[Cryptography] ETSI releases standards for enterprise security and data centre management Crypto
Dear All, JFYI. Via Feisti Duck nerwsletter. https://www.etsi.org/news-events/news/1358-2018-11-press-etsi-releases-standards-for-enterprise-security-and-data-centre-management The eTLS key exchange shall use exactly the same messages and procedures to establish a set of session keys as a TLS 1.3 ephemeral Diffie-Hellman key exchange, except for two differences [2]. 1) the server shall use a static public/private key pair at Step 2 in clause 4.3.1; and 2) the server's certificate at Step 5 shall contain visibility information as defined in clause 4.3.3 to indicate to the client that eTLS is in use. NOTE: Neither the static public key nor the visibility information affects the operation of a TLS 1.3 compliant client, so an eTLS server is therefore fully interoperable with TLS 1.3 compliant clients. -- SY, Dmitry Belyavsky _______________________________________________ The cryptography mailing list cryptography@metzdowd.com http://www.metzdowd.com/mailman/listinfo/cryptography
On Sat, Dec 1, 2018 at 6:59 PM Tony Arcieri <bascule@gmail.com> wrote: > This does not seem to address a problem which was brought up when the > similar draft-green-tls-static-dh-in-tls13-00 was discussed, namely any > system in possession of one of the non-ephemeral-ECDHE private keys, > ostensibly for the purposes of passive traffic decryption, can arbitrarily > resume decrypted sessions and therefore impersonate any observed clients. > > I'm not a fan of systems like this, but I believe for security reasons > they should be designed in such a way that only the confidentiality of > traffic is impacted, and a "visibility" system isn't able to leverage the > decrypted traffic to resume decrypted sessions and thereby impersonate > clients. > I do not understand why the ETSI solution does not provide ability to impersonate clients/servers. -- SY, Dmitry Belyavsky _______________________________________________ The cryptography mailing list cryptography@metzdowd.com http://www.metzdowd.com/mailman/listinfo/cryptography
On Sat, Dec 01, 2018 at 07:59:45AM -0800, Tony Arcieri wrote: > This does not seem to address a problem which was brought up when the > similar draft-green-tls-static-dh-in-tls13-00 was discussed, namely any > system in possession of one of the non-ephemeral-ECDHE private keys, > ostensibly for the purposes of passive traffic decryption, can arbitrarily > resume decrypted sessions and therefore impersonate any observed clients. > > I'm not a fan of systems like this, but I believe for security reasons they > should be designed in such a way that only the confidentiality of traffic > is impacted, and a "visibility" system isn't able to leverage the decrypted > traffic to resume decrypted sessions and thereby impersonate clients. Any key escrow system will have this property. Given the session keys (or a way to recover them) you can resume decrypted sessions. If I had to I would build a corporate TLS 1.3 session key escrow system as follows: - use a keyed PRF/PRNG to generate the ephemeral DH keys, with two inputs, a secret key shared with the escrow third party, and a number generated randomly: edh_key = DH_key_gen(seed = PRF+(escrowed_key, r = getrandom())); - log to the escrow third party {connection ID, random} for each connection (the connection ID can be a handshake transcript hash). (it's even safe to log the random number r in the clear, as it alone is insufficient for recovering session keys) This would preserve all the properties of TLS 1.3 and would work for any other version of TLS with EDH too, and also for any other protocols that use ephemeral key agreement (SSHv2, IKE, ...). It's more work to integrate this than to use RSA key transport with escrowed RSA key orchestration, but it's one-time work (do it for about six or so open source implementations and you've got 90+% coverage). I'm sure upstreams would accept this sort of contribution as it is better for everyone outside corporate environments if we can just stop the pressure to go back to RSA key transport. It's also better for corporate environments, as insiders are the largest threat there, so forward security is still a plus even in corporate environments. Nico -- _______________________________________________ The cryptography mailing list cryptography@metzdowd.com http://www.metzdowd.com/mailman/listinfo/cryptography
On Tue, Dec 04, 2018 at 05:39:30PM +0100, Jonathan Hoyland wrote: > Isn't there a lower bar at the IETF for defining new cipher suites, as long > as you're not seeking a "recommended" setting? Yes, but then you have to get interoperability using them, which means patching clients and servers. You can't 100% escrow this way. Nico -- _______________________________________________ The cryptography mailing list cryptography@metzdowd.com http://www.metzdowd.com/mailman/listinfo/cryptography
(I removed TLS from the list) > Isn't there a lower bar at the IETF for defining new cipher suites, as long as you're not seeking a "recommended" setting?  Yes. You have to have a document that the three appointed “TLS Experts” can read. The current list is Yoav Nir, Nick Sullivan, and I. > It seems like with an out-of-band escrow agent, the traffic secrets could be escrowed with no changes to TLS. Yes, but this would not meet the only-semi-stated goal of not requiring expensive changes to the monitoring and security infrastructure already deployed. /r$ _______________________________________________ The cryptography mailing list cryptography@metzdowd.com http://www.metzdowd.com/mailman/listinfo/cryptography
89.2 MB 3,873 messages
Last sync: 15 July 2019 22:44

Move Messages

Save

Apply Labels


Warning: Unknown: write failed: No space left on device (28) in Unknown on line 0

Warning: Unknown: Failed to write session data (files). Please verify that the current setting of session.save_path is correct (/var/lib/php/sessions) in Unknown on line 0