onboarding in the iot

40
ON-BOARDING IN THE IOT – A REPORT CARD Paul Madsen Senior Technical Architect Ping Identity (The Identity Division of Vista Equity) Copyright © 2014 Ping Identity Corp. All rights reserved. 1

Upload: paul-madsen

Post on 09-Feb-2017

139 views

Category:

Internet


0 download

TRANSCRIPT

Page 1: Onboarding in the IoT

ON-BOARDING IN THE IOT – A REPORT CARD

Paul MadsenSenior Technical ArchitectPing Identity (The Identity Division of Vista Equity)

Copyright © 2014 Ping Identity Corp. All rights reserved. 1

Page 2: Onboarding in the IoT

Onboarding, process of provisioning a client with credentials for accessing a network resource and assigning appropriate permissions

Copyright © 2014 Ping Identity Corp. All rights reserved. 2

Page 3: Onboarding in the IoT

Flavours of onboarding in Smart Home

•Device to Device– E.g Getting a device onto home wifi

•User(Device) to Device – E.g. Getting house guest onto home wifi

•Device to Application– Binding a device to a cloud account

• Application to Application– Assigning a web app permissions to

access API dataCopyright © 2014 Ping Identity Corp. All rights

reserved. 3

Page 4: Onboarding in the IoT

Copyright © 2014 Ping Identity Corp. All rights reserved. 4

Page 5: Onboarding in the IoT

Desired qualities

•Security – must not leak credentials nor create opportunity for MITM to insert themselves into process •Usable – intuitive, learnable & consistent•Granularity – associated permissions should be constrained beyond y/n•Interoperability – proprietary doesn’t scale (nor enable consistency)

Copyright © 2014 Ping Identity Corp. All rights reserved. 5

Page 6: Onboarding in the IoT

Device to Device

Copyright © 2014 Ping Identity Corp. All rights reserved. 6

Page 7: Onboarding in the IoT

Copyright © 2014 Ping Identity Corp. All rights reserved. 7

Page 8: Onboarding in the IoT

Copyright © 2014 Ping Identity Corp. All rights reserved. 8

Page 9: Onboarding in the IoT

WiFi Provisioning mechanisms

•Device hotspot•WPS Push Button• Apple Wireless Accessory Configuration (WAC)• TI SmartConfig•OOB, eg BLE, BlinkUp, NFC

Copyright © 2014 Ping Identity Corp. All rights reserved. 9

Page 10: Onboarding in the IoT

Insecure

• Lifx bulb creates its own WiFi AP in order to collect creds of house WiFi

• If turned on/off 5 times, bulb resets & creates a new hotspot

• If attacker creates their own hotspot at same time, user can be phished into providing wifi creds

Page 11: Onboarding in the IoT

Proprietary

Copyright © 2014 Ping Identity Corp. All rights reserved. 11

• TI SmartConfig app provisions SSID credentials to specialized CC3000 chip

• App encodes credentials as length of UDP packets

• CC3000 can see the encrypted packets and their sizes.

• Chip can decode SSID & pwd– even from encrypted packets

Page 12: Onboarding in the IoT

Weird….

Copyright © 2014 Ping Identity Corp. All rights reserved. 12

• ElectricImp BlinkUp app transmits wifi creds by rapidly flashing light pulses on the device’s screen

• Light flashes picked up by optical sensor on device

• Wifi creds decoded and network joined

Page 13: Onboarding in the IoT

Report card

Copyright © 2014 Ping Identity Corp. All rights reserved. 13

Security Usability Granularity

Interoperability

Device to Device

C- B- D D

User(Device) to DeviceDevice to ApplicationApplication to Application

Page 14: Onboarding in the IoT

User (Device) to Device

Copyright © 2014 Ping Identity Corp. All rights reserved. 14

Page 15: Onboarding in the IoT

Copyright © 2014 Ping Identity Corp. All rights reserved. 15

Page 16: Onboarding in the IoT

Copyright © 2014 Ping Identity Corp. All rights reserved. 16

Page 17: Onboarding in the IoT

Google OnHub password sharing

Copyright © 2014 Ping Identity Corp. All rights reserved. 17

Page 18: Onboarding in the IoT

Authorization features

Copyright © 2014 Ping Identity Corp. All rights reserved. 18

Page 19: Onboarding in the IoT

But

•Current authz constraint & automation mechanisms are defined in terms of the device•Doesn’t adequately account for shared devices•Should instead manage the combination of the user & the device (ie relationship)

Copyright © 2014 Ping Identity Corp. All rights reserved. 19

Page 20: Onboarding in the IoT

Copyright © 2014 Ping Identity Corp. All rights reserved. 20

Page 21: Onboarding in the IoT

Password anti-pattern (in the small)

•Discourages strong wifi passwords•No granularity of authorizations•Phishable•Difficult to revoke permissions

Copyright © 2014 Ping Identity Corp. All rights reserved. 21

Page 22: Onboarding in the IoT

Copyright © 2014 Ping Identity Corp. All rights reserved. 22

Page 23: Onboarding in the IoT

Report card

Copyright © 2014 Ping Identity Corp. All rights reserved. 23

Security Usability Granularity

Interoperability

Device to Device

C- B- D D

User(Device) to Device

C- B+ C B-

Device to ApplicationApplication to Application

Page 24: Onboarding in the IoT

Device to Application

Copyright © 2014 Ping Identity Corp. All rights reserved. 24

Page 25: Onboarding in the IoT

Two fold•How to– bind a specific device to

an existing account at an IoT provider

– Issue that device with a credential that can be used to authenticate to a cloud endpoint

Copyright © 2014 Ping Identity Corp. All rights reserved. 25

Page 26: Onboarding in the IoT

Current model

Copyright © 2014 Ping Identity Corp. All rights reserved. 26

Device

Server

Server

x.509 (or key pair)

pwd

Page 27: Onboarding in the IoT

A new anti-pattern?

•Normal challenges of lifecycle management of certs, ie PKI•Can’t support shared devices•Doesn’t inhibit correlation

Copyright © 2014 Ping Identity Corp. All rights reserved. 27

Page 28: Onboarding in the IoT

Authentication Chain

Copyright © 2014 Ping Identity Corp. All rights reserved. 28

Attestation keys

Device generatedkeys

Signed device keys

User creds

Tokens

Page 29: Onboarding in the IoT

Report card

Copyright © 2014 Ping Identity Corp. All rights reserved. 29

Security Usability Granularity

Interoperability

Device to Device

C- B- D D

User(Device) to Device

C- B+ C B

Device to Application

C B D D

Application to Application

Page 30: Onboarding in the IoT

Application to Application

Copyright © 2014 Ping Identity Corp. All rights reserved. 30

Page 31: Onboarding in the IoT

Good news

Copyright © 2014 Ping Identity Corp. All rights reserved. 31

Page 32: Onboarding in the IoT

Cautionary tale

•OAuth 2.0 is not a silver bullet•Doesn’t guarantee appropriate permissions/scopes• Authz to ‘close’ door should not necessarily mean authz to ‘open door’

Copyright © 2014 Ping Identity Corp. All rights reserved. 32

Page 33: Onboarding in the IoT

Report card

Copyright © 2014 Ping Identity Corp. All rights reserved. 33

Security Usability Granularity

Interoperability

Device to Device

C- B- D D

User(Device) to Device

C- B+ C B

Device to Application

C B D D

Application to Application

B+ B+ B- A-

Page 34: Onboarding in the IoT

Copyright © 2014 Ping Identity Corp. All rights reserved. 34

Page 35: Onboarding in the IoT

Time to graduate

Problem is using primary credentials (certs, device keys, passwords) where secondary (tokens) are more appropriate

Copyright © 2014 Ping Identity Corp. All rights reserved. 35

Page 36: Onboarding in the IoT

Copyright © 2014 Ping Identity Corp. All rights reserved. 36

Page 37: Onboarding in the IoT

Need to apply delegated authz model to all flavours of Smart Home onboarding (and not just app to app)

Copyright © 2014 Ping Identity Corp. All rights reserved. 37

Page 38: Onboarding in the IoT

What do we need

• OAuth AS capabilities in routers/hubs– Emerging authz features in routers a first step?

• Bindings of delegated authz model to constrained IoT protocols– a la IEF ACE WG– NAPPS TA?

• Intuitive & usable authz ceremonies– App-based– Voice? Amazon Echo et al

Copyright © 2014 Ping Identity Corp. All rights reserved. 38

Page 39: Onboarding in the IoT

Copyright © 2014 Ping Identity Corp. All rights reserved. 39

Thing

Page 40: Onboarding in the IoT

THANKS@paulmadsen

Copyright © 2014 Ping Identity Corp. All rights reserved. 40