[perpass] Hasty PRISM proofing considered harmful

Paul Hoffman <paul.hoffman@gmail.com> Tue, 22 October 2013 15:27 UTC

Return-Path: <paul.hoffman@gmail.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 06BE311E84C4 for <perpass@ietfa.amsl.com>; Tue, 22 Oct 2013 08:27:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, NO_RELAYS=-0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QgLz1i69k9kv for <perpass@ietfa.amsl.com>; Tue, 22 Oct 2013 08:27:00 -0700 (PDT)
Received: from mail-vb0-x230.google.com (mail-vb0-x230.google.com [IPv6:2607:f8b0:400c:c02::230]) by ietfa.amsl.com (Postfix) with ESMTP id 31CF811E83FF for <perpass@ietf.org>; Tue, 22 Oct 2013 08:26:58 -0700 (PDT)
Received: by mail-vb0-f48.google.com with SMTP id w16so3101vbf.21 for <perpass@ietf.org>; Tue, 22 Oct 2013 08:26:57 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:date:message-id:subject:from:to:content-type; bh=nq/ICG1GeSKUzfXT3tsanczABCWT6sWKLzh/6Y5S2Ik=; b=YBqew2jZZRmuAqZT1ygKG6a/5XWSU0VP9gMoJHRlfXdJTBT5QJlAvmZBKkKHDVJUtZ VIr3XqwfPWlw9Mg92BEe3npp307nJo7fSMPiHx1w2k7MCthNle7GaFSkTdOPhA/2OPN9 rcaQLxRfz77KFRCGKw99ffi10NxodMa2fKTwHeWNmBBsI57XmgCM/SaKJzDCbfFNKeby ptEbcDZDDW4vqfO+aQXZd8wJwJdv4Ja4LrrMveUvGMPjGPBGmQWdYZOBypuEbnjqKW4B VQlD3OX3/lOYPqDH2QZoSxlbXV4OdQNb5cmEhyoZGBWna3PYYz5FEFy+mM581896iy6d G3hw==
MIME-Version: 1.0
X-Received: by 10.58.168.205 with SMTP id zy13mr5253746veb.19.1382455617593; Tue, 22 Oct 2013 08:26:57 -0700 (PDT)
Received: by 10.220.150.208 with HTTP; Tue, 22 Oct 2013 08:26:57 -0700 (PDT)
Date: Tue, 22 Oct 2013 08:26:57 -0700
Message-ID: <CAPik8yaKaXRm3t3sepRHAFADCnOmdPjQC5-be3a8Xsr29965BQ@mail.gmail.com>
From: Paul Hoffman <paul.hoffman@gmail.com>
To: perpass@ietf.org
Content-Type: multipart/alternative; boundary="047d7b6dc22401286904e95608c5"
Subject: [perpass] Hasty PRISM proofing considered harmful
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "The perpass list is for discussion of the privacy properties of IETF protocols and concrete ways in which those could be improved. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Oct 2013 15:27:01 -0000

This was posted last night by Viktor Dukhovni on the cryptography mailing
list, but is certainly applicable here. Forwarded with Viktor's permission.

====================

There have been many recent efforts to harden the cryptographic
security of various systems.  I would like to urge anyone considering
taking steps in that direction to exercise due caution.

Multiple recent attempts at improvement backfire in various ways:

   - RedHat has been under pressure for some time to enable EC support
     in their OpenSSL RPM package.

    * They finally relented and added EC support ~1 week ago.  However,
      they quickly decided to play it safe and enable just the Suite-B
      curves: secp256r1, secp384r1 and no others.

    * They neglected to consider that the new libraries now
      happily negotiate EECDH key exchange TLS cipher-suites with
      servers that typically don't know of (or can't act on) the
      client's limitations.

    * At the same time newly hardened SMTP servers at gmx.de
      and other sites have "stronger" security by switching to
      secp521r1.

      # Result: SMTP TLS handshakes break, and more mail goes out in
        the clear!

      # With TLS, no EC is better than crippled EC.

   - GnuTLS sets aggressive client-side EDH prime-size lower bound.

    * Exim encounters interoperability problems and works-around
      the setting by allowing 1024-bit EDH in SMTP clients while
      using 2048-bit EDH in the server (which generally works for
      SMTP).

    * Debian decides to improve security in Exim and raises this
      to 2048-bits, breaking interoperability again.

       # Result:  Since SMTP TLS is generally opportunistic, when
         TLS handshakes break, more mail is transmitted in the clear!

   - Some email administrators disable RC4 (enable only the OpenSSL "HIGH"
     ciphers) in opportunistic TLS.  Many extant Microsoft Exchange servers
     support only RC4-SHA1, RC4-MD5 and 3DES (whose implementation is
     breaks post handshake in data transfer).

       # Result: TLS handshakes fail, and mail is sent in the clear.

   - There's lots of press about CRIME, BEAST, ... and some SMTP
     administrators configure their systems to prefer RC4 and
     avoid CBC ciphersuites.

    # The attacks in question are primarily HTTPS attacks,
    cryptanalysis of RC4 may well be the greater threat to SMTP.

There are I expect similar examples of good intentions, but poor
outcomes outside the world of SMTP.  Raising the bar on Internet
security will take considerable time and effort.  Updated standards
will have to be developed, toolkits extended to support them and
applications updated.  Rolling improved security out to end-users
will likely take on the order of a decade.

In the mean-time, users should make an effort to configure their
systems to employ current best-practice security, trying to go
beyond that into uncharted territory may well be counter-productive.

Endpoint security and misuse of data at rest are still IMHO the
bigger issues.  I am much more concerned about the proliferation
of miniature programmable computers inside our computers (CPUs and
programmable firmware in disk controllers, battery controllers,
BMC controllers, with opaque binary firmware update blobs, and
complex supply chains) that about secp256r1 vs secp521r1.

We thought embedded devices were for physical infrastructure
engineers to worry about, but now they are proliferating inside
our general purpose computers.  The next Stuxnet will run on one
of the invisible computers inside your computer.

With concerted effort we can improve the crypto protocols, but will
it matter if the architecture on top of which the crypto runs has
an ever growing attack surface.