This has been bugging me for a long time and I've talked to some here about
it in person, but this report;

https://www.teamupturn.com/static/reports/2016/what-isps-can-see/files/Upturn%20-%20What%20ISPs%20Can%20See%20v.1.0.pdf

provokes me to bring it up. Here's the crux of it; is it really a security
win to recommend the AEAD cipher suites for TLS 1.2 users?

The AEAD cipher suites as-implemented are byte-for-byte mappable to
response sizes, with no padding for any kind of length hiding. This makes
passive size analysis attacks quite a lot easier than they could be (a
quick sample of wikipedia page sizes suggests that even 16 byte blocks
raise the difficulty by orders of magnitude). The search hints attack
outline in the paper may not even work with 16-byte padding. I want to
emphasize that the attack here is passive, undetectable to servers or
clients, and realistic - it's likely happening today.

On the other side of the trade-off is that the AEAD mode ciphers are not
susceptible to mac-then-encrypt issues, such as Lucky13. Some time ago I
wrote up some detail on the Lucky13 attack:
https://blogs.aws.amazon.com/security/post/TxLZP6HNAYWBQ6/s2n-and-Lucky-13
, and my take here is that the scenario is so unrealistic that the attack
is simply impractical against TLS - even unmitigated. In any event, TLS CBC
implementations have been mitigated and patched. Here I also want to
emphasize that the attack is active - it generates lots of noisy signals -
and may never have happened.

Is it wise to make the real-world attack cost less, to mitigate the
theoretical one? I also think AEAD mode is awesome: it's how crypto should
be used, and want to give it a strong endorsement, but not at the cost of
making on-the-wire data meaningfully less secure.

At a minimum: could we agree that if a service/site is sensitive to privacy
- it's reasonable for them to prefer AES-CBC; should they be penalized in
SSL health analysis tools/reports for that configuration? it's not as
flexible or useful as the padding in TLS1.3, but it's what we have.

-- 
Colm
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to