[wot-security] minutes - 2 June 2017

available at:
  https://www.w3.org/2017/06/02-wot-sec-minutes.html

also as text below.

Thanks,

Kazuyuki

---

   [1]W3C

      [1] http://www.w3.org/

                               - DRAFT -

                           WoT IG - Security

02 Jun 2017

   [2]Agenda

      [2] https://www.w3.org/WoT/IG/wiki/IG_Security_WebConf#Agenda

   See also: [3]IRC log

      [3] http://www.w3.org/2017/06/02-wot-sec-irc

Attendees

   Present
          Kaz_Ashimura, Barry_Leiba, Elena_Reshetova,
          Oliver_Pfaff, Zoltan_Kis, Michael_McCool

   Regrets
   Chair
          McCool

   Scribe
          kaz

Contents

     * [4]Topics
         1. [5]Continue with threat model (Elena)
     * [6]Summary of Action Items
     * [7]Summary of Resolutions
     __________________________________________________________

   <McCool> Review PRs Continue with Threat model (Elena) Smart
   Home scenario definition Discussion of container types and
   implications

Continue with threat model (Elena)

   elena: goes through her GH page
   ... Objectives.md

   [8]WoT Threat Model & Security Objectives

      [8] https://github.com/ereshetova/wot/blob/master/security-privacy/AssetsThreatModelSecurityObjectives.md

   mccool: runtime should take care of it

   elena: will change the name

   barry: somebody makes something to attack on things

   mccool: attack from another thing

   elena: have to prevision malicious things

   barry: somebody design some WoT things which possibly infect
   others' things

   elena: how to distribute/transfer scripts?
   ... related to malicious scripts

   zoltan: if it's not distributed, it's still malicious

   elena: related to how malicious scripts would be distributed
   ... where the malicious scripts are installed

   barry: we need to split threats

   mccool: scripting protection is the main issue

   elena: what if manufactures manage to substitute scripts?

   barry: somebody gets a temperature sensor
   ... what kind of attacks are possible?

   elena: let's go through the threat table

   (goes through it)

   mccool: WoT API or Web API
   ... external non-WoT external devices are out of scope
   ... we go through the protocols
   ... protocol binding would reduce the category

   kaz: which category?

   mccool: for WoT User Interface
   ... we have to have certain access permission to access scripts

   zoltan: agree most of this would be covered by scripting

   mccool: there is a case that an app is a back door
   ... would prefer servients talking with external world only via
   the protocol binding

   elena: having less protocols would be better

   mccool: having only the front door (=protocol binding)

   elena: (WoT Protocol Bindings)

   mccool: if dynamically loadable, could be malicious
   ... recommend don't do that

   elena: (WoT API)
   ... getting compromising Thing instance and getting
   access/control
   ... (WoT API - Unauthorized API access)
   ... unautorized access to an asset provided via WoT API

   zoltan: WoT API is REST API
   ... possible mitigation for attacks

   elena: discovering ports, etc.?

   zoltan: yes
   ... e.g., ssh ports

   mccool: if I was skimming the port, maybe would be scanning
   generic CoAP ports, etc.
   ... identify type of devices, etc.
   ... maybe related to privacy threats
   ... who accesses what using which protocol

   elena: depending how the device/software is implemented
   ... we can make recommendations, though
   ... but not sure if we can cover everything
   ... (WoT Protocol - TD Integrity)
   ... Integrity and confidentiality in transfer
   ... do we have notion for re-play?

   oliver: integrity is one aspect of authenticity

   elena: can rename it

   mccool: I distribute some TD
   ... and distribute an updated new TD
   ... certain kind of attacks

   oliver: regarding user data...
   ... would that be considered as what?
   ... user data?

   mccool: sensor data is user data?

   oliver: there is no actual "user"

   elena: what's the purpose

   mccool: definition of users?
   ... TD here
   ... about metadata
   ... next is solution
   ... over the protocols themselves

   elena: physical user or non physical

   oliver: solution data would help
   ... like normal data

   elena: will change the term

   mccool: previous point on re-play
   ... something would happen again
   ... network may have "repeat things"
   ... sequence, freshness and uniqueness

   kaz: would suggest we think about some concrete use case and
   risk scenario when we discuss these stakeholders/components of
   the threat model

   elena: there is a section later

   kaz: yeah, we should look at the use case as well when we
   discus each component

   elena: (Scenario 1 - Home environment)



   In this scenario we assume a standard home environment with a
   WoT network running behind a firewall that separates it from
   the rest of the Internet. However the WoT network is shared
   with the standard user home network that contains other non-WoT
   devices that have high chances of being compromised. This
   results on viewing these non-WoT devices as network attackers
   with access to WoT network and its APIs/Protocol Bindings. WoT
   scripts and protocol bindings are considered trusted, single
   solution provider exists on physical WoT devices, no dynamic
   installation of WoT scripts are possible.

   ]]

   elena: WoT scripts and protocol bindings are considered as
   trusted.
   ... implies the following WoT Security objectives

   - WoT Protocol Bindings
   - WoT API
   - WoT API - Unauthorized API access
   - WoT Protocol - TD Integrity
   - WoT Protocol - TD Confidentiality
   - WoT Protocol - Solution User Data Integrity
   - WoT Protocol - Solution User Data Confidentiality
   - WoT DoS ????

   mccool: each threat needs example use case
   ... clarify the impacts

   elena: can give examples

   mccool: gives some example use case

   elena: ok
   ... will give examples

   mccool: how to deal with mitigation?
   ... depending on protocols?
   ... which capability is available with which protocols?
   ... some of the mitigations are depending on underlying
   protocols
   ... others have to be described

   elena: we have to discuss "mitigation"
   ... sometimes underlying protocol doesn't guarantee it
   ... and we ourselves need to handle that

   mccool: should list which protocols support what
   ... security properties
   ... our recommendation and non-recommendation

   elena: there are already protocols that WoT is expected to
   support
   ... we have to provide end-to-end security

   mccool: there is a list under the TD section and the binding
   section
   ... CoAP, bluetooth, etc.
   ... let's add concrete examples for threats

   elena: can do that
   ... anyone can send your ideas as well

   kaz: whan/how to move this document on Elena's repo to the W3C
   repo?

   elena: there is a pullrequest

   kaz: let's approve the pullrequest and make this the starting
   point

   [ adjourned ]

Summary of Action Items

Summary of Resolutions

   [End of minutes]
     __________________________________________________________


    Minutes formatted by David Booth's [9]scribe.perl version
    1.152 ([10]CVS log)
    $Date: 2017/06/02 15:58:40 $

      [9] http://dev.w3.org/cvsweb/~checkout~/2002/scribe/scribedoc.htm
     [10] http://dev.w3.org/cvsweb/2002/scribe/



-- 
Kaz Ashimura, W3C Staff Contact for WoT, TV and Geo
Tel: +81 3 3516 2504

Received on Friday, 2 June 2017 16:04:24 UTC