Re: [TLS] Selfie attack

Mohit Sethi M <mohit.m.sethi@ericsson.com> Fri, 11 October 2019 12:36 UTC

Return-Path: <mohit.m.sethi@ericsson.com>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8BED9120071 for <tls@ietfa.amsl.com>; Fri, 11 Oct 2019 05:36:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level:
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mVN3n4xhtAFP for <tls@ietfa.amsl.com>; Fri, 11 Oct 2019 05:36:53 -0700 (PDT)
Received: from EUR03-VE1-obe.outbound.protection.outlook.com (mail-eopbgr50074.outbound.protection.outlook.com [40.107.5.74]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 48C87120088 for <tls@ietf.org>; Fri, 11 Oct 2019 05:36:51 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=aVK1X4rm0MaMr/7UOME6VpGpLw+mG3prDTRdNhvp+hbryBRvWb5B2nd1gqYgwBRmFDRQL/8BeCie/9tdwYJJhktbp+5TU+AvXcPfSkqPwZNpZOPdtj0rEqmasA0545EtM9tHiedufgmGdl9Oqs+RE8rACasHBHetcME3q85IMLcjEMhOeFCaY9QHaTwplc5ImKhYTcXdnSeLdM39Pr7/wUvqCJ7YmPgp3ms7f5Jyj1jHIEMf/f4Brq+pUMLdYaqs8WZJzamjJfU7nXqp9BuDgTm96L88TrYeCiUaxxPM6lC/1VAfKlX4UtCdXoku7Rm8YnBx991rlfTKbreMen4PKQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=mn7MCTNUq9RK3M/WGEgzSkldMK+TKY5s95P4XTZnbGQ=; b=mOz+4sc8e4FagUamYpBXRUETvoOB2Eg+1kW7hsrvSG54iInbPyUjRawBKuVz1tMuxOuNi/sBUFsWy0dQ9/sJlDmaAii6rUYM8Y4HifVAvoO/X2bfHtTYY/RoqVZDnK0whWgUPJpJFIfgTwz5R4r28aeVSTYklM7KrHNY9HHl16fdxikOI1FfDVtGC9FOxUhHYWXwW9NLVPz3m+qFdy07ohy9rdQkmy7fNCREF4lf3VFbBtIeKo3lZzM2JKTQzhYPwfclQv6DhsFGnYcB60qThGduAcxwkLxzoBfYyttK8NL+8WMszBujKAcFwdl0/W3RFaWs++MNTkyeAJtg5+bZ8g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=mn7MCTNUq9RK3M/WGEgzSkldMK+TKY5s95P4XTZnbGQ=; b=AihLIZc9KRN2L85SBzP8ryT2XOVhi3Tpa06Zy7R4OtLC1mv9E+5lZrrCWItPEXJVMzIMoCbE2d6LK9RUr1kkybbL1STUO5dQUuk6x6BSGXVUdHVmIPx+nsWi9XTpUHQEswUlWpAGakqQBxcgaz5mJtp44Yz68S4cOK9zufVmUu8=
Received: from HE1PR0701MB2905.eurprd07.prod.outlook.com (10.168.98.146) by HE1PR0701MB2892.eurprd07.prod.outlook.com (10.168.94.142) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2347.13; Fri, 11 Oct 2019 12:36:47 +0000
Received: from HE1PR0701MB2905.eurprd07.prod.outlook.com ([fe80::f073:9f5c:2438:ea1f]) by HE1PR0701MB2905.eurprd07.prod.outlook.com ([fe80::f073:9f5c:2438:ea1f%6]) with mapi id 15.20.2347.016; Fri, 11 Oct 2019 12:36:47 +0000
From: Mohit Sethi M <mohit.m.sethi@ericsson.com>
To: John Mattsson <john.mattsson=40ericsson.com@dmarc.ietf.org>, Mohit Sethi M <mohit.m.sethi=40ericsson.com@dmarc.ietf.org>, Christian Huitema <huitema@huitema.net>, Christopher Wood <caw@heapingbits.net>, Mohit Sethi M <mohit.m.sethi@ericsson.com>, "TLS@ietf.org" <tls@ietf.org>
Thread-Topic: [TLS] Selfie attack
Thread-Index: AQHVfb6JZ9ydCGu6h0WNgLEAne6JU6dQ9FwAgAAizgCAAAS3gIAD9nmAgABTPwA=
Date: Fri, 11 Oct 2019 12:36:47 +0000
Message-ID: <83d858da-e180-029b-e6a1-58778948f811@ericsson.com>
References: <CY4PR1101MB227834A5DF828F000C6D1144DB890@CY4PR1101MB2278.namprd11.prod.outlook.com> <CACykbs2qp0EDa3pGfFpQY6rgruJD1f-6mZ_B5KF8kBkrXD9caw@mail.gmail.com> <CY4PR1101MB227871FEF520A88CF65BADF6DB890@CY4PR1101MB2278.namprd11.prod.outlook.com> <964aab95-1a42-df82-e8e4-cf7ee15ba0f8@ericsson.com> <AE2F1D6C-39AD-4C2F-BE03-FA2F189BBF4B@live.warwick.ac.uk> <896F89B2-37D0-4674-881D-FB9FE4874978@ericsson.com> <FE583332-1915-4B5A-AAAB-AD854CF336B8@live.warwick.ac.uk> <bb410c2a-6836-48a8-ac3d-de395f4c57d8@www.fastmail.com> <a0c560b0-8bca-d843-dac8-57c90c0488de@ericsson.com> <90ddc116-f5d9-4b22-8b80-e31835e09f10@www.fastmail.com> <a70e420c-eeab-b446-57a8-a496a0541f89@huitema.net> <28313e8d-48d1-723e-9548-1e9fb3718491@ericsson.com> <C5ACF4AE-E2C9-41B3-BBF2-0122D35662DF@ericsson.com>
In-Reply-To: <C5ACF4AE-E2C9-41B3-BBF2-0122D35662DF@ericsson.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0
authentication-results: spf=none (sender IP is ) smtp.mailfrom=mohit.m.sethi@ericsson.com;
x-originating-ip: [82.203.244.107]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 62abf312-2448-49bd-698a-08d74e47ae76
x-ms-traffictypediagnostic: HE1PR0701MB2892:|HE1PR0701MB2892:
x-ms-exchange-purlcount: 1
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <HE1PR0701MB2892BFEB2262A9393866CE41D0970@HE1PR0701MB2892.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:7219;
x-forefront-prvs: 0187F3EA14
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(366004)(136003)(39860400002)(376002)(396003)(346002)(199004)(189003)(186003)(71190400001)(76116006)(6306002)(6246003)(66946007)(66476007)(66446008)(66556008)(64756008)(236005)(110136005)(6512007)(606006)(478600001)(71200400001)(6506007)(2501003)(53546011)(14454004)(54896002)(966005)(99286004)(102836004)(76176011)(26005)(6486002)(316002)(8676002)(31686004)(6436002)(58126008)(5660300002)(86362001)(7736002)(6116002)(790700001)(31696002)(81166006)(8936002)(14444005)(256004)(2906002)(3846002)(11346002)(446003)(2616005)(476003)(25786009)(486006)(229853002)(65806001)(65956001)(36756003)(66066001)(81156014); DIR:OUT; SFP:1101; SCL:1; SRVR:HE1PR0701MB2892; H:HE1PR0701MB2905.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: UgumRBB1DfJdrUfK0PVDRa8C9k8J4iIeQswexLLhTyBpbsz1CPWbMdBhb7iofdnSi/9eFwOBl85Z/FTLRcpQMPGQkzdKeCowAKe/AKthKTzv75Ct4xN/Qd2pBQT4ZLj/4SpVRLsLwnFjyAv6DI9vFGTFvKI1bHeBkl/pgg8qrn60/55J943Z12P0RV5cfwtkcVWjBFl/VOiTBcUGlAewAlqQvzaZpGrrmHy13PwQiUOKrZypHEmCNPv8Jm49RSsSFObCPWPBXq9YapZFNSINUL4aqtuwnIEToEGhEj8M3LBUvOUfrDM0mXUsn53Kp8/NLwVplP+EsKJvQs98J/0hDUC5oXkcTzOd/ZWbMIZgt9qjPPjUb0f2utId7LinqK8L4931q6RSlvXKC3se3v4LyaJKOCsKBtrwbLub4g4+iqfPQi+SuCHzdSCZCt/U/eHq4GXAqhQlSkNyg4ME1cB8gg==
Content-Type: multipart/alternative; boundary="_000_83d858dae180029be6a158778948f811ericssoncom_"
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 62abf312-2448-49bd-698a-08d74e47ae76
X-MS-Exchange-CrossTenant-originalarrivaltime: 11 Oct 2019 12:36:47.0635 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: /V1ctAe56yzvnR3iN6YAcdqGbc/zdeXezuuaxPywJw0m+inbI/CGhAfVOSB3pWlmfWN+rDzBOCNGJ0qv7a95ojznaLtiVuqUviSrNUQkt6A=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0701MB2892
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/mzIWJV8Vgz5npAYQNdN5UodloYM>
Subject: Re: [TLS] Selfie attack
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Oct 2019 12:36:56 -0000

Hi John,

I hope you also check the text for addressing Selfie attacks in the pull request I created Chris. Some more comments below.

--Mohit

On 10/11/19 10:38 AM, John Mattsson wrote:

Thanks Mohit,



Re-reading the Selfie paper I see that the authors define Client Alice and Server Alice as different members of the group. That makes things clearer. I think there are three cases:



  1.  Use cases where only Client Alice and Server Bob shares the PSK are not vulnerable to the Selfie attack.



  1.  Cases where Alice, Bob, and Caesar share an external PSK seem like misconfiguration, I assume TLS 1.3 just forgot to explicitly forbid them.



  1.  The interesting use case if where Client Alice, Server Alice, Client Bob, and Server Bob shares a PSK. That is a very valid use case and one that is currently deployed in several systems.



To do as the Selfie authors suggest “A PSK MUST NOT be shared between more than one client and one server” seems way too drastic as is forbids 3 above. For 3 I think the Selfie attack can be very easily mitigated by forcing clients to check incoming ServerHello.random.



I think something like the following updates for RFC 8446 would be enough:



“A PSK MUST NOT be shared between more than two endpoints”

What is a bug for you maybe is a feature for someone else. I wish we could put the requirement you suggest but there are several people who use PSKs that are shared by more than two nodes.




“An endpoint receiving a ClientHello with PSK authentication MUST check that the ClientHello.random is not equal to a ClientHello.random that the endpoint previously sent and has not received a ServerHello.”

This is one possible solution. In effect you are using the CleintHello.random and ServerHello.random as endpoint identifiers. However, it seems cleaner to not re-use random nonces from the cryptographic protocols as identifiers.



Cheers,

John

From: TLS <tls-bounces@ietf.org><mailto:tls-bounces@ietf.org> on behalf of Mohit Sethi M <mohit.m.sethi=40ericsson.com@dmarc.ietf.org><mailto:mohit.m.sethi=40ericsson.com@dmarc.ietf.org>
Date: Tuesday, 8 October 2019 at 21:08
To: Christian Huitema <huitema@huitema.net><mailto:huitema@huitema.net>, Christopher Wood <caw@heapingbits.net><mailto:caw@heapingbits.net>, Mohit Sethi M <mohit.m.sethi@ericsson.com><mailto:mohit.m.sethi@ericsson.com>, "TLS@ietf.org"<mailto:TLS@ietf.org> <tls@ietf.org><mailto:tls@ietf.org>
Subject: Re: [TLS] Selfie attack


Hi Christian,

It was my poor attempt at explaining the attack. The attack can happen as long as a node sends outbound connections (as a TLS client) and accepts inbound connections (as a TLS server) with the same external PSK and identity. This is likely to happen in some form of group communication but not necessarily.

In such a scenario, a malicious node Eve can fool Alice to open a connection to herself (hence the name Selfie).

Admittedly, UKS/misbinding/selfie are somewhat hard to comprehend sometimes (at least for me).

--Mohit
On 10/8/19 9:51 PM, Christian Huitema wrote:

On 10/8/2019 9:46 AM, Christopher Wood wrote:

On Tue, Oct 8, 2019, at 2:55 AM, Mohit Sethi M wrote:



Hi Chris,



For the benefit of the list, let me summarize that the selfie attack is

only relevant where multiple parties share the same PSK and use the

same PSK for outgoing and incoming connections. These situations are

rather rare, but I accept that TLS is widely used (and sometimes

misused) in many places.



I may be getting old but the way Mohit writes it, it seems that the attack happens when the security of a group relies on a secret shared by all members of the group, and can then be compromised when one of the group members misbehaves. How is that a new threat? If groups are defined by a shared secret, then corruption of a group member reveals that shared secret to the attacker and open the path for all kinds of exploitation. In what sense is the "selfie" attack different from that generic threat?

-- Christian Huitema



_______________________________________________

TLS mailing list

TLS@ietf.org<mailto:TLS@ietf.org>

https://www.ietf.org/mailman/listinfo/tls



_______________________________________________
TLS mailing list
TLS@ietf.org<mailto:TLS@ietf.org>
https://www.ietf.org/mailman/listinfo/tls