[radext] Re: Selfie Attack on TLS-PSK

Margaret Cullen <mrcullen42@gmail.com> Thu, 25 July 2024 22:44 UTC

Return-Path: <mrcullen42@gmail.com>
X-Original-To: radext@ietfa.amsl.com
Delivered-To: radext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C4BFFC18DB88 for <radext@ietfa.amsl.com>; Thu, 25 Jul 2024 15:44:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.858
X-Spam-Level:
X-Spam-Status: No, score=-1.858 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HiURCyISDfHF for <radext@ietfa.amsl.com>; Thu, 25 Jul 2024 15:44:08 -0700 (PDT)
Received: from mail-pl1-x62c.google.com (mail-pl1-x62c.google.com [IPv6:2607:f8b0:4864:20::62c]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 620ACC1840FF for <radext@ietf.org>; Thu, 25 Jul 2024 15:44:08 -0700 (PDT)
Received: by mail-pl1-x62c.google.com with SMTP id d9443c01a7336-1fd640a6454so548955ad.3 for <radext@ietf.org>; Thu, 25 Jul 2024 15:44:08 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1721947447; x=1722552247; darn=ietf.org; h=to:references:message-id:date:cc:in-reply-to:from:subject :mime-version:content-transfer-encoding:from:to:cc:subject:date :message-id:reply-to; bh=JQmhn41iQV0TpveoWWr+fMifgSjZ2DMpaJsjcxGUwdM=; b=Vq9YAJdtV4DxgQUwAxKcLth7ZFVZc0VPuqsf9t5JcuKuvSHhZU7RpScMPrn6atv/M+ 1V65K7eMhL2j5P2l1eOdlNFlgB94yJyVE6vRN6MbBPFMHZMENSwqRs1HLkqRUOY7iwe9 EycS5p18hBrg3efUMoT0guyC5Us6Pr1px10vWDREmKJ1dfQjkpssfNvqUnq4QGm6VBEu ICI0eyyefr2UjvkmXNn+TEQXoGVGAVoiXkSQXuEPBcJnTRTXRTGSjfAckF+PSKSA8SqH Yyy7N0hyvO56nNbqQgyQIN758RKsJGXaqsWXJzYWuNI4LDkrTwMo+DroSaKvCGjUM/Dh qeIg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1721947447; x=1722552247; h=to:references:message-id:date:cc:in-reply-to:from:subject :mime-version:content-transfer-encoding:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=JQmhn41iQV0TpveoWWr+fMifgSjZ2DMpaJsjcxGUwdM=; b=H7LR5xtwjCtXBj0CzrPphIIZZRmXWGV+9Kfd4WfADni28VcjY7fH9kgBJWOvmrT6iH 4mbN8thPo1ccc2xC4er9xD5naK52jifi47MzwqMOzTw5rTvzDjQcwKi/dafy+DxQ2mQB FFSQF/mYifV9tOTdiZHW2Lw5089NlGDswmbQGlqriPo+hCXE37DF3JgihZu9tfF3G1Qk WTzgSEG0IdwKTmCfR7MNCFiDpB7aqhBPbFSGw91ufLBrN3QzC276xd2nEjT5/JGaTunO l++HSyfRU3gX4B+VxdwEZhdS/hubKgUXvvg+kT6lIegy+5Ana0CTbbbutkXhJ+ZQbV88 ceWw==
X-Forwarded-Encrypted: i=1; AJvYcCUG7XzWA/fKcmZlKiC+8M4ODiui0EGBAJ0pE2ci2FWcaCiOx+IBq6NJtHPinzqB8cOOnrKyzvcw0bkehKpEa0o=
X-Gm-Message-State: AOJu0YxpuUThUdf8EAIxE7JtdXey6+F20f1EQX+3tr3n/+yTlfaimoNb mGgiYo6DuyjpgK3FwKauS2XICrmGk8taFI1NVRkeTF5dazSlCsd6+DY5IZ8C
X-Google-Smtp-Source: AGHT+IEMPFj96vRotDpDw1X89+uekvWNv5pegn9T6HvgK8aiew+fG4V7U+HUvf4Z1utxb0s4VYYeDQ==
X-Received: by 2002:a17:903:18e:b0:1fb:7f82:515 with SMTP id d9443c01a7336-1fed3860189mr52131145ad.15.1721947446782; Thu, 25 Jul 2024 15:44:06 -0700 (PDT)
Received: from smtpclient.apple ([2001:67c:370:128:b8ab:7aae:2a33:7b30]) by smtp.gmail.com with ESMTPSA id d9443c01a7336-1fed7c85930sm19411945ad.29.2024.07.25.15.44.04 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Thu, 25 Jul 2024 15:44:05 -0700 (PDT)
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Mime-Version: 1.0 (1.0)
From: Margaret Cullen <mrcullen42@gmail.com>
In-Reply-To: <0265E702-4220-42F5-9B42-DD8DB0F44EDE@deployingradius.com>
Date: Thu, 25 Jul 2024 15:43:54 -0700
Message-Id: <3CB916DF-48E0-4CD1-826B-18ED98BBE118@gmail.com>
References: <0265E702-4220-42F5-9B42-DD8DB0F44EDE@deployingradius.com>
To: Alan DeKok <aland@deployingradius.com>
X-Mailer: iPhone Mail (21F90)
Message-ID-Hash: UTJVSK5J44CEOJ6QU5RPH6PMCDQ266FI
X-Message-ID-Hash: UTJVSK5J44CEOJ6QU5RPH6PMCDQ266FI
X-MailFrom: mrcullen42@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-radext.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: josh.howlett@gmail.com, Bernard Aboba <bernard.aboba@gmail.com>, radext@ietf.org
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [radext] Re: Selfie Attack on TLS-PSK
List-Id: RADIUS EXTensions working group discussion list <radext.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/radext/rQUtIiHMo5VvOcFM0Enqgz0bl8w>
List-Archive: <https://mailarchive.ietf.org/arch/browse/radext>
List-Help: <mailto:radext-request@ietf.org?subject=help>
List-Owner: <mailto:radext-owner@ietf.org>
List-Post: <mailto:radext@ietf.org>
List-Subscribe: <mailto:radext-join@ietf.org>
List-Unsubscribe: <mailto:radext-leave@ietf.org>


> On Jul 25, 2024, at 3:05 PM, Alan DeKok <aland@deployingradius.com> wrote:
> On Jul 25, 2024, at 11:23 AM, Margaret Cullen <mrcullen42@gmail.com> wrote:
>> As Stefan points out, copying of a RADIUS/TLS-transmitted RADIUS message on to a local network is different (and less secure) than dumb copying of a message that was transmitted via RADIUS/UDP, because sensitive data in the message transmitted via UDP will still be protected (to some degree) by the RADIUS secret and MD5, while the packet coming from RADIUS/TLS would use a well-known RADIUS secret, “radsec”, essentially equivalent to sending the sensitive parts of the packet in clear text.
> 
>  I think that description is not correct, though.  The RADIUS packets have some kind of transport behavior (TLS, shared secrets, whatever).  That behavior is defined hop by hop.  So when a proxy forwards traffic, it doesn't care what the previous transport is.

As I understood Stefan’s message, he was talking about copying the raw packet as received from the transport, not proxying the packet as you described.  I don’t know why this would be done, nor do I know of anyone who is doing it. I’m assuming Stefan does, because he brought this up as a use case for why binding the TLS and RADIUS layers would be undesirable.

I was attempting to point out that security implications of “dumb copying” a RadSec packet (with a secret of “radsec”) are different than the implications of dumb copying a RADIUS/UDP packet (with a non-constant secret), because in the RadSec case, the contents can be converted to plaintext using the “radsec” secret value, but in the RADIUS/UDP, you need to crack MD5 to see the full contents.

That _is_ a _real_ difference.  Without knowing who is doing “dumb copying” in what situations, we can’t know if it is a significant difference.

Margaret