On Monday, October 17, 2016 at 8:33:37 PM UTC+1, David Baron wrote:
> The W3C is proposing a new charter for:
> 
>   Automotive Working Group
>   https://lists.w3.org/Archives/Public/public-new-work/2016Oct/0003.html
>   https://www.w3.org/2014/automotive/charter-2016.html
> 
> Mozilla has the opportunity to send comments or objections through
> Monday, November 7.  However, I hope to be able to complete the
> comments by Tuesday, October 25.
> 
> Please reply to this thread if you think there's something we should
> say as part of this charter review, or if you think we should
> support or oppose it.
> 
> Note that this is a new working group.  I don't know of anyone from
> Mozilla being involved in the discussions that led to this charter.
> 
> -David
> 
> -- 
> 𝄞   L. David Baron                         http://dbaron.org/   𝄂
> 𝄢   Mozilla                          https://www.mozilla.org/   𝄂
>              Before I built a wall I'd ask to know
>              What I was walling in or walling out,
>              And to whom I was like to give offense.
>                - Robert Frost, Mending Wall (1914)

Hi, Apologies that this is a long post, but please see below for responses  to 
questions raised on this thread. These responses (see comments within [W3C 
Auto] tags) have  been circulated and agreed by the editors and chairs of W3C 
Automotive group, thanks Kev G.

This seems to be a more specific instance of WoT.  As such, the goals 
are much clearer here.  While some of the concerns with the WoT 
charter apply (security in particular!), here are a few additional 
observations: 

[W3C Auto] Completely agree: The Automotive Group exists because 
there is benefit in creating an abstraction at the ‘vehicle’ level 
in order to make it easier to programme against attributes and 
behaviours that are common to vehicles (compared with e.g. 
heart rate monitors or power stations) [W3C Auto]


Exposing the level of information that they claim to want to expose 
needs more privacy treatment than just a casual mention of the PIG. 

[W3C Auto] The primary purpose of the specification is to expose 
vehicle signals in a secure way to authenticated clients. 
It’s true that a sub-set of the information could be considered 
to be personal (e.g. GPS location history). The specification 
includes an extensible access control mechanism to ensure that 
implementers can restrict access to suitable clients (users 
and/or devices and/or applications).
Because the IP address of a vehicle is not known to the wider 
internet until after the vehicle has connected to an offboard 
server, only clients running on the vehicle can directly access 
the WebSocket server that implements the specification.
As clarified by the modifications to the documents abstract, 
this data is intended only for local clients, such as web 
applications and web agents to interface e.g. to the OEMs offboard 
infrastructure. We have added some advice and guidance, but agree 
references to best practice re. personal data should be added to 
help ensure implementers are aware of this. [W3C Auto]

Websockets?  Protocol?  Both of these are red flags.  Protocol 
development is an entirely different game to APIs and the choice of 
websockets makes me question the judgment of the people involved.  Of 
particular concern is how the group intends to manage interactions 
with SOP.  Do they intend to allow the web at large to connect to 
parts of the car?  The security architecture is worrying in its lack 
of detail. 

[W3C Auto] Could you please clarify why the use of WebSockets is 
a red flag. In practice, OEMs will control which signals are exposed 
and what access control policies are applied for specific signals. 
The WebSocket server is not open to direct access from the wider 
web (but of course agents running on the vehicle could pass data 
off the vehicle to any agreed endpoint) – but these agents would 
be subject to access control policies enforced by the implementer 
(OEM). [W3C Auto]

If this proceeds, the naming choice (wwwivi) will have to change.  It 
is not OK to register a new GTLD (see 
https://tools.ietf.org/html/rfc6761).  A similar mistake was made 
recently in the IETF, and it was ugly. For people interested in the 
gory details, I can provide more details offline. 

[W3C Auto] The choice of the wwwivi hostname was to allow the 
local infrastructure to map their in-vehicle local server to a 
consistent end point allowing application compatibility (as an 
alternative to ‘hardcoding’  ‘localhost’ or 127.0.0.1). This 
allows the local network to have its own configuration whilst 
remaining compatible for all W3C compliant web applications 
and agents. We would be interested and keen to hear alternate 
proposals. [W3C Auto]


There's fairly extensive evidence of security vulnerabilities in 
vehicular systems that can lead to serious safety issues (see: 
http://www.autosec.org/publications.html), so more than usual 
attention needs to be paid to security in this context. 

In fairness, a lot of these are implementation security issues: 
i.e., how to properly firewall off any network access from the 
CAN bus. You really need to ensure that there's no way 
to influence the CAN bus, which probably means some kind of 
very strong one-way communications guarantee. At some level 
these are out of scope for this group, but it's predictable 
that if this technology is built, people will also implement 
it in insecure ways, so in that respect it's very much in-scope. 

[W3C Auto] The Automotive Group has had a number of discussions 
with respect to ensuring that access to CAN signals is carefully 
controlled. We have previously published Architecture diagrams 
showing a ‘Secure Gateway’ that controls all access to CAN and 
the group is very keen to promote security best practice. 
It is true that there is a risk that implementers may expose 
signals in an insecure way, but OEMs are already exposing an 
increasing number of signals and this trend is likely to continue 
whether or not a standard specification is created. We are keen 
though to keep re-iterating that CAN (and other vehicle signals) 
should only be accessible to suitably authorised clients and 
so there is an opportunity for the specification to encourage 
and promote best practice. This could include, for example, 
that if setting a safety related signal cannot be implemented 
in a very highly secure way, that the implementer does not 
allow this signal to be set. [W3C Auto]


The commuications security story also seems to be not well 
fleshed out. The examples shown all seem to have fixed hostnames 
(wwwivi/localhost) which don't really seem like the basis for 
strong identity. It's not just enough to say, as in S 6, that 
the server has to have a certificate; what are the properties of 
that certificate? What identity does it have? 

[W3C Auto] The vehicle does not necessarily have to have a certificate 
in order to prove its identity to the offboard server. It could for 
example, prove knowledge of a shared symmetric vehicle-specific key. 
This step could occur over an encrypted SSL/TLS channel that is 
established based on the server’s certificate. The specification 
doesn’t want to force implementers [W3C Auto]

This is particularly concerning: 

    At this point, internet based clients and servers do not know the 
    dynamic IP address that was assigned to a specific vehicle. So 
    normally, a vehicle has to connect to a well known endpoint, 
    generally using a URL to connect to a V2X Server. The vehicle and 
    the internet server typically mutually authenticate and the 
    vehicle 'registers' with the server over an encrypted channel 
    passing it a unique identifier e.g. its Vehicle Identification 
    Number (VIN). From that point on, the server has the IP address 
    that is currently assigned to a vehicle with a particular VIN, and 
    can share this information with other internet based clients and 
    servers, which are then able to send messages to the vehicle. 

How does the V2X server know that this is actually my VIN? Just because 
I claim it over an encrypted channel. 

[W3C Auto] The vehicle can connect to a security authority e.g. a 
vehicle authentication server at a well-known endpoint, verify the 
server’s identity e.g. using the server’s certificate, set up an 
encrypted SSL/TLS tunnel and the vehicle can then prove its identity 
to the security authority e.g. using a certificate or knowledge of 
a shared secret (by communicating with the server over the encrypted 
SSL/TLS channel). Once the vehicle has confirmed its identity to the 
Vehicle Authentication Server, the server issues an authentication 
token for the vehicle to use on requests to the V2X server. The client 
e.g. Agent on the vehicle passes the vehicle authentication token with 
the VIN on any requests to the V2X server (over an encrypted channel) 
and the V2X server can verify that the token is valid by checking with 
the Security Authority (Vehicle Auth. Server) [W3C Auto]

In IETF we often ask at the WG-forming stage whether we feel that the 
community has the expertise to take on this work. The current proposal 
seems to call that into question and absent some evidence that that 
expertise does in fact exist, I believe we shoud oppose formation.  
[W3C Auto] A number of Automotive Manufacturers and Tier 1 suppliers have 
contributed to the ideas in the specification which focusses on exposing 
vehicle 

signals and data to clients in a controlled and secure manner. W3C Automotive 
Group members have a very good understanding of vehicle architectures and 

signals and this expertise is being supplemented by security specialists within 
the Group, but the Group is open to contributions on how security best 

practice can best be incorporated and/or referenced from the spec. [W3C Auto]
________________________________________________________________________________

This sounds to me like there are sufficient reasons to formally object 
to this charter, and as Martin points out, a special case of IoT/WoT 
(with additional concerns!). 

[W3C Auto] Before you formally object, could we suggest having a conference 
call to discuss your concerns. This  would also give us the opportunity to 
try to answer or clarify any additional questions. [W3C Auto]
 
David, 

Thus I too think we should formally object, link to our previous 
formal objection of the WoT charter (since nearly all the same reasons 
apply), and list the new items that Martin and Ekr provided. I suggest 
we cc this response to www-archive as well. 


It's not clear to me that there are any changes one could plausibly adopt 
that would make this acceptable to us. The complaints MT and I had are 
just the ones of first impression. 

[X] opposes this Charter and requests that this group not be 
     created [Formal Objection] (your details below). 

[W3C Auto] The W3C Automotive Working Group was established approx.
two years ago and has published a First Public Working Draft of the 
Vehicle Signal Server Specification. [W3C Auto]

We're concerned enough about the security and privacy aspects of 
this charter and the associated work that we believe this effort is 
not currently ready to begin development on the Recommendation 
track. 

We have a number of concerns about the security aspects of this 
work.  It's not clear how exposing vehicle information through 
WebSockets will work in a secure way.  Will connections to parts of 
the car be exposed to the Internet?  If not, how will access be 
limited to allowed clients?  How will integration with the DNS-based 
CA system and with the same origin policy be handled?  The proposals 
to use fixed hostnames don't appear workable, since they don't 
establish unique identities for which certificates can be issued. 
Similarly, it's not clear how the V2X server described verifies that 
the connection it receives is from a vehicle with the VIN that the 
client claims to have.  Security is critical, as security 
vulnerabilities in systems within cars have already led to serious 
safety problems; see http://www.autosec.org/publications.html . 

It seems that privacy needs to be a core aspect of this working 
group, given the level of private data involved in this space, and 
given deeper consideration from the beginning than a note that the 
working group will secure reviews from the Privacy Interest Group. 

It's also not OK to use a new GTLD (as this proposes using wwwivi); 
see https://tools.ietf.org/html/rfc6761 . 
These concerns are apparent after only a brief review.  Given that, 
we believe that the best path forward in this area is for the 
community to take some time to consider security and privacy more 
carefully, and come back later with a charter that reflects that 
consideration. 

[W3C Auto] We would be very happy to understand specific criticisms 
of the security model and approach and to understand contributions 
from Mozilla (and of course others) on how this should be improved. 
[W3C Auto]
_______________________________________________
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform

Reply via email to