Hi!


I understand your main concern to be that you prefer to see a solution adding 
PFS that is also secure against a PQ attacker and that does not increase the 
bandwidth consumption too much doing it.



I believe there are benefits of adding a mechanism for PFS for EAP-AKA’ even if 
a potential future PQ attacker may break the PFS part. As discussed in section 
7.5, the PFS property is added on top of EAP-AKA’. An independent DH-exchange 
is mixed-in with the symmetric-key AKA key establishment, so intuitively, the 
result is no less secure than the current protocols (even against a PQ 
attacker).



Let’s consider the risks.

- If we do nothing, we will surely not get PFS.

- If we add PFS based on a DH-exchange, we won’t get PFS against attackers with 
PQ capabilities (which may or may not materialize, and which may or may not be 
very costly to obtain).

- If we wait with introducing PFS until we have mechanism that has small 
bandwidth consumption and resists PQ attackers a lot of data will be without 
PFS protection against non-PQ attackers.



Introducing a DH-based PFS mechanism now will not mitigate all those risks, 
that is true, but it allows parties to make trade-offs that suite their risk 
appetite.

For example:

- An operator who does not have the bandwidth to spare can opt to use EAP-AKA’ 
or native AKA.

- An operator may choose to deploy EAP-AKA’ or native AKA for some devices, and 
EAP-AKA’-FS for others, depending on device or subscription type.



The operator would have to assess the risk of PQ attackers to become a concern, 
and weigh that against the risk of other attacks on the long-term key as well 
as the consumed bandwidth.

My point is that at least there would be a choice until we come up with a more 
bandwidth-efficient and PQ-attacker resistant mechanism.



BR Karl



From: Meiling Chen <chenmeil...@chinamobile.com>
Sent: Monday, 27 February 2023 04:02
To: Karl Norrman <karl.norr...@ericsson.com>; Jari Arkko 
<jari.ar...@ericsson.com>; Vesa Torvinen <vesa.torvi...@ericsson.com>; John 
Mattsson <john.matts...@ericsson.com>
Cc: emu <emu@ietf.org>
Subject: Re: RE: [Emu] I-D Action: draft-ietf-emu-aka-pfs-10.txt



Hi,

I don't agree with you mix SUCI and D-H here, It has to be clear that SUCI is 
only done at the initial stage, However,  authentication happens frequently, 
the network has the authority to initiate authentication, that means D-H Much 
Higher frequency.



The most important issues to be discussed and solved in PFS are also our most 
important concerns, How to solve PQC problems that we have to take into 
consideration from 5G , Increase of at least 1000 bytes, How to solve this 
problem.





Best,

Meiling



   From: Karl Norrman<mailto:karl.norr...@ericsson.com>

   Date: 2023-02-13 17:21

   To: chenmeil...@chinamobile.com<mailto:chenmeil...@chinamobile.com>; Jari 
Arkko<mailto:jari.ar...@ericsson.com>; Vesa 
Torvinen<mailto:vesa.torvi...@ericsson.com>; John 
Mattsson<mailto:john.matts...@ericsson.com>

   Subject: RE: RE: [Emu] I-D Action: draft-ietf-emu-aka-pfs-10.txt

   Hi!



   Please see inline.



   From: Meiling Chen 
<chenmeil...@chinamobile.com<mailto:chenmeil...@chinamobile.com>>
   Sent: Monday, 13 February 2023 02:31
   To: Karl Norrman 
<karl.norr...@ericsson.com<mailto:karl.norr...@ericsson.com>>; Jari Arkko 
<jari.ar...@ericsson.com<mailto:jari.ar...@ericsson.com>>; Vesa Torvinen 
<vesa.torvi...@ericsson.com<mailto:vesa.torvi...@ericsson.com>>; John Mattsson 
<john.matts...@ericsson.com<mailto:john.matts...@ericsson.com>>
   Subject: Re: RE: [Emu] I-D Action: draft-ietf-emu-aka-pfs-10.txt



   Hi all,

   Thanks John open an issue, but I'm Meiling Chen not Meiling Cheng.

   for Karl's reply please see inline.





      From: Karl Norrman<mailto:karl.norr...@ericsson.com>

      Date: 2023-02-09 17:02

      To: chenmeil...@chinamobile.com<mailto:chenmeil...@chinamobile.com>; Jari 
Arkko<mailto:jari.ar...@ericsson.com>; Vesa 
Torvinen<mailto:vesa.torvi...@ericsson.com>; John 
Mattsson<mailto:john.matts...@ericsson.com>

      Subject: RE: Re: [Emu] I-D Action: draft-ietf-emu-aka-pfs-10.txt

      Hi!



      First, John opened an issue with your comments to the EMU mailing list: 
Comments by Meiling Cheng · Issue #43 · emu-wg/eap-aka-pfs · 
GitHub<https://protect2.fireeye.com/v1/url?k=31323334-501d5122-313273af-454445555731-ae0508f79ec1f0e0&q=1&e=818bdd26-f413-411e-80ae-b13b3f6d4c4c&u=https%3A%2F%2Fgithub.com%2Femu-wg%2Feap-aka-pfs%2Fissues%2F43>.

      I have replied to some of your questions there as well.



      Please see inline.





      From: Meiling Chen 
<chenmeil...@chinamobile.com<mailto:chenmeil...@chinamobile.com>>
      Sent: Wednesday, 8 February 2023 10:51
      To: John Mattsson 
<john.mattsson=40ericsson....@dmarc.ietf.org<mailto:john.mattsson=40ericsson....@dmarc.ietf.org>>;
 Jari Arkko <jari.ar...@ericsson.com<mailto:jari.ar...@ericsson.com>>; Karl 
Norrman <karl.norr...@ericsson.com<mailto:karl.norr...@ericsson.com>>; Vesa 
Torvinen <vesa.torvi...@ericsson.com<mailto:vesa.torvi...@ericsson.com>>
      Subject: Re: Re: [Emu] I-D Action: draft-ietf-emu-aka-pfs-10.txt



      Hi authors,

      For  this is the Second WG Last Call, I have some comments:



      1. EAP-AKA' PFS requirements are not clear and obvious, For this feature, 
at least 32 bytes will be added to the existing AKA process at the New Radio, 
which greatly affects the cost.

      [Karl]: Yes, to increase security, there is a need to increase bandwidth 
usage. It is a trade-off. I do not believe adding 32 bytes will greatly affect 
costs for 5G. For 4G it may have been a tougher trade-off, but in 5G we already 
have a “large” SUCI in the NAS signaling, and there is even discussions around 
padding that. So in general 5G NAS procedures are already using relatively 
large messages compared to earlier generations. Further, re-authentication is 
not a frequently run procedure, making the increased message size less of an 
issue.

      [Meiling]: 32Bytes growth for Iot device is fatal, and 
Resource-constrained equipment can not support D-H,  bandwidth and CPU 
consumption is huge.


      [Karl]: My point was that a device that is capable of using SUCI would 
also be capable of running a DH. Similarly, If the bandwidth consumption with 
SUCI was not seen as a problem, I don’t see that a DH-exchange would be 
considerably worse. Also note that neither SUCI not authentication are frequent 
events.



      When it comes to constrained IoT devices, I am sure there are 
super-constrained use cases where the device and bandwidth cannot allow for 
SUCI nor DH. For those use cases, one would have to make a risk-analysis, and 
if it turns out that the risk is acceptable, one can use EAP-AKA’ or perhaps 
even plain AKA.  At the same time, I note that IETF is standardizing a DH-based 
key exchange targeted at constrained devices, so sufficiently many use cases 
involving IoT devices seems capable of running DH (draft-ietf-lake-edhoc-19 - 
Ephemeral Diffie-Hellman Over COSE 
(EDHOC)<https://datatracker.ietf.org/doc/draft-ietf-lake-edhoc/>).





      2. AKA based on symmetric key is currently very secure, the  PFS of 
communication network is different from that of PC server,  For the 
communication network, UDM has a very high protection intensity, and it is 
almost impossible for the  long-term shared   secrets to be leaked. At present, 
there is no case that the SIM root key is broken by hackers in the process of 
use.

      [Karl]: I completely agree with you that AKA is a strong and 
well-analyzed AKE. That is why EAP-AKA’ FS is reusing it as a building block 
and extends the protocol with PFS.



      I also agree that the UDM can be assumed to be well protected. We do, 
however, need to consider that the long-term keys are not only at risk when 
stored in the UDM. The keys are also present in the USIM, and the distribution 
of the keys is another attack vector. In fact, the distribution was what was 
attacked in the SIM Heist attack in 2015 (The Great SIM Heist: How Spies Stole 
the Keys to the Encryption Castle 
(theintercept.com)<https://theintercept.com/2015/02/19/great-sim-heist/>). It 
could be argued that PFS does not help against attacks when the adversary knows 
the key even before it is provided to the customer. This is true, but it does 
help if such batches of keys are obtained by an adversary at a later stage.



      [Meiling]: FOR SIM Heist attack in 2015, The main culprit is the 
manufacturing process of SIM card manufacturers, this is a low probability 
event. There is no absolute security in this world.

      [Karl]: That is true, but I would like to reiterate what I say below 
regarding multi-level security: this days, 3GPP and other organizations do 
apply several layers of security. Again, for SBA, one could argue that an 
inside attacker in the mobile core network is also a low probability event (in 
comparison to, e.g., air-interface attacks). Still, SA3 chose to add TLS e2e 
between NFs as a second layer of protection.



       3.The necessity of AKA PFS is not strong,  AKA is used to protect the 
security of the signaling for the communication network, PFS considers more at 
the application layer which TLS  has been done.

      [Karl]: I think we are at a stage where we need to have multi-level 
security. For example, in SBA in the 5G core network, we do use TLS 
point-to-point between NFs even though both endpoints reside in an NDS secure 
domain. A well protected UDM is good first line of defense, but I would not 
like that to be the only defense.



      I do believe PFS is important for the access network as well, even if TLS 
is applied over the top. For example, for userplane traffic, IP addresses and 
other metadata is still visible even when TLS is applied over the top. This 
information is also sensitive and requires strong protection.



      [Meiling]: PFS can not solve the problem of  IP addresses and other 
metadata protection.

      [Karl]: Sorry for being unclear. What I meant was: The air-interface 
transports metadata that TLS does not protect. An example of that is IP 
addresses. The air-interface protects this data with encryption and the keys 
for that encryption are derived from AKA. Even if TLS has PFS and protects the 
rest of the data, the air-interface encryption does not have PFS today. That 
means that someone can collect encrypted air-interface data, later obtain the 
long-term key and then decrypt the IP addresses. By applying an AKA enhanced 
with PFS would strengthen the protection that the existing encryption provides.



       4.Whether the PFS ideas proposed in this draft are sustainable? How to 
deal with Post-Quantum Cryptography in the future, the introduction of PQC will 
increase the consumption of hundreds of bytes?

      [Karl]: The question of PQC is very important for 3GPP radio access 
security. Today the security is as you know not using public key crypto for 
anything else than SUCI. The DH exchange introduced by EAP-AKA’ FS would indeed 
be a new dependence on asymmetric-key technology. Note though that the session 
key resulting from EAP-AKA’ FS still includes the symmetric key from the 
underlying AKA run in addition to the secret g^{xy} resulting from the DH 
exchange. This means that an adversary would need to break that symmetric key 
as well, even if they have access to a quantum computer that breaks the DH 
exchange.



      [Meiling]: In addition to the sustainability of PQC, Another scenario is 
how to use AKA PFS in satellite network in the future, Satellite communication 
is very concerned about byte consumption.

      [Karl]: I cannot predict whether future 3GPP satellite communication will 
be so bandwidth constrained that running a DH-exchange is prohibitively 
expensive. But I would handle that the same way as super-constrained IoT use 
cases: make a risk-assessment whether the intended satellite use cases can be 
sufficiently secured without it.



      BR Karl





      BR Karl





      Best,

      Meiling



         From: Meiling Chen<mailto:chenmeil...@chinamobile.com>

         Date: 2023-01-30 18:21

         To: John Mattsson<mailto:john.mattsson=40ericsson....@dmarc.ietf.org>; 
emu<mailto:emu@ietf.org>

         Subject: Re: [Emu] I-D Action: draft-ietf-emu-aka-pfs-10.txt

         Hi,

         I have reviewed the draft, it seems that asymmetric negotiation is 
used to achieve PFS, But I didn't understand how it was realized.

         MK       = PRF'(IK'|CK',"EAP-AKA'"|Identity)
                MK_ECDHE = PRF'(IK'|CK'|SHARED_SECRET,"EAP-AKA' FS"|Identity)
                K_encr   = MK[0..127]
                K_aut    = MK[128..383]
                K_re     = MK_ECDHE[0..255]
                MSK      = MK_ECDHE[256..767]
                EMSK     = MK_ECDHE[768..1279]
         1. ECDHE's private key is not reflected in the  K_encr,
         MSK used SHARED_SECRET(I understand it is the private key in a pair of 
keys), Ensure PFS by mixing private key?
         The names of SHARED SECRET and long-term shared secrets on the SIM 
card should be distinguished.
         2.TLS1.3 support secp256r1, secp384r1, secp521r1,x25519, x448, why the 
draft only x25519?

         Best,
         Meiling



            From: John 
Mattsson<mailto:john.mattsson=40ericsson....@dmarc.ietf.org>

            Date: 2023-01-26 22:36

            To: emu@ietf.org<mailto:emu@ietf.org>

            Subject: Re: [Emu] I-D Action: draft-ietf-emu-aka-pfs-10.txt

            Hi,



            The -10 version fixes various nits found by Peter Yee.

            Cheers,
            John



            From: Emu <emu-boun...@ietf.org<mailto:emu-boun...@ietf.org>> on 
behalf of internet-dra...@ietf.org<mailto:internet-dra...@ietf.org> 
<internet-dra...@ietf.org<mailto:internet-dra...@ietf.org>>
            Date: Thursday, 26 January 2023 at 15:31
            To: i-d-annou...@ietf.org<mailto:i-d-annou...@ietf.org> 
<i-d-annou...@ietf.org<mailto:i-d-annou...@ietf.org>>
            Cc: emu@ietf.org<mailto:emu@ietf.org> 
<emu@ietf.org<mailto:emu@ietf.org>>
            Subject: [Emu] I-D Action: draft-ietf-emu-aka-pfs-10.txt


            A New Internet-Draft is available from the on-line Internet-Drafts 
directories.
            This draft is a work item of the EAP Method Update WG of the IETF.

                    Title           : Forward Secrecy for the Extensible 
Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' 
FS)
                    Authors         : Jari Arkko
                                      Karl Norrman
                                      Vesa Torvinen
                                      John Preuß Mattsson
              Filename        : draft-ietf-emu-aka-pfs-10.txt
              Pages           : 32
              Date            : 2023-01-26

            Abstract:
               Many different attacks have been reported as part of revelations
               associated with pervasive surveillance.  Some of the reported 
attacks
               involved compromising the smart card supply chain, such as 
attacking
               SIM card manufacturers and operators in an effort to compromise
               shared secrets stored on these cards.  Since the publication of 
those
               reports, manufacturing and provisioning processes have gained 
much
               scrutiny and have improved.  However, the danger of resourceful
               attackers for these systems is still a concern.  Always assuming
               breach such as key compromise and minimizing the impact of 
breach are
               essential zero-trust principles.

               This specification updates RFC 9048, the improved Extensible
               Authentication Protocol Method for 3GPP Mobile Network 
Authentication
               and Key Agreement (EAP-AKA'), with an optional extension.  
Similarly,
               this specification also updates the earlier version of the 
EAP-AKA'
               specification in RFC 5448.  The extension, when negotiated, 
provides
               Forward Secrecy for the session key generated as a part of the
               authentication run in EAP-AKA'.  This prevents an attacker who 
has
               gained access to the long-term pre-shared secret in a Subscriber
               Identity Module (SIM) card from being able to decrypt any past
               communications.  In addition, if the attacker stays merely a 
passive
               eavesdropper, the extension prevents attacks against future 
sessions.
               This forces attackers to use active attacks instead.


            The IETF datatracker status page for this draft is:
            https://datatracker.ietf.org/doc/draft-ietf-emu-aka-pfs/

            There is also an htmlized version available at:
            https://datatracker.ietf.org/doc/html/draft-ietf-emu-aka-pfs-10

            A diff from the previous version is available at:
            https://author-tools.ietf.org/iddiff?url2=draft-ietf-emu-aka-pfs-10


            Internet-Drafts are also available by rsync at 
rsync.ietf.org::internet-drafts


            _______________________________________________
            Emu mailing list
            Emu@ietf.org<mailto:Emu@ietf.org>
            https://www.ietf.org/mailman/listinfo/emu

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to