On 3/8/2021 8:00 AM, Eric Rescorla wrote:
Taking a step back from the crypto, I'm trying to make sure I
understand the desired security properties. As I understand the
situation:

- the client has a preconfigured key pair (X_c, Y_c)
- the server is anonymous (i.e., doesn't have a valid TLS cert).
- the server is preconfigured with information about each
  client (in this case, Y_c).

And the desired property you are looking for is that:

1. The client authenticates to the server using X_c
2. The client will only connect to servers that know the
   per-client information

Is this correct?


Assuming it is, it seems like we could accomplish this with
less change to TLS. Here is one proposal (warning: not
at all analyzed so may be totally broken).

- Have the client take on the TLS server role, and use RFC 7250 raw
  public keys. This addresses requirement 1.

- Store a separate per-client value K_c (this can be derived from the
  X_c to ease the burden on the client) and use RFC 8773 external PSK
  with cert authentication to inject K_c into the key schedule.


The list of requirement reminds me of two scenarios: the Anima problem of "bringing a clean device into the new owner's network"; and the corporate Wi-Fi problem of "connecting a device to the corporate Wi-Fi". In the Anima problem, the server can verify that the device identity corresponds to something that the owner bought, but the device has no knowledge of where it is connecting to. Anima proposed to close the security loop by having the device connect to the enterprise first, then check a certificate issued by the manufacturer to device owner. The Wi-Fi scenario uses EAP over TLS and the classic solution is a variation of TOFU: ask the device user to verify that the key is what it expects for the SSID, then remember that for the following connections. In this scenario, the Wi-Fi server is always entitled to verify the client's identity and authorization.

I don't think that these scenarios lend themselves easily to "reversing the roles". At least, not easily.

-- Christian Huitema

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to