Re: [Ace] Security of the Communication Between C and RS

Benjamin Kaduk <kaduk@mit.edu> Sun, 27 January 2019 04:40 UTC

Return-Path: <kaduk@mit.edu>
X-Original-To: ace@ietfa.amsl.com
Delivered-To: ace@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C8517128CE4 for <ace@ietfa.amsl.com>; Sat, 26 Jan 2019 20:40:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level:
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=mit.edu
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nM_J227TyFSA for <ace@ietfa.amsl.com>; Sat, 26 Jan 2019 20:40:17 -0800 (PST)
Received: from NAM03-CO1-obe.outbound.protection.outlook.com (mail-eopbgr790108.outbound.protection.outlook.com [40.107.79.108]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 02B5312896A for <ace@ietf.org>; Sat, 26 Jan 2019 20:40:16 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mit.edu; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=YKJ7B7gPnb0bjr9TBBZUMgjuDouXU/opht6SYli/NzU=; b=pPzEeURng6IWlvqeu4Pyb6NRJFZNuaX6KsLx3ddBZb9PHBAUqkcLBtkgBiYTbrQr3JXgw3enqkWrHoscNEohRk1Q8tL1dU6sKVP7hy5KLd2InpIR9xTo+D6jqlLdBQe5VA8o0nyGED0Hfgv+ayI6yyJh6L66E60cajoYKYn4ESg=
Received: from BL0PR0102CA0035.prod.exchangelabs.com (2603:10b6:207:18::48) by BL0PR01MB4484.prod.exchangelabs.com (2603:10b6:208:81::31) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1558.21; Sun, 27 Jan 2019 04:40:12 +0000
Received: from BY2NAM03FT038.eop-NAM03.prod.protection.outlook.com (2a01:111:f400:7e4a::205) by BL0PR0102CA0035.outlook.office365.com (2603:10b6:207:18::48) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.1558.16 via Frontend Transport; Sun, 27 Jan 2019 04:40:12 +0000
Authentication-Results: spf=pass (sender IP is 18.9.28.11) smtp.mailfrom=mit.edu; ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=bestguesspass action=none header.from=mit.edu;
Received-SPF: Pass (protection.outlook.com: domain of mit.edu designates 18.9.28.11 as permitted sender) receiver=protection.outlook.com; client-ip=18.9.28.11; helo=outgoing.mit.edu;
Received: from outgoing.mit.edu (18.9.28.11) by BY2NAM03FT038.mail.protection.outlook.com (10.152.84.170) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.1580.10 via Frontend Transport; Sun, 27 Jan 2019 04:40:11 +0000
Received: from kduck.mit.edu (24-107-191-124.dhcp.stls.mo.charter.com [24.107.191.124]) (authenticated bits=56) (User authenticated as kaduk@ATHENA.MIT.EDU) by outgoing.mit.edu (8.14.7/8.12.4) with ESMTP id x0R4e7R4032337 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Sat, 26 Jan 2019 23:40:09 -0500
Date: Sat, 26 Jan 2019 22:40:07 -0600
From: Benjamin Kaduk <kaduk@mit.edu>
To: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
CC: Ludwig Seitz <ludwig.seitz@ri.se>, Jim Schaad <ietf@augustcellars.com>, 'Stefanie Gerdes' <gerdes@tzi.de>, "ace@ietf.org" <ace@ietf.org>
Message-ID: <20190127044007.GL49072@kduck.mit.edu>
References: <VI1PR0801MB21125D384A3DE6BD90AEDB74FABD0@VI1PR0801MB2112.eurprd08.prod.outlook.com> <b79ea204-0d7d-3968-6ea5-cd33d5502380@tzi.de> <VI1PR0801MB2112F215E8DF2E8AC34F217FFABE0@VI1PR0801MB2112.eurprd08.prod.outlook.com> <e42032d6-ad15-26d2-cdbb-aaa34900d1ad@tzi.de> <9f35177f-30d4-817e-dfc3-9a54903ab023@ri.se> <VI1PR0801MB2112BA2A400D660DC32B7293FABE0@VI1PR0801MB2112.eurprd08.prod.outlook.com> <f441528a-aba4-8556-0493-2e12a38e4133@ri.se> <035a01d497d8$941fa920$bc5efb60$@augustcellars.com> <ad81074d-54b8-23df-4a55-74163b290aa3@ri.se> <VI1PR0801MB21120C7B4116AC7A1D348064FABF0@VI1PR0801MB2112.eurprd08.prod.outlook.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <VI1PR0801MB21120C7B4116AC7A1D348064FABF0@VI1PR0801MB2112.eurprd08.prod.outlook.com>
User-Agent: Mutt/1.10.1 (2018-07-13)
X-EOPAttributedMessage: 0
X-Forefront-Antispam-Report: CIP:18.9.28.11; IPV:CAL; SCL:-1; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10019020)(376002)(396003)(136003)(346002)(39860400002)(2980300002)(13464003)(189003)(199004)(2906002)(4326008)(478600001)(26826003)(6916009)(53416004)(93886005)(88552002)(6246003)(46406003)(33656002)(75432002)(106466001)(50466002)(47776003)(23726003)(55016002)(229853002)(246002)(305945005)(8676002)(8936002)(316002)(7696005)(36906005)(104016004)(15650500001)(356004)(86362001)(26005)(54906003)(97756001)(426003)(186003)(476003)(1076003)(11346002)(446003)(486006)(956004)(336012)(106002)(126002)(58126008)(16586007)(786003)(14444005)(53546011)(76176011)(18370500001); DIR:OUT; SFP:1102; SCL:1; SRVR:BL0PR01MB4484; H:outgoing.mit.edu; FPR:; SPF:Pass; LANG:en; PTR:outgoing-auth-1.mit.edu; MX:1; A:1;
X-Microsoft-Exchange-Diagnostics: 1; BY2NAM03FT038; 1:L6dyoeSCCnlYNM2YNFw0c7xZIdCO3H80l7ZbRKvTBz2ADwLmnsRq3NKNgVMjV9rlewT0SrSbrVRDd25HmTTW+xEdW+1XMctjKG+b3X2enI5z91cv4OesdJPvwuW2kfDjWK0fVKYnVA+2v5Yw9YwSHr29QvbBr2+D8dSOX3FLg+I=
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 7a45a650-54ce-451a-2e90-08d684118625
X-Microsoft-Antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600110)(711020)(4605077)(4608076)(4709027)(2017052603328)(7153060); SRVR:BL0PR01MB4484;
X-Microsoft-Exchange-Diagnostics: 1; BL0PR01MB4484; 3:Lrb3UGxL2GYWhQ+eYfHAEcckYLmHniTLbiorVD0kx6UMEuAj9SsqziD/vOnCFIE4IxF9kxSZ48Iny6cIyhh94xGCbC9IAbEIAy75gl4AjyPmpAJtPwcj0afHPIyRXcsTwjO5lEEAidrJZNFR0shfcNSY2lV5YhIcXVyTYhJup3a/xn/FhGqqbRfOsjl6QDRiAufzWT2iXkOVGQgZc69Ozr5N+7z/4MyG+m9V1baVVQcy3JhMKsT8eh8Xspo7BqVmt4FlPViE0AoTOEBlx+2tox5dPEYLjRWJrC2tn31r38Jtu4WWiUgplV6mSiN8/lMD73oIH4DDnYlh98syTLo4qAoYsMO0XGkMrtTwf9xb22/lmB0R2GdLDtkDkjmdTRMy; 25:HEyVQNLuTdFhXdvQY1vlt1gq+XL2l9mpTp4un6IO86AaSmL46QhvmJoJy9mrWQnZr807wv3V/0i6ildI7lCmiGZgsF/pDt5BLZ2v39gTdMbKUEK6qfm96loClwIkMveK9frOcF3V6Ty4DPbaKjbufs/6IzZS+7VY0vegBVj1bTcUirGd73UbLZ99BN2KFMlmHOaxotXoGWhSSRlFfiZasqSrL15ONm3u1USCyduv9h/+jsrr//YWPT/E8suUYHGRhPSNNoZB562ZPMlMD+7KPdxOGN1jdEzVK0fLvTOA6RgXOaMBSQFCoaKasg+YXXaGCRQClucP8B/UsGEUhxRzUw==
X-MS-TrafficTypeDiagnostic: BL0PR01MB4484:
X-Microsoft-Exchange-Diagnostics: 1; BL0PR01MB4484; 31:4sfgM9ahbjVZco2c+H6avzmUZrs9pyvfKJ77Wm2e7yQdKl7akLy+7lSx5U6HmMqYdio5bLF9nkIBIRnXY8G+aPQS5yDlEAoC0csR3mPr5B0o95Qjso9sQjOFJHnoLQcwRUAztTXrscRqSkaxjJEmHQ6reaM+NTE5nfuiJRnD3UG++tVIFWR7y42Kim+clbNYV0zIZG1tX4xQBrrWNeZbiCBeldfOWoK5QwsU52jAiXQ=; 20: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
X-Microsoft-Antispam-PRVS: <BL0PR01MB4484F88FDAF59E0F7561B4E7A0950@BL0PR01MB4484.prod.exchangelabs.com>
X-Microsoft-Exchange-Diagnostics: 1; BL0PR01MB4484; 4:c+o+Zp94uMW9vunAo5INRM2t5Cti1LxWy1sSBPadsBGX42mP3E3ftEmt00/JxXgLKmfIRA0yJQHRLSNaEKmaQS3JIuysJZtnuUReDx/h/C++SIi7SRmGoegs7XZt5KhD5nLNxNdT9N4szSXNw6Qu99GEEBdo4jPqvbXzyA/S6ZTAQJYlSMU3GQrmH8WZIQX/2DV3LPdzgZWrALCGw+82u05KN5q1Vzg4nbgJlMeIrzwU3ut8gcoDBoavjPEpOKmM97yn7/g6ihkdtpW+QFqoU6fu16bV0oWjKMKoOZ5csGchQ67BoC37tIsc74zPstYc
X-Forefront-PRVS: 0930AAFAD9
X-Microsoft-Exchange-Diagnostics: 1; BL0PR01MB4484; 23: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
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Message-Info: myPOJkGMP9txGucf9Lxb78aPe5/tCEaTA/eC0dAZw4AbJopPQzdxscUS2bzfHNXuDwemtmAuVkOt+Tw575Ioxnq02nfHY4VAQKhkA9/ndAzvEXexcga7GhrIUQG0GNdNbJR441P2MZsrpEuLmq1ErcL+uoP67ye3nBZEEmRU6h+pgGzN+i65ctJp5EwMqDUV5oPD9/3kjE7XLZLglWWq0KUoQadtJO70efAQFs9VF9AuPI5gVfUgHqvDYMcPTHIo83Jal57i4jCaxZkD9lH7+o7GYwpjgUckGqj3nlz4T8pVMnqiVacSNrLllWaTNSLTPbEEeKjn/Tc0j4Xx9bKKmM9wmVukLkLCVv7L2u56hFU6PX/8pUWZnI4EKotOKMLWt9w7iUB6YtroQjXX/Bk8czKMG6cDoYWvVl6YS4ulo3E=
X-Microsoft-Exchange-Diagnostics: 1; BL0PR01MB4484; 6:0aEFPM7qJRKA7K3hjtDRGeszwGsc1447gaILZOn76J3Fl/2uuuQ0Q5bnJKa+leIqqUT+8Sstke66s+D3LaDVdDLDQSH+34SMwBeH5ybeM8L7mi/tbPf78nJ9dIi71gYDfKD6PAfPMQJ3Sh6L4CDbjc8CLpBysC+j+18ne9YLWcX+1e1+cL35xJxbOb7yUasKgaxNnIyGkkB4mP9PpdrLUMkvK6h/0znuso3LoNHoxNgX67ttu9zXXHLgquXh85+jLcpnLezFYUgjAJ0gmibwn1C7LXGTD7PW2ud2pLPNd+BXnjqXvKPMaSd7znIPPLU4SasD1SAGeEA4y9U/hbOc1vvZAxgVqb7FYdeKSvz5gYqGWjjLNbJQPE8rBtf1XRUH8XsPaJi0Xz+2VzMQKaxbgVCme6iopxifdhnOwBeR8k6p6WahELC6YDw5pU+8mLyQgoHE/sElZxN4g/83CIG5bQ==; 5:HdjlTedqyt7+FD2+lxY+aKFYVyCwA4umD2MbVfDNveoN7x1miU+zZJObXw0sjNnjWBFPeU98W9tStCt0DN+yMsILTlkdDO5fpGmrotET6f2ihQAec2wnwjgS2LicYoSV4yc2Uo2jXATzAEkHxK6yec5PkEEEYCUZf1Qo1jU2nkCx9LrYMNPq/wHLiMCPADwAQtqs3lZoElXqg8nBE4fAuA==; 7:OZb3l2G0Kq2mnXjMIsM7HySD7zc+u9IUvHxDjgDmAwg0kx/SS1FLjZrbWLo5OMLidtEUT6VLlNBl3Syhht8W/dOQmklem9lnehRRWF3HcNPVR9mrQ4bSfrWaxFR0HlxxJTeqI/W0LDoNHSs9wcG/+w==
X-OriginatorOrg: mit.edu
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 27 Jan 2019 04:40:11.5494 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 7a45a650-54ce-451a-2e90-08d684118625
X-MS-Exchange-CrossTenant-Id: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=64afd9ba-0ecf-4acf-bc36-935f6235ba8b; Ip=[18.9.28.11]; Helo=[outgoing.mit.edu]
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL0PR01MB4484
Archived-At: <https://mailarchive.ietf.org/arch/msg/ace/Q8DiXIrlKOBoEnB2LlTF3eVklYU>
Subject: Re: [Ace] Security of the Communication Between C and RS
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 27 Jan 2019 04:40:20 -0000

On Thu, Dec 20, 2018 at 09:11:24AM +0000, Hannes Tschofenig wrote:
> 
> -----Original Message-----
> From: Ludwig Seitz <ludwig.seitz@ri.se>
> Sent: Donnerstag, 20. Dezember 2018 08:40
> To: Jim Schaad <ietf@augustcellars.com>; Hannes Tschofenig <Hannes.Tschofenig@arm.com>; 'Stefanie Gerdes' <gerdes@tzi.de>; ace@ietf.org
> Subject: Re: [Ace] Security of the Communication Between C and RS
> 
> On 19/12/2018 21:22, Jim Schaad wrote:
> >
> > It would be more reasonable to say that if you are doing a physical
> > attack, then it would be easy to get an RPK and then you are the RS
> > until such a time as the AS is told that the key is no longer trusted.
> > In this case you will just continue getting tokens as a client which
> > are still valid and none of this is helpful in any event.
> 
> Ok my example was perhaps not ideal, since it has an even bigger breach as precondition. So under what conditions would an attacker get access to a pop-key of an expired token? Steffi any ideas?
> 
> [Hannes] We definitely need some more details about the type of attack we would like to prevent. Maybe it is worthwhile to think about what information the attacker steals from whom at what point in time could be a way to progress the topic.

It is perhaps contrived, but one scenario in which the PoP key could be
exposed to an attacker or third party is if some sort of post-facto
auditing service is in play, where the "previous generation" of key
material is released to an auditing service, after expiration or key
rollover has occurred.  This third party would then be able to audit
network traffic (whether for intrusion detection or other purposes) but not
modify any live traffic.

Such a scheme has been proposed in the context of TLS (though I'm not
finding a good reference in the archive; maybe it was just at a mic line?),
though not with any great degree of seriousness AFAIK.

-Ben