On 09.03.20 20:37, Lukas Tribus wrote:
>> I think the wording from the patch is still quite relaxed :). One of the best
>> summaries describing the session ticket flaws, which I recommend is this:
>> https://blog.filippo.io/we-need-to-talk-about-session-tickets/
> Nothing about this is a MITM attack. The point in the article is that
> when the ticket-key is compromised, captured traffic can be passively
> decrypted (which is what broken PFS means, as explained by the Apache
> docs).

take also this article, which clearly states that session tickets are
vulnerable to replay attacks (which are a kind of MITM):
https://eprint.iacr.org/2019/228.pdf

That paper also says in clear words:

"The standard techniques to achieve [session resumption] are Session
Caches or, alternatively, Session Tickets. The former provides forward
security and resistance against replay attacks, but requires a large
amount of server-side storage. The latter requires negligible storage,
but provides no forward security and is known to be vulnerable to replay
attacks"

I have to admit that I was also not aware that haproxy does not rotate
keys by itself.

As writtenhere before I also think that session tickets should really be
disabled by default and the documentation should point out the risks and
possible attacks. imho simple tls session caching should be enough for
"older"  TLS>=1.2 clients for security reasons and address the
performance concerns. A secure setting should be a default at this
point. If users prefer more (but less secure) performance improvement
features, which even require additional work to make it less insecure
(key rotation), than this should have to be enabled manually only I think.

Key rotation, if enabled, should ideally not be a matter of manual
action by the administrator but key rotation should happen automatically
after a reasonable amount of time. A note in the documentation on the
no-tls-tickets about this is just not enough, especially if session
tickets stay enabled by default.

Björn

Reply via email to