>This file doesn't have any extra information than what would be in a
>serialised
>session data used for session resumption. Something plenty of software
>already
>does.

I hope that is TLS 1.2 only. A TLS 1.3 implementation should not save any other 
keys than resumption_master_secret or PSKs derived from 
resumption_master_secret. If that is not clear in RFC 8446, I think that need 
to be made clear in RFC8446bis.

John

From: Hubert Kario <hka...@redhat.com>
Date: Wednesday, 21 December 2022 at 17:03
To: John Mattsson <john.matts...@ericsson.com>
Cc: Martin Thomson <m...@lowentropy.net>, Peter Gutmann 
<pgut...@cs.auckland.ac.nz>, tls@ietf.org <tls@ietf.org>
Subject: Re: [TLS] sslkeylogfile
On Thursday, 24 November 2022 11:37:02 CET, John Mattsson wrote:
> Hi,
>
> Two high level comments:
>
>
> - OLD: "though use of earlier versions is strongly discouraged [RFC8996]"
>
> That is not what RFC 8996 says. RFC 8996 says
>
> - "TLS 1.1 MUST NOT be used."
> - "TLS 1.1 MUST NOT be used."
>
> Please change to something that aligns with RFC 8996 such as
>
> NEW: "though use of earlier versions is forbidden [RFC8996]"
>
>
> -  "Access to the content of a file in SSLKEYLOGFILE allows an attacker
>    to break the confidentiality protection on any TLS connections that
>    are included in the file."
>
> This is true but does not at all reflect the implications of
> the existence of a file for long-term storage of keys like this.
> Storing any of the keying material like this completely breaks
> the stated forward secrecy property of TLS 1.3 as it creates new
> long-term keys. It does not matter how well the file is
> protected i.e.,
>
>    "Ensuring adequate access control on these files therefore becomes
>    very important."
>
> is not enough. The theoretical security properties are still
> broken badly. I think this draft is problematic, but I can
> understand the need to standardize this existing format. I think
> the fact that SSLKEYLOGFILE breaks the security properties of
> TLS 1.3 needs to very clearly described. As a consequence, I
> think the only allowed use case standardized by TLS WG should be
> limited to non-production debugging. If governments and
> companies wanting visibility do other things, that would be
> outside of IETFs control.

This file doesn't have any extra information than what would be in a
serialised
session data used for session resumption. Something plenty of software
already
does.

> Cheers,
> John
>
> From: TLS <tls-boun...@ietf.org> on behalf of Martin Thomson
> <m...@lowentropy.net>
> Date: Wednesday, 26 October 2022 at 02:18
> To: Peter Gutmann <pgut...@cs.auckland.ac.nz>, tls@ietf.org <tls@ietf.org>
> Subject: Re: [TLS] sslkeylogfile
>
> On Tue, Oct 25, 2022, at 16:48, Peter Gutmann wrote:
>> But it's not the same thing, it only seems to cover some TLS
>> 1.3 extensions.
>> Thus my suggestion to call it "Extensions to the SSLKEYLOGFILE
>> Format for TLS
>> 1.3".
>
> That's not the intent.  Section 3.2 covers all you need for TLS 1.2.
>
> I did not describe the (deprecated) "RSA" key, is that in
> common usage?  Or, are there things that I have missed?  I got
> everything from
> https://firefox-source-docs.mozilla.org/security/nss/legacy/key_log_format/index.html
> but maybe that is no longer the best reference.
>

--
Regards,
Hubert Kario
Principal Quality Engineer, RHEL Crypto team
Web: www.cz.redhat.com<http://www.cz.redhat.com>
Red Hat Czech s.r.o., Purkyňova 99/71, 612 45, Brno, Czech Republic
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to