On Apr 10, 2023, at 4:54 AM, Karl Norrman <karl.norr...@ericsson.com> wrote:
> [K]: OK. I don't argue that PFS is important here. My point is just that those
> who *do* believe that PFS is important need to take care when using
> long-lived TLS/IPsec sessions. That is:
> 1. Assuming a system user wants PFS, the question is whether they get it by
> enabling PFS-enabled TLS cipher suites for RADIUS/DIAMETER and a
> PFS-enabled EAP method. Answer: not in the sense one may expect.
> 
> 2. What trade-offs do they need to make?

  People authenticating via EAP have no control over the AAA infrastructure.  
So they have very few choices for making trade-offs.

> [K]: Indeed. These long-lived sessions are exactly what make the attack on
> the MSK's PFS possible.

  I would suggest that these attacks aren't very relevant.  Or if they are, 
there is very little which can be done about them.

> [K]:  As I wrote in the initial mail, one need to be aware of that one may not
> get PFS for the MSK until the next rekeying of the IPsec/TLS tunnel between
> the EAP server and the pass-through authenticator. So, one need to do
> a risk assessment and trade-off security/efficiency on how frequently one need
> to rekey. The trade-off means a more relaxed version of PFS.

  In some cases the AAA operators have control over the EAP methods used, 
(3G/4G/etc. and universities).  In other cases (proxying) the AAA operators are 
themselves perhaps untrusted by the end users.

  I agree that PFS is good, but I'm not sure what anyone can do about the 
attacks outlined here.

> [K]: There are more possibilities than (a) and (b).
> The threat situation depends on the deployments and adversaries one considers.
> For example, an adversary may have access to traffic passing to a number of 
> WiFi access
> points in a certain area of importance.

  i.e. someone operating the AAA servers?  Or the people operating the local 
network, who are usually the same people operating the AAA servers.  Or someone 
watching the radio-layer traffic.

  Which are the attacks I suggested earlier.  I'm not sure there are many 
different ones.

> [K]: It could be argued whether PFS as such is such a feature, yes. It depends
> on whom you ask and what their threat model is, whether PFS is a theoretical
> threat or not. However, for anyone who wants PFS, then the attack I described
> seems a worry.

  What is this person going to do about it?  Lobby the AAA operators to re-key 
their sessions more often?

  I'm struggling to find practical steps that people can take here.

> [K]:  1. Make the system-level issue known so that those who do care about PFS
> can make an informed decision and risk-based security policy when designing
> their systems.

  Raising awareness is good.  But again, what can the average user of EAP do 
about this?  Or the average AAA operator?

  I don't see many defences here.  PFS only helps protect the current session, 
and prevents using the current session to attack past / future sessions.

  PFS offers minimal additional protection from a nation-state adversary who 
can simply record all of the traffic.  Rekeying every second or every day makes 
little difference here.  The only difference between rekeying intervals is the 
number of user authentications which can be compromised per AAA session being 
cracked.

  And if an adversary has those resources, it's probably much simpler to just 
attack the network directly.  Everything has buffer overflows, zero-day 
attacks, etc.  Just log into the AP, and steal all of the keys as they flow 
through it.

> 2. Recommend to make a risk assessment and trade-off between how long time
> after the session using MSK should achieve PFS and rekey the TLS/IPsec tunnel
> accordingly.

  What advice do you have for AAA operators?  How often should the sessions be 
rekeyed?  What impact will this have on AAA operations?

  Every time an AAA connection drops, there is a chance that the EAP sessions 
transported over it will simply fail.  This is because proxying and fail-over 
are poorly defined in RADIUS.  There is the possibility that all EAP sessions 
using a particular connection will simply fail.

  So the increased security has the potential to also increase the number of 
failed authentications.  Which means in order to fully support small lifetime 
for AAA connections, we need to first ensure that the AAA system is robust to 
such small lifetime connections.

  Alan DeKok.

_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to