Re: [Model-t] Considerations for modern COMSEC protocol design

Joachim Fabini <Joachim.Fabini@tuwien.ac.at> Tue, 18 February 2020 15:40 UTC

Return-Path: <joachim.fabini@tuwien.ac.at>
X-Original-To: model-t@ietfa.amsl.com
Delivered-To: model-t@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B6731120180 for <model-t@ietfa.amsl.com>; Tue, 18 Feb 2020 07:40:42 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id S9nnJZ4x_z2h for <model-t@ietfa.amsl.com>; Tue, 18 Feb 2020 07:40:39 -0800 (PST)
Received: from secgw2.intern.tuwien.ac.at (secgw2.intern.tuwien.ac.at [IPv6:2001:629:1005:30::72]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DE56E1200EC for <model-t@iab.org>; Tue, 18 Feb 2020 07:40:38 -0800 (PST)
Received: from totemomail (localhost [127.0.0.1]) by secgw2.intern.tuwien.ac.at (8.14.7/8.14.7) with ESMTP id 01IFeaiF001147; Tue, 18 Feb 2020 16:40:36 +0100
Received: from localhost ([127.0.0.1]) by totemomail.intern.tuwien.ac.at (Totemo SMTP Server) with SMTP ID 708; Tue, 18 Feb 2020 16:40:35 +0100 (CET)
Received: from edge13a.intern.tuwien.ac.at (edge13a.intern.tuwien.ac.at [IPv6:2001:629:1005:30::66]) by secgw2.intern.tuwien.ac.at (8.14.7/8.14.7) with ESMTP id 01IFeZCa001123 (version=TLSv1/SSLv3 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=FAIL); Tue, 18 Feb 2020 16:40:35 +0100
Received: from mbx13c.intern.tuwien.ac.at (2001:629:1005:30::63) by edge13a.intern.tuwien.ac.at (2001:629:1005:30::66) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Tue, 18 Feb 2020 16:40:35 +0100
Received: from [128.131.67.210] (128.131.67.210) by mbx13c.intern.tuwien.ac.at (2001:629:1005:30::63) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Tue, 18 Feb 2020 16:40:35 +0100
To: Eric Rescorla <ekr@rtfm.com>
CC: model-t@iab.org
References: <CABcZeBPgvsQGzyWEXK_U2x_wYthuxELCs7r+J+NLyA=knpp8pw@mail.gmail.com> <a9bca34b-c458-f3b9-cf54-6418ef525fa9@tuwien.ac.at> <CABcZeBPzF4=_m5La1JikGWR=4_Q5j68n1kx3Xzozaa+-QhuMHg@mail.gmail.com>
From: Joachim Fabini <Joachim.Fabini@tuwien.ac.at>
Autocrypt: addr=Joachim.Fabini@tuwien.ac.at; keydata= xsFNBFzP9YwBEADLSwTOJGpr6+y+UQ2tko4lnJLfcazo3MHJq6w8CoOAeBhgvxHvksx48RpB JOculUcAP+Sr/dAsVJRvbrd3ZVFl5X+5rq5HqZtEER64JkZN3ZWwuZJ2cIPe8UrmPUCCSdDm Q2Ss3jWRYq+5bg9xG9pgRdfXQj4EzocE5+vnq1TEx5skuAK2pmntE29gCO8ICIO0qOtlNMyz UNPyb/wvVR/+8Umj5xO3kJrEjq7NpYCPP+I2nmRmrCVNQ+ruQGjHFbFzLCzeQj/Ln+vHJy3C O5qbBs/8aae2+7g/N642ODgXv78mg6k4r/yA2uCoeqirj9P6d/8qyhdU247oe+96FLwd4ly5 cHjmS5FEBhNsZKB3yPwod8phWwMZhPDro+ttkTRjL9CTmXspLFPlYwDqkuyEVMOHh24toFVI 0QukzYWLrMwY3ae0ni8DM5fcTQaFDWr4rqRcfGRhA66xxT4uUAX20q1VzWBO2fVUr0eB3Hwr FjCS7URAlsPFebuevgt1/pjSbcRk20TXPp//1qwh8GU03C6qy5iHB8coAsCwZec3S92YEdgM obdYgVhLPHOMd89IfldRASAConvQzI8WkiabzkMpL0donUUErNQ9RVFQ1NRoLJYIx2D0CMFN RW01q0xZFEKci+r/S2/YUkhXTXD4cEx4y3A4WCJPi0teSUW8owARAQABzSxKb2FjaGltIEZh YmluaSA8am9hY2hpbS5mYWJpbmlAdHV3aWVuLmFjLmF0PsLBgAQTAQgAKgIbIwUJCWYBgAUL CQgHAgYVCAkKCwIEFgIDAQIeAQIXgAUCXM/2+wIZAQAKCRCbDicB0srp1dEXEACLpHerJzi7 684Ixo6sgwQ0TM/oVV7unXIqFZuuZLMf4r609La++l0BXSmj6LtrIqZVXoFVRwIutEADmaKZ k2kc2zVaKWN/BM4/o8r0db/jOdElv8bbqsui1HYCA1KIKu2nNEMQd1axH0mzBUEFQaIoEPQP mQszQhKHw1ZgAjrsyvU7ZH9aHTboPvLURIAH0CBfgvnm+feFxl/rMBSLu5CJpff9cWA1inKX 1eEexy2tFR80NUSaLauRLC9j9Xe2q+7DLNAT16+5dgRt16bXlkUh4IMpG5k6vpyFu12vSfcB VHJZEKld9APoHoHdjgq7QSeyENfZU+XeAzT/U0fDvF7v392/Fnw7UfVNi5TW2DjiR1cf5ahG YNzfJlIRmiFAkGAxjA6LV6tidpr+KtKvgTh00JZoHVpd4f26/bRTuHXzZh/G36r1bo3qYaQQ mebj6HocdFofh4dN08zv9tiYfrn9uAScZ8JeNQQWb1fg8a2a3nnGLAQiqyFKiuklczA/wkcV ZklezqdO/8nhEhSmiGOLiVwCCdMOBwwBhhJc3iXNYt+pp/v+X/T6m10wwJrwF0JVaPsKqk/m XwCw3jCjcu6iBHPwxS5qmCyJJmBwqq8RtA+Bjdp4J1CIJN3cb+fDoteXBJHYSWYFNGSa9wC4 kSGpw/5LyucT7vSCSolwdC0YVc7BTQRcz/WMARAAyMkUJLJo7g0HwerlxK2kzncvpN0ACN+b Dq89kxJPpbUivE/5I8CTpYQUVBEIq7mvk5/vZj7NWiOdBqW7yx3pmnSuzVtIy7+SB9nVm4mZ InnHij8g1IQ5267C2x1jv93PdbGXFFeEHHg0h/4GjN//3ScyhKt0vf6tDPjGwkUe5tvpvTx7 NiCW2D5hk+tQf5FcvKhwFYCKC6b9DaIb19QgjuANo/g6is/n5M4CYiX+Pqx5j+J6NjG9hMLc 4GTSQur8Ix7LZ3G78z7zB1AdiJMCyeaqrYKTVWNsz1DB5MRiGl9Wz5Q9LZu070neMuoOHD+0 Aaud5JbI8YozvxwTbNN8/fV6byVWvCCmtd8ZZDKfQXgav2HvtejFlm0ix9MTl87+OUGbpLtm WIS/2qZtamrTVfv5dVlCM9ziHkkhV75nMr6X6h+tAaedboC7xIWR8bAC4HGk3KN1cmwjgy4D G87X+tYNmzhAQHioHEEvfklNXOIvU5coDzpdp/n9OxQxPlA5qC+BDSixQqsu5iTcPaA0iGij Ja3A7Wg69ybigctY22ICCvyUv8WgRoCWcHNfjI3sJULLk+SfygEALfgWQ9xKQI+L0M5h+Tq4 2RUpYVC2HKGtzQZ7YhSQcHu9NobA/4qVJcCF+tZXV5mPeMg5LHpmNhfSQRYgbk2KBvaqJw2D MbsAEQEAAcLBZQQYAQgADwUCXM/1jAIbDAUJCWYBgAAKCRCbDicB0srp1YnTD/0Qao7t3YNk Rc04ed1slc22Ned54huNF10TD5+QVSjfdjiMrlUNYznjqnMEdWDaHKclQS7WaBJO2GetSPFr Etk/IJ0bM+C9GjYh+kfqA0X45X8KC4/XLoARd4I+B4uLk+i0UbhlnL9sibVaIGG6IC6S1HGN M0yA9RJ0FPXl4/QV5JAkLNSDKCiyeFjACqExLk7HHNACrLO8Jr7IH8RDE3rlIEgdWxwTIs+9 GeLvMdtasnfEloZCsGb2proOu1QhMZlqoftLhtMzW+4lEmJnUAfxHZRivpjjlQVtWIQ03t6f txnqh4plL3gJsGV+y4ty4emTN9MJsDAyphkqKPqv29hJTyHoeixSG7G0KT/gO+JqTWm/7wwU d7xOW+WtjsXhNM5k5aJtTGpGAwC6QkKnodu+WUkYxpXJKU4cmEBguFQPCwTlFzh7+Jo98Vbh N9cJUQ5iJau00lDU3qJIcbsD06ccy1EoBjIiqAH59DnumrnP99J6iNj8yCxStc1TjA3dRReu +iOGwyoUlp48c3UlpK4BkSegtd2CA37xkiesebEUoRYiAld410PETVlHCQX/kBa6iAx4oEoG lS4E9h1XOCVa0fnJZfwq00WHUbT+P3E3/svKw63HccEuLHBETuowX1ECcGf7s6E9aaexLqbV jVz9rWWAUFG680+ewfjVKZjb5Q==
Message-ID: <a271b757-e0ee-2f98-5ce4-21834075e950@tuwien.ac.at>
Date: Tue, 18 Feb 2020 16:40:34 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.4.1
MIME-Version: 1.0
In-Reply-To: <CABcZeBPzF4=_m5La1JikGWR=4_Q5j68n1kx3Xzozaa+-QhuMHg@mail.gmail.com>
Content-Type: text/plain; charset="utf-8"
Content-Language: en-US
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: mbx13b.intern.tuwien.ac.at (2001:629:1005:30::62) To mbx13c.intern.tuwien.ac.at (2001:629:1005:30::63)
Archived-At: <https://mailarchive.ietf.org/arch/msg/model-t/Cktc3kD5gYN50q-aFAozSeYCdlc>
Subject: Re: [Model-t] Considerations for modern COMSEC protocol design
X-BeenThere: model-t@iab.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussions of changes in Internet deployment patterns and their impact on the Internet threat model <model-t.iab.org>
List-Unsubscribe: <https://www.iab.org/mailman/options/model-t>, <mailto:model-t-request@iab.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/model-t/>
List-Post: <mailto:model-t@iab.org>
List-Help: <mailto:model-t-request@iab.org?subject=help>
List-Subscribe: <https://www.iab.org/mailman/listinfo/model-t>, <mailto:model-t-request@iab.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Feb 2020 15:40:43 -0000

On 2/18/20 3:27 PM, Eric Rescorla wrote:
> 
> 
> On Tue, Feb 18, 2020 at 3:39 AM Joachim Fabini
> <Joachim.Fabini@tuwien.ac.at <mailto:Joachim.Fabini@tuwien.ac.at>> wrote:
> 
>     thanks EKR for the concise summary. Some minor
>     additions/comments/thoughts on the traffic analysis paragraph and on e2e
>     aspects below.
> 
>     On 2/17/20 6:06 PM, Eric Rescorla wrote:
>     > As promised...
>     >
>     > -Ekr and Chris
>     >
>     > [...]
>     > can leak information about the
>     > underlying plaintext. DNS queries and responses are particularly
>     > at risk given their size distributions. Recent protocols account
>     > for this leakage by supporting padding, either generically in the
>     > transport protocol (QUIC and TLS), or specifically in the application
>     > protocol (EDNS(0) padding option for DNS messages).
> 
>     Time synchronization protocols can be mentioned here as a use case, too.
>     Currently none of the existing TS protocols is adequately protected
>     against timing attacks (assumptions concerning link diversity typically
>     fail whenever the attacker is well-positioned, e.g., on the majority of
>     the system's few access links). And timing becomes crucial for many
>     systems.
> 
>     Moreover, the accuracy of (today's) network-based timesync depends on
>     deterministic message patterns, sizes and timing. Consequently (a) any
>     attempt to secure/obscure these messages impairs on timesync accuracy
>     and (b) timesync messages can be spotted easily within encrypted traffic
>     (even including IPsec-tunneled timesync, despite TFC and obscuring
>     traffic - references on request).
> 
>     At least a note could be added that subliminal channels do exist and
>     should be considered when designing (security) protocols. I'll try to go
>     into more detail with the malware draft.
> 
> 
> Hmm.... What do you think protocol designers would do with this information?

I suppose your question concerns just the last sentence?

The former statements on time synchronization should warn protocol
designers that they must not rely on the timing of messages and that
encryption/security does not help in this respect, either.
In Industry and in the academic community it is a common misbelief that
encryption helps against timing attacks (can reference several
publications relying on such assumptions). People are not aware of this
pitfall and it is fair to warn.

> Every modern comsec protocol I am familiar with has zillions of bits
> that can
> be freely chosen, and though there's been a bunch of work on deransomization
> I don't think we're ready to change that.

Still: the less degrees of freedom protocol designers provide in their
freely selectable bits, the better. My concern is not so much about
end-to-end subliminal channels, but about the zillions intermediate
layers between pretended "end-to-end" and the actual security layer below.

>     Finally, somebody mentioned during Friday's telco that "we don't know
>     who provides security". Imo this is where the threat landscape changed
>     most since 2003. RFC3552 does not even include the definition of an
>     endpoint (imo because by the time of writing it was too obvious what's
>     meant). Security frameworks, containers, virtual guests, clouds, etc.,
>     changed the rules of the game. They help but their transparency can be
>     painful in a security context.
> 
>     So it boils down to a (again, imo) central question that the CLESS
>     endpoint taxonomy draft tackles to a certain extent: "what does
>     end-to-end mean"?
> 
>     Is it meaningful/mandatory that future protocol/framework security
>     specifications are forced to make explicit what their perception or
>     concept of end-to-end is? Rewording this slightly: Users and
>     applications should have a right to identify/query which underlying
>     layers provide (e2e) security, i.e., where e2e security really ends.
>     And, in addition, which layers/frameworks/etc. (either local or remote)
>     sit in between and could break end-to-end security without being
>     noticed.
> 
> 
> This seems like a kind of normative statement that 3552 generally strove to
> avoid, and I think should remain out of scope here. I think it would be
> a good
> idea to explain that the endpoint you are talking to now is probably really
> distributed, but I don't think we should be taking a position on the users
> rights vis-a-vis that.

No need to involve users. The advise to protocol designers could be as
simple as: minimize the number of layers between the application that
needs end-to-end security and the actual {encryption/integrity
protection} layer. The fewer uncertainty factors there are in between,
the better.

>From a purely academic perspective I'd love to have a traceroute-kind
mechanism that allows users/applications to trace e2e all layers,
modules, frameworks involved in an e2e communication. But I guess this
truly exceeds the scope of model-t. ;)

thanks,
Joachim