I'm in agreement with Stephen.  If you compromise TLS confidentiality you
are going to break application security. For most applications a loss in
confidentiality in TLS will have an impact in other aspects of security.
 The third-party will often be able to inject application traffic, although
it may need to do this over a separate connection.

On Sun, Nov 5, 2017 at 7:38 PM, Richard Barnes <r...@ipv.sx> wrote:

> I understood Cas to be observing that you could in principle remove
> confidentiality with regard to the third party to whom keys are being
> exfiltrated, without also removing integrity and authenticity.  So the
> third party could observe application traffic, but not modify or inject.
> The solution in draft-rhrd removes all three properties with regard to the
> third party (all still of course hold with regard to all other attackers).
>
> So you would still have a risk of violating applications' assumptions with
> regard to confidentiality, but only with regard to confidentiality, and
> only relative to the chosen third party.   To Stephen's point, though, this
> is of course a pretty subtle point for application developers to understand.
>
> --Richard
>
>
> On Sun, Nov 5, 2017 at 8:57 PM, Joseph Salowey <j...@salowey.net> wrote:
>
>> I'm not sure what use cases you are targeting, but this type of solution
>> can be dangerous for application security. Most application security models
>> assume that TLS will provide both confidentiality and authenticity.
>> Breaking confidentiality will often expose vulnerabilities that can result
>> in escalation of privilege or spoofing resulting in a loss of
>> integrity/authenticity in the application. For example, the use bearer
>> tokens such as passwords or session cookies is widespread. It will take
>> much more work to make applications resilient to loss of confidentiality.
>> There may be use cases where confidentiality compromise is limited to just
>> confidentiality, but I think these are in the minority.
>>
>> Joe
>>
>> On Fri, Nov 3, 2017 at 7:41 AM, Cas Cremers <cas.crem...@cs.ox.ac.uk>
>> wrote:
>>
>>> Hi Richard,
>>>
>>> Thanks for the pointer, I had missed your earlier observation of
>>> essentially the same thing in the large mail threads.
>>>
>>> Personally, I think it is a substantial and unmotivated loss in security
>>> to also give up authentication/integrity.
>>>
>>> Note that any changes towards PERC would require some significant
>>> changes in the security analyses; for mctls, I expect it would be a
>>> completely new analysis. (I haven't seen any analyses of rhrd, but of the
>>> three, it is of course closest to the current setup.)
>>>
>>> Best,
>>>
>>> Cas
>>>
>>>
>>> On Fri, Nov 3, 2017 at 2:00 PM, Richard Barnes <r...@ipv.sx> wrote:
>>>
>>>> Hey Cas,
>>>>
>>>> This question is a good one.  Earlier I brought up mcTLS, which some
>>>> folks have been working on to provide even more granular separations than
>>>> you suggest:
>>>>
>>>> https://mctls.org/
>>>>
>>>> I think the authors of draft-rhrd are trying for a more lightweight
>>>> change to TLS.  That said, there might be some intermediate points on the
>>>> spectrum here.  For example, you could define a TLS ciphersuite akin to
>>>> what we defined in PERC when we wanted to break integrity partly and
>>>> confidentiality not at all.
>>>>
>>>> https://tools.ietf.org/html/draft-ietf-perc-double-07
>>>>
>>>> That would be less invasive than mcTLS, while still getting the
>>>> properties you describe.
>>>>
>>>> --Richard
>>>>
>>>>
>>>> On Nov 3, 2017 09:43, "Cas Cremers" <cas.crem...@cs.ox.ac.uk> wrote:
>>>>
>>>> Dear all,
>>>> ​​
>>>> ​​Disclaimer: I am not a proponent of the idea behind draft
>>>> visibility/green/rhrd; I think such a mechanism should not be part of the
>>>> TLS 1.3 standard.
>>>> ​​
>>>> ​​I have a technical problem with the current design, whose goal is to
>>>> allow eavesdropping for inspection, i.e., selectively decreasing
>>>> confidentiality.
>>>> ​​
>>>> ​​However, the design in the draft also enables arbitrary traffic
>>>> modification/insertion, additionally breaking all authentication and
>>>> integrity guarantees. Once someone has the session keys, they can not only
>>>> eavesdrop but can also start to insert/modify traffic. This additional
>>>> decrease in security is entirely unmotivated by the cited use cases.
>>>> ​​
>>>> ​​It is possible to offer authentication and integrity, while
>>>> selectively giving up confidentiality. For example, one could replace the
>>>> AEAD by (i) a mechanism for authentication and (ii) a separate mechanism
>>>> for confidentiality, and then possibly reveal the keys used for (ii), but
>>>> make sure only the real endpoint has the keys for (i). That seems more
>>>> rational to me, and may retain the authentication/integrity guarantees.
>>>> However, it would require a much more invasive change.
>>>> ​​
>>>> ​​Best,
>>>> ​​
>>>> ​​Cas
>>>>
>>>>
>>>> _______________________________________________
>>>> TLS mailing list
>>>> TLS@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/tls
>>>>
>>>>
>>>>
>>>
>>> _______________________________________________
>>> TLS mailing list
>>> TLS@ietf.org
>>> https://www.ietf.org/mailman/listinfo/tls
>>>
>>>
>>
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to