Re: [MLS] Use Cases for avoiding Forward Secrecy

Dave Cridland <dave@cridland.net> Wed, 28 February 2018 22:56 UTC

Return-Path: <dave@cridland.net>
X-Original-To: mls@ietfa.amsl.com
Delivered-To: mls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 069CF12708C for <mls@ietfa.amsl.com>; Wed, 28 Feb 2018 14:56:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level:
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cridland.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fEveqh5_MZKx for <mls@ietfa.amsl.com>; Wed, 28 Feb 2018 14:56:25 -0800 (PST)
Received: from mail-lf0-x231.google.com (mail-lf0-x231.google.com [IPv6:2a00:1450:4010:c07::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C7CC6126FDC for <mls@ietf.org>; Wed, 28 Feb 2018 14:56:24 -0800 (PST)
Received: by mail-lf0-x231.google.com with SMTP id l191so6008567lfe.1 for <mls@ietf.org>; Wed, 28 Feb 2018 14:56:24 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cridland.net; s=google; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=5OpMTIenpIUHZdFRCIvc/uKBNuiSp2ZSPLXutcMCWwI=; b=O5Os4CZc8K9dm+1BD2QVIWdCxV/YT5f+++DZPJ01tzCcmu/G8vIDxB5bMuuv5SZKDd v0Jg4EYhfajrx7HB5NGKESdTAB3TCGeMdrT2BNVtoTIMs3dCa8FSgJsTGL8XO/l3X/3C IEIezHT2t1IxCPwBaenTHu+6hTItnStfGP1iI=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=5OpMTIenpIUHZdFRCIvc/uKBNuiSp2ZSPLXutcMCWwI=; b=Bm89lH8s643QRs9dv0W8fcXgZGF0ITxDv3pPS9ZPr1F/1oAw44YJxE8ANluihsJBf5 wqA9Bjc/5cnJAYX/N7/WbBMmeZggpDrbyswcbigS/P+4UiJh+KxbTWf0lIfNoHZx844+ LUOad67w6v6/aTyQqEyRF5afrA2OD5YysLICKCQVjZCvbqfqOf99S3t7CqkCqU4hbxcS mXsCxvD7VPKaS0JtLGRdbTfuf4YBwMtt95D7mzcegEdQkm9NUHXo828+3+ZQg3BKXyva E19r/sX+tMaYyQ7t5Uzm6/0lMeQj3asTmVkKNzDJplZaMXk5E7ZnxcjDR1YowG+/EK+g OqNw==
X-Gm-Message-State: APf1xPDPkGh67ZhWwqViJrLMgetdvExg8qcCIdC4yybZg3rd6K14HANI IgAjydZHtU3yuMNzPPlLnBJXZ5tnJilcwY/aXVBJiQeX
X-Google-Smtp-Source: AG47ELs2jfj/OUzDMaxOMPjZkeWF1E4rjztSei+ZMMRKDSdr8b22WbG69alWN+ATpGwmB/nbfjrd5ithZxOkhBrlSDo=
X-Received: by 10.46.56.6 with SMTP id f6mr14683057lja.4.1519858582904; Wed, 28 Feb 2018 14:56:22 -0800 (PST)
MIME-Version: 1.0
Received: by 10.179.80.4 with HTTP; Wed, 28 Feb 2018 14:56:22 -0800 (PST)
In-Reply-To: <f10d4e2c-7b4c-b841-eadf-056e1729c713@cs.tcd.ie>
References: <CAKHUCzxOwmPrpUUj6HSRMcxiXtRmT05OapeBQdRA49bSWum6yQ@mail.gmail.com> <f10d4e2c-7b4c-b841-eadf-056e1729c713@cs.tcd.ie>
From: Dave Cridland <dave@cridland.net>
Date: Wed, 28 Feb 2018 22:56:22 +0000
Message-ID: <CAKHUCzx6V8UqmP7-njtAU5xeZ=R0Mc_O5TrWd2UkX6X6i53bLA@mail.gmail.com>
To: Stephen Farrell <stephen.farrell@cs.tcd.ie>
Cc: mls@ietf.org
Content-Type: text/plain; charset="UTF-8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/mls/p79Ps5uTTEkUBPmSyHcTmNhBXBw>
Subject: Re: [MLS] Use Cases for avoiding Forward Secrecy
X-BeenThere: mls@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Messaging Layer Security <mls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mls>, <mailto:mls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mls/>
List-Post: <mailto:mls@ietf.org>
List-Help: <mailto:mls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mls>, <mailto:mls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Feb 2018 22:56:27 -0000

On 28 February 2018 at 21:16, Stephen Farrell <stephen.farrell@cs.tcd.ie> wrote:
>
> Hiya,
>
> On 28/02/18 17:14, Dave Cridland wrote:
>> Given the latter, for example, I could not use an MLS-based system to
>> discuss a tax problem with the authority, and since I'm unlikely to
>> have a SAKKE-based messaging client, I'm unlikely to have encrypted
>> messaging to my tax authority at all - which seems signficantly worse
>> than merely having no Forward Secrecy.
>
> Sorry, why is transport layer security not sufficient between you
> and your tax authority?
>

Because it's not a single hop.

Supposing my tax authority uses XMPP, for example, and so has (in my
case) hmrc.gov.uk as an XMPP domain. I use some commercialish XMPP
provider. I don't want my provider to be able to read my tax messages,
nor do I want them archived in plaintext on the server (although I
probably do want a verifiable record). Meanwhile, HMRC wants to keep
an archived, but secured, copy at their end, viewable by their
organisation.

> I'm unclear as to why the security guarantees (aimed for) between
> groups of people ought be reduced in order to meet the goals of
> securing communications between a person and a service provider.
>

I'm not suggesting they should be.

I am suggesting that it might be nice if my options were not simply FS or FO.

(Besides which, the archives in a non-FS situation gain some security
guarantees, too).

> I do agree that it'd be good if a user of some application could
> add a new device and still see old messages, but I'm not at all
> clear that's that significant (for the crypto) since people will
> always need to have some kind of fallback to handle cases where
> they've lost state.

Assume a FS-only message transfer. In that case, how do we recover
missing messages? We have to transport those from another device that
has them. That's a perfectly reasonable concept, and one that has been
tried before in Skype. Unfortunately, as mobile devices replaced
desktop/laptop combinations as the dominant device, they switched away
from the design back to centrally-held archives since the clever
synchronisation options simply didn't work.

Of course, there are users who prefer the trade-off of higher security
and no (or limited) archives. Such users would, one hopes, be warned
about the change in security should they enter into a conversation
with someone who cannot (or will not) support FS.

Dave.