Thursday 24 July 2025
10:00 (UTC)/ 12:00 (Madrid)
1 hour
Meetecho: https://meetings.conf.meetecho.com/ietf123/?session=34253
Notes: https://notes.ietf.org/notes-ietf-123-iotops
Chairs: Alexey Melnikov and Henk Birkholz
Abbreviations:
CA: Christian Amsüss
CB: Carsten Bormann
HB: Henk Birkholz
HT: Hannes Tschofenig
MCR: Michael Richardson
Notes taken by Michael Richardson, Ivaylo Petrov, and Jan Romann
12:00 Administrivia
(5 min; chairs)
presentation
Henk goes through the slides
No bashing of the agenda
12:05 draft-ietf-iotops-security-protocol-comparison
(5+5 min; John/Francesca)
Presentation
Francesca:
Status: currently with the authors to respond to Med's review
Went through the IESG statement on normative references
Up next is the re-submission of the document and then we can start
the IETF LC.
12:15 draft-ietf-iotops-mud-acceptable-urls
(5+5 min; Michael)
presentation
MCR presenting the history of the draft - first adopted by OPSAWG, but
happy to have it here now.
MCR describes MUD updates of firmware and false positives as that will
make people ignore that. So we don't want false positives.
MCR: it's fine to sometimes allow something that the device never does.
MCR: Adding new permissions with new firmware update is fine, describes
when that might need a new URL instead of just updating the file pointed
by the URL.
MCR: Mud can be fetched through a few ways - it's easy by DHCP, but
malware can abuse it. LLDP is slightly more secure, but it can still be
circumvented.
MCR: IDevID is the best, but can't change the URL later on.
MCR: It can be good for a first URL. The proposal is to allow to only
change the last part of the URL, not changing the origin, not changing
the model of device, so that should be fine.
MCR: You can change the URL if you get aquired by another company by
updating the MUD file.
JPB: you said IDevID is permanent, but what about deploying LDEVID?
MCR: Quantum safe profiles are in the works, maybe initially it's fine
to use IDevID and switch right away
CB: RFC 8520 is on Standards Track.
MCR: Maybe it was AD sponsored and I will withdraw my concern about
whether we can update it in IETF.
CA (via chat): I like new-URL-in-old-MUD-file way better than limiting
which parts of URLs can be touched. (But there might be good reasons to
do the latter)
MCR: They are not mutually exclusive, they are two steps of doing it.
HB: Can also continue discussion on the mailing list.
12:25 draft-ietf-iotops-ol
(5+5 min; Michael/Carsten)
presentation
CB:
HB (without the chair hat):
CB: Already made an update of SPDX (?)
MCR:
CB:
12:35 draft-richardson-iotops-mud-query
(5+10 min; Michael)
presentation
MCR:
So if we could use the IDevID in a TLS connection as a solution for
enumerating devices
Proposed solution:
HT:
MCR:
HT:
MCR:
HT:
MCR:
MCR:
HT:
MCR:
Technical problems are that it requires
Is related to RATS and work from the EDHOC WG
Question is: can we get vendors to implement this and convince the
regulators that this fulfills requirements?
HT:
MCR:
HB:
(Starts a poll on whether the WG is interested in working on this
topic)
So there is no objections, considering that we have about 50 people
in the room. We will check on the mailing list.
MCR:
12:50 IoT DNS Security and Privacy Guidelines
(10min; Jim/Abhi)
presentation
Jim and Abhishek presenting
DNS security and privacy guidelines catered to IoT.
There are resource constraints, IoT devices miss security agents. When
IoT devices they can be fingerprinted, so privacy can be lost. The goal
is to help network security people manage large deployments.
There might be devices that ignore DNS initially, but that doesn't
affect them then.
A passive thread - listening for DNS traffic and active one.
They tried checking port randomization and that was fairly poorly
implemented.
Amplifying attack was possible - affecting many devices
98% of the devices were fingerprinted successfully.
Some devices were contacting hardcoded DNS servers, caching was limited,
etc.
Found a bunch of vulnerabilities and found no papers specific to this
topic.
HT: What kind of devices were you looking at - Linux or big?
Abhishek: There were different types - from smart plugs to smart TVs
HT: in some devices you find very restricted DNS
Abhishek: 80-90% of the devices were resource constraint
HT: Maybe then that's a feature - there might be no privacy rights for a
fridge and the vendors probably didn't see the need to protect that kind
of information - so not using DNS over HTTP, etc.
HT: tinyDTLS don't have this kind of features, so maybe.
Abhishek: Even with DoH looking at the packet size, you might infer the
type of devices.
Jim: There are mitigations that we have listed, etc. Take a look please.
13:00 FIN