Hi!


If I understand correctly, you mean that current PQ-secure key establishment 
schemes are either broken or do not provide PFS.

Because of this, if one were to add a PQ-secure algorithm to EAP-AKA’-FS, then 
one need to evaluate whether that algorithm is secure and whether it provides 
PFS.

If that is the case, then I think we agree on what should be stated.



What I don’t quite understand is what in your formulation is more accurate. I 
assume you additionally try to capture some other aspect than the above.



There are some phrasings in your formulation that are unclear to me. For 
example,  “when PQC is used” could be interpreted as PQC being used in general, 
or by most other protocols.

It could also be interpreted as when a PQ-secure algorithm is added to 
EAP-AKA’-FS. Could you clarify which is the intention?



Also, it is not clear to me from that formulation who should do the evaluation 
and what to do with the conclusion. What I tried to capture in my formulation 
is that whoever wants to extend this specification with a PQ-secure algorithm, 
must do that evaluation before adding it. If concluding that the algorithm is 
not secure/don’t provide PFS, it should not be added to this specification. 
That restricts what extensions can be made to this specification.



I am not particularly fond of my specific formulation, but I want to make sure 
we agree on the intention.



BR Karl





From: Meiling Chen <chenmeil...@chinamobile.com>
Sent: Monday, 20 March 2023 10:28
To: Karl Norrman <karl.norr...@ericsson.com>; Jari Arkko 
<jari.ar...@ericsson.com>; Vesa Torvinen <vesa.torvi...@ericsson.com>; John 
Mattsson <john.matts...@ericsson.com>
Cc: emu <emu@ietf.org>
Subject: Re: RE: [Emu] I-D Action: draft-ietf-emu-aka-pfs-10.txt



Hi,

Currently, the only PQC related to DH is SIDH, which is the cracked one we have 
mentioned.

In addition, other PQC algorithms are independent of DH, so PFS cannot be 
applied I think.

So I think the sentence "the security and availability of PFS need to be 
further evaluated when PQC is used" should be more accurate.



Best,

Meiling



   From: Karl Norrman<mailto:karl.norr...@ericsson.com>

   Date: 2023-03-15 20:23

   To: chenmeil...@chinamobile.com<mailto:chenmeil...@chinamobile.com>; Jari 
Arkko<mailto:jari.ar...@ericsson.com>; Vesa 
Torvinen<mailto:vesa.torvi...@ericsson.com>; John 
Mattsson<mailto:john.matts...@ericsson.com>

   CC: emu@ietf.org<mailto:emu@ietf.org>

   Subject: RE: RE: [Emu] I-D Action: draft-ietf-emu-aka-pfs-10.txt

   Hi!



   Maybe I misunderstand you. What I propose is that if the draft is at any 
point in the future extended with PQ-secure algorithms, those algorithms must 
be evaluated for performance and security. If there is a broken PQ algorithm, 
like the one you mention, that would not be added after such evaluation.



   Could you clarify what you mean by “security and availability of PFS”?

   I try to understand in what sense it is more accurate.



   BR Karl



   From: Meiling Chen 
<chenmeil...@chinamobile.com<mailto:chenmeil...@chinamobile.com>>
   Sent: Wednesday, 15 March 2023 10:51
   To: Karl Norrman 
<karl.norr...@ericsson.com<mailto:karl.norr...@ericsson.com>>; Jari Arkko 
<jari.ar...@ericsson.com<mailto:jari.ar...@ericsson.com>>; Vesa Torvinen 
<vesa.torvi...@ericsson.com<mailto:vesa.torvi...@ericsson.com>>; John Mattsson 
<john.matts...@ericsson.com<mailto:john.matts...@ericsson.com>>
   Cc: emu <emu@ietf.org<mailto:emu@ietf.org>>
   Subject: Re: RE: [Emu] I-D Action: draft-ietf-emu-aka-pfs-10.txt



   Hi,

   It seems not accurate enough, one of PQCs which has built-in DH algorithm 
has been cracked.

   The sentence "the security and availability of PFS need to be further 
evaluated when PQC is used" should be more accurate.



   Best,

   Meiling



      From: Karl Norrman<mailto:karl.norr...@ericsson.com>

      Date: 2023-03-15 17:18

      To: chenmeil...@chinamobile.com<mailto:chenmeil...@chinamobile.com>; Jari 
Arkko<mailto:jari.ar...@ericsson.com>; Vesa 
Torvinen<mailto:vesa.torvi...@ericsson.com>; John 
Mattsson<mailto:john.matts...@ericsson.com>

      CC: emu@ietf.org<mailto:emu@ietf.org>

      Subject: RE: Re: [Emu] I-D Action: draft-ietf-emu-aka-pfs-10.txt

      Hi!



      Section 7.5 currently states:



      “… introduction of a powerful enough quantum computer would disable this

         protocol extension's ability to provide the forward security

         capability.  This would make it necessary to update the current ECC

         algorithms in this specification to PQC algorithms.  This

         specification does not add such algorithms, but a future update can

         do that.”



      Would adding a sentence “Such algorithms must be evaluated based on 
performance, bandwidth consumption and security before being added.” cover your 
concern?



      BR Karl



      From: Meiling Chen 
<chenmeil...@chinamobile.com<mailto:chenmeil...@chinamobile.com>>
      Sent: Wednesday, 15 March 2023 08:18
      To: Karl Norrman 
<karl.norr...@ericsson.com<mailto:karl.norr...@ericsson.com>>; Jari Arkko 
<jari.ar...@ericsson.com<mailto:jari.ar...@ericsson.com>>; Vesa Torvinen 
<vesa.torvi...@ericsson.com<mailto:vesa.torvi...@ericsson.com>>; John Mattsson 
<john.matts...@ericsson.com<mailto:john.matts...@ericsson.com>>
      Cc: emu <emu@ietf.org<mailto:emu@ietf.org>>
      Subject: Re: Re: [Emu] I-D Action: draft-ietf-emu-aka-pfs-10.txt



      Hi,

      Since the differences are in PQC problem.

      I suggest adding a description in Section 7.5: the security and 
availability of PFS need to be further evaluated when PQC is used.



      Best,

      Meiling



         From: Meiling Chen<mailto:chenmeil...@chinamobile.com>

         Date: 2023-03-13 15:16

         To: karl.norrman<mailto:karl.norr...@ericsson.com>; 
jari.arkko<mailto:jari.ar...@ericsson.com>; 
vesa.torvinen<mailto:vesa.torvi...@ericsson.com>; John 
Mattsson<mailto:john.matts...@ericsson.com>

         CC: emu<mailto:emu@ietf.org>

         Subject: Re: RE: [Emu] I-D Action: draft-ietf-emu-aka-pfs-10.txt

         Hi,

         There are some concerns about the use of PFS in CT network, although 
PFS adds some security in theory, it may not be appropriate for actual 
deployment.

         Since this is closely related to 3GPP, what are their comments?



         Best,

         Meiling



            From: Karl Norrman<mailto:karl.norr...@ericsson.com>

            Date: 2023-02-27 19:23

            To: 
chenmeil...@chinamobile.com<mailto:chenmeil...@chinamobile.com>; Jari 
Arkko<mailto:jari.ar...@ericsson.com>; Vesa 
Torvinen<mailto:vesa.torvi...@ericsson.com>; John 
Mattsson<mailto:john.matts...@ericsson.com>

            CC: emu@ietf.org<mailto:emu@ietf.org>

            Subject: RE: RE: [Emu] I-D Action: draft-ietf-emu-aka-pfs-10.txt

            Hi!



            I understand your main concern to be that you prefer to see a 
solution adding PFS that is also secure against a PQ attacker and that does not 
increase the bandwidth consumption too much doing it.



            I believe there are benefits of adding a mechanism for PFS for 
EAP-AKA’ even if a potential future PQ attacker may break the PFS part. As 
discussed in section 7.5, the PFS property is added on top of EAP-AKA’. An 
independent DH-exchange is mixed-in with the symmetric-key AKA key 
establishment, so intuitively, the result is no less secure than the current 
protocols (even against a PQ attacker).



            Let’s consider the risks.

            - If we do nothing, we will surely not get PFS.

            - If we add PFS based on a DH-exchange, we won’t get PFS against 
attackers with PQ capabilities (which may or may not materialize, and which may 
or may not be very costly to obtain).

            - If we wait with introducing PFS until we have mechanism that has 
small bandwidth consumption and resists PQ attackers a lot of data will be 
without PFS protection against non-PQ attackers.



            Introducing a DH-based PFS mechanism now will not mitigate all 
those risks, that is true, but it allows parties to make trade-offs that suite 
their risk appetite.

            For example:

            - An operator who does not have the bandwidth to spare can opt to 
use EAP-AKA’ or native AKA.

            - An operator may choose to deploy EAP-AKA’ or native AKA for some 
devices, and EAP-AKA’-FS for others, depending on device or subscription type.



            The operator would have to assess the risk of PQ attackers to 
become a concern, and weigh that against the risk of other attacks on the 
long-term key as well as the consumed bandwidth.

            My point is that at least there would be a choice until we come up 
with a more bandwidth-efficient and PQ-attacker resistant mechanism.



            BR Karl



            From: Meiling Chen 
<chenmeil...@chinamobile.com<mailto:chenmeil...@chinamobile.com>>
            Sent: Monday, 27 February 2023 04:02
            To: Karl Norrman 
<karl.norr...@ericsson.com<mailto:karl.norr...@ericsson.com>>; Jari Arkko 
<jari.ar...@ericsson.com<mailto:jari.ar...@ericsson.com>>; Vesa Torvinen 
<vesa.torvi...@ericsson.com<mailto:vesa.torvi...@ericsson.com>>; John Mattsson 
<john.matts...@ericsson.com<mailto:john.matts...@ericsson.com>>
            Cc: emu <emu@ietf.org<mailto:emu@ietf.org>>
            Subject: Re: RE: [Emu] I-D Action: draft-ietf-emu-aka-pfs-10.txt



            Hi,

            I don't agree with you mix SUCI and D-H here, It has to be clear 
that SUCI is only done at the initial stage, However,  authentication happens 
frequently, the network has the authority to initiate authentication, that 
means D-H Much Higher frequency.



            The most important issues to be discussed and solved in PFS are 
also our most important concerns, How to solve PQC problems that we have to 
take into consideration from 5G , Increase of at least 1000 bytes, How to solve 
this problem.








            Best,

            Meiling



               From: Karl Norrman<mailto:karl.norr...@ericsson.com>

               Date: 2023-02-13 17:21

               To: 
chenmeil...@chinamobile.com<mailto:chenmeil...@chinamobile.com>; Jari 
Arkko<mailto:jari.ar...@ericsson.com>; Vesa 
Torvinen<mailto:vesa.torvi...@ericsson.com>; John 
Mattsson<mailto:john.matts...@ericsson.com>

               Subject: RE: RE: [Emu] I-D Action: draft-ietf-emu-aka-pfs-10.txt

               Hi!



               Please see inline.



               From: Meiling Chen 
<chenmeil...@chinamobile.com<mailto:chenmeil...@chinamobile.com>>
               Sent: Monday, 13 February 2023 02:31
               To: Karl Norrman 
<karl.norr...@ericsson.com<mailto:karl.norr...@ericsson.com>>; Jari Arkko 
<jari.ar...@ericsson.com<mailto:jari.ar...@ericsson.com>>; Vesa Torvinen 
<vesa.torvi...@ericsson.com<mailto:vesa.torvi...@ericsson.com>>; John Mattsson 
<john.matts...@ericsson.com<mailto:john.matts...@ericsson.com>>
               Subject: Re: RE: [Emu] I-D Action: draft-ietf-emu-aka-pfs-10.txt



               Hi all,

               Thanks John open an issue, but I'm Meiling Chen not Meiling 
Cheng.

               for Karl's reply please see inline.





                  From: Karl Norrman<mailto:karl.norr...@ericsson.com>

                  Date: 2023-02-09 17:02

                  To: 
chenmeil...@chinamobile.com<mailto:chenmeil...@chinamobile.com>; Jari 
Arkko<mailto:jari.ar...@ericsson.com>; Vesa 
Torvinen<mailto:vesa.torvi...@ericsson.com>; John 
Mattsson<mailto:john.matts...@ericsson.com>

                  Subject: RE: Re: [Emu] I-D Action: 
draft-ietf-emu-aka-pfs-10.txt

                  Hi!



                  First, John opened an issue with your comments to the EMU 
mailing list: Comments by Meiling Cheng · Issue #43 · emu-wg/eap-aka-pfs · 
GitHub<https://protect2.fireeye.com/v1/url?k=31323334-501d5122-313273af-454445555731-ae0508f79ec1f0e0&q=1&e=818bdd26-f413-411e-80ae-b13b3f6d4c4c&u=https%3A%2F%2Fgithub.com%2Femu-wg%2Feap-aka-pfs%2Fissues%2F43>.

                  I have replied to some of your questions there as well.



                  Please see inline.





                  From: Meiling Chen 
<chenmeil...@chinamobile.com<mailto:chenmeil...@chinamobile.com>>
                  Sent: Wednesday, 8 February 2023 10:51
                  To: John Mattsson 
<john.mattsson=40ericsson....@dmarc.ietf.org<mailto:john.mattsson=40ericsson....@dmarc.ietf.org>>;
 Jari Arkko <jari.ar...@ericsson.com<mailto:jari.ar...@ericsson.com>>; Karl 
Norrman <karl.norr...@ericsson.com<mailto:karl.norr...@ericsson.com>>; Vesa 
Torvinen <vesa.torvi...@ericsson.com<mailto:vesa.torvi...@ericsson.com>>
                  Subject: Re: Re: [Emu] I-D Action: 
draft-ietf-emu-aka-pfs-10.txt



                  Hi authors,

                  For  this is the Second WG Last Call, I have some comments:



                  1. EAP-AKA' PFS requirements are not clear and obvious, For 
this feature, at least 32 bytes will be added to the existing AKA process at 
the New Radio, which greatly affects the cost.

                  [Karl]: Yes, to increase security, there is a need to 
increase bandwidth usage. It is a trade-off. I do not believe adding 32 bytes 
will greatly affect costs for 5G. For 4G it may have been a tougher trade-off, 
but in 5G we already have a “large” SUCI in the NAS signaling, and there is 
even discussions around padding that. So in general 5G NAS procedures are 
already using relatively large messages compared to earlier generations. 
Further, re-authentication is not a frequently run procedure, making the 
increased message size less of an issue.

                  [Meiling]: 32Bytes growth for Iot device is fatal, and 
Resource-constrained equipment can not support D-H,  bandwidth and CPU 
consumption is huge.


                  [Karl]: My point was that a device that is capable of using 
SUCI would also be capable of running a DH. Similarly, If the bandwidth 
consumption with SUCI was not seen as a problem, I don’t see that a DH-exchange 
would be considerably worse. Also note that neither SUCI not authentication are 
frequent events.



                  When it comes to constrained IoT devices, I am sure there are 
super-constrained use cases where the device and bandwidth cannot allow for 
SUCI nor DH. For those use cases, one would have to make a risk-analysis, and 
if it turns out that the risk is acceptable, one can use EAP-AKA’ or perhaps 
even plain AKA.  At the same time, I note that IETF is standardizing a DH-based 
key exchange targeted at constrained devices, so sufficiently many use cases 
involving IoT devices seems capable of running DH (draft-ietf-lake-edhoc-19 - 
Ephemeral Diffie-Hellman Over COSE 
(EDHOC)<https://datatracker.ietf.org/doc/draft-ietf-lake-edhoc/>).





                  2. AKA based on symmetric key is currently very secure, the  
PFS of communication network is different from that of PC server,  For the 
communication network, UDM has a very high protection intensity, and it is 
almost impossible for the  long-term shared   secrets to be leaked. At present, 
there is no case that the SIM root key is broken by hackers in the process of 
use.

                  [Karl]: I completely agree with you that AKA is a strong and 
well-analyzed AKE. That is why EAP-AKA’ FS is reusing it as a building block 
and extends the protocol with PFS.



                  I also agree that the UDM can be assumed to be well 
protected. We do, however, need to consider that the long-term keys are not 
only at risk when stored in the UDM. The keys are also present in the USIM, and 
the distribution of the keys is another attack vector. In fact, the 
distribution was what was attacked in the SIM Heist attack in 2015 (The Great 
SIM Heist: How Spies Stole the Keys to the Encryption Castle 
(theintercept.com)<https://theintercept.com/2015/02/19/great-sim-heist/>). It 
could be argued that PFS does not help against attacks when the adversary knows 
the key even before it is provided to the customer. This is true, but it does 
help if such batches of keys are obtained by an adversary at a later stage.



                  [Meiling]: FOR SIM Heist attack in 2015, The main culprit is 
the manufacturing process of SIM card manufacturers, this is a low probability 
event. There is no absolute security in this world.

                  [Karl]: That is true, but I would like to reiterate what I 
say below regarding multi-level security: this days, 3GPP and other 
organizations do apply several layers of security. Again, for SBA, one could 
argue that an inside attacker in the mobile core network is also a low 
probability event (in comparison to, e.g., air-interface attacks). Still, SA3 
chose to add TLS e2e between NFs as a second layer of protection.



                   3.The necessity of AKA PFS is not strong,  AKA is used to 
protect the security of the signaling for the communication network, PFS 
considers more at the application layer which TLS  has been done.

                  [Karl]: I think we are at a stage where we need to have 
multi-level security. For example, in SBA in the 5G core network, we do use TLS 
point-to-point between NFs even though both endpoints reside in an NDS secure 
domain. A well protected UDM is good first line of defense, but I would not 
like that to be the only defense.



                  I do believe PFS is important for the access network as well, 
even if TLS is applied over the top. For example, for userplane traffic, IP 
addresses and other metadata is still visible even when TLS is applied over the 
top. This information is also sensitive and requires strong protection.



                  [Meiling]: PFS can not solve the problem of  IP addresses and 
other metadata protection.

                  [Karl]: Sorry for being unclear. What I meant was: The 
air-interface transports metadata that TLS does not protect. An example of that 
is IP addresses. The air-interface protects this data with encryption and the 
keys for that encryption are derived from AKA. Even if TLS has PFS and protects 
the rest of the data, the air-interface encryption does not have PFS today. 
That means that someone can collect encrypted air-interface data, later obtain 
the long-term key and then decrypt the IP addresses. By applying an AKA 
enhanced with PFS would strengthen the protection that the existing encryption 
provides.



                   4.Whether the PFS ideas proposed in this draft are 
sustainable? How to deal with Post-Quantum Cryptography in the future, the 
introduction of PQC will increase the consumption of hundreds of bytes?

                  [Karl]: The question of PQC is very important for 3GPP radio 
access security. Today the security is as you know not using public key crypto 
for anything else than SUCI. The DH exchange introduced by EAP-AKA’ FS would 
indeed be a new dependence on asymmetric-key technology. Note though that the 
session key resulting from EAP-AKA’ FS still includes the symmetric key from 
the underlying AKA run in addition to the secret g^{xy} resulting from the DH 
exchange. This means that an adversary would need to break that symmetric key 
as well, even if they have access to a quantum computer that breaks the DH 
exchange.



                  [Meiling]: In addition to the sustainability of PQC, Another 
scenario is how to use AKA PFS in satellite network in the future, Satellite 
communication is very concerned about byte consumption.

                  [Karl]: I cannot predict whether future 3GPP satellite 
communication will be so bandwidth constrained that running a DH-exchange is 
prohibitively expensive. But I would handle that the same way as 
super-constrained IoT use cases: make a risk-assessment whether the intended 
satellite use cases can be sufficiently secured without it.



                  BR Karl





                  BR Karl





                  Best,

                  Meiling



                     From: Meiling Chen<mailto:chenmeil...@chinamobile.com>

                     Date: 2023-01-30 18:21

                     To: John 
Mattsson<mailto:john.mattsson=40ericsson....@dmarc.ietf.org>; 
emu<mailto:emu@ietf.org>

                     Subject: Re: [Emu] I-D Action: 
draft-ietf-emu-aka-pfs-10.txt

                     Hi,

                     I have reviewed the draft, it seems that asymmetric 
negotiation is used to achieve PFS, But I didn't understand how it was realized.

                     MK       = PRF'(IK'|CK',"EAP-AKA'"|Identity)
                            MK_ECDHE = PRF'(IK'|CK'|SHARED_SECRET,"EAP-AKA' 
FS"|Identity)
                            K_encr   = MK[0..127]
                            K_aut    = MK[128..383]
                            K_re     = MK_ECDHE[0..255]
                            MSK      = MK_ECDHE[256..767]
                            EMSK     = MK_ECDHE[768..1279]
                     1. ECDHE's private key is not reflected in the  K_encr,
                     MSK used SHARED_SECRET(I understand it is the private key 
in a pair of keys), Ensure PFS by mixing private key?
                     The names of SHARED SECRET and long-term shared secrets on 
the SIM card should be distinguished.
                     2.TLS1.3 support secp256r1, secp384r1, secp521r1,x25519, 
x448, why the draft only x25519?

                     Best,
                     Meiling



                        From: John 
Mattsson<mailto:john.mattsson=40ericsson....@dmarc.ietf.org>

                        Date: 2023-01-26 22:36

                        To: emu@ietf.org<mailto:emu@ietf.org>

                        Subject: Re: [Emu] I-D Action: 
draft-ietf-emu-aka-pfs-10.txt

                        Hi,



                        The -10 version fixes various nits found by Peter Yee.

                        Cheers,
                        John



                        From: Emu 
<emu-boun...@ietf.org<mailto:emu-boun...@ietf.org>> on behalf of 
internet-dra...@ietf.org<mailto:internet-dra...@ietf.org> 
<internet-dra...@ietf.org<mailto:internet-dra...@ietf.org>>
                        Date: Thursday, 26 January 2023 at 15:31
                        To: i-d-annou...@ietf.org<mailto:i-d-annou...@ietf.org> 
<i-d-annou...@ietf.org<mailto:i-d-annou...@ietf.org>>
                        Cc: emu@ietf.org<mailto:emu@ietf.org> 
<emu@ietf.org<mailto:emu@ietf.org>>
                        Subject: [Emu] I-D Action: draft-ietf-emu-aka-pfs-10.txt


                        A New Internet-Draft is available from the on-line 
Internet-Drafts directories.
                        This draft is a work item of the EAP Method Update WG 
of the IETF.

                                Title           : Forward Secrecy for the 
Extensible Authentication Protocol Method for Authentication and Key Agreement 
(EAP-AKA' FS)
                                Authors         : Jari Arkko
                                                  Karl Norrman
                                                  Vesa Torvinen
                                                  John Preuß Mattsson
                          Filename        : draft-ietf-emu-aka-pfs-10.txt
                          Pages           : 32
                          Date            : 2023-01-26

                        Abstract:
                           Many different attacks have been reported as part of 
revelations
                           associated with pervasive surveillance.  Some of the 
reported attacks
                           involved compromising the smart card supply chain, 
such as attacking
                           SIM card manufacturers and operators in an effort to 
compromise
                           shared secrets stored on these cards.  Since the 
publication of those
                           reports, manufacturing and provisioning processes 
have gained much
                           scrutiny and have improved.  However, the danger of 
resourceful
                           attackers for these systems is still a concern.  
Always assuming
                           breach such as key compromise and minimizing the 
impact of breach are
                           essential zero-trust principles.

                           This specification updates RFC 9048, the improved 
Extensible
                           Authentication Protocol Method for 3GPP Mobile 
Network Authentication
                           and Key Agreement (EAP-AKA'), with an optional 
extension.  Similarly,
                           this specification also updates the earlier version 
of the EAP-AKA'
                           specification in RFC 5448.  The extension, when 
negotiated, provides
                           Forward Secrecy for the session key generated as a 
part of the
                           authentication run in EAP-AKA'.  This prevents an 
attacker who has
                           gained access to the long-term pre-shared secret in 
a Subscriber
                           Identity Module (SIM) card from being able to 
decrypt any past
                           communications.  In addition, if the attacker stays 
merely a passive
                           eavesdropper, the extension prevents attacks against 
future sessions.
                           This forces attackers to use active attacks instead.


                        The IETF datatracker status page for this draft is:
                        https://datatracker.ietf.org/doc/draft-ietf-emu-aka-pfs/

                        There is also an htmlized version available at:
                        
https://datatracker.ietf.org/doc/html/draft-ietf-emu-aka-pfs-10

                        A diff from the previous version is available at:
                        
https://author-tools.ietf.org/iddiff?url2=draft-ietf-emu-aka-pfs-10


                        Internet-Drafts are also available by rsync at 
rsync.ietf.org::internet-drafts


                        _______________________________________________
                        Emu mailing list
                        Emu@ietf.org<mailto:Emu@ietf.org>
                        https://www.ietf.org/mailman/listinfo/emu

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to