Hiya,

On 10/02/2021 22:56, Jack Visoky wrote:
Hi Stephen,

I believe the case of the robotic arm which paints cars would be a
reasonable example of a case where confidentiality of data is not
required. I fully admit that it's not generalizable to all robotic
arms painting all cars, but I do believe it holds for many of these
cases. At the risk of treading this ground again, could you elaborate
on your thoughts around this use case?

Knowing the positioning of an arm from afar, via snooping on
the n/w, could allow an attacker to fine-tune an attack aimed
at e.g. reducing paint quality, forcing a recall, via changes
to a controller (i.e. not one of the TLS endpoints). That's
not very different to changing the spin-rate of a centrifuge,
an attack that we know was mounted, some time ago.

It's not hard to come up with arguments against these use
cases. I don't claim that those are winning arguments, and
I don't expect those who desire "visibility" will be won
over, but I do claim these are valid arguments for wanting
the "best" transport layer security we can get turned on
everywhere all the time, to the extent possible. I for one
believe experience so far has shown that to be the wisest
approach in general.

S.


Thanks,

--Jack

-----Original Message----- From: TLS <tls-boun...@ietf.org> On Behalf
Of Stephen Farrell Sent: Wednesday, February 10, 2021 7:08 AM To:
John Mattsson <john.mattsson=40ericsson....@dmarc.ietf.org>;
TLS@ietf.org Subject: Re: [TLS] EXTERNAL: TLS 1.3 Authentication and
Integrity only Cipher Suites


Hiya,

I realise it's not proposed as a wg document, but fwiw, I think John
is quite correct below. The only additional point I'd add is that
I've seen cases over the years where the fact that confidentiality
really *is* required only became clear when people actually
considered how to attack systems. I'd be happy to bet beers that will
be the case with some examples mentioned in the draft, esp the
wandering robotic arm.

This seems like a not that well done write-up of a bad idea to me.

S.

On 10/02/2021 09:14, John Mattsson wrote:
Hi,

- The draft has a lot of claims regarding benefits:

"strong requirement for low latency." "minimize the cryptographic
algorithms are prioritized" "important for latency to be very
low." "pay more for a sensor with encryption capability" "come with
a small runtime memory footprint and reduced processing power, the
need to minimize" the number of cryptographic algorithms used is
prioritized."

I don't think this draft should be published as long as it gives
the idea that sacrificing confidentiality has significant benefits
for latency, memory, processing power, and cost. This is in general
not the case.

The two cipher suites TLS_SHA256_SHA256 and TLS_SHA384_SHA384
defined by the draft causes much more message expansion (32 and 48
bytes tags instead of 16 or 8 bytes) than the already registered
cipher suites for TLS 1.3. In many IoT radio systems with small
frames this will leads to significantly increased latency. I think
that needs to be mentioned.


- The draft has ridiculous amount of sentences saying that
confidentiality is not strictly needed.

"do not require confidentiality" "privacy is not strictly needed" "no strong requirement for confidentiality" "no requirement to
encrypt messages" "no need for confidentiality" "reduced need for
confidentiality" "confidentiality requirements are relaxed" "do not
require confidential communications" "does not convey private
information" "without requiring the communication to/from the
robotic arm to be encrypted" "doesn't grant the attacker
information that can be exploited" "no confidentiality
requirements"

It would be more honest if the draft simply stated that "the are
use cases that require visibility". If visibility is not a
requirement for the use cases, I think IETF could help you to
standardize SHA-2 only cipher suites offering confidentiality.


- The draft mentions that the security considerations regarding
confidentiality and privacy does not hold. The draft does not
mention that it breaks one of the stated security properties of TLS
1.3, namely "Protection of endpoint identities". This is actually
quite problematic. EAP-TLS 1.3 relied on this stated TLS 1.3
property to be true.

John

_______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls

Attachment: OpenPGP_0x5AB2FAF17B172BEA.asc
Description: application/pgp-keys

Attachment: OpenPGP_signature
Description: OpenPGP digital signature

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to