[TLS] Re: [EXTERNAL] Disallowing reuse of ephemeral keys

"Dang, Quynh H. (Fed)" <quynh.dang@nist.gov> Mon, 16 December 2024 14:30 UTC

Return-Path: <quynh.dang@nist.gov>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1ECDEC151082 for <tls@ietfa.amsl.com>; Mon, 16 Dec 2024 06:30:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.704
X-Spam-Level:
X-Spam-Status: No, score=-2.704 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.148, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FROM_GOV_DKIM_AU=-0.453, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=nist.gov
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id p9DPJvNOXl9r for <tls@ietfa.amsl.com>; Mon, 16 Dec 2024 06:30:34 -0800 (PST)
Received: from BY5PR09CU001.outbound.protection.outlook.com (mail-westusazon11011052.outbound.protection.outlook.com [52.101.86.52]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-384) server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 315BFC151061 for <tls@ietf.org>; Mon, 16 Dec 2024 06:30:34 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=K0LMZ3DFOr2L/0QoetiRLBlgsMzIUdKiXy4kvXHf1u8+3zuv6GpgdPhInwOrXTy6MX6NL5v2O/wiS/ZRJ0OCQKALURN06S2dHo9XwY4DG1lWtqomgndQA33fWOb0OBeWDWhnHNh51UBUN6Tg/eM9KxHNVWNZQw8brhZp1ftLdrAURXp5hCKgl7cJl7fO92P96LIL1r5nYSy1Efr1mY01894iEdCEBJMeUX/PuKgBi9fGU+LzpsRKECTTbZbDif865Lnc6B67WYPn8R/GMEitT4jraRQLCHi9dLqU6d/On1EaKMm4nBeL+IGm9eZ7eJrM0yCxq5YtFobR/SYXc8TgJw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=aJJ93s/hHUH4193nMKHL7yJ0oz7HS+wq359KcXVr9U0=; b=lYgoCbcwYJ/6paVkGnfPKuaJxv4h6mZbvg5ZO4Ut0ILAK6Pb7pHkh/3B5YQvMMtvwVYCCH3Eh8nkJTaEzd2oQ6WS/VNH8BGuiBtu/zPSbnsPohNADFQWiMZaFMcnAqiJpPBjneg4ZptwE/yfLueCBGefZ94PCDtRTFUJYlwYlYkj+oYD3+cSrWTSjil4JwCyny9wercztKv7/qk9CGFljDdXhnnrFW9nT86XgCN73ByLTIuKiiO2kOnBbtgkdhf7pIf5gF1Gb5XEd/jMxRMTLW7ezBDnHSVKi0TRsb21xSSAu+3hmXk5Colku7kv+pWfdbNioguA8WWcCsstkoarRA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=nist.gov; dmarc=pass action=none header.from=nist.gov; dkim=pass header.d=nist.gov; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nist.gov; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=aJJ93s/hHUH4193nMKHL7yJ0oz7HS+wq359KcXVr9U0=; b=Aq84lwIFjx5LO3MOGM84NR2iq8T9qlK2S4XuEadF8j2/xCwuQa/xyPbt/C1AjekFk9UWt1SABARRL01mQxe/yil5SEGnNHSa99HUA23gDNFLoyXf7ZL7BLkj1e1IN2wQgWTF1yos9tIhhajwjuHmEFC1Vtm6I4Hd612+0DiFm7h7Fgo5FUwuadjv/SYVzamqHC95WalFsXQORvgMF2vNVvLDjDhCygV9WMAcRlcsKHWeW7fNJRTegpd9CEAPHHXxjPp7oAyFbBoMrOld6LGieKRHqHwK29pI6x4BGxVzkhkXksLgt7+FA2l+QSy9zWZBPd7H813Q0tKhS9+oOFdIiw==
Received: from MW4PR09MB10059.namprd09.prod.outlook.com (2603:10b6:303:1fc::22) by DS0PR09MB10455.namprd09.prod.outlook.com (2603:10b6:8:177::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8251.22; Mon, 16 Dec 2024 14:30:29 +0000
Received: from MW4PR09MB10059.namprd09.prod.outlook.com ([fe80::e0a3:5842:681e:70c5]) by MW4PR09MB10059.namprd09.prod.outlook.com ([fe80::e0a3:5842:681e:70c5%7]) with mapi id 15.20.8251.015; Mon, 16 Dec 2024 14:30:29 +0000
From: "Dang, Quynh H. (Fed)" <quynh.dang@nist.gov>
To: Richard Barnes <rlb@ipv.sx>, "Scott Fluhrer (sfluhrer)" <sfluhrer=40cisco.com@dmarc.ietf.org>
Thread-Topic: [TLS] Re: [EXTERNAL] Disallowing reuse of ephemeral keys
Thread-Index: AQHbT8CJDHJdmmLYMEK7QTSppKo4QbLo5lIAgAAC8ICAAAQUgA==
Date: Mon, 16 Dec 2024 14:30:29 +0000
Message-ID: <MW4PR09MB1005966E48D47DC9AFC7D71ECF33B2@MW4PR09MB10059.namprd09.prod.outlook.com>
References: <LV8PR21MB4158CEABE28A5068931F32788C3F2@LV8PR21MB4158.namprd21.prod.outlook.com> <F215DE9E-D11B-47BC-A3AB-14CA38481ADF@huitema.net> <50935d5a-3072-4db5-ab38-244b2d97cfeb@redhat.com> <CH0PR11MB5444194BDB61738FA5219E2EC13B2@CH0PR11MB5444.namprd11.prod.outlook.com> <CAL02cgSJ29p57tAvgnOiisZbaCGL-e8ng8mq0XfcMqy5VPOSEg@mail.gmail.com>
In-Reply-To: <CAL02cgSJ29p57tAvgnOiisZbaCGL-e8ng8mq0XfcMqy5VPOSEg@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=nist.gov;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: MW4PR09MB10059:EE_|DS0PR09MB10455:EE_
x-ms-office365-filtering-correlation-id: e3995617-196a-4845-b4f0-08dd1dde3091
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230040|4022899009|1800799024|366016|8096899003|7053199007|38070700018;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MW4PR09MB10059.namprd09.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(4022899009)(1800799024)(366016)(8096899003)(7053199007)(38070700018);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_MW4PR09MB1005966E48D47DC9AFC7D71ECF33B2MW4PR09MB10059na_"
MIME-Version: 1.0
X-OriginatorOrg: nist.gov
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MW4PR09MB10059.namprd09.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: e3995617-196a-4845-b4f0-08dd1dde3091
X-MS-Exchange-CrossTenant-originalarrivaltime: 16 Dec 2024 14:30:29.1105 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 2ab5d82f-d8fa-4797-a93e-054655c61dec
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS0PR09MB10455
Message-ID-Hash: YGRSD5JDOAFNGT3DKZKD3X33CQ4JQ23X
X-Message-ID-Hash: YGRSD5JDOAFNGT3DKZKD3X33CQ4JQ23X
X-MailFrom: quynh.dang@nist.gov
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tls.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Andrei Popov <Andrei.Popov=40microsoft.com@dmarc.ietf.org>, IETF TLS <tls@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [TLS] Re: [EXTERNAL] Disallowing reuse of ephemeral keys
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/JipiyhwDXcB8pMdjjIVAyZaWL9w>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Owner: <mailto:tls-owner@ietf.org>
List-Post: <mailto:tls@ietf.org>
List-Subscribe: <mailto:tls-join@ietf.org>
List-Unsubscribe: <mailto:tls-leave@ietf.org>

KeyGen is very cheap (generally). So, for many use cases, it seems it does not make sense to keep a private key around for later uses.

In very constrained environments, if the goal is to save computation as much as possible, some users could decide to reuse keys.

Regards,
Quynh.

From: Richard Barnes <rlb@ipv.sx>
Sent: Monday, December 16, 2024 9:11 AM
To: Scott Fluhrer (sfluhrer) <sfluhrer=40cisco.com@dmarc.ietf.org>
Cc: Andrei Popov <Andrei.Popov=40microsoft.com@dmarc.ietf.org>; IETF TLS <tls@ietf.org>
Subject: [TLS] Re: [EXTERNAL] Disallowing reuse of ephemeral keys

You’re technically correct, but if you look at how TLS stacks work in practice, the amount of state they keep across connections is tiny, basically just what is needed to support resumption, if that. So tracking which public keys have been seen would be a big lift.

On the other hand, if a couple of widespread clients started enforcing uniqueness, it could be enough to make the ecosystem inimical to reuse.

On the third hand, enforcing means failing connections that would otherwise work, so you would need a substantial security benefit to get a critical mass to enforce.  Which I’m not sure is there.

—Richard



On Mon, Dec 16, 2024 at 09:03 Scott Fluhrer (sfluhrer) <sfluhrer=40cisco.com@dmarc.ietf.org<mailto:40cisco.com@dmarc.ietf.org>> wrote:
Might I remind people the ML-KEM public key reuse is detectable?

The ML-KEM public key is in the client hello, which is either in the clear, or (in the case of ECH) is readable by the server.  Hence, if the same ML-KEM is reused, then (in the worse case) the server can detect that.

And, if it is externally visible, I believe that the TLS WG can forbid it.  Whether it should or not is what we are debating, but I believe the debate can't be closed on that basis.

Has anyone considered the open questions I gave a few days ago?

> -----Original Message-----
> From: Alicja Kario <hkario@redhat.com<mailto:hkario@redhat.com>>
> Sent: Monday, December 16, 2024 8:42 AM
> To: Christian Huitema <huitema@huitema.net<mailto:huitema@huitema.net>>
> Cc: Andrei Popov <Andrei.Popov=40microsoft.com@dmarc.ietf.org<mailto:40microsoft.com@dmarc.ietf.org>>; IETF TLS
> <tls@ietf.org<mailto:tls@ietf.org>>
> Subject: [TLS] Re: [EXTERNAL] Disallowing reuse of ephemeral keys
>
> No, the specification definitely can, and should, specify behaviours that are
> unenforcable.
>
> When there are preferred or recommended ways of doing something, we
> should absolutely put that in writing.
>
> On Thursday, 12 December 2024 21:07:03 CET, Christian Huitema wrote:
> > I like keeping as they are. Disallowing only makes sense if that
> > prohibition can be enforced, and one of the peer refuses the
> > connection if it detects key reuse. Would we want to do that? And,
> > even if we wanted to accept the cost of refusing connections, could
> > individual nodes actually detect reuse by a peer?
> >
> > -- Christian Huitema
> >
> > On Dec 12, 2024, at 10:11 AM, Andrei Popov
> > <Andrei.Popov=40microsoft.com@dmarc.ietf.org<mailto:40microsoft.com@dmarc.ietf.org>> wrote:
> >
> >
> > +1 in favor of option1.
> >
> > Cheers,
> >
> > Andrei
> >
> > From: Russ Housley <housley@vigilsec.com<mailto:housley@vigilsec.com>>
> > Sent: Thursday, December 12, 2024 9:43 AM
> > To: Joe Salowey <joe@salowey.net<mailto:joe@salowey.net>>
> > Cc: IETF TLS <tls@ietf.org<mailto:tls@ietf.org>>
> > Subject: [EXTERNAL] [TLS] Re: Disallowing reuse of ephemeral keys
> >
> > I prefer option 1.
> >
> > Russ
> >
> >
> > On Dec 12, 2024, at 12:35 PM, Joseph Salowey <joe@salowey.net<mailto:joe@salowey.net>> wrote:
> >
> > Currently RFC 8446 (and RFC8446bis) do not forbid the reuse of
> > ephemeral keys.  This was the consensus of the working group during
> > the development of TLS 1.3.  There has been more recent discussion on
> > the list to forbid reuse for ML-KEM/hybrid key exchange.  There are
> > several possible options here:
> >
> > Keep things as they are (ie. say nothing, as was done in previous TLS
> > versions, to forbid the reuse of ephemeral keys) - this is the default
> > action if there is no consensus Disallow reuse for specific
> > ciphersuites.  It doesn’t appear that there is any real difference in
> > this matter between MLKEM/hybrids and ECDH here except that there are
> > many more ECDH implementations (some of which may reuse a keyshare)
> > Update 8446 to disallow reuse of ephemeral keyshares in general.  This
> > could be done by revising RFC 8446bis or with a separate document that
> > updates RFC 8446/bis
> >
> > We would like to know if there are folks who think the reuse of
> > keyshares is important for HTTP or non-HTTP use cases.
> >
> >
> > Thanks,
> >
> >
> > Joe, Deirdre and Sean
> >
>
> --
> Regards,
> Alicja (nee Hubert) Kario
> Principal Quality Engineer, RHEL Crypto team
> Web: www.cz.redhat.com<http://www.cz.redhat.com/>
> Red Hat Czech s.r.o., Purkyňova 115, 612 00, Brno, Czech Republic
>
> _______________________________________________
> TLS mailing list -- tls@ietf.org<mailto:tls@ietf.org>
> To unsubscribe send an email to tls-leave@ietf.org<mailto:tls-leave@ietf.org>
_______________________________________________
TLS mailing list -- tls@ietf.org<mailto:tls@ietf.org>
To unsubscribe send an email to tls-leave@ietf.org<mailto:tls-leave@ietf.org>