On Fri, 6 Dec 2024, 10:06 Muhammad Usama Sardar, <
muhammad_usama.sar...@tu-dresden.de> wrote:

> On 05.12.24 11:03, Ben Smyth wrote:
>
> If they aren't in the model, then analysis is only good up to KeyUpdate.
>
> Sure, I completely agree. We have no guarantees on what is not in the
> formal model. More precisely, I would like the FATT to comment on the
> following:
>
> Since issues have already been found by David, does FATT expect more
> potential issues around KeyUpdate and post-handshake messages that have
> *not* yet been found? If yes:
>
>    - (at least) one example of such potential issue.
>
>
Post-handshake client authentication is one aspect that could be
investigated. Another could be security under a new key. It's plausible
flaws may exist, we just don't believe there are; any issues would be more
likely to arise in corner cases.

>
>    - What kind of tools are most suitable for such an analysis? I suspect
>    a standard model checker (e.g., SPIN) would do (in contrast to symbolic
>    security analysis tools, like ProVerif and Tamarin).
>
> Unsure standard model checkers would help, symbolic security tools seem
the most useful, plus they only require extension of existing models.

> (OpenJDK got KeyUpdate wrong, there were use cases with no security.)
>
> Sounds interesting. Do you have a pointer for me which describes the
> problem precisely?
>

OpenJDK's TLS 1.3 implementation was vulnerable to attack for large data
volumes after closure in one direction:

* Method tryKeyUpdate() "Do[es]n't bother to kickstart if...the connection
is not duplex-open."

Safe AES-GCM operation is upper-bound by about 395 gigabytes of plaintext
under the same key, thereafter OpenJDK was vulnerable to attack, it's been
patched:
https://github.com/openjdk/jdk/commit/14aad787a81368ced426c2a9cb301f4ff0c37c3f

(The official report doesn't reveal much:
https://www.cve.org/CVERecord?id=CVE-2023-21930)

>
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to