It seems to me like the next step is to share a paper, ideally in the form of an internet-draft, that describes more precisely what you would like to see happen.
On Wed, May 26, 2021, at 18:48, Florian Wilkens wrote: > Dear all, > > first, we want to thank you for your feedback, it is much appreciated! > We wanted to briefly clarify some details about our idea: > > - AEAD/non-AEAD: completely true. We were mainly looking at ciphers from > TLS 1.3 that all use keys and IVs but that is of course unrelated to > AEAD as a concept. > - registering our own ciphersuite: while that is certainly an option, we > are not really advocating for new cipher suites but rather keeping at > least a single cipher suite in the standard that allows for separate > keys for confidentiality and integrity. > > We also tried to catch up on the discussions in 2016/2017 around > industry concerns to TLS 1.3 (regarding PFS and static key exchanges). > While some parts are certainly similar, we think our approach is > different, as we do not aim to weaken the overall connection security > but rather keep the client machine in control of the key material (as it > is already with current TLS). > > To be clear, our prototype already works on current TLS as is. The > client sends either the pre-master-secret or derived session keys to the > network monitor. Naturally, this will continue to work with future TLS > versions as the client ultimately possesses all required key material. > There are certainly scenarios in which an enterprise might still want to > deploy an MitM proxy at the network edge to retain more control, however > our approach is able to avoid the disadvantages induced by these > proxies. In fact multiple commercial offerings (including one proposed > on the linked NIST workshop) already do exactly what we propose and hand > over all key material to a central party for decryption. Whether this is > good practice, is a discussion for another time, but it is already > happening anyway and there is demand for these solutions. > > Our prototype is able to slightly decrease the attack surface on the > network monitor, as it is not able to forge valid packets in the same > connection due to the missing integrity key. The impact on application > protocols such as HTTP is a problem, however this problem is also > present on both commercial solutions that exfiltrate all key material > from the client and MitM proxies. > > Overall, we just wanted to raise some awareness for the use case as we > felt that a small change to a future TLS standard could achieve some > slight improvements regarding the network monitor. However, if that does > not match the WG's opinion that is certainly okay, as we can work with > current TLS. > > So again thank you for you feedback! > Cheers, > Florian > > > On 17.05.21 18:23, Florian Wilkens wrote: > > Hey folks, > > > > we came across a novel use-case that highlights the need for non-AEAD > > ciphers in TLS and would like to start a discussion on that. > > > > Our use-case is passive TLS decryption on network monitors (NMs). > > Non-AEAD ciphers would allow to selectively forward the TLS write keys > > from clients to a NM that can then passively decrypt TLS sessions, > > without touching their integrity (as the write MAC keys remain on the > > host). This would be a major improvement compared to the usage of MitM > > proxies as current state of the art. MitM proxies terminate all TLS > > connections and establish own connections. Thus, a compromised MitM > > proxy cannot only decrypt all packets, but also change packet contents. > > > > We propose an approach for passive TLS decryption [1] in which > > cooperating hosts selectively forward TLS keys to the NM that then > > decrypts TLS sessions. The approach is (i) completely passive and thus > > does not interfere with the overall connection security and (ii) is able > > to selectively decrypt certain TLS connections with the hosts retaining > > full authority over the key material. While a MitM proxy can also claim > > to selectively decrypt traffic, we can guarantee this by keeping key > > material for selected connections on the client. Furthermore, for > > non-AEAD ciphers only the write keys, but not the write MAC keys, are > > forwarded, so that the NM can inspect but not modify TLS packets. > > > > Our prototype is built for the Zeek network monitor [2] and is currently > > in the process of being upstreamed with explicit interest from the > > maintainers [3]. Once merged, this will be the first open-source > > solution for passive TLS decryption on both client host (for which we > > built a small prototype) and network monitor (Zeek). > > > > We understand that AEAD ciphers offer many advantages and we understand > > the decision to limit the set of available ciphers to secure choices > > only. However, we think the use-case of passive TLS decryption is highly > > relevant especially for enterprise settings. In such settings, mainly > > MitM proxies are used that are a security problem on their own. > > > > We look forward to your feedback. > > > > Best, > > Florian > > > > [1] https://arxiv.org/abs/2104.09828 > > [2] https://zeek.org > > [3] https://github.com/zeek/zeek/pull/1518 > > > > > > _______________________________________________ > > TLS mailing list > > TLS@ietf.org <mailto:TLS%40ietf.org> > > https://www.ietf.org/mailman/listinfo/tls > > > > > -- > M.Sc. Florian Wilkens > Research Associate > Phone: +49 40 42883 2353 > > IT-Sicherheit und Sicherheitsmanagement (ISS) > Universität Hamburg > Fachbereich Informatik > Vogt-Kölln-Straße 30 > 22527 Hamburg > Deutschland > > > _______________________________________________ > TLS mailing list > TLS@ietf.org <mailto:TLS%40ietf.org> > https://www.ietf.org/mailman/listinfo/tls > > Attachments: > * OpenPGP_signature _______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls