On Thu, Feb 27, 2025 at 12:59:56PM -0800, S Moonesamy wrote: > Hi Brian, Stephen, > At 06:18 AM 27-02-2025, Stephen Farrell wrote: > > From my POV yes: fundamentally it is a bad idea for > > the IETF to standardise ways to exfiltrate keys > > even if there may be innocuous uses for those. And > > this latest ask (extending the exfiltration from > > being a TLS-only thing, to cover other protocols > > such as EDHOC) IMO nicely demonstrates the danger > > of the TLS WG publishing this document. > > According to Sheffer, Holz and Saint-Andre, "It is known that stolen (or > otherwise obtained) private keys have been used as part of large-scale > monitoring [RFC7258] of certain servers."
What kind of private keys? Is that just the known trouble (TLS_RSA_*, TLS_PSK_* and the session ticket extension), or is it also other key types? Of those, only the pure-PSK stuff remains in TLS 1.3 (TLS 1.3 does have session tickets, but the mechanism is not a security disaster). Those three are especially suited for large-scale monitoring, because all destroy any forward secrecy, avoiding attacker having to steal keys on per-connection basis. Which is certainly highly convinient for attacker. I don't think putting non-ephemeral keys into SSLKEYLOGFILE would be even remotely reasonable. -Ilari _______________________________________________ TLS mailing list -- tls@ietf.org To unsubscribe send an email to tls-le...@ietf.org