On Tue, Dec 07, 2021 at 03:59:50PM +0300, Valery Smyslov wrote:
> Hi,
> 
> this message starts a Working Group Last Call for 
> draft-ietf-uta-rfc7525bis-04:
> https://datatracker.ietf.org/doc/draft-ietf-uta-rfc7525bis/
> 
> The WGLC will last for two weeks and will end on December the 21st.
> Please send your comments to the list before this date.
- Section 3.1.1:

Obsolete NOTE should be removed.

- Section 3.4:

The recommendations given are not sufficient for security.

To actually give any forward security, with any timeframe, an server
implementation supporting TLS 1.2 session tickets MUST:

1) Rotate ticket keys periodically, AND
2) Securely destroy the old ticket keys, AND
3) Refuse to resume too old sessions.

Failure to do so does not just expose resumed connections to
compromise, it exposes all connections where client sent the session
ticket extension to compromise, regardless of if the sessions were
ever resumed or not.

The last one is about age of session, not age of ticket. Session can be
older than the ticket. These requirements follow from rather nasty
interaction of the following properties of TLS 1.2 session tickets:

1) Client can initiate handshake without proof-of-possession of the
   session ticket key.
2) The ticket is returned unencrypted.
3) The server can update the ticket.
4) There is no ratcheting of keys.

TLS 1.3 session tickets do not have three of these properties. As
consequence, e.g.:

1) Sending session ticket never compromises the connection.
2) Even without DH, only connections using ticket with compromised
   session ticket encryption key are compromised.

- Section 3.5:

This needs to be strengthened to that all TLS 1.2 implementations
MUST implement renegotiation_info, regardless of if renegotiation is
implemented or not.

It is not safe for client to connect to TLS 1.2 server that does not
support renegotiation_info, regardless of if either endpoint actually
implements renegotiation.

- Section 3.7:

It is not possible for server to acknowledge different SNI hostname.
The server version of server_name extension always has an empty payload.

- Section 3.9:

I do not think the recommendation is in agreement with TLS 1.3. TLS
absolutely requires application profile for 0-RTT (section E.5).

- Section 4:

What is "targeted security services" in context of cipher suites?
Maybe "targeted security level"?

- Section 6.4:

Reusing ECDH exponents is insecure unless one either:

1) Checks for point validity, or
2) Uses montgomery ladder with twist-secure curve.

Currently the only curves in TLS satsifying 2) are x25519 and x448. For
any other elliptic curve, reusing exponents without validating points
is insecure. Few thoursand connection attempts at most is sufficient
for recovering the ECDH private key, which compromises any connection
that used it.

- Section 6.5:

It seems that status_request_v2 is rather poorly supported.

Furthermore in context of WebPKI, the support for CA OCSP is really
poor. Major intermediates lack OCSP entierely, or the responses have
really long lifetimes (up to the 1 year maximum). Effective revocation
of WebPKI CAs basically requires propiteriary mechanisms.


-Ilari

_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to