<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.3.24 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc strict="yes"?>
<?rfc toc="yes"?>
<?rfc tocdepth="3"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<?rfc iprnotified="no"?>

<rfc ipr="trust200902" docName="draft-mattsson-tls-psk-ke-dont-dont-dont-01" category="info">

  <front>
    <title abbrev="psk_ke don't don't don't">Key Exchange Without Forward Secrecy is NOT RECOMMENDED</title>

    <author initials="J." surname="Preuß Mattsson" fullname="John Preuß Mattsson">
      <organization abbrev="Ericsson">Ericsson AB</organization>
      <address>
        <postal>
          <street>SE-164 80 Stockholm</street>
          <country>Sweden</country>
        </postal>
        <email>john.mattsson@ericsson.com</email>
      </address>
    </author>

    <date year="2021" month="May" day="18"/>

    <area></area>
    <workgroup></workgroup>
    <keyword></keyword>

    <abstract>


<t>Key exchange without forward secrecy enables passive monitoring.  Massive pervasive monitoring attacks relying on key exchange without forward secrecy has been reported, and many more have likely happened without ever being reported.  If key exchange without Diffie-Hellman is used, access to the long-term authentication keys enables a passive attacker to compromise past and future sessions.  Entities can get access to long-term key material in different ways: physical attacks, hacking, social engineering attacks, espionage, or by simply demanding access to keying material with or without a court order. psk_ke does not provide forward secrecy and is NOT RECOMMENDED.  This document sets the IANA registration of psk_ke to NOT RECOMMENDED.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>Key exchange without forward secrecy enables passive monitoring <xref target="RFC7258"/>.  Massive pervasive monitoring attacks relying on key exchange without forward secrecy has been reported <xref target="Heist"/> <xref target="I-D.ietf-emu-aka-pfs"/>, and many more have likely happened without ever being reported.  If key exchange without Diffie-Hellman is used, access to the long-term authentication keys enables a passive attacker to compromise past and future sessions.  Entities can get access to long-term key material in different ways: physical attacks, hacking, social engineering attacks, espionage, or by simply demanding access to keying material with or without a court order.</t>

<t>All TLS 1.2 <xref target="RFC5246"/> cipher suites without forward secrecy has been marked as NOT RECOMMENDED <xref target="RFC8447"/>, and static RSA has been forbidden in TLS 1.3 <xref target="RFC8446"/>.  A large number of TLS profiles forbid use of key exchange without Diffie-Hellman for TLS 1.2 <xref target="RFC7540"/>, <xref target="ANSSI"/>, <xref target="TS3GPP"/>.</t>

<t><list style="symbols">
  <t>ANSSI states that for all versions of TLS: “The perfect forward secrecy property must be ensured.”</t>
  <t>3GPP based their general TLS 1.2 profile on <xref target="RFC7540"/> states: “Only cipher suites with AEAD (e.g. GCM) and PFS (e.g.  ECDHE, DHE) shall be supported.</t>
</list></t>

<t>In addition to the very serious weaknesses of not providing protection against key leakage and enabling passive monitoring <xref target="RFC7258"/>, psk_ke has other significant security problems.  As stated in <xref target="RFC8446"/>, psk_ke does not fulfill one of the fundamental TLS 1.3 security properties, namely “Forward secret with respect to long-term keys”.  When the PSK is a group key, which is now formally allowed in TLS 1.3 <xref target="I-D.ietf-tls-external-psk-guidance"/>, psk_ke fails yet another one of the fundamental TLS 1.3 security properties, namely “Secrecy of the session keys” <xref target="Akhmetzyanova19"/> <xref target="I-D.ietf-tls-external-psk-guidance"/>.</t>

<t>Together with ffdhe, and rsa_pkcs1, psk_ke is one of the bad apples in the TLS 1.3 fruit basket.  Organizations like BSI <xref target="BSI"/> has already produced recommendations regarding TLS 1.3.</t>

<t><list style="symbols">
  <t>BSI states regarding psk_ke that it “This mode should only be used in special applications after consultation of an expert.” and has set a deadline of 2026 when psk_ke should not be used at all anymore.</t>
</list></t>

<t>Unfortunately psk_ke is marked as “Recommended” in the IANA PskKeyExchangeMode registry.  This may weaken security in deployments following the “Recommended” column.  Introducing TLS 1.3 in 3GPP had the unfortunate and surprising effect of drastically lowering the minimum security when TLS is used with PSK authentication.  Some companies in 3GPP has been unwilling to disrecommend psk_ke as IETF has so clearly marked it as “Recommended”.</t>

<t>PSK authentication has yet another big inherent weakness as it does not provide “Protection of endpoint identities”.  It could be argued that PSK authentication should be not recommended solely based on this significant privacy weakness.</t>

<t>This document updates the PskKeyExchangeMode registry under the Transport Layer Security (TLS) Parameters heading.  For psk_ke the “Recommended” value has been set to “N”.</t>

<t>Editor’s note: The current IANA action is based on the present very limited single column in the IANA TLS registries. If more granular classifications were possible in the future, it would likely make sense to difference between different use cases where psk_ke might be useful such as very constrained IoT.</t>

<section anchor="terminology" title="Terminology">

<t>The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”, “MAY”, and “OPTIONAL” in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>

</section>
</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>IANA is requested to update the PskKeyExchangeMode registry under the Transport Layer Security (TLS) Parameters heading.  For psk_ke the “Recommended” value has been set to “N”.</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>





<reference  anchor="RFC2119" target='https://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>



<reference  anchor="RFC8174" target='https://www.rfc-editor.org/info/rfc8174'>
<front>
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
<author initials='B.' surname='Leiba' fullname='B. Leiba'><organization /></author>
<date year='2017' month='May' />
<abstract><t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='8174'/>
<seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>



<reference  anchor="RFC8446" target='https://www.rfc-editor.org/info/rfc8446'>
<front>
<title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /></author>
<date year='2018' month='August' />
<abstract><t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t><t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t></abstract>
</front>
<seriesInfo name='RFC' value='8446'/>
<seriesInfo name='DOI' value='10.17487/RFC8446'/>
</reference>



<reference  anchor="RFC8447" target='https://www.rfc-editor.org/info/rfc8447'>
<front>
<title>IANA Registry Updates for TLS and DTLS</title>
<author initials='J.' surname='Salowey' fullname='J. Salowey'><organization /></author>
<author initials='S.' surname='Turner' fullname='S. Turner'><organization /></author>
<date year='2018' month='August' />
<abstract><t>This document describes a number of changes to TLS and DTLS IANA registries that range from adding notes to the registry all the way to changing the registration policy.  These changes were mostly motivated by WG review of the TLS- and DTLS-related registries undertaken as part of the TLS 1.3 development process.</t><t>This document updates the following RFCs: 3749, 5077, 4680, 5246, 5705, 5878, 6520, and 7301.</t></abstract>
</front>
<seriesInfo name='RFC' value='8447'/>
<seriesInfo name='DOI' value='10.17487/RFC8447'/>
</reference>




    </references>

    <references title='Informative References'>





<reference  anchor="RFC5246" target='https://www.rfc-editor.org/info/rfc5246'>
<front>
<title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
<author initials='T.' surname='Dierks' fullname='T. Dierks'><organization /></author>
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /></author>
<date year='2008' month='August' />
<abstract><t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol.  The TLS protocol provides communications security over the Internet.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5246'/>
<seriesInfo name='DOI' value='10.17487/RFC5246'/>
</reference>



<reference  anchor="RFC7258" target='https://www.rfc-editor.org/info/rfc7258'>
<front>
<title>Pervasive Monitoring Is an Attack</title>
<author initials='S.' surname='Farrell' fullname='S. Farrell'><organization /></author>
<author initials='H.' surname='Tschofenig' fullname='H. Tschofenig'><organization /></author>
<date year='2014' month='May' />
<abstract><t>Pervasive monitoring is a technical attack that should be mitigated in the design of IETF protocols, where possible.</t></abstract>
</front>
<seriesInfo name='BCP' value='188'/>
<seriesInfo name='RFC' value='7258'/>
<seriesInfo name='DOI' value='10.17487/RFC7258'/>
</reference>



<reference  anchor="RFC7540" target='https://www.rfc-editor.org/info/rfc7540'>
<front>
<title>Hypertext Transfer Protocol Version 2 (HTTP/2)</title>
<author initials='M.' surname='Belshe' fullname='M. Belshe'><organization /></author>
<author initials='R.' surname='Peon' fullname='R. Peon'><organization /></author>
<author initials='M.' surname='Thomson' fullname='M. Thomson' role='editor'><organization /></author>
<date year='2015' month='May' />
<abstract><t>This specification describes an optimized expression of the semantics of the Hypertext Transfer Protocol (HTTP), referred to as HTTP version 2 (HTTP/2).  HTTP/2 enables a more efficient use of network resources and a reduced perception of latency by introducing header field compression and allowing multiple concurrent exchanges on the same connection.  It also introduces unsolicited push of representations from servers to clients.</t><t>This specification is an alternative to, but does not obsolete, the HTTP/1.1 message syntax.  HTTP's existing semantics remain unchanged.</t></abstract>
</front>
<seriesInfo name='RFC' value='7540'/>
<seriesInfo name='DOI' value='10.17487/RFC7540'/>
</reference>


<reference anchor="I-D.ietf-emu-aka-pfs">
   <front>
      <title>Perfect-Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA&#39; PFS)</title>
      <author fullname="Jari Arkko">
	 <organization>Ericsson</organization>
      </author>
      <author fullname="Karl Norrman">
	 <organization>Ericsson</organization>
      </author>
      <author fullname="Vesa Torvinen">
	 <organization>Ericsson</organization>
      </author>
      <date month="October" day="30" year="2020" />
      <abstract>
	 <t>   Many different attacks have been reported as part of revelations
   associated with pervasive surveillance.  Some of the reported attacks
   involved compromising smart cards, such as attacking SIM card
   manufacturers and operators in an effort to compromise shared secrets
   stored on these cards.  Since the publication of those reports,
   manufacturing and provisioning processes have gained much scrutiny
   and have improved.  However, the danger of resourceful attackers for
   these systems is still a concern.

   This specification is an optional extension to the EAP-AKA&#39;
   authentication method which was defined in [I-D.ietf-emu-rfc5448bis].
   The extension, when negotiated, provides Perfect Forward Secrecy for
   the session key generated as a part of the authentication run in EAP-
   AKA&#39;.  This prevents an attacker who has gained access to the long-
   term pre-shared secret in a SIM card from being able to decrypt any
   past communications.  In addition, if the attacker stays merely a
   passive eavesdropper, the extension prevents attacks against future
   sessions.  This forces attackers to use active attacks instead.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-emu-aka-pfs-05" />
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-ietf-emu-aka-pfs-05.txt" />
</reference>


<reference anchor="I-D.ietf-tls-external-psk-guidance">
   <front>
      <title>Guidance for External PSK Usage in TLS</title>
      <author fullname="Russ Housley">
	 <organization>Vigil Security</organization>
      </author>
      <author fullname="Jonathan Hoyland">
	 <organization>Cloudflare Ltd.</organization>
      </author>
      <author fullname="Mohit Sethi">
	 <organization>Ericsson</organization>
      </author>
      <author fullname="Christopher A. Wood">
	 <organization>Cloudflare</organization>
      </author>
      <date month="February" day="20" year="2021" />
      <abstract>
	 <t>   This document provides usage guidance for external Pre-Shared Keys
   (PSKs) in Transport Layer Security (TLS) version 1.3 as defined in
   RFC 8446.  It lists TLS security properties provided by PSKs under
   certain assumptions and demonstrates how violations of these
   assumptions lead to attacks.  It discusses PSK use cases,
   provisioning processes, and TLS stack implementation support in the
   context of these assumptions.  It provides advice for applications in
   various use cases to help meet these assumptions.  It also lists the
   privacy and security properties that are not provided by TLS when
   external PSKs are used.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-tls-external-psk-guidance-02" />
   <format type="TXT" target="https://www.ietf.org/archive/id/draft-ietf-tls-external-psk-guidance-02.txt" />
</reference>


<reference anchor="ANSSI" target="https://www.ssi.gouv.fr/uploads/2017/02/security-recommendations-for-tls_v1.1.pdf">
  <front>
    <title>Security Recommendations for TLS</title>
    <author initials="." surname="Agence nationale de la sécurité des systèmes d'information">
      <organization></organization>
    </author>
    <date year="2017" month="January"/>
  </front>
</reference>
<reference anchor="BSI" target="https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/TechGuidelines/TG02102/BSI-TR-02102-2.pdf">
  <front>
    <title>Technical Guideline TR-02102-2 Cryptographic Mechanisms: Recommendations and Key Lengths Part 2 – Use of Transport Layer Security (TLS)</title>
    <author initials="." surname="Bundesamt für Sicherheit in der Informationstechnik">
      <organization></organization>
    </author>
    <date year="2021" month="January"/>
  </front>
</reference>
<reference anchor="Heist" target="https://theintercept.com/2015/02/19/great-sim-heist/">
  <front>
    <title>How Spies Stole the Keys to the Encryption Castle</title>
    <author initials="." surname="The Intercept">
      <organization></organization>
    </author>
    <date year="2015" month="February"/>
  </front>
</reference>
<reference anchor="TS3GPP" target="https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2279">
  <front>
    <title>TS 33.210 Network Domain Security (NDS); IP network layer security</title>
    <author initials="." surname="3GPP">
      <organization></organization>
    </author>
    <date year="2020" month="July"/>
  </front>
</reference>
<reference anchor="Akhmetzyanova19" target="https://eprint.iacr.org/2019/421.pdf">
  <front>
    <title>Continuing to reflect on TLS 1.3 with external PSK</title>
    <author initials="L." surname="Akhmetzyanova">
      <organization></organization>
    </author>
    <author initials="E." surname="Alekseev">
      <organization></organization>
    </author>
    <author initials="E." surname="Smyshlyaeva">
      <organization></organization>
    </author>
    <author initials="A." surname="Sokolov">
      <organization></organization>
    </author>
    <date year="2019" month="April"/>
  </front>
</reference>


    </references>


<section numbered="false" anchor="acknowledgements" title="Acknowledgements">

<t>The authors want to thank Ari Keränen for their valuable comments and feedback.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

