<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version  -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-dkg-tls-reject-static-dh-00" category="std">

  <front>
    <title abbrev="TLS clients reject static DH">TLS clients should reject static Diffie-Hellman</title>

    <author initials="D.K." surname="Gillmor" fullname="Daniel Kahn Gillmor">
      <organization>ACLU</organization>
      <address>
        <email>dkg@fifthhorseman.net</email>
      </address>
    </author>

    <date year="2018" month="December"/>

    <area>Network</area>
    <workgroup>tls</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>This draft addresses problematic proposals that contradict the
expected security properties of TLS.  In particular, the ETSI
“Middlebox Security Protocol” standard deliberately weakens the
cryptographic guarantees of TLS unilaterally by the server, using
static Diffie-Hellman keys where ephemeral keys are expected.
Responsible TLS clients should avoid connecting to servers that appear
to implement such a specification.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>TLS 1.3 <xref target="RFC8446"/> promises strong cryptographic properties for a
two-party protocol.  These properties are the result of extensive
engineering and analysis, and are intended to afford users of TLS
baseline expectations of confidentiality, integrity, authentication,
as well as more subtle properties like replay resistance and forward
secrecy.</t>

<t><xref target="draft-green-tls-static-dh-in-tls13-01"/> proposed the use of a
pseudo-static DH share, and was discussed at length in the IETF TLS
working group as a mechanism to modify the security properties of TLS
for operations within the “enterprise datacenter”.  The working group
failed to reach consensus on this draft, in large part because of the
changes it created to the TLS security model, the relative lack of
cryptanalysis those changes have received, and the risks to users on
the broader Internet.</t>

<t><xref target="MIDDLEBOX"/> was recently formalized by ETSI, and offers a very
similar mechanism to <xref target="draft-green-tls-static-dh-in-tls13-01"/>. In
particular, MIDDLEBOX addresses none of the concerns raised during the
earlier discussion, and is not fit for the goals of TLS.</t>

<t>This document discusses how responsible TLS clients can avoid the
risks inherent in such a design, by refusing connections to peers that
implement it.</t>

<section anchor="key-words" title="Key Words">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”,
“SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “MAY”, and “OPTIONAL” in this
docuoment are to be interpreted as described in <xref target="RFC2119"/>.</t>

</section>
</section>
<section anchor="static-dh-problems" title="Problems with static DH">

<t><xref target="MIDDLEBOX"/> proposes the use of static Diffie-Hellman keys where TLS
expects ephemeral Diffie-Hellman keys.  Furthermore, it encourages the
sharing of those secret keys with third parties (“middleboxes”).  This
section documents some of the known problems with this design.</t>

<section anchor="limited-cryptanalysis" title="Limited cryptanalysis">

<t>TLS 1.3 as specified has been subject to a substantial amount of
cryptanalysis, including formal methods that provide security
guarantees.  Much of that cryptanalysis takes as a given that the
ephemeral DH keys are never re-used.  Deliberately re-using DH keys
invalidates some of this cryptanalysis, and discards the formal
guarantees provided.</t>

</section>
<section anchor="lack-of-forward-secrecy" title="Lack of forward secrecy">

<t>Standard ephemeral Diffie-Hellman key exchange permits simple forward
secrecy by means of each peer discarding the secrets used to establish
the session.  Reusing a DH key requires retention of the key, which
means that the expected forward secrecy properties are lost.</t>

</section>
<section anchor="confidentiality-violation-by-middleboxes" title="Confidentiality violation by middleboxes">

<t>A Middlebox which has access to the DH key of a given session can read
the contents of the messages in that session by deriving the
client_application_traffic_secret and
server_application_traffic_secret and using it to decrypt
ApplicationData messages.  This appears to be the stated goal of
<xref target="MIDDLEBOX"/> but typical TLS clients unwittingly connecting to such a
server may still expect confidentiality against third party
eavesdropping.  This implementation violates that expectation.</t>

</section>
<section anchor="message-tampering-by-middleboxes" title="Message tampering by middleboxes">

<t>A Middlebox which has access to the DH key of a given session can
derive all necessary secrets of the session, and is capable of
modifying messages in flight without detection by either peer.  This
violates the integrity guarantees of TLS.</t>

</section>
<section anchor="session-resumption-by-middleboxes" title="Session resumption by middleboxes">

<t>A middlebox with access to the DH key of a given session can derive
the resumption_master_secret, and can also view any NewSessionTicket
messages sent by the server.  The middlebox can use that information
to subsequently resume the session as the client, impersonating the
client to the server.  The middlebox can also replay any
application-layer data that the server might use to establish client
identity (e.g. passwords or HTTP cookies).  Since many TLS servers
associate a TLS session with a client identity or application-layer
bearer tokens, this effectively allows the middlebox to impersonate
the client.  This violates expectations of authenticity (because the
server does not know that the client is really the client) and replay
resistance (because the server can replay any application layer data
sent by the client to the server without the client’s knowledge).</t>

</section>
<section anchor="static-dh-implementations-are-error-prone" title="Static DH implementations are error-prone">

<t>Implementations of static DH schemes are known to be difficult to
implement correctly.  See for example <xref target="invalid-curves-TLS-ECDH"/>.
Proposals of this nature are likely to introduce new forms of
implementation error that would be avoided by standard
implementations.</t>

</section>
</section>
<section anchor="mitigations-against-static-dh" title="Mitigations against static DH">

<t>Given the concerns raised in <xref target="static-dh-problems"/>, responsible TLS
clients that want to provide the standard TLS guarantees need to
implement clear mitigations against risky peers.</t>

<section anchor="tls-clients-must-reject-server-certificates-marked-for-use-with-static-dh" title="TLS Clients MUST Reject server certificates marked for use with static DH">

<t><xref target="MIDDLEBOX"/> suggests that most servers using the designated scheme
will use a certificate with so-called “VisibilityInformation” stored
in the <spanx style="verb">subjectAltName</spanx> X.509v3 extension (see <xref target="RFC5280"/>), as an
<spanx style="verb">otherName</spanx> field with a specific <spanx style="verb">type-id</spanx> of 0.4.0.3523.3.1.</t>

<figure title="OID of VisibilityInformation `type-id`" anchor="visibility-extension"><artwork><![CDATA[
    0.4.0.3523.3.1
    { itu-t(0)
      identified-organization(4)
      etsi(0)
      msp(3523)
      etls(3)
      visibility(1) }
]]></artwork></figure>

<t>A TLS client that receives a Certificate message from the server where
the end entity certificate contains any such element in its
<spanx style="verb">subjectAltName</spanx> MUST terminate the TLS connection with a fatal
<spanx style="verb">bad_certificate</spanx> alert.</t>

</section>
<section anchor="track-dh" title="Client detection and rejection of static DH">

<t>Annex A of <xref target="MIDDLEBOX"/> suggests that some servers may use
pseudo-static Diffie-Hellman without this <spanx style="verb">subjectAltName</spanx> in their
certificate.</t>

<t>To defend against leakage from these servers, responsible TLS clients
that can afford to keep state SHOULD keep track of the DH shares sent
by the server over the course of multiple connections.</t>

<t>If the TLS client notices that it has been offered the same DH share
more than once, it SHOULD terminate the TLS connection upon handshake
completion with a fatal <spanx style="verb">decrypt_error</spanx> alert.</t>

</section>
<section anchor="servers-must-avoid-accidental-dhe-share-reuse" title="Servers MUST avoid accidental DHE share reuse">

<t>Given the concerns in <xref target="static-dh-problems"/> and the necessary client
mitigations in the subsections above, servers need to avoid giving the
appearance of using non-ephemeral DH.  Servers MUST NOT reuse
ephemeral DH shares.</t>

</section>
</section>
<section anchor="security" title="Security Considerations">

<t>This entire document is an attempt to address security considerations
associated with a non-standard use of TLS.</t>

</section>
<section anchor="privacy" title="Privacy Considerations">

<section anchor="timing-of-rejection-for-detecting-dh-reuse" title="Timing of rejection for detecting DH reuse">

<t>Clients that are not careful with timing may introduce a minor
linkability concern when implementing the mitigation described in
<xref target="track-dh"/>.</t>

<t>A network adversary capable of observing some connections, and
actively interfering with others may be able to identify a TLS client
of a standard TLS server across different connections by observing a
successul connection, and then impersonating the server on a
subsequent connection from an unknown client to the same server while
re-using the server’s previously-offered DH share.  If the client
rejects this share early (e.g upon receipt of the ServerHello, but
before the handshake completes), then the network adversary can
re-identify the client.</t>

<t>Note that this likability attack is mitigated by waiting until
handshake completion to reject the server’s offer, since a normal
network adversary will not be able to complete the handshake
legitimately, since it does not know the server’s credentials, so
rejection of the connection at that time will not allow the server to
distinguish the specific client from any other TLS client.</t>

</section>
</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>There are no IANA considerations for this document.</t>

</section>
<section anchor="acknowledgements" title="Acknowledgements">

<t>Thanks to numerous commenters on the tls@ietf.org mailing who
explained why using static DH presents a risk to TLS users.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference  anchor="RFC2119" target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference  anchor="RFC5280" target='https://www.rfc-editor.org/info/rfc5280'>
<front>
<title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
<author initials='D.' surname='Cooper' fullname='D. Cooper'><organization /></author>
<author initials='S.' surname='Santesson' fullname='S. Santesson'><organization /></author>
<author initials='S.' surname='Farrell' fullname='S. Farrell'><organization /></author>
<author initials='S.' surname='Boeyen' fullname='S. Boeyen'><organization /></author>
<author initials='R.' surname='Housley' fullname='R. Housley'><organization /></author>
<author initials='W.' surname='Polk' fullname='W. Polk'><organization /></author>
<date year='2008' month='May' />
<abstract><t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet.  An overview of this approach and model is provided as an introduction.  The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms.  Standard certificate extensions are described and two Internet-specific extensions are defined.  A set of required certificate extensions is specified.  The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions.  An algorithm for X.509 certification path validation is described.  An ASN.1 module and examples are provided in the appendices.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5280'/>
<seriesInfo name='DOI' value='10.17487/RFC5280'/>
</reference>



<reference  anchor="RFC8446" target='https://www.rfc-editor.org/info/rfc8446'>
<front>
<title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /></author>
<date year='2018' month='August' />
<abstract><t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t><t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t></abstract>
</front>
<seriesInfo name='RFC' value='8446'/>
<seriesInfo name='DOI' value='10.17487/RFC8446'/>
</reference>


<reference anchor="MIDDLEBOX" >
  <front>
    <title>Middlebox Security Protocol; Part 3: Profile for enterprise network and data centre access control</title>
    <author >
      <organization>European Telecommunications Standards Institute</organization>
    </author>
    <date year="2018" month="October"/>
  </front>
  <seriesInfo name="ETSI" value="TS 103 523-3"/>
</reference>


    </references>

    <references title='Informative References'>

<reference anchor="draft-green-tls-static-dh-in-tls13-01" >
  <front>
    <title>Data Center use of Static Diffie-Hellman in TLS 1.3</title>
    <author initials="M." surname="Green" fullname="Matthew Green">
      <organization></organization>
    </author>
    <date year="2017" month="July" day="03"/>
  </front>
</reference>
<reference anchor="invalid-curves-TLS-ECDH" >
  <front>
    <title>Practical Invalid Curve Attacks on TLS-ECDH</title>
    <author initials="J." surname="Somorovsky" fullname="Juraj Somorovsky">
      <organization></organization>
    </author>
    <date year="2015" month="September" day="14"/>
  </front>
</reference>


    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

