Re: [Unbearable] I-D Action: draft-ietf-tokbind-tls13-0rtt-02.txt

Nick Harper <nharper@google.com> Tue, 11 July 2017 21:53 UTC

Return-Path: <nharper@google.com>
X-Original-To: unbearable@ietfa.amsl.com
Delivered-To: unbearable@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CC3361317DF for <unbearable@ietfa.amsl.com>; Tue, 11 Jul 2017 14:53:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.702
X-Spam-Level:
X-Spam-Status: No, score=-2.702 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bxzlr0TqiY2v for <unbearable@ietfa.amsl.com>; Tue, 11 Jul 2017 14:53:48 -0700 (PDT)
Received: from mail-lf0-x231.google.com (mail-lf0-x231.google.com [IPv6:2a00:1450:4010:c07::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1824E1270B4 for <unbearable@ietf.org>; Tue, 11 Jul 2017 14:53:48 -0700 (PDT)
Received: by mail-lf0-x231.google.com with SMTP id z78so3135490lff.0 for <unbearable@ietf.org>; Tue, 11 Jul 2017 14:53:47 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=/mk4PDqEIxlG5yfl2UIM2EdHSzrfdqJ5EIdHuXH0CXQ=; b=QpR2SmaRZnzwq2QvTQ9Zp48Z/BlEJPv+vQoL226UmbofT1AjpNguyBb2cA0PLtCwY3 9LzBcbURGpU2UMFk8g8NuPBiGSvfja7kdAocJ06xIDnPa8KmXLfNJaWL0t4yHXWsn3ku DByNC9K6vjrDpddKy+8KSYCG/YJqoVHXCcpC23FJpu7qHfWnPRDAeDB88KlVuPoKi6oc V80mSqK2k6ukg61A0UWKVunPJvIXFSz3cO3qFyH5J7esMSAZ98knZ3JnmTkKPp5L2eT6 jFEmBVWnxtvkzd4L60eI1We4zWl7bcCPFNGWtbbsvEmwUjEmjcuSB5T/UrQ545U7YtSB riiA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=/mk4PDqEIxlG5yfl2UIM2EdHSzrfdqJ5EIdHuXH0CXQ=; b=g30X0hVkLpMC2hWaQ4tWmnrUiUbW/8fyT9O0qYKpCyVjt0YkTrTgEs/4qfj39fYrSt pZ09DteHpp5Vub8/wnl1s6zxZR0wP6/0VbOkXRUv/rGJv6vcqFN+ljhO6SJyya5fkB5m TaHfxSs4SU8l0YtiXXDjCwRPkYcPySHhzoFVoGyM+JPYOwHWnAjl6/4fpGwsXUAm9JDc 4LkBRNOVrXolv7x4jjGjZ1mWCzMO+OSrFDkdfFUuZH6cuJvYCXoPD59V1iQlkUBIcES9 tkYIGD1IwQU0J4YOXqsYJN8bKvfA0bTKFvmNFwiNg7r2Zt7/GPLmjU2dmpEhGS6FswpR JKuA==
X-Gm-Message-State: AIVw111mDs6H+enCcVZ4G27rw0rvPEEuBONOCXkBnFak9bGm+VSfcCWO h6JnTKZH46CCApjgZ1l1bN+nBb8bMOTkPmMIwQ==
X-Received: by 10.25.161.77 with SMTP id k74mr538957lfe.97.1499810026126; Tue, 11 Jul 2017 14:53:46 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.25.44.73 with HTTP; Tue, 11 Jul 2017 14:53:25 -0700 (PDT)
In-Reply-To: <20170701165317.GT68391@kduck.kaduk.org>
References: <149868793805.5443.4284920405751222901@ietfa.amsl.com> <CACdeXiLqmdVpQryrPOBnUrbrk24Vap7QrASK-_vnwH91vwkZ3A@mail.gmail.com> <20170629024818.GI68391@kduck.kaduk.org> <9057a735-a907-d06c-327b-a959e4f554f0@sunet.se> <CACdeXiKOGptZ2WSZ_nVo-LmS5W0kqUszx_BpOcOWnfV05KO7mQ@mail.gmail.com> <97A1224B-5B6C-41EC-9FE0-CA0DE53746E1@ve7jtb.com> <DM2PR21MB009122B46F7497493AFF953C8CD20@DM2PR21MB0091.namprd21.prod.outlook.com> <20170701165317.GT68391@kduck.kaduk.org>
From: Nick Harper <nharper@google.com>
Date: Tue, 11 Jul 2017 14:53:25 -0700
Message-ID: <CACdeXiKnkK48_sv3yzCcxmWsKRgX4ehdERvK0TMsFmGkuXUEmg@mail.gmail.com>
To: Benjamin Kaduk <kaduk@mit.edu>
Cc: John Bradley <ve7jtb@ve7jtb.com>, IETF Tokbind WG <unbearable@ietf.org>, Leif Johansson <leifj@sunet.se>, "tokbind-chairs@ietf.org" <tokbind-chairs@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/unbearable/5dyu74sHXpot4gC16JRISKf3OJQ>
Subject: Re: [Unbearable] I-D Action: draft-ietf-tokbind-tls13-0rtt-02.txt
X-BeenThere: unbearable@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "\"This list is for discussion of proposals for doing better than bearer tokens \(e.g. HTTP cookies, OAuth tokens etc.\) for web applications. The specific goal is chartering a WG focused on preventing security token export and replay attacks.\"" <unbearable.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/unbearable>, <mailto:unbearable-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/unbearable/>
List-Post: <mailto:unbearable@ietf.org>
List-Help: <mailto:unbearable-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/unbearable>, <mailto:unbearable-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 11 Jul 2017 21:53:51 -0000

On Sat, Jul 1, 2017 at 9:53 AM, Benjamin Kaduk <kaduk@mit.edu> wrote:
> Hi Nick,
>
> On Thu, Jun 29, 2017 at 08:16:33PM +0000, Andrei Popov wrote:
>> There is often a tradeoff between security and performance; some servers may choose 0-RTT based on their business requirements, and others may choose TB. I do not think that it is necessary to reconcile TB and 0-RTT (although it would have been awesome if we could). From my perspective, it is more important to keep TB secure than to make it work with 0-RTT: replayable TB would be a waste of CPU cycles.
>
> I agree with Andrei that there is a tradeoff and keeping TB secure is important.

I agree that there are trade-offs to be made between security and
performance, and I agree that some clients and servers when choosing
to do Token Binding will want it to be as secure as possible. I'm a
little confused by what you mean when you say "keeping TB secure is
important". 0-RTT TB does not change the security properties of the
existing TB in TBNEGO/TBPROTO.
>
> For a long time I have been generally opposed to 0-RTT TB at a gut level,
> but I may have recently gained an intuition for how to articulate my
> concerns in a more concrete fashion.  That is, as a server, I am interested
> in TB providing binding to the channel between the client and myself.
> But, since 0-RTT does not include any server contributions, in some sense
> 0-RTT TB is only binding to "half of the channel" (the client's contribution),
> and even though it is/ends up being bound to my (as the server) connection
> to the client, the same octets on the wire could also end up being bound
> to a different connection emanating from the client.  So I as a server
> have a weaker security guarantee, and I would prefer to retain the stronger
> security property.
>
> -Ben

There is a server contribution to the exporter value signed in 0-RTT
TB - the server contribution is the PSK from the NewSessionTicket
issued on the original connection. 0-RTT TB is just like using client
certificates with TLS resumption: with client certificates there is
only a signature on the original connection, and the client auth state
is carried over from the previous connection on resumption. With 0-RTT
TB, there is a signature on both the original and resumed connection,
but this signature just proves that the private key was used at the
beginning of the original connection (since the resumed connection's
signature could hypothetically be computed then as well). In both
cases - client certs and 0-RTT TB - we have proof of possession of the
private key at the beginning of the original connection, but not at
the beginning of the resumed connection. I think having comparable
security to client certificates is a decent bar that 0-RTT TB meets.

I know that 1-RTT TB meets a higher security bar, and I don't expect
to convince those wanting to trade performance for this additional
security that they should implement 0-RTT TB. I'm trying to make the
case that 0-RTT TB is not a waste of resources and that it provides a
decent level of security for those wishing to use it.