On Apr 9, 2023, at 3:51 PM, Karl Norrman <karl.norr...@ericsson.com> wrote:
> [K]: Correct. The assumption in 1 is that the traffic is protected with IPsec 
> or TLS.
> Thanks for the reference. I read it, but it does not seem to consider the 
> forward secrecy
> aspects I try to describe here.

  I can add some text about PFS to the document.

  From a practical point of view, I think PFS issues are less of a problem than 
other issues.

> [K]: There is another attack even if TLS uses a PFS (the one I describe here),
> which works if one does not establish a new TLS connection or does a key 
> update after
> each EAP run. Similarly for IPsec.

  Systems like Eduroam currently transport 2-5K full EAP sessions per second 
for national proxies, with 10+ packets per session.  OpenRoaming systems have 
similar or larger amounts of traffic.

  Which means that it is not realistically practical to re-key the AAA 
connection after every successful EAP authentication.  Even re-keying the AAA 
connections once a second is a lot to ask.

> However, because the IPsec tunnel is only rekeyed after 59 more minutes, the 
> MSK will
> not be forward secret. The adversary compromising S could get the IPsec keys, 
> and
> decrypt the stored IPsec packets that contain the message transporting the 
> MSK from S to A.
> That is, the channel between S and A is a form of storage for the MSK which 
> remains even after it
> should be deleted.

  So what can be done here?  What solutions should be implemented which are 
practical, and which also increase security? 

> The only thing that seems to help is to rekey the IPsec connection and delete 
> the previous key material.

  I think this issue is more theoretical than practical.  If someone can snoop 
random AAA traffic, then either (a) they are a trusted member of the AAA 
ecosystem, or (b) they have nation-state level access to network traffic.  
There are few practical defences against either of those attacks.

  For me, this issue falls into the same area as "my front door lock is 
insecure, because the lock-picking lawyer can pick it in 30 seconds".   Well, 
$2000 for a perfect front door lock is impractical, because the determined 
adversary will simply throw a rock through a side window, and bypass the lock 
entirely.

  To put it another way, the theoretical attacks are much less interesting than 
the practical attacks.  And the defences against theoretical attacks are not 
interesting if the defences are entirely impractical.

  What solutions can be implemented here?  What recommendations can we make 
which are both practical, and secure?

  Alan DeKok.

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to