Hi Eric, Martin, You suggested writing an RFC require replay protection in DTLS 1.3. I was just planning to start writing such a -00 draft but now I see there is “DTLS Clarifications - David Benjamin (15 min)” on the agenda. If that means RFC9147bis, it might be better to have it there. But based on Martin comments, I separate draft might have value anyway.
> I agree that it would be good to require replay protection at this > time. Perhaps we should just publish a short RFC requiring it. Cheers, John From: John Mattsson <john.matts...@ericsson.com> Date: Thursday, 28 December 2023 at 13:47 To: Martin Thomson <m...@lowentropy.net>, Eric Rescorla <e...@rtfm.com> Cc: tls@ietf.org <tls@ietf.org> Subject: Re: [TLS] DTLS 1.3 replay protection of post-handshake messages? On Wed, Nov 29, 2023, at 11:21, Eric Rescorla wrote: > I agree that it would be good to require replay protection at this > time. Perhaps we should just publish a short RFC requiring it. I think that is a good idea and I would be happy to help with such an RFC. Either one mandating DTLS replay protection or one mandating replay protection at some layer. I think it would maybe make most sense to mandate DTLS replay protection. Applications wanting to turn off DTLS replay protection should be required to register an extension. I made a PR to RFC8446bis that shortly describes that 0-RTT replay can be used for server tracking. https://github.com/tlswg/tls13-spec/pull/1334/files Cheers, John Preuß Mattsson From: Martin Thomson <m...@lowentropy.net> Date: Wednesday, 29 November 2023 at 06:02 To: Eric Rescorla <e...@rtfm.com>, John Mattsson <john.matts...@ericsson.com> Cc: tls@ietf.org <tls@ietf.org> Subject: Re: [TLS] DTLS 1.3 replay protection of post-handshake messages? One thing that I observed when we were doing QUIC was that the canonical reference for how to do this sort of anti-replay is a section that is buried deep in an IPsec RFC. Perhaps that short RFC is an opportunity to also document the process in a way that can be a reference to other documents. (That's a slightly longer RFC, but still fairly short; Section 3.4.3 of RFC 4303 is just two pages in the old measure.) On Wed, Nov 29, 2023, at 11:21, Eric Rescorla wrote: > I agree that it would be good to require replay protection at this > time. Perhaps we should just publish a short RFC requiring it. > > -Ekr > > > On Tue, Nov 28, 2023 at 3:00 PM John Mattsson > <john.mattsson=40ericsson....@dmarc.ietf.org> wrote: >> Hi,____ >> __ __ >> Lack of replay also enables tracking of client and server. If the client or >> server is a device moving together with a person this enables tracking of >> the person.____ >> __ __ >> An attacker can store a message from one location and then replay it to the >> client or server in another location. If the client or server accept the >> replayed message, the attacker knows that the device in the two locations >> are one and the same. It is best practice to assume that an attacker can >> always detect if a message was accepted. If the client or server send a >> response to the replayed message (like a replayed client authentication >> request) this is trivial.____ >> __ __ >> This is different from the attack described in Section C.4 “Client and >> Server Tracking Prevention” of RFC8446bis, which describes the client >> reusing a ticket. A network attacker mounting a replay attack are described >> in Section 8 of RFC8446bis. I think a sentence or two should be added to >> Section C.4 to describe that a network attacker mounting a replay attack can >> be used for server tracking and that the mitigations in Section 8 help.____ >> https://datatracker.ietf.org/doc/draft-ietf-tls-rfc8446bis/____ >> __ __ >> Cheers,____ >> John Preuß Mattsson____ >> __ __ >> *From: *TLS <tls-boun...@ietf.org> on behalf of John Mattsson >> <john.mattsson=40ericsson....@dmarc.ietf.org> >> *Date: *Tuesday, 28 November 2023 at 09:30 >> *To: *TLS@ietf.org <tls@ietf.org> >> *Subject: *Re: [TLS] DTLS 1.3 replay protection of post-handshake >> messages?____ >> Hi,____ >> ____ >> Reading RFC 9147 (DTLS 1.3) I cannot find any other interpretation than that >> replay protection may be disabled for all records. This is not a problem for >> the initial lock-step handshake, alerts, KeyUpdate, and ACKs. It seems to be >> a major problem for NewSessionTicket, NewConnectionId, RequestConnectionId, >> and Post-handshake client authentication as the lack of replay protection >> might significantly affect availability. It seems to me that DTLS 1.3 forgot >> to update replay protection based on the new post-handshake messages. Let me >> know if I miss something.____ >> ____ >> It is a bit surprising that DTLS 1.3 published in 2022 allows the >> application to turn off replay protection at all. This very far from current >> best practice for security protocols. There are very good reasons why >> Datagram QUIC mandates replay protection and why TLS 1.3 has several pages >> discussing security considerations for 0-RTT data, which lacks replay >> protection. In general, turning off replay protection (even just for >> application data) might lead to loss of confidentiality, integrity, and >> availability, i.e., the whole CIA triad.____ >> ____ >> Applications cannot be expected to understand the severe consequences of not >> having replay protection or understand how to fix it on the application >> layer. I also don't see any need for turning off replay protection except >> RFC 6083 which is a bit of a special case, and which turned out to have >> replay issues.____ >> https://datatracker.ietf.org/meeting/115/materials/slides-115-tsvwg-sctp-auth-security-issues-00____ >> ____ >> I would strongly recommend all DTLS 1.3 libraries to completely remove the >> option to disable replay protection.____ >> ____ >> An easy fix for the post-handshake messages is to "clarify" that replay >> protection must not be turned off for anything else than application data. I >> you agree I can submit an “erratum” for RFC 9147. But this does not solve >> the general issue that turning off replay protection would be a major >> security problem in almost all applications. ____ >> ____ >> Cheers,____ >> John Preuß Mattsson____ >> ____ >> *From: *TLS <tls-boun...@ietf.org> on behalf of John Mattsson >> <john.mattsson=40ericsson....@dmarc.ietf.org> >> *Date: *Friday, 24 November 2023 at 14:50 >> *To: *TLS@ietf.org <tls@ietf.org> >> *Subject: *[TLS] DTLS 1.3 replay protection of post-handshake messages?____ >> Hi,____ >> ____ >> How does replay protection of Post-handshake messages work in DTLS 1.3 if >> the per-record replay-protection mechanism is turned off?____ >> ____ >> 1. Is the post-handshake messages replay protected in some other way, which >> I miss?____ >> ____ >> 2. Should RFC 9147 state that the per-record replay-protection mechanism can >> only be turned off for application data? (I could not find anything in RFC >> 9147 stating something like this).____ >> ____ >> (things like post-handshake authentication need replay protection in some >> way)____ >> ____ >> Cheers,____ >> John Preuß Mattsson____ >> _______________________________________________ >> TLS mailing list >> TLS@ietf.org >> https://www.ietf.org/mailman/listinfo/tls > _______________________________________________ > TLS mailing list > TLS@ietf.org > https://www.ietf.org/mailman/listinfo/tls
_______________________________________________ TLS mailing list -- tls@ietf.org To unsubscribe send an email to tls-le...@ietf.org