ECDHE only helps if the connections are short-lived, otherwise 
CLIENT/SERVER_TRAFFIC_SECRET_0 is enough for passively eavesdropping on the 
whole connection. Connections lasting months or even years are not uncommon. It 
is essential to frequently rekey using asymmetric ephemeral key exchange 
(EDCHE, ML-KEM, etc.). Long-life connections were not a problem in TLS 1.2 
where you can do ephemeral key exchange inside the connection. TLS 1.3 
connections should not last more than an hour.

While the key shares in acceptable TLS implementations (complying with NIST 
requirements that ephemeral keys are only used once) are ephemeral, I don’t 
think the symmetric keys in TLS can be described as ephemeral.

John

From: Ilari Liusvaara <ilariliusva...@welho.com>
Date: Friday, 28 February 2025 at 09:20
To: TLS@ietf.org <tls@ietf.org>
Subject: [TLS] Re: Additional uses for SSLKEYLOGFILE entries
On Thu, Feb 27, 2025 at 12:59:56PM -0800, S Moonesamy wrote:
> Hi Brian, Stephen,
> At 06:18 AM 27-02-2025, Stephen Farrell wrote:
> > From my POV yes: fundamentally it is a bad idea for
> > the IETF to standardise ways to exfiltrate keys
> > even if there may be innocuous uses for those. And
> > this latest ask (extending the exfiltration from
> > being a TLS-only thing, to cover other protocols
> > such as EDHOC) IMO nicely demonstrates the danger
> > of the TLS WG publishing this document.
>
> According to Sheffer, Holz and Saint-Andre, "It is known that stolen (or
> otherwise obtained) private keys have been used as part of large-scale
> monitoring [RFC7258] of certain servers."

What kind of private keys? Is that just the known trouble (TLS_RSA_*,
TLS_PSK_* and the session ticket extension), or is it also other key
types? Of those, only the pure-PSK stuff remains in TLS 1.3 (TLS 1.3
does have session tickets, but the mechanism is not a security
disaster).

Those three are especially suited for large-scale monitoring, because
all destroy any forward secrecy, avoiding attacker having to steal
keys on per-connection basis. Which is certainly highly convinient
for attacker.

I don't think putting non-ephemeral keys into SSLKEYLOGFILE would
be even remotely reasonable.




-Ilari

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org
_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to