Re: [TLS] 2nd WG Last Call for draft-ietf-tls-dtls-rrc

2023-10-03 Thread Marco Tiloca
8a09ecc40cc9e8%7C0%7C0%7C638306678725310227%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=SvzuTSLXUepdgCRou2%2FSpKIEEseKkgeW2FtxK2USDmU%3D&reserved=0

The WG Last Call will end 3 October 2023 @ 2359 UTC.

Please review the I-D and submit issues and pull requests via the GitHub 
repository that can be found at:

https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Ftlswg%2Fdtls-rrc&data=05%7C01%7Cmarco.tiloca%40ri.se%7C0debb4c78dbe430d7e1c08dbb88ad9d4%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C638306678725310227%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=3oMiSlJbKPepw82mGmzWcCzevuMJcjmOotSu4c6k92c%3D&reserved=0

Alternatively, you can also send your comments to...@ietf.org.

Thanks,
Chris, Joe, & Sean
___
TLS mailing list
TLS@ietf.org
https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Ftls&data=05%7C01%7Cmarco.tiloca%40ri.se%7C0debb4c78dbe430d7e1c08dbb88ad9d4%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C638306678725310227%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=OIpfBDR8I10rXFa6xzI3X%2FhqfTw10S1EDQGs%2BzuCJeY%3D&reserved=0


--
Marco Tiloca
Ph.D., Senior Researcher

Phone: +46 (0)70 60 46 501

RISE Research Institutes of Sweden AB
Box 1263
164 29 Kista (Sweden)

Division: Digital Systems
Department: Computer Science
Unit: Cybersecurity

https://www.ri.se



OpenPGP_0xEE2664B40E58DA43.asc
Description: OpenPGP public key


OpenPGP_signature
Description: OpenPGP digital signature
___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


Re: [TLS] 2nd WG Last Call for draft-ietf-tls-dtls-rrc

2023-10-09 Thread Marco Tiloca

Hi Thomas,

On 2023-10-09 11:42, Thomas Fossati wrote:

Hi Marco,

We think we have addressed all your comments (but one, see below).
Could you please check that the PR at [1] is good to go?


==>MT
Thank you, the PR looks good me!

(please see below about the two other points)
<==



[1]https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Ftlswg%2Fdtls-rrc%2Fpull%2F63%2Ffiles&data=05%7C01%7Cmarco.tiloca%40ri.se%7C52b4e41e5459444c222508dbc8ac2441%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C638324413891462331%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=8WOJtf7yh71vA08CvogTi0Qrlqu8W%2FcTnAfoa33RE%2Bw%3D&reserved=0

The one comment we wanted to have a bit more discussion before
deciding how to proceed is this:

On Tue, 3 Oct 2023 at 15:50, Marco Tiloca
  wrote:

[Section 7.4]

* I think that another requirement should be that the initiator MUST NOT act on 
more than one valid path_response or path_drop message for each path_challenge 
message that it has sent.

§7.4 currently says:  "The responder MUST send exactly one
path_response or path_drop message for each received path_challenge."

So it's not clear how a situation with multiple occurrences of
path_drop/path_challenge could come off, if the responder obeys the
specified MUST?

Could you clarify your concern a bit more?


==>MT
Right, I was thinking of spelling out how the initiator should behave if 
the responder does not comply with the specification.


If that can be excluded altogether or a safe behavior at the responder 
is obvious/implied, then the current text is just fine.

<==




[Section 10]

* You will need to add a new subsection that provides expert review 
instructions, for the Designated Experts assigned to the new subregistry 
defined in Section 10.3.

Thanks: this made us realise that expert review was a bit too
lightweight, therefore we moved to STD required.


==>MT
That makes sense.

Best,
/Marco
<==



cheers, thanks!


--
Marco Tiloca
Ph.D., Senior Researcher

Phone: +46 (0)70 60 46 501

RISE Research Institutes of Sweden AB
Box 1263
164 29 Kista (Sweden)

Division: Digital Systems
Department: Computer Science
Unit: Cybersecurity

https://www.ri.se



OpenPGP_0xEE2664B40E58DA43.asc
Description: OpenPGP public key


OpenPGP_signature.asc
Description: OpenPGP digital signature
___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Fwd: New Version Notification for draft-tiloca-tls-dos-handshake-02.txt

2018-03-16 Thread Marco Tiloca
Hi all,

We have recently submitted an updated version of the draft based on
comments at IETF100.

Also, a proof-of-concept implementation for DTLS 1.2 in
Californium/Scandium is available at [1].

Best,
/Marco

[1] https://bitbucket.org/sicssec/dos_dtls


 Forwarded Message 
Subject:New Version Notification for
draft-tiloca-tls-dos-handshake-02.txt
Date:   Mon, 5 Mar 2018 10:36:49 -0800
From:   internet-dra...@ietf.org
To: Maarten Hoeve , Ludwig Seitz
, Olaf Bergmann , Marco Tiloca




A new version of I-D, draft-tiloca-tls-dos-handshake-02.txt
has been successfully submitted by Marco Tiloca and posted to the
IETF repository.

Name:   draft-tiloca-tls-dos-handshake
Revision:   02
Title:  Extension for protecting (D)TLS handshakes against Denial of 
Service
Document date:  2018-03-05
Group:  Individual Submission
Pages:  15
URL:
https://www.ietf.org/internet-drafts/draft-tiloca-tls-dos-handshake-02.txt
Status: https://datatracker.ietf.org/doc/draft-tiloca-tls-dos-handshake/
Htmlized:   https://tools.ietf.org/html/draft-tiloca-tls-dos-handshake-02
Htmlized:   
https://datatracker.ietf.org/doc/html/draft-tiloca-tls-dos-handshake-02
Diff:   
https://www.ietf.org/rfcdiff?url2=draft-tiloca-tls-dos-handshake-02

Abstract:
   This document describes an extension for TLS and DTLS to protect the
   server from Denial of Service attacks against the handshake protocol,
   carried out by an on-path adversary.  The extension includes a nonce
   and a Message Authentication Code (MAC) over that nonce, encoded as a
   Handshake Token that a Trust Anchor entity computes and provides to
   the client.  The server registered at the Trust Anchor verifies the
   MAC to determine whether continuing or aborting the handshake.


  


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

The IETF Secretariat





signature.asc
Description: OpenPGP digital signature
___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Fwd: New Version Notification for draft-tiloca-tls-dos-handshake-00.txt

2017-07-08 Thread Marco Tiloca
Dear all,

FYI, we have recently submitted a new draft proposing an extension for
(D)TLS 1.2/1.3.

The solution described in the draft addresses Denial of Service attacks
against the handshake protocol, allowing servers to promptly abort
invalid session set ups.

Feedback and comments are of course very welcome. Thanks a lot!

Best regards,
/Marco

 Forwarded Message 
Subject:New Version Notification for
draft-tiloca-tls-dos-handshake-00.txt
Date:   Wed, 28 Jun 2017 07:40:45 -0700
From:   internet-dra...@ietf.org
To: Marco Tiloca , Ludwig Seitz
, Maarten Hoeve 



A new version of I-D, draft-tiloca-tls-dos-handshake-00.txt
has been successfully submitted by Marco Tiloca and posted to the
IETF repository.

Name:   draft-tiloca-tls-dos-handshake
Revision:   00
Title:  Extension for protecting (D)TLS handshakes against Denial of 
Service
Document date:  2017-06-28
Group:  Individual Submission
Pages:  12
URL:
https://www.ietf.org/internet-drafts/draft-tiloca-tls-dos-handshake-00.txt
Status: https://datatracker.ietf.org/doc/draft-tiloca-tls-dos-handshake/
Htmlized:   https://tools.ietf.org/html/draft-tiloca-tls-dos-handshake-00
Htmlized:   
https://datatracker.ietf.org/doc/html/draft-tiloca-tls-dos-handshake-00


Abstract:
   This document describes an extension for TLS and DTLS to protect the
   server from Denial of Service attacks against the handshake protocol.
   The extension includes a Message Authentication Code (MAC) over the
   ClientHello message, computed by the Client through key material
   obtained from a Trust Anchor entity.  The server registered at the
   Trust Anchor derives the same key material and checks the MAC to
   determine whether continuing or aborting the handshake.


  


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

The IETF Secretariat



signature.asc
Description: OpenPGP digital signature
___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


Re: [TLS] Fwd: New Version Notification for draft-tiloca-tls-dos-handshake-00.txt

2017-07-09 Thread Marco Tiloca
osed above, in case of
resumption request, the client can compute the HMAC itself, again only
over the extension-related content, like considered by the TA in the
main case for new session establishment. This would also avoid the
implementation issues you mentioned below [0] for the current approach
in (D)TLS 1.3.


>
> -Ekr
>
> [0] It also, won't work. In particular, having the client send a
> MAC over the CH leads to having to zero out portions of the CH, which
> is going to create implementation problems in two ways. First, it
> creates a circular dependency with the TLS 1.3 PSK binder, so you'll
> need to have an exception there. Second, the zero-ing out trick you
> use is actually quite annoying to implement in many TLS stacks (it
> would be so in NSS).

I understand your concerns as to implementation complications. We can
then build on the alternative design above to avoid them by construction.

>
>
>
> On Sat, Jul 8, 2017 at 4:10 AM, Marco Tiloca  <mailto:marco.til...@ri.se>> wrote:
>
> Dear all,
>
> FYI, we have recently submitted a new draft proposing an extension
> for (D)TLS 1.2/1.3.
>
> The solution described in the draft addresses Denial of Service
> attacks against the handshake protocol, allowing servers to
> promptly abort invalid session set ups.
>
> Feedback and comments are of course very welcome. Thanks a lot!
>
> Best regards,
> /Marco
>
>  Forwarded Message 
> Subject:  New Version Notification for
> draft-tiloca-tls-dos-handshake-00.txt
> Date: Wed, 28 Jun 2017 07:40:45 -0700
> From:     internet-dra...@ietf.org <mailto:internet-dra...@ietf.org>
> To:   Marco Tiloca 
> <mailto:marco.til...@ri.se>, Ludwig Seitz 
> <mailto:ludwig.se...@ri.se>, Maarten Hoeve 
> <mailto:maarten.ho...@encs.eu>
>
>
>
> A new version of I-D, draft-tiloca-tls-dos-handshake-00.txt
> has been successfully submitted by Marco Tiloca and posted to the
> IETF repository.
>
> Name: draft-tiloca-tls-dos-handshake
> Revision: 00
> Title:Extension for protecting (D)TLS handshakes against 
> Denial of Service
> Document date:2017-06-28
> Group:Individual Submission
> Pages:12
> URL:
> https://www.ietf.org/internet-drafts/draft-tiloca-tls-dos-handshake-00.txt
> 
> <https://www.ietf.org/internet-drafts/draft-tiloca-tls-dos-handshake-00.txt>
> Status: 
> https://datatracker.ietf.org/doc/draft-tiloca-tls-dos-handshake/
> <https://datatracker.ietf.org/doc/draft-tiloca-tls-dos-handshake/>
> Htmlized:   
> https://tools.ietf.org/html/draft-tiloca-tls-dos-handshake-00
> <https://tools.ietf.org/html/draft-tiloca-tls-dos-handshake-00>
> Htmlized:   
> https://datatracker.ietf.org/doc/html/draft-tiloca-tls-dos-handshake-00
> <https://datatracker.ietf.org/doc/html/draft-tiloca-tls-dos-handshake-00>
>
>
> Abstract:
>This document describes an extension for TLS and DTLS to protect the
>server from Denial of Service attacks against the handshake protocol.
>The extension includes a Message Authentication Code (MAC) over the
>ClientHello message, computed by the Client through key material
>obtained from a Trust Anchor entity.  The server registered at the
>Trust Anchor derives the same key material and checks the MAC to
>determine whether continuing or aborting the handshake.
>
>       
> 
>
>
> Please note that it may take a couple of minutes from the time of 
> submission
> until the htmlized version and diff are available at tools.ietf.org 
> <http://tools.ietf.org>.
>
> The IETF Secretariat
>
>
> ___
> TLS mailing list
> TLS@ietf.org <mailto:TLS@ietf.org>
> https://www.ietf.org/mailman/listinfo/tls
> <https://www.ietf.org/mailman/listinfo/tls>
>
>

-- 
Marco Tiloca, PhD
Research Institutes of Sweden
RISE ICT/SICS
Isafjordsgatan 22 / Kistagången 16
SE-164 40 Kista (Sweden)
Phone: +46 (0)70 60 46 501
https://www.sics.se
https://www.sics.se/~marco/

The RISE institutes Innventia, SP and Swedish ICT
have merged in order to become a stronger research
and innovation partner for businesses and society.

SICS Swedish ICT AB, has now changed name to RISE SICS AB.



signature.asc
Description: OpenPGP digital signature
___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


Re: [TLS] Fwd: New Version Notification for draft-tiloca-tls-dos-handshake-00.txt

2017-07-10 Thread Marco Tiloca
On 2017-07-09 15:33, Eric Rescorla wrote:
>
>
> On Sun, Jul 9, 2017 at 2:44 AM, Marco Tiloca  <mailto:marco.til...@ri.se>> wrote:
>
> Hello Eric,
>
> Thanks for your good comments!
>
> Please, see my answers inline.
>
> Best,
> /Marco
>
> On 2017-07-08 16:45, Eric Rescorla wrote:
>> Document: draft-tiloca-tls-dos-handshake-00.txt
>>
>> I'm trying to understand the threat model and operating model this
>> is designed for. Let's start with the threat model. The anti-DoS
>> mechanisms in DTLS are specifically oriented towards attackers
>> who are not on-path, because on-path attackers can, as you
>> say, obtain the HRR/HVR.
>>
>> You say:
>>
>>DTLS 1.2 as well as both TLS 1.3 and DTLS 1.3 provide the optional
>>Cookie exchange as possible solution to mitigate this Denial of
>>Service attack.  While this makes the attack more complicated to
>>mount, a well determined and resourceful adversary able to spoof
>>valid IP addresses can still successfully perform it, by
>> intercepting
>>the possible server response including the Cookie and then
>> echoing it
>>in the second ClientHello.  This is particularly doable in
>> case the
>>handshake is not based on Pre-Shared Key exchange modes.
>>
>> I take from this that your assumed threat model is an attacker who is
>> minimally a man-on-the-side (i.e., able to read traffic and
>> inject his
>> own but not block) and maximally a full active attacker able to block
>> data. Is that correct?
>>
>
> Yes, correct.
>
>>
>>Depending on the specific protocol version and the key
>> establishment
>>mode used in the handshake, the attack impact can range from
>> single
>>replies triggered by invalid ClientHello messages, to the server
>>performing advanced handshake steps with consequent setup of
>> invalid
>>half-open sessions.  Especially if performed in a large-scale and
>>distributed manner, this attack can thwart performance and service
>>availability of (D)TLS servers.  Moreover, it can be particularly
>>effective in application scenarios where servers are resource-
>>constrained devices running DTLS over low-power, low bandwidth and
>>lossy networks.
>>
>> It seems like the attack you are considering is one in which the
>> attacker generates DTLS handshakes and then forces the DTLS server to
>> either perform computations or hold state open (e.g., by doing a
>> handshake or a partial handshake and then stopping) Is that correct?
>>
>
> Yes, correct.
>
>> Assuming I am correct, the design you describe here seems much more
>> complicated than necessary [0]. Consider the simpler design:
>>
>> - The client contacts the TA
>> - TA generates a new value C = HMAC(k_M, N) and sends that to the
>>   client
>> - the client inserts C in the ClientHello.
>>
>> The major downside is that this allows an on-path attacker to
>> steal C and
>> put it in their own CH, but so what? The attacker is still rate
>> limited
>> by the number of valid clients, and (at least) a fully active
>> attacker
>> doesn't need to substitute their own handshake messages for the valid
>> clients because they can force the server to perform computations
>> by playing the client messages and leave the server in a half-open
>> state by blocking some client messages. I suppose you could argue
>> that they could negotiate cipher suites that are more expensive to
>> the server, but that seems like a fairly weak attack.
>>
>
> This alternative is surely simpler and good to consider, and I
> agree with your related considerations.
>
> I would add that the TA has still to provide also N to the client,
> for inclusion in the extension. N is in fact required by the
> server for recomputing the HMAC and perform anti-replay checks on
> the ClientHello as suggested in the draft.
>
>
> Well, sort of. It needs to supply the client some opaque token. The only
> semantics of this token are between the TA and the server. 
>

I agree.

>
>
> The model currently described in the draft considers additional
> key material and related derivation, thinking also about session
> resumption (see also the related comment below). 

[TLS] Fwd: New Version Notification for draft-tiloca-tls-dos-handshake-01.txt

2017-10-28 Thread Marco Tiloca
Hi all,

We have just submitted an updated version of draft-tiloca-tls-dos-handshake

This revised version especially considers the comments from Eric
Rescorla and following discussion [1]. Thanks again, Eric!

Comments are very welcome.

Best,
/Marco

[1] https://www.ietf.org/mail-archive/web/tls/current/msg23824.html


 Forwarded Message 
Subject:New Version Notification for
draft-tiloca-tls-dos-handshake-01.txt
Date:   Sat, 28 Oct 2017 04:54:51 -0700
From:   internet-dra...@ietf.org
To: Maarten Hoeve , Ludwig Seitz
, Olaf Bergmann , Marco Tiloca




A new version of I-D, draft-tiloca-tls-dos-handshake-01.txt
has been successfully submitted by Marco Tiloca and posted to the
IETF repository.

Name:   draft-tiloca-tls-dos-handshake
Revision:   01
Title:  Extension for protecting (D)TLS handshakes against Denial of 
Service
Document date:  2017-10-28
Group:  Individual Submission
Pages:  14
URL:
https://www.ietf.org/internet-drafts/draft-tiloca-tls-dos-handshake-01.txt
Status: https://datatracker.ietf.org/doc/draft-tiloca-tls-dos-handshake/
Htmlized:   https://tools.ietf.org/html/draft-tiloca-tls-dos-handshake-01
Htmlized:   
https://datatracker.ietf.org/doc/html/draft-tiloca-tls-dos-handshake-01
Diff:   
https://www.ietf.org/rfcdiff?url2=draft-tiloca-tls-dos-handshake-01

Abstract:
   This document describes an extension for TLS and DTLS to protect the
   server from Denial of Service attacks against the handshake protocol,
   carried out by an on-path adversary.  The extension includes a nonce
   and a Message Authentication Code (MAC) over that nonce, encoded as a
   Handshake Token that a Trust Anchor entity computes and provides to
   the client.  The server registered at the Trust Anchor verifies the
   MAC to determine whether continuing or aborting the handshake.


  


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

The IETF Secretariat



signature.asc
Description: OpenPGP digital signature
___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


[TLS] Re: Adoption call for Large Record Sizes for TLS and DTLS

2024-10-30 Thread Marco Tiloca

Hi,

I support the adoption of this document.

Best,
/Marco

On 2024-10-25 04:46, Sean Turner wrote:

At the TLS meeting at IETF 119 we discussed the Large Record Sizes for TLS and 
DTLS I-D; see [0] and [1]. There has been some list discussion; see [2] and 
[3]. The I-D has been revised a few times since IETF 119 to incorporate list 
feedback. This message is to judge consensus on whether there is support to 
adopt this I-D. If you support adoption and are willing to review and 
contribute text, please send a message to the list. If you do not support 
adoption of this draft, please send a message to the list and indicate why. 
This call will close on November 7, 2024.

Thanks,
Deirdre, Joe, and Sean

[0]https://datatracker.ietf.org/doc/draft-mattsson-tls-super-jumbo-record-limit/ 
[1]https://datatracker.ietf.org/meeting/119/materials/slides-119-tls-large-record-sizes-for-tls-and-dtls-00 
[2]https://mailarchive.ietf.org/arch/msg/tls/ZnGzqIWOkpm_F6zaqAxxtReHpVg/

[3]https://mailarchive.ietf.org/arch/msg/tls/cRH9x6nbLeAnkG-fhOS3ASDA3oU/
___
TLS mailing list --tls@ietf.org
To unsubscribe send an email totls-le...@ietf.org


--
Marco Tiloca
Ph.D., Senior Researcher

Phone: +46 (0)70 60 46 501

RISE Research Institutes of Sweden AB
Box 1263
164 29 Kista (Sweden)

Division: Digital Systems
Department: Computer Science
Unit: Cybersecurity

https://www.ri.se/
___
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org