[TLS] Re: Consensus call for RFC8773bis Formal Analysis Requirement

Eric Rescorla <ekr@rtfm.com> Sun, 29 September 2024 16:32 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E8F9BC14F680 for <tls@ietfa.amsl.com>; Sun, 29 Sep 2024 09:32:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level:
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20230601.gappssmtp.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZAdf_lqYpjaN for <tls@ietfa.amsl.com>; Sun, 29 Sep 2024 09:32:46 -0700 (PDT)
Received: from mail-yb1-xb2a.google.com (mail-yb1-xb2a.google.com [IPv6:2607:f8b0:4864:20::b2a]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9366AC14F61E for <tls@ietf.org>; Sun, 29 Sep 2024 09:32:46 -0700 (PDT)
Received: by mail-yb1-xb2a.google.com with SMTP id 3f1490d57ef6-e03caab48a2so2846040276.1 for <tls@ietf.org>; Sun, 29 Sep 2024 09:32:46 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20230601.gappssmtp.com; s=20230601; t=1727627566; x=1728232366; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=pMUwDPiyUY7WPVe//YtDkgi6kjCGOltl8LuwoWu9Ei8=; b=vfa3574tzpxybw/ZR19UELiMKMXxM29emZ7OIlXfRMzq5WxhriAY6I3sgBcI074QKi eLUh5OBDHiM8EPj0ypaVRXhAkYvMK5vPvUJhkOwJrg4IsjrkWozyApuXz0yf5iAtmTut 3PMGKY/1iPOhqWCrNMn5S14G6vFERmlLyOqNpap8UbQn2Avo/Xatcx1mNMrRmxA+wI/b YurCNVWj4ymGiNe///f5tIbQMehdiP1xFYXrLzxn53uCeBU7328qkQD42hfS1rDZKV6+ xgcG1SV3O52c8oF0cO0LntVl52Aj3Giy7Bal6lLZieF+uovmVMTsAvo+eF0Ob0l9FknZ CIew==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1727627566; x=1728232366; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=pMUwDPiyUY7WPVe//YtDkgi6kjCGOltl8LuwoWu9Ei8=; b=smG9I/BU9MW2JK662z8f9PGu3K0Gk3mmjMHtv38Ct42syfoVzRCsDFvpF209Md2Qsj pVnP1xe2nYBfUaeVwyh8lMP28bsFJ8hMKhtItrK/6P/2Jplysq1lVTIJAKxUbMGBh+SX XKgpArrNvlEfMrw5kYiWzg+A5stBQ4ja+uSKJfiUyqbko8sIoxo3pxawe+2wd3kywko6 J3ffhYWQ5gi2Hx0LmH61jCpW/C3zqXUXtwGGeL9adLCEvW3QlMjoIxP/UOvIbHlNBYB9 U8KpTBr+2IR1KccbpsN0AiLOaRRyFotgsvAKCvu1R4S5JG6RvsOkagG9Y7WK05MsG8pY mGSQ==
X-Forwarded-Encrypted: i=1; AJvYcCVGKXmB6hKjG2lJzB8dgPVKJm76sPUS/TmpwphbCEoON4GwB+t4KfioyNCpjxL+F2hSvz0=@ietf.org
X-Gm-Message-State: AOJu0Yxc5iizh3OOCqEmQL1VZ5CG+30DBH479zIp2wycbm6Zsxl+J4vT 7RfqweMs3Rxlm8HIzJfgf1EtbLW94MhzDhnDhhPJ/42Kgl72jvFaHHv+bCDEZsdSzQ+l4zV8Utu vvp/DGYhE7KuzzWKaQd0UmLGa7JwzmW3J6S1WKWaIaOPL4mg2
X-Google-Smtp-Source: AGHT+IHMk//Ui2yG/NF99GfQBwayWsO8E2tvJM6WKuCEihJhuXTzrPWQdxP2PO0a9fPq728W/iURPjfZzIvZ9H44T1w=
X-Received: by 2002:a25:68cd:0:b0:e26:677:656d with SMTP id 3f1490d57ef6-e26067767aemr4706037276.10.1727627565616; Sun, 29 Sep 2024 09:32:45 -0700 (PDT)
MIME-Version: 1.0
References: <CAOgPGoBxoEhVkzb=WYFvNEhN0sKLDLir0qPVSqx_a=Co7dkXgA@mail.gmail.com> <CAOgPGoCLnLHbO9mTbaqjERbpFtoGyJeVk=mjDvxkJYe8nySTvw@mail.gmail.com> <0BAA3B8C-BAC0-47E1-A202-2BC4B001C48B@vigilsec.com>
In-Reply-To: <0BAA3B8C-BAC0-47E1-A202-2BC4B001C48B@vigilsec.com>
From: Eric Rescorla <ekr@rtfm.com>
Date: Sun, 29 Sep 2024 09:32:09 -0700
Message-ID: <CABcZeBNOv0Ghkjk37_3TX0WKVJz0MTPQOPcgud1j8EZm_e3ATg@mail.gmail.com>
To: Russ Housley <housley@vigilsec.com>
Content-Type: multipart/alternative; boundary="0000000000005a6f45062344a39a"
Message-ID-Hash: OJTX7WU5T4S2DYJDF4OJMBVTSZZ3JEQW
X-Message-ID-Hash: OJTX7WU5T4S2DYJDF4OJMBVTSZZ3JEQW
X-MailFrom: ekr@rtfm.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: IETF TLS <tls@ietf.org>
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [TLS] Re: Consensus call for RFC8773bis Formal Analysis Requirement
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/CWoQa_4XN7lbiabFcruUWVaOoLQ>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>

Yes, but the question is whether the protocol actually *provides* the
property that authentication is based on certificates. The point of the
analysis is to determine that.

-Ekr


On Mon, Sep 23, 2024 at 3:55 PM Russ Housley <housley@vigilsec.com> wrote:

> I agree, and I think the Security Considerations already cover this point:
>
>    If the external PSK is known to any party other than the client and
>    the server, then the external PSK MUST NOT be the sole basis for
>    authentication.  The reasoning is explained in Section 4.2 of
>    [K2016].  When this extension is used, authentication is based on
>    certificates, not the external PSK.
>
> Russ
>
> On Sep 23, 2024, at 4:49 PM, Joseph Salowey <joe@salowey.net> wrote:
>
> There is rough consensus that the document should have additional formal
> analysis before publication. Ekr proposed the following for the
> authentication property, which seems like a reasonable clarification
>
> "I think the right analysis is one in which the attacker knows the PSK.
> For instance, say we have a company where everyone shares a PSK (as some
> kind of post-quantum protection) and you want to make sure employee A
> cannot impersonate employee B."
>
> At this point it is up to the authors and working group to address the
> request for additional symbolic analysis in order to move the document
> forward.
>
> The consensus call also indicated that there is a need to continue to work
> out the process for formal analysis triage which we are working on as a
> separate topic. See interim scheduling poll from Sean.
>
> On Fri, Aug 23, 2024 at 10:30 AM Joseph Salowey <joe@salowey.net> wrote:
>
>> In regard to moving RFC 8773 to standards track the formal analysis
>> triage group has provided input on the need for formal analysis which was
>> posted to the list [1].  The authors have published a revision of the draft
>> [2] to address some of this feedback, however the general sentiment of the
>> triage panel was that there should be some additional symbolic analysis
>> done to verify the security properties of the draft and to verify there is
>> no negative impact on TLS 1.3 security properties.
>>
>> The formal analysis is to verify the following properties of the proposal
>> in the draft:
>>
>> - The properties of the handshake defined in Appendix E.1 of RFC8446 [3]
>> remain intact if either the external PSK is not compromised or (EC)DH is
>> unbroken.
>> - The public key certificate authentication works as in TLS 1.3, and this
>> extension adds the condition that the party has possession of the external
>> PSK. The details of external PSK distribution are outside the scope of this
>> extension.
>>
>> This is a consensus call for the working group to determine how to
>> proceed between these two options:
>>
>> 1. Require formal analysis in the symbolic model to verify that the
>> proposal in the document does not negatively impact the security properties
>> of base TLS 1.3 and that the additional security properties cited above are
>> met
>> 2. Proceed with publishing the document without additional formal
>> verification
>>
>> Please respond to the list with a brief reason why you think the document
>> requires formal analysis or not. This call will end on September 16, 2024.
>>
>> Thanks
>>
>> Joe, Deirdre, and Sean
>>
>> [1]
>> https://mailarchive.ietf.org/arch/msg/tls/vK2N0vr83W6YlBQMIaVr9TeHzu4/
>> [2]
>> https://author-tools.ietf.org/iddiff?url1=draft-ietf-tls-8773bis-00&url2=draft-ietf-tls-8773bis-02&difftype=--html
>> [3] https://www.rfc-editor.org/rfc/rfc8446.html#appendix-E.1
>>
> _______________________________________________
> TLS mailing list -- tls@ietf.org
> To unsubscribe send an email to tls-leave@ietf.org
>
>
> _______________________________________________
> TLS mailing list -- tls@ietf.org
> To unsubscribe send an email to tls-leave@ietf.org
>