On Fri, Jan 29, 2021 at 7:52 AM John Mattsson
<john.mattsson=40ericsson....@dmarc.ietf.org> wrote:
>
> Hi,
>
> 3GPP has historically to a large degree used IPsec to protect interfaces in 
> the core and radio access networks. Recently, 3GPP has more and more been 
> specifying use of (D)TLS to replace or complement IPsec. Most 3GPP usage of 
> (D)TLS are long-term connections.
>
> Current best practice for long-term connections is to rerun Ephemeral 
> Diffie-Hellman frequently to limit the impact of a key compromise. For IPsec, 
> ANSSI (France) recommends to rerun Ephemeral Diffie-Hellman every hour and 
> every 100 GB, BSI (Germany) recommend at least every 4 h, and NIST (USA) 
> recommends at least every 8 h. These recommendations are formally for IPsec 
> but makes equal sense for any long-term connection such as (D)TLS.
>
> If I understand correctly, the KeyUpdate handshake message only provides 
> Forward Secrecy (compromise of the current key does not compromise old keys). 
> To ensure that compromise of the current key does not compromise future keys 
> (post-compromise security, backward secrecy, future secrecy) my understanding 
> is that one would have to frequently terminate the connection and do 
> resumption with psk_dh_ke. Seems like this would cause a noticeable 
> interruption in the connection, or? Are there any best practice for how to do 
> frequent ephemeral Diffie-Hellman for long-term (D)TLS connections? Seems to 
> me that frequent ephemeral Diffie-Hellman should be the recommendation for 
> any long-term (D)TLS connection as it is for IPsec.

What's the threat model here?

>
> Cheers,
> John
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls



--
Astra mortemque praestare gradatim

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to