Hi Ralph,

I agree with you about middleboxes being necessary in some enterprise cases (I know that others vehemently disagree). I wish the TLS WG was receptive to improve the protocol by allowing such boxes to declare themselves and participate actively in the protocol (https://tools.ietf.org/html/draft-mcgrew-tls-proxy-server-01).

But the "right" way to deploy enterprise middleboxes is by provisioning their cert into the employees' endpoints, instead of educating them to click through security warnings.

Similarly, airport networks often contain such middleboxes, where the user (who has no reason to trust them of course) is supposed to Just Click Yes.

Thanks,
        Yaron

On 10/14/2014 02:59 PM, Ralph Holz wrote:
Hi everyone,

I second Yaron on the first point: it seems a good idea to mention theft
& forensics - in fact, we already reference some of these in the PFS
section, so we may as well add a few sentences with overall applicability.

On the second point - I am not quite so sure we should call it an
attack. In my experience, there are quite a few companies that use these
boxes for entirely legitimate reasons - especially in the context of
industrial espionage. When employees are informed and consent to this
practice, I do not view it as particularly problematic. In fact, there
was a very interesting I-D a while ago that proposed to export the
session keys to the middle box automatically so it would not have to
break up the cryptographic X.509 link. It did not seem to get much
support, unfortunately. My own network measurements show a significant
number of certificates that can be identified as having been created by
such middle boxes, so they are common.

Ralph

On 14 October 2014 13:45, Yaron Sheffer <[email protected]
<mailto:[email protected]>> wrote:

    Hi Kathleen,

    I sort-of agree with the first point, and fully agree with the
    second one.

    I think that both theft of the private key and forensic
    investigation of the endpoint are essentially out of the document's
    scope. However, they do motivate an important decision we made in
    the BCP: to mandate forward secrecy. With that in mind, they are
    worth a mention.

    I agree that a middlebox that inserts itself into the connection by
    relying on badly designed UI, a problematic PKI architecture and
    non-expert users is indeed a valid attack. Definitely worth a section.

    Thanks,
             Yaron



    On 10/14/2014 12:19 AM, Kathleen Moriarty wrote:

        Kathleen Moriarty has entered the following ballot position for
        draft-ietf-uta-tls-attacks-04: Discuss

        When responding, please keep the subject line intact and reply
        to all
        email addresses included in the To and CC lines. (Feel free to
        cut this
        introductory paragraph, however.)


        Please refer to
        http://www.ietf.org/iesg/__statement/discuss-criteria.__html
        <http://www.ietf.org/iesg/statement/discuss-criteria.html>
        for more information about IESG DISCUSS and COMMENT positions.


        The document, along with other ballot positions, can be found here:
        http://datatracker.ietf.org/__doc/draft-ietf-uta-tls-__attacks/
        <http://datatracker.ietf.org/doc/draft-ietf-uta-tls-attacks/>



        
------------------------------__------------------------------__----------
        DISCUSS:
        
------------------------------__------------------------------__----------

        Thank you for your work on this draft!  It looks great, but I do
        have two
        items I'd like to discuss and see if we can add text to address
        these
        concerns/attacks before switching to a yes.

        1. I think it would be very helpful to include what techniques
        are used
        by forensic tools that enable access to decrypt TLS sessions and
        how to
        respond/prevent that access.  I see you have certificate attacks
        listed
        in 2.7, which is what the common forensic tools leverage.
        However, these
        tools also require access to the private key, and it would be
        helpful to
        mention the importance of protecting the private key, preventing
        exportability, etc..

        In 2.7 I thin it would be helpful to explicitly state that
        commonly used
        forensic tools such as wireshark require access to the private
        key as
        well as use of RSA.  Another option might be to add the
        recommendation to
        protect the private key in 2.13.  If you can't export the key
        (from an
        implementation perspective), that could go a long way to helping to
        reduce this method of exposure.

        I've included a few links for additional information on the list
        of tools
        and explicit details of the attack used in case this is helpful.
            Forensic tools that rely on a MiTM attack to decrypt TLS and
        DTLS
        session:
        http://forensicswiki.org/wiki/__SSL_forensics
        <http://forensicswiki.org/wiki/SSL_forensics>
            Wireshark requires you have the key:
        http://support.citrix.com/__article/CTX116557
        <http://support.citrix.com/article/CTX116557>
            Mitigations are to protect the private key and to not use RSA:

        
http://wirewatcher.wordpress.__com/2010/07/20/decrypting-ssl-__traffic-with-wireshark-and-__ways-to-prevent-it/
        
<http://wirewatcher.wordpress.com/2010/07/20/decrypting-ssl-traffic-with-wireshark-and-ways-to-prevent-it/>
        http://wiki.wireshark.org/__DTLS?highlight=%28tls%29
        <http://wiki.wireshark.org/DTLS?highlight=%28tls%29>

        If you would like text suggestions, let me know and I'll help.

        2. I realize this draft covers explicit attacks against TLS, however
        since pervasive monitoring is considered an attack, it could be
        helpful
        for this draft also cover techniques used by middle boxes to
        intercept
        TLS streams (proxy firewalls, load balancers, etc.).  Although
        these are
        more of 'attacks' on the user, than of TLS, it could be a short
        addition
        to have this documented.

        The TLS session is intercepted, or in the case of a load balancer it
        might be terminated, with a second TLS session initiated to the
        destination allowing traffic to pass in the clear on the
        middlebox.  The
        user is alerted and warned to accept an untrusted certificate in
        this
        process, and many do as a result of corporate restrictions (they
        have no
        choice if they want to go to that site).

        Perhaps implementation recommendations could assist here to
        improve the
        warnings to the user, letting them know their traffic may be
        passing in
        the clear and they may not want to continue with their session.
        Some may
        chose to avoid certain transactions from the work place as a result.


        If you have already discussed these items and decided they were
        out of
        scope, please let me know.  I support this work and just wanted
        to make
        sure we covered all bases or put some out of scope.  Thank you.




        _________________________________________________
        Uta mailing list
        [email protected] <mailto:[email protected]>
        https://www.ietf.org/mailman/__listinfo/uta
        <https://www.ietf.org/mailman/listinfo/uta>


    _________________________________________________
    Uta mailing list
    [email protected] <mailto:[email protected]>
    https://www.ietf.org/mailman/__listinfo/uta
    <https://www.ietf.org/mailman/listinfo/uta>



_______________________________________________
Uta mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/uta

Reply via email to