Re: [TLS] Breaking into TLS for enterprise "visibility" (don't do it)

2018-04-04 Thread Hubert Kario
On Wednesday, 4 April 2018 16:46:36 CEST Roland Zink wrote:
> Am 04.04.2018 um 14:43 schrieb Hubert Kario:
> > On Friday, 30 March 2018 11:42:23 CEST Vakul Garg wrote:
> >> Hi Martin
> >> 
> >>> -Original Message-
> >>> From: TLS [mailto:tls-boun...@ietf.org] On Behalf Of Martin Rex
> >>> Sent: Thursday, March 29, 2018 4:47 AM
> >>> To: Steve Fenter 
> >>> Cc: tls@ietf.org
> >>> Subject: Re: [TLS] Breaking into TLS for enterprise "visibility" (don't
> >>> do
> >>> it)>
> >>> 
> >>> Steve Fenter  wrote:
> >>>> To clarify for anyone who has confusion on the enterprise TLS
> >>>> visibility use case, I think enterprises need to be able to do
> >>>> out-of-band decryption anywhere in the network that they own.
> >>> 
> >>> This is argument is so lame.
> >>> 
> >>> In Germany, monitoring communications between individuals or between
> >>> individuals and legal entities, including communications over corporate
> >>> networks, was made a serious crime in 2004 (TKG 2004) with a penalty of
> >>> up
> >>> to 5 years in prison for listening into such communication.
> >>> 
> >>> The world didn't end.  Really, consider it proven that there is no need.
> >> 
> >> Could monitoring could be legally done if user provided his consent at
> >> the
> >> time of login into enterprise managed terminal?
> >> I guess that's the case in enterprise managed networks.
> > 
> > No, even then the employer needs to establish a concrete case for
> > inspection of the communications of an employee.
> > Employer also must not continue inspection of an email as soon as it has
> > noticed that it is part of a private message.
> > 
> > https://www.lexology.com/library/detail.aspx?g=f946064a-05d0-4603-ace9-384
> > 6b1c7536d
> > 
> > and this is true, to a large degree, for the whole of EU:
> > https://www.theguardian.com/law/2017/sep/05/romanian-chat-messages-read-by
> > -employer-had-privacy-breached-court-rules> 
> >  From the ECHR ruling:
> > "An employer[...] cannot reduce private social life in the workplace to
> > zero. Respect for private life and for the privacy of correspondence
> > continues to exist, even if these may be restricted in so far as
> > necessary."
> 
> This is true, but at the same time the employer is required in many
> countries including Germany to archive many emails and other relevant
> messages. See for example https://en.wikipedia.org/wiki/Email_archiving
> or https://www.intradyn.com/email-retention-laws/. This is often in
> conflict with the above mentioned laws, for an example see
> https://www.theguardian.com/business/2016/jan/08/volkswagen-withhold-emissio
> ns-documents-investigations.
> 
> 
> I don't think breaking TLS is the way to fulfill such requirements but I
> also think TLS connection to a company shouldn't end up at a third party
> providing hosting or CDN services.

it's not in conflict, just because you control of have the data doesn't mean 
you are allowed to access it - think phone companies listening on customer 
conversations

What it does mean, is that realtime access to TLS connections is definitely 
not necessary to retain messages for criminal investigations, that can and 
should be done at the endpoint in control of the company, not in transit at 
network boundary.

-- 
Regards,
Hubert Kario
Senior Quality Engineer, QE BaseOS Security team
Web: www.cz.redhat.com
Red Hat Czech s.r.o., Purkyňova 115, 612 00  Brno, Czech Republic

signature.asc
Description: This is a digitally signed message part.
___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


Re: [TLS] Breaking into TLS for enterprise "visibility" (don't do it)

2018-04-04 Thread Roland Zink

Am 04.04.2018 um 14:43 schrieb Hubert Kario:

On Friday, 30 March 2018 11:42:23 CEST Vakul Garg wrote:

Hi Martin


-Original Message-
From: TLS [mailto:tls-boun...@ietf.org] On Behalf Of Martin Rex
Sent: Thursday, March 29, 2018 4:47 AM
To: Steve Fenter 
Cc: tls@ietf.org
Subject: Re: [TLS] Breaking into TLS for enterprise "visibility" (don't do
it)>
Steve Fenter  wrote:

To clarify for anyone who has confusion on the enterprise TLS
visibility use case, I think enterprises need to be able to do
out-of-band decryption anywhere in the network that they own.

This is argument is so lame.

In Germany, monitoring communications between individuals or between
individuals and legal entities, including communications over corporate
networks, was made a serious crime in 2004 (TKG 2004) with a penalty of up
to 5 years in prison for listening into such communication.

The world didn't end.  Really, consider it proven that there is no need.

Could monitoring could be legally done if user provided his consent at the
time of login into enterprise managed terminal?
I guess that's the case in enterprise managed networks.

No, even then the employer needs to establish a concrete case for inspection
of the communications of an employee.
Employer also must not continue inspection of an email as soon as it has
noticed that it is part of a private message.

https://www.lexology.com/library/detail.aspx?g=f946064a-05d0-4603-ace9-3846b1c7536d

and this is true, to a large degree, for the whole of EU:
https://www.theguardian.com/law/2017/sep/05/romanian-chat-messages-read-by-employer-had-privacy-breached-court-rules

 From the ECHR ruling:
"An employer[...] cannot reduce private social life in the workplace to zero.
Respect for private life and for the privacy of correspondence continues to
exist, even if these may be restricted in so far as necessary."


This is true, but at the same time the employer is required in many 
countries including Germany to archive many emails and other relevant 
messages. See for example https://en.wikipedia.org/wiki/Email_archiving 
or https://www.intradyn.com/email-retention-laws/. This is often in 
conflict with the above mentioned laws, for an example see 
https://www.theguardian.com/business/2016/jan/08/volkswagen-withhold-emissions-documents-investigations.



I don't think breaking TLS is the way to fulfill such requirements but I 
also think TLS connection to a company shouldn't end up at a third party 
providing hosting or CDN services.



Regards,
Roland






There may be _desires_.  For me, those desires are no less unethical as
data collections by apple, camebridge analytica, facebook, google,
microsoft, whathaveyou...

 and fortunately, for corporations in germany, such data gathering is
not just unethical, but truely criminal by law.


-Martin

___
TLS mailing list
TLS@ietf.org
https://emea01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fww
w.ietf.org%2Fmailman%2Flistinfo%2Ftls&data=02%7C01%7Cvakul.garg%40n
xp.com%7C17aacd25ee5c49568aca08d595021677%7C686ea1d3bc2b4c6fa9
2cd99c5c301635%7C0%7C0%7C636578758559728633&sdata=sa3hcM4C94
%2BX826Xcu4BwvfkIFzfJiB8cjPjOh7s8pI%3D&reserved=0

___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls




___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


Re: [TLS] Breaking into TLS for enterprise "visibility" (don't do it)

2018-04-04 Thread Hubert Kario
On Friday, 30 March 2018 11:42:23 CEST Vakul Garg wrote:
> Hi Martin
> 
> > -Original Message-
> > From: TLS [mailto:tls-boun...@ietf.org] On Behalf Of Martin Rex
> > Sent: Thursday, March 29, 2018 4:47 AM
> > To: Steve Fenter 
> > Cc: tls@ietf.org
> > Subject: Re: [TLS] Breaking into TLS for enterprise "visibility" (don't do
> > it)> 
> > Steve Fenter  wrote:
> > > To clarify for anyone who has confusion on the enterprise TLS
> > > visibility use case, I think enterprises need to be able to do
> > > out-of-band decryption anywhere in the network that they own.
> > 
> > This is argument is so lame.
> > 
> > In Germany, monitoring communications between individuals or between
> > individuals and legal entities, including communications over corporate
> > networks, was made a serious crime in 2004 (TKG 2004) with a penalty of up
> > to 5 years in prison for listening into such communication.
> > 
> > The world didn't end.  Really, consider it proven that there is no need.
> 
> Could monitoring could be legally done if user provided his consent at the
> time of login into enterprise managed terminal?
> I guess that's the case in enterprise managed networks.

No, even then the employer needs to establish a concrete case for inspection 
of the communications of an employee.
Employer also must not continue inspection of an email as soon as it has 
noticed that it is part of a private message.

https://www.lexology.com/library/detail.aspx?g=f946064a-05d0-4603-ace9-3846b1c7536d

and this is true, to a large degree, for the whole of EU:
https://www.theguardian.com/law/2017/sep/05/romanian-chat-messages-read-by-employer-had-privacy-breached-court-rules

From the ECHR ruling:
"An employer[...] cannot reduce private social life in the workplace to zero. 
Respect for private life and for the privacy of correspondence continues to 
exist, even if these may be restricted in so far as necessary."

> > There may be _desires_.  For me, those desires are no less unethical as
> > data collections by apple, camebridge analytica, facebook, google,
> > microsoft, whathaveyou...
> > 
> >  and fortunately, for corporations in germany, such data gathering is
> > not just unethical, but truely criminal by law.
> > 
> > 
> > -Martin
> > 
> > ___
> > TLS mailing list
> > TLS@ietf.org
> > https://emea01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fww
> > w.ietf.org%2Fmailman%2Flistinfo%2Ftls&data=02%7C01%7Cvakul.garg%40n
> > xp.com%7C17aacd25ee5c49568aca08d595021677%7C686ea1d3bc2b4c6fa9
> > 2cd99c5c301635%7C0%7C0%7C636578758559728633&sdata=sa3hcM4C94
> > %2BX826Xcu4BwvfkIFzfJiB8cjPjOh7s8pI%3D&reserved=0
> 
> ___
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls


-- 
Regards,
Hubert Kario
Senior Quality Engineer, QE BaseOS Security team
Web: www.cz.redhat.com
Red Hat Czech s.r.o., Purkyňova 115, 612 00  Brno, Czech Republic

signature.asc
Description: This is a digitally signed message part.
___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


Re: [TLS] Breaking into TLS for enterprise "visibility" (don't do it)

2018-03-30 Thread Vakul Garg
Hi Martin

> -Original Message-
> From: TLS [mailto:tls-boun...@ietf.org] On Behalf Of Martin Rex
> Sent: Thursday, March 29, 2018 4:47 AM
> To: Steve Fenter 
> Cc: tls@ietf.org
> Subject: Re: [TLS] Breaking into TLS for enterprise "visibility" (don't do it)
> 
> Steve Fenter  wrote:
> >
> > To clarify for anyone who has confusion on the enterprise TLS
> > visibility use case, I think enterprises need to be able to do
> > out-of-band decryption anywhere in the network that they own.
> 
> This is argument is so lame.
> 
> In Germany, monitoring communications between individuals or between
> individuals and legal entities, including communications over corporate
> networks, was made a serious crime in 2004 (TKG 2004) with a penalty of up
> to 5 years in prison for listening into such communication.
> 
> The world didn't end.  Really, consider it proven that there is no need.
> 
 
Could monitoring could be legally done if user provided his consent at the time 
of 
login into enterprise managed terminal? 
I guess that's the case in enterprise managed networks.

> There may be _desires_.  For me, those desires are no less unethical as data
> collections by apple, camebridge analytica, facebook, google, microsoft,
> whathaveyou...
> 
>  and fortunately, for corporations in germany, such data gathering is not
> just unethical, but truely criminal by law.
> 
> 
> -Martin
> 
> ___
> TLS mailing list
> TLS@ietf.org
> https://emea01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fww
> w.ietf.org%2Fmailman%2Flistinfo%2Ftls&data=02%7C01%7Cvakul.garg%40n
> xp.com%7C17aacd25ee5c49568aca08d595021677%7C686ea1d3bc2b4c6fa9
> 2cd99c5c301635%7C0%7C0%7C636578758559728633&sdata=sa3hcM4C94
> %2BX826Xcu4BwvfkIFzfJiB8cjPjOh7s8pI%3D&reserved=0

___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


Re: [TLS] Breaking into TLS for enterprise "visibility" (don't do it)

2018-03-28 Thread Martin Rex
Steve Fenter  wrote:
>
> To clarify for anyone who has confusion on the enterprise TLS visibility
> use case, I think enterprises need to be able to do out-of-band decryption
> anywhere in the network that they own.

This is argument is so lame.

In Germany, monitoring communications between individuals or between
individuals and legal entities, including communications over corporate
networks, was made a serious crime in 2004 (TKG 2004) with a penalty of
up to 5 years in prison for listening into such communication.

The world didn't end.  Really, consider it proven that there is no need.

There may be _desires_.  For me, those desires are no less unethical
as data collections by apple, camebridge analytica, facebook, google,
microsoft, whathaveyou...

 and fortunately, for corporations in germany, such data gathering 
is not just unethical, but truely criminal by law.


-Martin

___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


Re: [TLS] Breaking into TLS for enterprise "visibility" (don't do it)

2018-03-26 Thread Ion Larranaga Azcue
For the monitoring part, I have never felt the need to monitor anything outside 
the end points of the connections. If I need to decrypt packets online in order 
to troubleshoot it, it’s because my application is currently not providing 
enough information in the debug logs. And in order to consolidate similar logs 
generating at different servers, many of our customers (including several 
national banks) used our SIEM tool to collect all information generated by 
their applications and query it in a centralized way. For me, TLS connections 
should always be opaque pipes. If I want to look at what’s within, I have to 
look from one end.

Regarding IPS/IDS appliances, maybe it’s the time to change the current idea 
and say that IPS services should not be the “big brother” thet are today. I 
would go for “global” IPS/IDS appliances working on traffic content for 
unencrypted connections and traffic trends for encrypted ones. For protection 
of each server, IPS/IDS agents installed within the machine could monitor and 
defend each specific service in it. As server plugins or if necessary, TLS 
termination at the agent, cleartext analysis and passing it to the server in 
cleartext. Client authentication can still be used in this case. For example, 
using Apache+Tomcat, the AJP protocol has allowed for many years ago the 
passing of TLS client credentials from the TLS terminating frontend (Apache) to 
the backend (Tomcat).

If you still feel that you need TLS visibility, for me the mechanisms already 
in place to export the necessary key material to the out-of-band scanners are 
enough for this. You talk about the need for out-of-band scanners to have the 
key available as soon as they start receiving packets, as they can’t possibly 
cache so many packets for so many connections. In that case you can put the TLS 
handshake on hold until you are sure that the out-of-band scanner has received 
the key material, and only then go on with the handshake.

In fact, I guess (I may be wrong, as I have not gone into it yet) that when 
using the method SSL_CTX_set_keylog_callback included in OpenSSL, handshake 
will not go on until the callback has returned (and if it does continue or the 
callback is performed at the end of the handshake, I think it could be an 
improvement to modify the callback this way). If this callback includes the 
transfer of the material to the out-of-band scanner, then by the time the 
callback ends and the handshake is allowed to continue, any out-of-band scanner 
has been provided with the key material and they can decrypt the TLS data 
without having to queue any packet. If this data cannot be sent to out-of-band 
scanners due to the scanners being down, the server has the option to 
automatically abort the connection or allowing it to continue without the 
visibility (your choice).

Summarizing, I think that there are many ways to overcome the visibility 
problem without having to weaken TLS itself. Probably we won’t be able to find 
a one-size-fits-all solution to magically convert what enterprise have today to 
what is required for TLS 1.3, but I think that for most cases, all that is 
needed is a change of mind and some ideas about how to implement those changes.


De: TLS [mailto:tls-boun...@ietf.org] En nombre de Steve Fenter
Enviado el: lunes, 26 de marzo de 2018 13:49
Para: Tony Arcieri 
CC: tls@ietf.org
Asunto: Re: [TLS] Breaking into TLS for enterprise "visibility" (don't do it)

MITM as a solution doesn't scale for the needs of the enterprise.  Packet 
decryption and inspection is needed at many locations within the data center: 
at many tiers of an application, within the virtual environment, and within the 
cloud environment, all of which may be TLS encrypted.  Speaking as a 
troubleshooter, a problem can happen anywhere in the enterprise network, and 
there are thousands of locations where I need to be able to take a packet trace 
and decrypt it in order to find a slow or failing transaction.

The biggest problem I see with the key escrow solutions being suggested is that 
decryption is in some cases taking place in real time, even though it's out of 
band. This is being done, for example, for security inspection, for fraud 
monitoring, and for application performance monitoring.  TLS decryption 
appliances are going to be getting packets off of 100 gig links, and when the 
packet arrives the keys have to be there.  At this speed there's not a lot of 
time for queuing packets and waiting for keys. If we are going to use exported 
ephemeral keys, I think placing them in the packet as in draft-rhrd is the only 
scalable way to accomplish this.

In response to unwillingness to change, enterprises are doing things today that 
work and that solve our business problems. The alternative suggestions being 
made, like MITM and endpoint monitoring, don't solve our business problems.

In response to how much time we have, it was recently stated on the li

Re: [TLS] Breaking into TLS for enterprise "visibility" (don't do it)

2018-03-26 Thread Steve Fenter
MITM as a solution doesn't scale for the needs of the enterprise.  Packet 
decryption and inspection is needed at many locations within the data center: 
at many tiers of an application, within the virtual environment, and within the 
cloud environment, all of which may be TLS encrypted.  Speaking as a 
troubleshooter, a problem can happen anywhere in the enterprise network, and 
there are thousands of locations where I need to be able to take a packet trace 
and decrypt it in order to find a slow or failing transaction.

The biggest problem I see with the key escrow solutions being suggested is that 
decryption is in some cases taking place in real time, even though it's out of 
band. This is being done, for example, for security inspection, for fraud 
monitoring, and for application performance monitoring.  TLS decryption 
appliances are going to be getting packets off of 100 gig links, and when the 
packet arrives the keys have to be there.  At this speed there's not a lot of 
time for queuing packets and waiting for keys. If we are going to use exported 
ephemeral keys, I think placing them in the packet as in draft-rhrd is the only 
scalable way to accomplish this.

In response to unwillingness to change, enterprises are doing things today that 
work and that solve our business problems. The alternative suggestions being 
made, like MITM and endpoint monitoring, don't solve our business problems.

In response to how much time we have, it was recently stated on the list that 
NIST has published a draft that disallows all non-DH cipher suites, which 
includes TLS 1.2.  TLS 1.2 with Diffie-Hellman only will be just as big of a 
problem for enterprises as TLS 1.3 is.  I don't have a crystal ball, but I 
don't I think the RSA key exchange is going to last five years as has been 
suggested.  And whenever RSA is deprecated, it takes a long time to implement a 
new solution in a large enterprise, so we have to be well out in front of the 
problem,

Steve Fenter

> On Mar 24, 2018, at 3:31 PM, Tony Arcieri  wrote:
> 
>> On Fri, Mar 23, 2018 at 11:26 PM, Alex C  wrote:
>> As I understand it (poorly!) the idea is exactly to have a single system on 
>> the network that monitors all traffic in cleartext.
> 
> And more specifically: to be able to *passively* intercept traffic and allow 
> it to be decrypted by a central system. "Visibility" with an active MitM is a 
> solved problem: have the MitM appliance double as an on-the-fly CA and 
> install its root certificate in the trust stores of all the clients you 
> intend to MitM.
> 
>> It's fundamentally impossible to prevent someone from copying all their 
>> traffic to another system in cleartext. If they're going to do it, they will.
>> The functionality is exactly the same as what could be achieved by 
>> installing monitoring software on each endpoint, but the logistics are 
>> different since the monitoring is centralized.
> 
> The response from "visibility" proponents is "endpoint agents are hard". 
> However, it seems like there is a simple solution to this problem which 
> should be compatible with their existing monitoring architectures and require 
> no changes to TLS:
> 
> Instrument TLS servers and/or client libraries used by internal enterprise 
> applications with a little shim that extracts the session master secret, then 
> makes another TLS connection to a TLS session key escrow service, and goes 
> "here's the session master secret for a session between X.X.X.X and Y.Y.Y.Y 
> with nonce ...". It could even be encrypted-at-rest to a particular 
> public key in advance (which could correspond to e.g. an HSM-backed 
> decryption key).
> 
> Enterprises could continue to passively collect TLS sessions in whatever 
> manner they already do, and decrypt traffic at will, it would just require 
> looking up the session key for a particular session in a key escrow database 
> rather than having a single key-to-the-kingdom.
> 
> This approach requires no changes to TLS, no changes to how "visibility" 
> systems collect traffic, and should provide better security in that using 
> session master secrets better scope the authority conferred to the decryption 
> service than D-H keys which can grant authority to e.g. resume TLS sessions.
> 
> The downsides are you have to instrument clients and/or servers and have the 
> decryption service maintain a key escrow database.
> 
> However, "visibility" proponents seem unwilling to accept any changes to 
> anything they presently do today. This is coupled with a sort of artificial 
> emergency where they claim (or outright lie) that compliance with industry 
> standards will require them to ship TLS 1.3 everywhere tomorrow. There is a 
> total unwillingness to compromise, and all sorts of weasel words being thrown 
> around, from the "visibility" euphemism itself to claims that TLS 1.3 will 
> make them less secure because it makes implementing a 
> single-point-of-compromise for all their encrypted traffic more 

Re: [TLS] Breaking into TLS for enterprise "visibility" (don't do it)

2018-03-26 Thread Steve Fenter
To clarify for anyone who has confusion on the enterprise TLS visibility use 
case, I think enterprises need to be able to do out-of-band decryption anywhere 
in the network that they own.  It would be reasonable to terminate TLS on the 
enterprise's Internet connection, both inbound TLS and outbound TLS, as well as 
on business to business connections.  We could run standard TLS 1.3 on these 
external connections, and then run our modified TLS on the inside.

We also have internal browsers as well as other internal clients going to 
internal TLS servers, and these need deep packet inspection as well.  
Terminating TLS on the internal WAN head-end 
is less attractive, because there are significant sites outside of the data 
center that need troubleshooting and network security monitoring.  For example, 
a large metropolitan area may have many office buildings with thousands of 
users as well as local servers.  There can also be thousands of branch-type 
offices.  We don't want to be blind to these large areas of our enterprise 
network.  I think "scoping the solution to the data center" is the wrong way to 
phrase this, but rather it should be scoping to the internal enterprise 
network, owned and operated by the enterprise.

Also, while there are some enterprises who terminate TLS coming in from the 
Internet and then run clear text on the inside, there are others who run new 
TLS sessions internally.  There is a need for packet decryption and inspection 
at many layers of this internal TLS network.

Steve Fenter

> On Mar 24, 2018, at 7:37 PM, Ion Larranaga Azcue  wrote:
> 
> I recognize I may lack context, because I have only seen Steve Fenter's 
> slides, but apart from it not reaching consensus, the scenario it presents 
> (user connecting to online banking service) seems to be visibility of 
> connections from the internet to internal servers. 
> 
> I think that not even visibility proponents agree between them, as sometimes 
> they seem to require "server-to-server" visibility within the data center 
> while periodically use cases appear (such as the one you mention) where 
> traffic to be decrypted goes from internet to the internal network (or even 
> viceversa). I'm starting to understand someone who some months ago said this 
> looked like playing "whack-a-mole".
> 
> Besides, from what I understand from Steve Fenter's proposal (I may be wrong 
> because I have seen only the slides) , they seem to go for non-visible TLS 
> 1.3 connections from the client to the external layers of the network, and 
> visible TLS 1.3 connections within their internal network. This would match 
> the idea of "visibility only within the datacenter" but in my opinion it 
> requires a finalization of the external tunnel and creation of a new internal 
> one. At that point you obviously have the clear text and you could move your 
> monitor tasks to that point.
> 
> So maybe it's because the presentation is obsolete or because I lack context 
> but... no, I don't think those specific slides are a valid example today.
> 
> ____________
> De: TLS  en nombre de Jim Reid 
> Enviado: sábado, 24 de marzo de 2018 16:56
> Para: Dan Brown
> Cc: tls@ietf.org
> Asunto: Re: [TLS] Breaking into TLS for enterprise "visibility" (don't do it)
> 
>> On 19 Mar 2018, at 15:18, Dan Brown  wrote:
>> 
>> PS: I never directly worked on enterprise security (usually, I just think 
>> about the math of basic crypto primitives), but I don't recall hearing about 
>> such a "visibility" feature in the enterprise security work of colleagues 
>> (whom I do _not_ speak for), e.g. one system used forward-secure ECMQV to 
>> establish a connection between smartphones and the enterprise network.
> 
> Hearsay anecdote is not evidence. :-)
> 
> There are use cases in enterprise networks, notably in banking and finance. 
> Some of these were presented to the TLS WG. [See Steve Fenter’s presentation 
> at IETF97.] However the WG did not reach consensus on adopting the relevant 
> drafts as work items.
> 
> 
> ___
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls

___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


Re: [TLS] Breaking into TLS for enterprise "visibility" (don't do it)

2018-03-24 Thread Ion Larranaga Azcue
I recognize I may lack context, because I have only seen Steve Fenter's slides, 
but apart from it not reaching consensus, the scenario it presents (user 
connecting to online banking service) seems to be visibility of connections 
from the internet to internal servers. 

I think that not even visibility proponents agree between them, as sometimes 
they seem to require "server-to-server" visibility within the data center while 
periodically use cases appear (such as the one you mention) where traffic to be 
decrypted goes from internet to the internal network (or even viceversa). I'm 
starting to understand someone who some months ago said this looked like 
playing "whack-a-mole".

Besides, from what I understand from Steve Fenter's proposal (I may be wrong 
because I have seen only the slides) , they seem to go for non-visible TLS 1.3 
connections from the client to the external layers of the network, and visible 
TLS 1.3 connections within their internal network. This would match the idea of 
"visibility only within the datacenter" but in my opinion it requires a 
finalization of the external tunnel and creation of a new internal one. At that 
point you obviously have the clear text and you could move your monitor tasks 
to that point.

So maybe it's because the presentation is obsolete or because I lack context 
but... no, I don't think those specific slides are a valid example today.


De: TLS  en nombre de Jim Reid 
Enviado: sábado, 24 de marzo de 2018 16:56
Para: Dan Brown
Cc: tls@ietf.org
Asunto: Re: [TLS] Breaking into TLS for enterprise "visibility" (don't do it)

> On 19 Mar 2018, at 15:18, Dan Brown  wrote:
>
> PS: I never directly worked on enterprise security (usually, I just think 
> about the math of basic crypto primitives), but I don't recall hearing about 
> such a "visibility" feature in the enterprise security work of colleagues 
> (whom I do _not_ speak for), e.g. one system used forward-secure ECMQV to 
> establish a connection between smartphones and the enterprise network.

Hearsay anecdote is not evidence. :-)

There are use cases in enterprise networks, notably in banking and finance. 
Some of these were presented to the TLS WG. [See Steve Fenter’s presentation at 
IETF97.] However the WG did not reach consensus on adopting the relevant drafts 
as work items.


___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


Re: [TLS] Breaking into TLS for enterprise "visibility" (don't do it)

2018-03-24 Thread Carl Wallace


From:  TLS  on behalf of Tony Arcieri

Date:  Saturday, March 24, 2018 at 11:31 AM
Subject:  Re: [TLS] Breaking into TLS for enterprise "visibility" (don't do
it)

> On Fri, Mar 23, 2018 at 11:26 PM, Alex C  wrote:
>> As I understand it (poorly!) the idea is exactly to have a single system on
>> the network that monitors all traffic in cleartext.
> 
> And more specifically: to be able to *passively* intercept traffic and allow
> it to be decrypted by a central system. "Visibility" with an active MitM is a
> solved problem: have the MitM appliance double as an on-the-fly CA and install
> its root certificate in the trust stores of all the clients you intend to
> MitM.

It's not a solved problem for mutual authentication scenarios even if you
drop the passive requirement (as should be done in such cases anyway).



___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


Re: [TLS] Breaking into TLS for enterprise "visibility" (don't do it)

2018-03-24 Thread Jim Reid


> On 19 Mar 2018, at 15:18, Dan Brown  wrote:
> 
> PS: I never directly worked on enterprise security (usually, I just think 
> about the math of basic crypto primitives), but I don't recall hearing about 
> such a "visibility" feature in the enterprise security work of colleagues 
> (whom I do _not_ speak for), e.g. one system used forward-secure ECMQV to 
> establish a connection between smartphones and the enterprise network.

Hearsay anecdote is not evidence. :-)

There are use cases in enterprise networks, notably in banking and finance. 
Some of these were presented to the TLS WG. [See Steve Fenter’s presentation at 
IETF97.] However the WG did not reach consensus on adopting the relevant drafts 
as work items.



signature.asc
Description: Message signed with OpenPGP
___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


Re: [TLS] Breaking into TLS for enterprise "visibility" (don't do it)

2018-03-24 Thread Tony Arcieri
On Fri, Mar 23, 2018 at 11:26 PM, Alex C  wrote:

> As I understand it (poorly!) the idea is exactly to have a single system
> on the network that monitors all traffic in cleartext.
>

And more specifically: to be able to *passively* intercept traffic and
allow it to be decrypted by a central system. "Visibility" with an active
MitM is a solved problem: have the MitM appliance double as an on-the-fly
CA and install its root certificate in the trust stores of all the clients
you intend to MitM.

It's fundamentally impossible to prevent someone from copying all their
> traffic to another system in cleartext. If they're going to do it, they
> will.
> The functionality is exactly the same as what could be achieved by
> installing monitoring software on each endpoint, but the logistics are
> different since the monitoring is centralized.
>

The response from "visibility" proponents is "endpoint agents are hard".
However, it seems like there is a simple solution to this problem which
should be compatible with their existing monitoring architectures and
require no changes to TLS:

Instrument TLS servers and/or client libraries used by internal enterprise
applications with a little shim that extracts the session master secret,
then makes another TLS connection to a TLS session key escrow service, and
goes "here's the session master secret for a session between X.X.X.X and
Y.Y.Y.Y with nonce ...". It could even be encrypted-at-rest to a
particular public key in advance (which could correspond to e.g. an
HSM-backed decryption key).

Enterprises could continue to passively collect TLS sessions in whatever
manner they already do, and decrypt traffic at will, it would just require
looking up the session key for a particular session in a key escrow
database rather than having a single key-to-the-kingdom.

This approach requires no changes to TLS, no changes to how "visibility"
systems collect traffic, and should provide better security in that using
session master secrets better scope the authority conferred to the
decryption service than D-H keys which can grant authority to e.g. resume
TLS sessions.

The downsides are you have to instrument clients and/or servers and have
the decryption service maintain a key escrow database.

However, "visibility" proponents seem unwilling to accept any changes to
anything they presently do today. This is coupled with a sort of artificial
emergency where they claim (or outright lie) that compliance with industry
standards will require them to ship TLS 1.3 everywhere tomorrow. There is a
total unwillingness to compromise, and all sorts of weasel words being
thrown around, from the "visibility" euphemism itself to claims that TLS
1.3 will make them less secure because it makes implementing a
single-point-of-compromise for all their encrypted traffic more difficult.

The reality is for these slow-to-change enterprises, the industry standards
are also slow-to-change. There is no emergency. Many of them are still
using TLS 1.0. The PCI-DSS deadline to adopt TLS 1.1 isn't until this June.
I would challenge any "visibility" proponent to cite *any* industry
standard which will mandate TLS 1.3 any time in the next 5 years.

There is lots of time to solve this problem and better ways to solve it
than introducing codepaths which deliberately break the security of the
protocol.

-- 
Tony Arcieri
___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


Re: [TLS] Breaking into TLS for enterprise "visibility" (don't do it)

2018-03-23 Thread Alex C
As I understand it (poorly!) the idea is exactly to have a single system on
the network that monitors all traffic in cleartext.
It's fundamentally impossible to prevent someone from copying all their
traffic to another system in cleartext. If they're going to do it, they
will.
The functionality is exactly the same as what could be achieved by
installing monitoring software on each endpoint, but the logistics are
different since the monitoring is centralized.

The debate seems to be around: whether it should be standardized, and
whether the other endpoint (outside the monitored network) should know
about it.

On Tue, Mar 20, 2018 at 4:18 AM, Dan Brown  wrote:

> Dear TLS WG,
>
> Enterprise "visibility" is a network issue, not an Internet issue, and
> thus, to my _limited_ understanding, should be out of scope of IETF.
>
> Nonetheless, enterprise security is important, and enterprise networks use
> Internet technology internally, so the topic is perhaps still procedurally
> discussable, so I continue.  I (naively) worry that "visibility" is also
> "siphonability", creating an incentive for a Snowden-sized (but malicious)
> leak, which could hurt enterprises and their customers.  In other words:
> who watches the watchers; avoid a single point of weakness; prevent social
> engineering opportunities; decentralize power; make sure the cure is not
> worse than the ailment; etc.  It is not yet clear (to me) which attackers
> "visibility" would thwart, but if it is just naïve (but plentiful)
> insiders, then I imagine the optimal solution would be better endpoint
> management (which may be a more difficult road than "visibility", but
> should still be the long-term solution).
>
> Best regards,
>
> Dan
>
> PS: I never directly worked on enterprise security (usually, I just think
> about the math of basic crypto primitives), but I don't recall hearing
> about such a "visibility" feature in the enterprise security work of
> colleagues (whom I do _not_ speak for), e.g. one system used forward-secure
> ECMQV to establish a connection between smartphones and the enterprise
> network.
>
>
>
>
> ___
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
>
___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls


Re: [TLS] Breaking into TLS for enterprise "visibility" (don't do it)

2018-03-19 Thread Dan Brown
Dear TLS WG,

Enterprise "visibility" is a network issue, not an Internet issue, and thus, to 
my _limited_ understanding, should be out of scope of IETF.

Nonetheless, enterprise security is important, and enterprise networks use 
Internet technology internally, so the topic is perhaps still procedurally 
discussable, so I continue.  I (naively) worry that "visibility" is also 
"siphonability", creating an incentive for a Snowden-sized (but malicious) 
leak, which could hurt enterprises and their customers.  In other words: who 
watches the watchers; avoid a single point of weakness; prevent social 
engineering opportunities; decentralize power; make sure the cure is not worse 
than the ailment; etc.  It is not yet clear (to me) which attackers 
"visibility" would thwart, but if it is just naïve (but plentiful) insiders, 
then I imagine the optimal solution would be better endpoint management (which 
may be a more difficult road than "visibility", but should still be the 
long-term solution).

Best regards,

Dan

PS: I never directly worked on enterprise security (usually, I just think about 
the math of basic crypto primitives), but I don't recall hearing about such a 
"visibility" feature in the enterprise security work of colleagues (whom I do 
_not_ speak for), e.g. one system used forward-secure ECMQV to establish a 
connection between smartphones and the enterprise network.





smime.p7s
Description: S/MIME cryptographic signature
___
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls