IOTOPS at IETF 123 Madrid

Thursday 24 July 2025
10:00 (UTC)/ 12:00 (Madrid)
1 hour

Meetecho: https://meetings.conf.meetecho.com/ietf123/?session=34253
Notes: https://notes.ietf.org/notes-ietf-123-iotops
Chairs: Alexey Melnikov and Henk Birkholz

Abbreviations:

CA: Christian Amsüss
CB: Carsten Bormann
HB: Henk Birkholz
HT: Hannes Tschofenig
MCR: Michael Richardson

Action items

Notes

Notes taken by Michael Richardson, Ivaylo Petrov, and Jan Romann

12:00 Administrivia
(5 min; chairs)
presentation

Henk goes through the slides

No bashing of the agenda

12:05 draft-ietf-iotops-security-protocol-comparison
(5+5 min; John/Francesca)
Presentation

Francesca:

12:15 draft-ietf-iotops-mud-acceptable-urls
(5+5 min; Michael)
presentation

MCR presenting the history of the draft - first adopted by OPSAWG, but
happy to have it here now.
MCR describes MUD updates of firmware and false positives as that will
make people ignore that. So we don't want false positives.
MCR: it's fine to sometimes allow something that the device never does.

MCR: Adding new permissions with new firmware update is fine, describes
when that might need a new URL instead of just updating the file pointed
by the URL.
MCR: Mud can be fetched through a few ways - it's easy by DHCP, but
malware can abuse it. LLDP is slightly more secure, but it can still be
circumvented.
MCR: IDevID is the best, but can't change the URL later on.
MCR: It can be good for a first URL. The proposal is to allow to only
change the last part of the URL, not changing the origin, not changing
the model of device, so that should be fine.
MCR: You can change the URL if you get aquired by another company by
updating the MUD file.
JPB: you said IDevID is permanent, but what about deploying LDEVID?
MCR: Quantum safe profiles are in the works, maybe initially it's fine
to use IDevID and switch right away
CB: RFC 8520 is on Standards Track.
MCR: Maybe it was AD sponsored and I will withdraw my concern about
whether we can update it in IETF.
CA (via chat): I like new-URL-in-old-MUD-file way better than limiting
which parts of URLs can be touched. (But there might be good reasons to
do the latter)
MCR: They are not mutually exclusive, they are two steps of doing it.
HB: Can also continue discussion on the mailing list.

12:25 draft-ietf-iotops-ol
(5+5 min; Michael/Carsten)
presentation
CB:

HB (without the chair hat):

CB: Already made an update of SPDX (?)

MCR:

CB:

12:35 draft-richardson-iotops-mud-query
(5+10 min; Michael)
presentation

MCR:

HT:

MCR:

HT:

MCR:

HT:

MCR:

MCR:

HT:

MCR:

HT:

MCR:

HB:

MCR:

12:50 IoT DNS Security and Privacy Guidelines
(10min; Jim/Abhi)
presentation

Jim and Abhishek presenting

DNS security and privacy guidelines catered to IoT.
There are resource constraints, IoT devices miss security agents. When
IoT devices they can be fingerprinted, so privacy can be lost. The goal
is to help network security people manage large deployments.

There might be devices that ignore DNS initially, but that doesn't
affect them then.

A passive thread - listening for DNS traffic and active one.
They tried checking port randomization and that was fairly poorly
implemented.
Amplifying attack was possible - affecting many devices
98% of the devices were fingerprinted successfully.
Some devices were contacting hardcoded DNS servers, caching was limited,
etc.
Found a bunch of vulnerabilities and found no papers specific to this
topic.

HT: What kind of devices were you looking at - Linux or big?
Abhishek: There were different types - from smart plugs to smart TVs
HT: in some devices you find very restricted DNS
Abhishek: 80-90% of the devices were resource constraint
HT: Maybe then that's a feature - there might be no privacy rights for a
fridge and the vendors probably didn't see the need to protect that kind
of information - so not using DNS over HTTP, etc.
HT: tinyDTLS don't have this kind of features, so maybe.
Abhishek: Even with DoH looking at the packet size, you might infer the
type of devices.
Jim: There are mitigations that we have listed, etc. Take a look please.

13:00 FIN