonce)

Receive voucherrequest(w/ SPnonce)

Encrypt (ECIES)With publicKey of AR

Page 37: SECURE HOME GATEWAY PROJECT - IoT Security Foundation

Time Sequence DiagramMASA

AR Scan QRCode on

Generate Self-signedUse as ClientCertificate

Visit URLGiven QRDo OAUTH2 dance?

Get Certificate (optional?) signed by MASA

Connect to BRSKI port/requestvoucherrequest (+ SPnonce)

Receive voucherrequest(w/ SPnonce)

Send to voucherrequestTo MASA

Encrypt (ECIES)With publicKey of AR

Page 38: SECURE HOME GATEWAY PROJECT - IoT Security Foundation

Time Sequence DiagramMASA

AR Scan QRCode on

Generate Self-signedUse as ClientCertificate

Visit URLGiven QRDo OAUTH2 dance?

Get Certificate (optional?) signed by MASA

Connect to BRSKI port/requestvoucherrequest (+ SPnonce)

Receive voucherrequest(w/ SPnonce)

Send to voucherrequestTo MASA

Encrypt (ECIES)With publicKey of AR

Receive voucher

Page 39: SECURE HOME GATEWAY PROJECT - IoT Security Foundation

Time Sequence DiagramMASA

AR Scan QRCode on

Generate Self-signedUse as ClientCertificate

Visit URLGiven QRDo OAUTH2 dance?

Get Certificate (optional?) signed by MASA

Connect to BRSKI port/requestvoucherrequest (+ SPnonce)

Receive voucherrequest(w/ SPnonce)

Send to voucherrequestTo MASA

Encrypt (ECIES)With publicKey of AR

Receive voucher

Page 40: SECURE HOME GATEWAY PROJECT - IoT Security Foundation

Time Sequence DiagramMASA

AR Scan QRCode on

Generate Self-signedUse as ClientCertificate

Visit URLGiven QRDo OAUTH2 dance?

Get Certificate (optional?) signed by MASA

Connect to BRSKI port/requestvoucherrequest (+ SPnonce)

Receive voucherrequest(w/ SPnonce)

Send to voucherrequestTo MASA

Encrypt (ECIES)With publicKey of AR

Receive voucherSend voucher

To AR

Page 41: SECURE HOME GATEWAY PROJECT - IoT Security Foundation

Time Sequence DiagramMASA

AR Scan QRCode on

Generate Self-signedUse as ClientCertificate

Visit URLGiven QRDo OAUTH2 dance?

Get Certificate (optional?) signed by MASA

Connect to BRSKI port/requestvoucherrequest (+ SPnonce)

Receive voucherrequest(w/ SPnonce)

Send to voucherrequestTo MASA

Encrypt (ECIES)With publicKey of AR

Receive voucherSend voucher

To ARReceive reply,

exit provisional state

Page 42: SECURE HOME GATEWAY PROJECT - IoT Security Foundation

Time Sequence DiagramMASA

AR Scan QRCode on

Generate Self-signedUse as ClientCertificate

Visit URLGiven QRDo OAUTH2 dance?

Get Certificate (optional?) signed by MASA

Connect to BRSKI port/requestvoucherrequest (+ SPnonce)

Receive voucherrequest(w/ SPnonce)

Send to voucherrequestTo MASA

Encrypt (ECIES)With publicKey of AR

Receive voucherSend voucher

To ARReceive reply,

exit provisional stateSend telemetryReply to MASA

Page 43: SECURE HOME GATEWAY PROJECT - IoT Security Foundation

Time Sequence DiagramMASA

Registrar

EST7030/simpleenroll

PKIX certSpecific to this router

SHG specificAPIs

Page 44: SECURE HOME GATEWAY PROJECT - IoT Security Foundation

What about this QR code?Who else uses QR code?

● WiFi Alliance DPP– Released in summer 2019– Uses Public Key printed on QR code– Runs over new management frames in 802.11,

● presently inaccessible on current smartphone Oses

– *latest* Android 10, on some phones works– no known iOS code

● we are writing code today.● Designed system to transform into DPP in the future

Page 45: SECURE HOME GATEWAY PROJECT - IoT Security Foundation

CIRA Labs - Secure Home Gateway – 2019-11-26 45

f0b0

2607

2

ffee

c0

3SandelmanSoftware Works

Opportunities: asynchronous enrollment

● new installations/ buildings where there is no network

● LTE from install truck is not reachable from basement

● draft-richardson-anima-smarkaklink

● draft-fries-anima-brski-async-enroll (Siemens-BT)

Page 46: SECURE HOME GATEWAY PROJECT - IoT Security Foundation

CIRA Labs - Secure Home Gateway – 2019-11-26 46

f0b0

2607

2

ffee

c0

3SandelmanSoftware Works

Questions