Hi, It seems not accurate enough, one of PQCs which has built-in DH algorithm has been cracked. The sentence "the security and availability of PFS need to be further evaluated when PQC is used" should be more accurate.
Best, Meiling From: Karl Norrman Date: 2023-03-15 17:18 To: chenmeil...@chinamobile.com; Jari Arkko; Vesa Torvinen; John Mattsson CC: emu@ietf.org Subject: RE: Re: [Emu] I-D Action: draft-ietf-emu-aka-pfs-10.txt Hi! Section 7.5 currently states: “… introduction of a powerful enough quantum computer would disable this protocol extension's ability to provide the forward security capability. This would make it necessary to update the current ECC algorithms in this specification to PQC algorithms. This specification does not add such algorithms, but a future update can do that.” Would adding a sentence “Such algorithms must be evaluated based on performance, bandwidth consumption and security before being added.” cover your concern? BR Karl From: Meiling Chen <chenmeil...@chinamobile.com> Sent: Wednesday, 15 March 2023 08:18 To: Karl Norrman <karl.norr...@ericsson.com>; Jari Arkko <jari.ar...@ericsson.com>; Vesa Torvinen <vesa.torvi...@ericsson.com>; John Mattsson <john.matts...@ericsson.com> Cc: emu <emu@ietf.org> Subject: Re: Re: [Emu] I-D Action: draft-ietf-emu-aka-pfs-10.txt Hi, Since the differences are in PQC problem. I suggest adding a description in Section 7.5: the security and availability of PFS need to be further evaluated when PQC is used. Best, Meiling From: Meiling Chen Date: 2023-03-13 15:16 To: karl.norrman; jari.arkko; vesa.torvinen; John Mattsson CC: emu Subject: Re: RE: [Emu] I-D Action: draft-ietf-emu-aka-pfs-10.txt Hi, There are some concerns about the use of PFS in CT network, although PFS adds some security in theory, it may not be appropriate for actual deployment. Since this is closely related to 3GPP, what are their comments? Best, Meiling From: Karl Norrman Date: 2023-02-27 19:23 To: chenmeil...@chinamobile.com; Jari Arkko; Vesa Torvinen; John Mattsson CC: emu@ietf.org Subject: RE: RE: [Emu] I-D Action: draft-ietf-emu-aka-pfs-10.txt Hi! I understand your main concern to be that you prefer to see a solution adding PFS that is also secure against a PQ attacker and that does not increase the bandwidth consumption too much doing it. I believe there are benefits of adding a mechanism for PFS for EAP-AKA’ even if a potential future PQ attacker may break the PFS part. As discussed in section 7.5, the PFS property is added on top of EAP-AKA’. An independent DH-exchange is mixed-in with the symmetric-key AKA key establishment, so intuitively, the result is no less secure than the current protocols (even against a PQ attacker). Let’s consider the risks. - If we do nothing, we will surely not get PFS. - If we add PFS based on a DH-exchange, we won’t get PFS against attackers with PQ capabilities (which may or may not materialize, and which may or may not be very costly to obtain). - If we wait with introducing PFS until we have mechanism that has small bandwidth consumption and resists PQ attackers a lot of data will be without PFS protection against non-PQ attackers. Introducing a DH-based PFS mechanism now will not mitigate all those risks, that is true, but it allows parties to make trade-offs that suite their risk appetite. For example: - An operator who does not have the bandwidth to spare can opt to use EAP-AKA’ or native AKA. - An operator may choose to deploy EAP-AKA’ or native AKA for some devices, and EAP-AKA’-FS for others, depending on device or subscription type. The operator would have to assess the risk of PQ attackers to become a concern, and weigh that against the risk of other attacks on the long-term key as well as the consumed bandwidth. My point is that at least there would be a choice until we come up with a more bandwidth-efficient and PQ-attacker resistant mechanism. BR Karl From: Meiling Chen <chenmeil...@chinamobile.com> Sent: Monday, 27 February 2023 04:02 To: Karl Norrman <karl.norr...@ericsson.com>; Jari Arkko <jari.ar...@ericsson.com>; Vesa Torvinen <vesa.torvi...@ericsson.com>; John Mattsson <john.matts...@ericsson.com> Cc: emu <emu@ietf.org> Subject: Re: RE: [Emu] I-D Action: draft-ietf-emu-aka-pfs-10.txt Hi, I don't agree with you mix SUCI and D-H here, It has to be clear that SUCI is only done at the initial stage, However, authentication happens frequently, the network has the authority to initiate authentication, that means D-H Much Higher frequency. The most important issues to be discussed and solved in PFS are also our most important concerns, How to solve PQC problems that we have to take into consideration from 5G , Increase of at least 1000 bytes, How to solve this problem. Best, Meiling From: Karl Norrman Date: 2023-02-13 17:21 To: chenmeil...@chinamobile.com; Jari Arkko; Vesa Torvinen; John Mattsson Subject: RE: RE: [Emu] I-D Action: draft-ietf-emu-aka-pfs-10.txt Hi! Please see inline. From: Meiling Chen <chenmeil...@chinamobile.com> Sent: Monday, 13 February 2023 02:31 To: Karl Norrman <karl.norr...@ericsson.com>; Jari Arkko <jari.ar...@ericsson.com>; Vesa Torvinen <vesa.torvi...@ericsson.com>; John Mattsson <john.matts...@ericsson.com> Subject: Re: RE: [Emu] I-D Action: draft-ietf-emu-aka-pfs-10.txt Hi all, Thanks John open an issue, but I'm Meiling Chen not Meiling Cheng. for Karl's reply please see inline. From: Karl Norrman Date: 2023-02-09 17:02 To: chenmeil...@chinamobile.com; Jari Arkko; Vesa Torvinen; John Mattsson Subject: RE: Re: [Emu] I-D Action: draft-ietf-emu-aka-pfs-10.txt Hi! First, John opened an issue with your comments to the EMU mailing list: Comments by Meiling Cheng · Issue #43 · emu-wg/eap-aka-pfs · GitHub. I have replied to some of your questions there as well. Please see inline. From: Meiling Chen <chenmeil...@chinamobile.com> Sent: Wednesday, 8 February 2023 10:51 To: John Mattsson <john.mattsson=40ericsson....@dmarc.ietf.org>; Jari Arkko <jari.ar...@ericsson.com>; Karl Norrman <karl.norr...@ericsson.com>; Vesa Torvinen <vesa.torvi...@ericsson.com> Subject: Re: Re: [Emu] I-D Action: draft-ietf-emu-aka-pfs-10.txt Hi authors, For this is the Second WG Last Call, I have some comments: 1. EAP-AKA' PFS requirements are not clear and obvious, For this feature, at least 32 bytes will be added to the existing AKA process at the New Radio, which greatly affects the cost. [Karl]: Yes, to increase security, there is a need to increase bandwidth usage. It is a trade-off. I do not believe adding 32 bytes will greatly affect costs for 5G. For 4G it may have been a tougher trade-off, but in 5G we already have a “large” SUCI in the NAS signaling, and there is even discussions around padding that. So in general 5G NAS procedures are already using relatively large messages compared to earlier generations. Further, re-authentication is not a frequently run procedure, making the increased message size less of an issue. [Meiling]: 32Bytes growth for Iot device is fatal, and Resource-constrained equipment can not support D-H, bandwidth and CPU consumption is huge. [Karl]: My point was that a device that is capable of using SUCI would also be capable of running a DH. Similarly, If the bandwidth consumption with SUCI was not seen as a problem, I don’t see that a DH-exchange would be considerably worse. Also note that neither SUCI not authentication are frequent events. When it comes to constrained IoT devices, I am sure there are super-constrained use cases where the device and bandwidth cannot allow for SUCI nor DH. For those use cases, one would have to make a risk-analysis, and if it turns out that the risk is acceptable, one can use EAP-AKA’ or perhaps even plain AKA. At the same time, I note that IETF is standardizing a DH-based key exchange targeted at constrained devices, so sufficiently many use cases involving IoT devices seems capable of running DH (draft-ietf-lake-edhoc-19 - Ephemeral Diffie-Hellman Over COSE (EDHOC)). 2. AKA based on symmetric key is currently very secure, the PFS of communication network is different from that of PC server, For the communication network, UDM has a very high protection intensity, and it is almost impossible for the long-term shared secrets to be leaked. At present, there is no case that the SIM root key is broken by hackers in the process of use. [Karl]: I completely agree with you that AKA is a strong and well-analyzed AKE. That is why EAP-AKA’ FS is reusing it as a building block and extends the protocol with PFS. I also agree that the UDM can be assumed to be well protected. We do, however, need to consider that the long-term keys are not only at risk when stored in the UDM. The keys are also present in the USIM, and the distribution of the keys is another attack vector. In fact, the distribution was what was attacked in the SIM Heist attack in 2015 (The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle (theintercept.com)). It could be argued that PFS does not help against attacks when the adversary knows the key even before it is provided to the customer. This is true, but it does help if such batches of keys are obtained by an adversary at a later stage. [Meiling]: FOR SIM Heist attack in 2015, The main culprit is the manufacturing process of SIM card manufacturers, this is a low probability event. There is no absolute security in this world. [Karl]: That is true, but I would like to reiterate what I say below regarding multi-level security: this days, 3GPP and other organizations do apply several layers of security. Again, for SBA, one could argue that an inside attacker in the mobile core network is also a low probability event (in comparison to, e.g., air-interface attacks). Still, SA3 chose to add TLS e2e between NFs as a second layer of protection. 3.The necessity of AKA PFS is not strong, AKA is used to protect the security of the signaling for the communication network, PFS considers more at the application layer which TLS has been done. [Karl]: I think we are at a stage where we need to have multi-level security. For example, in SBA in the 5G core network, we do use TLS point-to-point between NFs even though both endpoints reside in an NDS secure domain. A well protected UDM is good first line of defense, but I would not like that to be the only defense. I do believe PFS is important for the access network as well, even if TLS is applied over the top. For example, for userplane traffic, IP addresses and other metadata is still visible even when TLS is applied over the top. This information is also sensitive and requires strong protection. [Meiling]: PFS can not solve the problem of IP addresses and other metadata protection. [Karl]: Sorry for being unclear. What I meant was: The air-interface transports metadata that TLS does not protect. An example of that is IP addresses. The air-interface protects this data with encryption and the keys for that encryption are derived from AKA. Even if TLS has PFS and protects the rest of the data, the air-interface encryption does not have PFS today. That means that someone can collect encrypted air-interface data, later obtain the long-term key and then decrypt the IP addresses. By applying an AKA enhanced with PFS would strengthen the protection that the existing encryption provides. 4.Whether the PFS ideas proposed in this draft are sustainable? How to deal with Post-Quantum Cryptography in the future, the introduction of PQC will increase the consumption of hundreds of bytes? [Karl]: The question of PQC is very important for 3GPP radio access security. Today the security is as you know not using public key crypto for anything else than SUCI. The DH exchange introduced by EAP-AKA’ FS would indeed be a new dependence on asymmetric-key technology. Note though that the session key resulting from EAP-AKA’ FS still includes the symmetric key from the underlying AKA run in addition to the secret g^{xy} resulting from the DH exchange. This means that an adversary would need to break that symmetric key as well, even if they have access to a quantum computer that breaks the DH exchange. [Meiling]: In addition to the sustainability of PQC, Another scenario is how to use AKA PFS in satellite network in the future, Satellite communication is very concerned about byte consumption. [Karl]: I cannot predict whether future 3GPP satellite communication will be so bandwidth constrained that running a DH-exchange is prohibitively expensive. But I would handle that the same way as super-constrained IoT use cases: make a risk-assessment whether the intended satellite use cases can be sufficiently secured without it. BR Karl BR Karl Best, Meiling From: Meiling Chen Date: 2023-01-30 18:21 To: John Mattsson; emu Subject: Re: [Emu] I-D Action: draft-ietf-emu-aka-pfs-10.txt Hi, I have reviewed the draft, it seems that asymmetric negotiation is used to achieve PFS, But I didn't understand how it was realized. MK = PRF'(IK'|CK',"EAP-AKA'"|Identity) MK_ECDHE = PRF'(IK'|CK'|SHARED_SECRET,"EAP-AKA' FS"|Identity) K_encr = MK[0..127] K_aut = MK[128..383] K_re = MK_ECDHE[0..255] MSK = MK_ECDHE[256..767] EMSK = MK_ECDHE[768..1279]1. ECDHE's private key is not reflected in the K_encr, MSK used SHARED_SECRET(I understand it is the private key in a pair of keys), Ensure PFS by mixing private key?The names of SHARED SECRET and long-term shared secrets on the SIM card should be distinguished.2.TLS1.3 support secp256r1, secp384r1, secp521r1,x25519, x448, why the draft only x25519? Best,Meiling From: John Mattsson Date: 2023-01-26 22:36 To: emu@ietf.org Subject: Re: [Emu] I-D Action: draft-ietf-emu-aka-pfs-10.txt Hi, The -10 version fixes various nits found by Peter Yee. Cheers, John From: Emu <emu-boun...@ietf.org> on behalf of internet-dra...@ietf.org <internet-dra...@ietf.org> Date: Thursday, 26 January 2023 at 15:31 To: i-d-annou...@ietf.org <i-d-annou...@ietf.org> Cc: emu@ietf.org <emu@ietf.org> Subject: [Emu] I-D Action: draft-ietf-emu-aka-pfs-10.txt A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the EAP Method Update WG of the IETF. Title : Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS) Authors : Jari Arkko Karl Norrman Vesa Torvinen John Preuß Mattsson Filename : draft-ietf-emu-aka-pfs-10.txt Pages : 32 Date : 2023-01-26 Abstract: Many different attacks have been reported as part of revelations associated with pervasive surveillance. Some of the reported attacks involved compromising the smart card supply chain, such as attacking SIM card manufacturers and operators in an effort to compromise shared secrets stored on these cards. Since the publication of those reports, manufacturing and provisioning processes have gained much scrutiny and have improved. However, the danger of resourceful attackers for these systems is still a concern. Always assuming breach such as key compromise and minimizing the impact of breach are essential zero-trust principles. This specification updates RFC 9048, the improved Extensible Authentication Protocol Method for 3GPP Mobile Network Authentication and Key Agreement (EAP-AKA'), with an optional extension. Similarly, this specification also updates the earlier version of the EAP-AKA' specification in RFC 5448. The extension, when negotiated, provides Forward Secrecy for the session key generated as a part of the authentication run in EAP-AKA'. This prevents an attacker who has gained access to the long-term pre-shared secret in a Subscriber Identity Module (SIM) card from being able to decrypt any past communications. In addition, if the attacker stays merely a passive eavesdropper, the extension prevents attacks against future sessions. This forces attackers to use active attacks instead. The IETF datatracker status page for this draft is: https://datatracker.ietf.org/doc/draft-ietf-emu-aka-pfs/ There is also an htmlized version available at: https://datatracker.ietf.org/doc/html/draft-ietf-emu-aka-pfs-10 A diff from the previous version is available at: https://author-tools.ietf.org/iddiff?url2=draft-ietf-emu-aka-pfs-10 Internet-Drafts are also available by rsync at rsync.ietf.org::internet-drafts _______________________________________________ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu
_______________________________________________ Emu mailing list Emu@ietf.org https://www.ietf.org/mailman/listinfo/emu