> Step0: we have this existing deployed thing we want to document.

As I wrote in [1], republishing without adding considerations and guard rails 
is already bad.

> I think it is an interesting idea to use the KEYLOG format to help
> debugging of other security protocols. I think easy debugging helps
> deployment of security protocols.

> Step1: hey can I add ECH to that?
> Step2: let's allow a DE to extend the set of keys we exfiltrate

I think this is another boundary being crossed.
There are two things to debug: The security protocol implementation, and the 
implementation of the application protocol running on top of it.

I am not convinced that the security protocol implementation even needs 
debugging in a standardized form.
After all, if you are debugging TLS (or whatever), you can see that protocol 
being used on the wire. If you do not fully understand a bug in your 
implementation, why would you expect it to output any kind of helpful keying 
material? Why would that be more helpful than an ad hoc debugging method in 
your implementation?
This also goes for ECH, which is part of TLS, not the application layer.

Maybe it is worth it to limit the scope of extractable keys to encryption keys, 
such that application protocols and their implementations can be debugged.
With each increase in scope, I fear we might be even less able to formulate 
resonable security considerations other than "If you implement this, you are 
more likely to be doomed".

> Step3: let's do the same for more protocols

Putting aside EDHOC, the main LI-usecase here is S/MIME and PGP, i.e. widely 
deployed protocols among users.
I do not see much debugging need in these protocols except for TLS. There are 
seldomly new protocols based on S/MIME.
For this reason, it does not seem worth it to include them.

As for EDHOC, I am not sure the security considerations change much going from 
one secure transport to another.
Could non-standardization drive people from EDHOC to TLS?

> Step4: I need to centralise all those key logs
> Step5: We have a standard for cross-protocol LI

LI somewhere on the server side should not matter too much here.
After all, any company or administrator forced by law to exfiltrate their 
traffic will find a convenient way to do so, even if it just means to turn off 
TLS between servers, or installing a TLS-terminating proxy and running 
LI-software behind that. Software should still emit a (possibly standardized 
and easy to find?) warning in the logs somewhere.

LI on the user's device is another deal. Again, at a minimum the user should be 
warned as I mentioned in [2].
We do not need to prevent LI here (and can't). We just need to make sure the 
situation is not worsened by a key file format.

-- TBB

[1] https://mailarchive.ietf.org/arch/msg/tls/FWmfouytzzqMb614Jv4y1cJxTqc/
[2] https://mailarchive.ietf.org/arch/msg/tls/nnqmXWtuBUD7W5NOkB57BYk723c/

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
TLS mailing list -- tls@ietf.org
To unsubscribe send an email to tls-le...@ietf.org

Reply via email to