On Mon, 10 Apr 2023 at 19:20, Karl Norrman <karl.norrman=
40ericsson....@dmarc.ietf.org> wrote:

[K]: I have described only one. I also gave a concrete example, which may
> have caused confusion.
> I will try to describe it again in clearer terms, but shorter. Point 2
> answers the direct question.
>
> 1. There is an EAP server S and a pass-through authenticator A. For
> simplicity, say they are operated
> by a single honest organization, which the client trusts. S and A protect
> the traffic sent between
> them using IPsec.
>
> 2. An adversary listens to the IPsec encrypted traffic sent between S and
> A. The adversary cannot decrypt
> the traffic, but records the encrypted traffic anyway. (This is who and
> what I meant by having access to the traffic).
>
> 3. After a successful EAP authentication between a client and S, S will
> send the established MSK to A over
> the IPsec tunnel.
>
> 4. The adversary records the (encrypted) MSK. But at this point the
> adversary cannot decrypt the MSK.
>
> 5. The MSK is used to protect a session. The session terminates. If one
> cares about PFS, the MSK
> and any data from which it can be derived shall be deleted when the
> session terminates. Otherwise,
> the MSK would not be forward secret.
>
> 6. If one cares about PFS, then one would worry that the adversary would
> hack into the server S,
> obtain the IPsec session keys and decrypt the encrypted MSK from step 4.
>

Wouldn't the solution here be upgrading the MSK users to be PFS enabled?
For example, Security Considerations in draft-ietf-emu-aka-pfs  says:

   This extension is most useful when used in a
   context where EAP keys are used without further mixing that can
   provide Forward Secrecy.  For instance, when used with IKEv2
   [RFC7296], the session keys produced by IKEv2 have this property, so
   better characteristics of EAP keys is not that useful.

As I understand the above, when an EAP method generates an MSK that's used
with IKEv2, step 6 above would still reveal the MSK but the MSK is not
usable to decrypt traffic that was secured with IKEv2.

For Wi-Fi authentication, the handshake between the wireless device and
WLAN access point could run the kind of 'further mixing'
draft-ietf-emu-aka-pfs mentions? We're now at Wi-Fi 7 and the future
versions could incorporate these changes, if they'd be needed for Wi-Fi. I
haven't checked if any of the 802.* specifications already define something
like this that's already used with wired and wireless LANs.

How common are the link layer protocols that use MSK in such a way that
forward security is not achieved?

-- 
Heikki Vatiainen
h...@radiatorsoftware.com
_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to