Re: [TLS] [SUSPECTED URL!]Re: Requiring that (EC)DHE public values be fresh

Ilari Liusvaara <ilariliusvaara@welho.com> Sun, 01 January 2017 22:39 UTC

Return-Path: <ilariliusvaara@welho.com>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B3C161270B4 for <tls@ietfa.amsl.com>; Sun, 1 Jan 2017 14:39:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5
X-Spam-Level:
X-Spam-Status: No, score=-5 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, RP_MATCHES_RCVD=-3.1] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VBq4PfE-Ez3O for <tls@ietfa.amsl.com>; Sun, 1 Jan 2017 14:38:59 -0800 (PST)
Received: from welho-filter4.welho.com (welho-filter4.welho.com [83.102.41.26]) by ietfa.amsl.com (Postfix) with ESMTP id A41AC128BA2 for <tls@ietf.org>; Sun, 1 Jan 2017 14:38:59 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by welho-filter4.welho.com (Postfix) with ESMTP id AA58F1879E; Mon, 2 Jan 2017 00:38:57 +0200 (EET)
X-Virus-Scanned: Debian amavisd-new at pp.htv.fi
Received: from welho-smtp1.welho.com ([IPv6:::ffff:83.102.41.84]) by localhost (welho-filter4.welho.com [::ffff:83.102.41.26]) (amavisd-new, port 10024) with ESMTP id 5WMYqkgpT7uE; Mon, 2 Jan 2017 00:38:57 +0200 (EET)
Received: from LK-Perkele-V2 (87-92-51-204.bb.dnainternet.fi [87.92.51.204]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by welho-smtp1.welho.com (Postfix) with ESMTPSA id 98BBDC4; Mon, 2 Jan 2017 00:29:38 +0200 (EET)
Date: Mon, 02 Jan 2017 00:29:28 +0200
From: Ilari Liusvaara <ilariliusvaara@welho.com>
To: Hugo Krawczyk <hugo@ee.technion.ac.il>
Message-ID: <20170101222928.GA18736@LK-Perkele-V2.elisa-laajakaista.fi>
References: <CAMfhd9Urd1DWF9yhMdhvx1AcKyB4-E7Qy+tzqz_-1RpXR+Wp1w@mail.gmail.com> <CAFewVt44xm3rgm=n8PpEcqbTvC-Ei2EvoJciL=+m2UnQ-fUm2A@mail.gmail.com> <CAMfhd9Xq4RA6XBqLZtsbWSnMk4SnvZLC9V3_gCH-FzyVBMg4xg@mail.gmail.com> <CADi0yUPSkBhyuX7utW1tsVkkbDc6YgBLie41qWPwbo+X6CpuZA@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
In-Reply-To: <CADi0yUPSkBhyuX7utW1tsVkkbDc6YgBLie41qWPwbo+X6CpuZA@mail.gmail.com>
User-Agent: Mutt/1.5.23 (2014-03-12)
Sender: ilariliusvaara@welho.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/0A_wlymiIHR_-r61ne_mHTKHliw>
Cc: Adam Langley <agl@imperialviolet.org>, "tls@ietf.org" <tls@ietf.org>
Subject: Re: [TLS] [SUSPECTED URL!]Re: Requiring that (EC)DHE public values be fresh
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 01 Jan 2017 22:39:02 -0000

On Sun, Jan 01, 2017 at 12:43:06PM -0500, Hugo Krawczyk wrote:
> There is more than one way to "backdoor" the use of DH (i.e., to not
> enforce forward secrecy) and some of these ways are completely undetectable
> (in particular, they would not repeat DH values). One has to be careful not
> to give a false sense of security by the illusion that not detecting DH
> repetition guarantees forward secrecy (FS). The value of a MUST NOT that
> cannot be enforced is debatable even though it may serve as a strong
> message to implementers that FS is an important property to comply with
> (which is the domain of SHOULD). Another consideration is that there are
> applications where FS is of little value, e.g. anything where the
> requirement is authentication and not secrecy or where the secrecy
> requirement itself is ephemeral.

My understanding of this matter is that this proposal isn't so much
about forcing FS, but ensuring that servers don't _accidentially_
screw up FS, as many TLS 1.2 servers do, even when using ECDHE cipher-
suites.

Those servers cache ECDH keys and apparently have no facily to roll
over ECDH keys as those use the same ones weeks or months over.

If such ECDH key gets compromised on still-live server, you don't
just get attacks where past connections have confidentiality 
compromised, but also attacks where _future_ connections have
confidentialty and _integerity_ compromised.

Yes, you can undetectalby undermine FS (and concrete methods of
doing that have been proposed in discussions within this WG), but
implementing that is nontrivial work, compared to just generating
ECDH key on startup and reusing it for lifetime of the process.



Also, when considering confidentiality, there is not just cofidentiality
of information itself, but also confidentiality of access of
information. I have seen lots of arguments against encryption that
completely ignore that.




-Ilari