Re: [Model-t] Considerations for modern COMSEC protocol design

Joachim Fabini <Joachim.Fabini@tuwien.ac.at> Tue, 18 February 2020 11:39 UTC

Return-Path: <joachim.fabini@tuwien.ac.at>
X-Original-To: model-t@ietfa.amsl.com
Delivered-To: model-t@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 186BE12008D for <model-t@ietfa.amsl.com>; Tue, 18 Feb 2020 03:39:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fLWNKQJ3SUkD for <model-t@ietfa.amsl.com>; Tue, 18 Feb 2020 03:39:32 -0800 (PST)
Received: from secgw1.intern.tuwien.ac.at (secgw1.intern.tuwien.ac.at [IPv6:2001:629:1005:30::71]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 350BC120073 for <model-t@iab.org>; Tue, 18 Feb 2020 03:39:31 -0800 (PST)
Received: from totemomail (localhost [127.0.0.1]) by secgw1.intern.tuwien.ac.at (8.14.7/8.14.7) with ESMTP id 01IBdTTa004316; Tue, 18 Feb 2020 12:39:29 +0100
Received: from localhost ([127.0.0.1]) by totemomail (Totemo SMTP Server) with SMTP ID 551; Tue, 18 Feb 2020 12:39:28 +0100 (CET)
Received: from edge13a.intern.tuwien.ac.at (edge13a.intern.tuwien.ac.at [IPv6:2001:629:1005:30::66]) by secgw1.intern.tuwien.ac.at (8.14.7/8.14.7) with ESMTP id 01IBdSH6004294 (version=TLSv1/SSLv3 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=FAIL); Tue, 18 Feb 2020 12:39:28 +0100
Received: from mbx13c.intern.tuwien.ac.at (2001:629:1005:30::63) by edge13a.intern.tuwien.ac.at (2001:629:1005:30::66) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Tue, 18 Feb 2020 12:39:28 +0100
Received: from [128.131.67.210] (128.131.67.210) by mbx13c.intern.tuwien.ac.at (2001:629:1005:30::63) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Tue, 18 Feb 2020 12:39:27 +0100
To: Eric Rescorla <ekr@rtfm.com>, model-t@iab.org
References: <CABcZeBPgvsQGzyWEXK_U2x_wYthuxELCs7r+J+NLyA=knpp8pw@mail.gmail.com>
From: Joachim Fabini <Joachim.Fabini@tuwien.ac.at>
Autocrypt: addr=Joachim.Fabini@tuwien.ac.at; keydata= xsFNBFzP9YwBEADLSwTOJGpr6+y+UQ2tko4lnJLfcazo3MHJq6w8CoOAeBhgvxHvksx48RpB JOculUcAP+Sr/dAsVJRvbrd3ZVFl5X+5rq5HqZtEER64JkZN3ZWwuZJ2cIPe8UrmPUCCSdDm Q2Ss3jWRYq+5bg9xG9pgRdfXQj4EzocE5+vnq1TEx5skuAK2pmntE29gCO8ICIO0qOtlNMyz UNPyb/wvVR/+8Umj5xO3kJrEjq7NpYCPP+I2nmRmrCVNQ+ruQGjHFbFzLCzeQj/Ln+vHJy3C O5qbBs/8aae2+7g/N642ODgXv78mg6k4r/yA2uCoeqirj9P6d/8qyhdU247oe+96FLwd4ly5 cHjmS5FEBhNsZKB3yPwod8phWwMZhPDro+ttkTRjL9CTmXspLFPlYwDqkuyEVMOHh24toFVI 0QukzYWLrMwY3ae0ni8DM5fcTQaFDWr4rqRcfGRhA66xxT4uUAX20q1VzWBO2fVUr0eB3Hwr FjCS7URAlsPFebuevgt1/pjSbcRk20TXPp//1qwh8GU03C6qy5iHB8coAsCwZec3S92YEdgM obdYgVhLPHOMd89IfldRASAConvQzI8WkiabzkMpL0donUUErNQ9RVFQ1NRoLJYIx2D0CMFN RW01q0xZFEKci+r/S2/YUkhXTXD4cEx4y3A4WCJPi0teSUW8owARAQABzSxKb2FjaGltIEZh YmluaSA8am9hY2hpbS5mYWJpbmlAdHV3aWVuLmFjLmF0PsLBgAQTAQgAKgIbIwUJCWYBgAUL CQgHAgYVCAkKCwIEFgIDAQIeAQIXgAUCXM/2+wIZAQAKCRCbDicB0srp1dEXEACLpHerJzi7 684Ixo6sgwQ0TM/oVV7unXIqFZuuZLMf4r609La++l0BXSmj6LtrIqZVXoFVRwIutEADmaKZ k2kc2zVaKWN/BM4/o8r0db/jOdElv8bbqsui1HYCA1KIKu2nNEMQd1axH0mzBUEFQaIoEPQP mQszQhKHw1ZgAjrsyvU7ZH9aHTboPvLURIAH0CBfgvnm+feFxl/rMBSLu5CJpff9cWA1inKX 1eEexy2tFR80NUSaLauRLC9j9Xe2q+7DLNAT16+5dgRt16bXlkUh4IMpG5k6vpyFu12vSfcB VHJZEKld9APoHoHdjgq7QSeyENfZU+XeAzT/U0fDvF7v392/Fnw7UfVNi5TW2DjiR1cf5ahG YNzfJlIRmiFAkGAxjA6LV6tidpr+KtKvgTh00JZoHVpd4f26/bRTuHXzZh/G36r1bo3qYaQQ mebj6HocdFofh4dN08zv9tiYfrn9uAScZ8JeNQQWb1fg8a2a3nnGLAQiqyFKiuklczA/wkcV ZklezqdO/8nhEhSmiGOLiVwCCdMOBwwBhhJc3iXNYt+pp/v+X/T6m10wwJrwF0JVaPsKqk/m XwCw3jCjcu6iBHPwxS5qmCyJJmBwqq8RtA+Bjdp4J1CIJN3cb+fDoteXBJHYSWYFNGSa9wC4 kSGpw/5LyucT7vSCSolwdC0YVc7BTQRcz/WMARAAyMkUJLJo7g0HwerlxK2kzncvpN0ACN+b Dq89kxJPpbUivE/5I8CTpYQUVBEIq7mvk5/vZj7NWiOdBqW7yx3pmnSuzVtIy7+SB9nVm4mZ InnHij8g1IQ5267C2x1jv93PdbGXFFeEHHg0h/4GjN//3ScyhKt0vf6tDPjGwkUe5tvpvTx7 NiCW2D5hk+tQf5FcvKhwFYCKC6b9DaIb19QgjuANo/g6is/n5M4CYiX+Pqx5j+J6NjG9hMLc 4GTSQur8Ix7LZ3G78z7zB1AdiJMCyeaqrYKTVWNsz1DB5MRiGl9Wz5Q9LZu070neMuoOHD+0 Aaud5JbI8YozvxwTbNN8/fV6byVWvCCmtd8ZZDKfQXgav2HvtejFlm0ix9MTl87+OUGbpLtm WIS/2qZtamrTVfv5dVlCM9ziHkkhV75nMr6X6h+tAaedboC7xIWR8bAC4HGk3KN1cmwjgy4D G87X+tYNmzhAQHioHEEvfklNXOIvU5coDzpdp/n9OxQxPlA5qC+BDSixQqsu5iTcPaA0iGij Ja3A7Wg69ybigctY22ICCvyUv8WgRoCWcHNfjI3sJULLk+SfygEALfgWQ9xKQI+L0M5h+Tq4 2RUpYVC2HKGtzQZ7YhSQcHu9NobA/4qVJcCF+tZXV5mPeMg5LHpmNhfSQRYgbk2KBvaqJw2D MbsAEQEAAcLBZQQYAQgADwUCXM/1jAIbDAUJCWYBgAAKCRCbDicB0srp1YnTD/0Qao7t3YNk Rc04ed1slc22Ned54huNF10TD5+QVSjfdjiMrlUNYznjqnMEdWDaHKclQS7WaBJO2GetSPFr Etk/IJ0bM+C9GjYh+kfqA0X45X8KC4/XLoARd4I+B4uLk+i0UbhlnL9sibVaIGG6IC6S1HGN M0yA9RJ0FPXl4/QV5JAkLNSDKCiyeFjACqExLk7HHNACrLO8Jr7IH8RDE3rlIEgdWxwTIs+9 GeLvMdtasnfEloZCsGb2proOu1QhMZlqoftLhtMzW+4lEmJnUAfxHZRivpjjlQVtWIQ03t6f txnqh4plL3gJsGV+y4ty4emTN9MJsDAyphkqKPqv29hJTyHoeixSG7G0KT/gO+JqTWm/7wwU d7xOW+WtjsXhNM5k5aJtTGpGAwC6QkKnodu+WUkYxpXJKU4cmEBguFQPCwTlFzh7+Jo98Vbh N9cJUQ5iJau00lDU3qJIcbsD06ccy1EoBjIiqAH59DnumrnP99J6iNj8yCxStc1TjA3dRReu +iOGwyoUlp48c3UlpK4BkSegtd2CA37xkiesebEUoRYiAld410PETVlHCQX/kBa6iAx4oEoG lS4E9h1XOCVa0fnJZfwq00WHUbT+P3E3/svKw63HccEuLHBETuowX1ECcGf7s6E9aaexLqbV jVz9rWWAUFG680+ewfjVKZjb5Q==
Message-ID: <a9bca34b-c458-f3b9-cf54-6418ef525fa9@tuwien.ac.at>
Date: Tue, 18 Feb 2020 12:39:27 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.4.1
MIME-Version: 1.0
In-Reply-To: <CABcZeBPgvsQGzyWEXK_U2x_wYthuxELCs7r+J+NLyA=knpp8pw@mail.gmail.com>
Content-Type: text/plain; charset="utf-8"
Content-Language: en-US
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: mbx13b.intern.tuwien.ac.at (2001:629:1005:30::62) To mbx13c.intern.tuwien.ac.at (2001:629:1005:30::63)
Archived-At: <https://mailarchive.ietf.org/arch/msg/model-t/GEgAndXfLJPqkXuJUUdOYPmU76U>
Subject: Re: [Model-t] Considerations for modern COMSEC protocol design
X-BeenThere: model-t@iab.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussions of changes in Internet deployment patterns and their impact on the Internet threat model <model-t.iab.org>
List-Unsubscribe: <https://www.iab.org/mailman/options/model-t>, <mailto:model-t-request@iab.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/model-t/>
List-Post: <mailto:model-t@iab.org>
List-Help: <mailto:model-t-request@iab.org?subject=help>
List-Subscribe: <https://www.iab.org/mailman/listinfo/model-t>, <mailto:model-t-request@iab.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Feb 2020 11:39:36 -0000

thanks EKR for the concise summary. Some minor
additions/comments/thoughts on the traffic analysis paragraph and on e2e
aspects below.

On 2/17/20 6:06 PM, Eric Rescorla wrote:
> As promised...
> 
> -Ekr and Chris
> 
> [...]
>
> TRAFFIC ANALYSIS
> RFC 3552; Section 3.2.1 describes how the absence of TLS or other
> transport-layer encryption may lead to obvious confidentiality
> violations against passive attackers. However, recent trends in
> traffic analysis indicate encryption alone may be insufficient
> protection for some types of application data [1]. Encrypted traffic
> metadata, especially message size, 

In addition, message timing, -sequence, -patterns are the features most
useful and commonly available whenever attacking encrypted (and
potentially aggregated) protocol traffic. Worth mentioning...

> can leak information about the
> underlying plaintext. DNS queries and responses are particularly
> at risk given their size distributions. Recent protocols account
> for this leakage by supporting padding, either generically in the
> transport protocol (QUIC and TLS), or specifically in the application
> protocol (EDNS(0) padding option for DNS messages).

Time synchronization protocols can be mentioned here as a use case, too.
Currently none of the existing TS protocols is adequately protected
against timing attacks (assumptions concerning link diversity typically
fail whenever the attacker is well-positioned, e.g., on the majority of
the system's few access links). And timing becomes crucial for many systems.

Moreover, the accuracy of (today's) network-based timesync depends on
deterministic message patterns, sizes and timing. Consequently (a) any
attempt to secure/obscure these messages impairs on timesync accuracy
and (b) timesync messages can be spotted easily within encrypted traffic
(even including IPsec-tunneled timesync, despite TFC and obscuring
traffic - references on request).

At least a note could be added that subliminal channels do exist and
should be considered when designing (security) protocols. I'll try to go
into more detail with the malware draft.

Finally, somebody mentioned during Friday's telco that "we don't know
who provides security". Imo this is where the threat landscape changed
most since 2003. RFC3552 does not even include the definition of an
endpoint (imo because by the time of writing it was too obvious what's
meant). Security frameworks, containers, virtual guests, clouds, etc.,
changed the rules of the game. They help but their transparency can be
painful in a security context.

So it boils down to a (again, imo) central question that the CLESS
endpoint taxonomy draft tackles to a certain extent: "what does
end-to-end mean"?

Is it meaningful/mandatory that future protocol/framework security
specifications are forced to make explicit what their perception or
concept of end-to-end is? Rewording this slightly: Users and
applications should have a right to identify/query which underlying
layers provide (e2e) security, i.e., where e2e security really ends.
And, in addition, which layers/frameworks/etc. (either local or remote)
sit in between and could break end-to-end security without being noticed.

br Joachim