[Last-Call] Re: The SSLKEYLOGFILE Format for TLS

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Thomas,

The draft makes a far broader claim of risks than you describe:

> Access to the content of a file in SSLKEYLOGFILE format allows an attacker to break the confidentiality and integrity protection on any TLS connections that are included in the file.

That this includes passwords is definitely a problem.  But passwords aren't special.  There are many things that could be equally problematic.  HTTP cookies often convey more power than a password, for example.

I don't agree that a media type makes abuse more of a problem.  I've received a number of text/plain files at various times that use this format.  Having a media type potentially makes it easier to identify and block any (likely accidental) attempt to leak secrets in this form.

Cheers,
Martin

On Fri, Jul 26, 2024, at 23:49, Thomas Lußnig wrote:
> Hi,
>
> in the risk description there is not mentioned that decryption of the 
> messages allow to see the plaintext passwords,
> used for identification that are otherwise not visible on the system if 
> they are hashed and salted. So the risk is even
> larger than compromising the old and current session. It will 
> compromise also the user accounts independently of the
> ssl protocol. So any access to this will allow impersonation long after 
> the recording and even after the ssl sessions.
>
> Another risk is adding an mime-type to this filetype can encourage 
> developers to send/publish this highly sensitive file via email or web.
>
>
>
> Gruß Thomas Lußnig
>
>
>
>
>
> --------------------------------------------------------
>
>> Message: 1
>> Date: Thu, 25 Jul 2024 12:13:23 -0700
>> From: The IESG <iesg-secretary@xxxxxxxx>
>> Subject: Document Action: 'The SSLKEYLOGFILE Format for TLS' to
>> 	Informational RFC (draft-ietf-tls-keylogfile-02.txt)
>> To: "IETF-Announce" <ietf-announce@xxxxxxxx>
>> Cc: The IESG <iesg@xxxxxxxx>, draft-ietf-tls-keylogfile@xxxxxxxx,
>> 	paul.wouters@xxxxxxxx, rfc-editor@xxxxxxxxxxxxxx, tls-chairs@xxxxxxxx,
>> 	tls@xxxxxxxx
>> Message-ID: <172193480302.1044038.13275141107936697882@dt-datatracker-
>> 	659f84ff76-9wqgv>
>> Content-Type: text/plain; charset="utf-8"
>> 
>> The IESG has approved the following document:
>> - 'The SSLKEYLOGFILE Format for TLS'
>>   (draft-ietf-tls-keylogfile-02.txt) as Informational RFC
>> 
>> This document is the product of the Transport Layer Security Working Group.
>> 
>> The IESG contact persons are Paul Wouters and Deb Cooley.
>> 
>> A URL of this Internet-Draft is:
>> https://datatracker.ietf.org/doc/draft-ietf-tls-keylogfile/
>> 
>> 
>> 
>> 
>> Technical Summary
>> 
>>    A format that supports the logging information about the secrets used
>>    in a TLS connection is described.  Recording secrets to a file in
>>    SSLKEYLOGFILE format allows diagnostic and logging tools that use
>>    this file to decrypt messages exchanged by TLS endpoints.
>> 
>> Working Group Summary
>> 
>> 
>>    The one thing that worried some people (including your responsible AD)
>>    was the fact that this could be used as pervasive monitoring tool if this
>>    file is offloaded/shared on production systems. Numerous warnings were
>>    added to the document to not do this. As the feature is already readily
>>    available (Firefox, Chrome, Wireshark, openssl, libcurl, etc.) those
>>    who are building such monitoring devices can already do so anyway.
>> 
>> Document Quality
>> 
>>   This is documenting a widely deployed feature that is used for development
>>   and debugging major crypto libraries and browsers (see above)
>> 
>> Personnel
>> 
>>    The Document Shepherd for this document is Sean Turner. The Responsible
>>    Area Director is Paul Wouters.
>> 
>> 
>> 
>> ------------------------------
>> 
>> Message: 2
>> Date: Thu, 25 Jul 2024 12:14:09 -0700
>> From: The IESG <iesg-secretary@xxxxxxxx>
>> Subject: Last Call:
>> 	<draft-ietf-teas-applicability-actn-slicing-07.txt> (Applicability of
>> 	Abstraction and Control of Traffic Engineered Networks (ACTN) to
>> 	Network Slicing) to Informational RFC
>> To: "IETF-Announce" <ietf-announce@xxxxxxxx>
>> Cc: draft-ietf-teas-applicability-actn-slicing@xxxxxxxx,
>> 	james.n.guichard@xxxxxxxxxxxxx, teas-chairs@xxxxxxxx, teas@xxxxxxxx,
>> 	vbeeram@xxxxxxxxxxx
>> Message-ID: <172193484951.1042453.12495308827630261210@dt-datatracker-
>> 	659f84ff76-9wqgv>
>> Content-Type: text/plain; charset="utf-8"
>> 
>> 
>> The IESG has received a request from the Traffic Engineering Architecture and
>> Signaling WG (teas) to consider the following document: - 'Applicability of
>> Abstraction and Control of Traffic Engineered
>>    Networks (ACTN) to Network Slicing'
>>   <draft-ietf-teas-applicability-actn-slicing-07.txt> as Informational RFC
>> 
>> The IESG plans to make a decision in the next few weeks, and solicits final
>> comments on this action. Please send substantive comments to the
>> last-call@xxxxxxxx mailing lists by 2024-08-08. Exceptionally, comments may
>> be sent to iesg@xxxxxxxx instead. In either case, please retain the beginning
>> of the Subject line to allow automated sorting.
>> 
>> Abstract
>> 
>> 
>>    Network abstraction is a technique that can be applied to a network
>>    domain to obtain a view of potential connectivity across the network
>>    by utilizing a set of policies to select network resources.
>> 
>>    Network slicing is an approach to network operations that builds on
>>    the concept of network abstraction to provide programmability,
>>    flexibility, and modularity.  It may use techniques such as Software
>>    Defined Networking (SDN) and Network Function Virtualization (NFV) to
>>    create multiple logical or virtual networks, each tailored for a set
>>    of services that share the same set of requirements.
>> 
>>    Abstraction and Control of Traffic Engineered Networks (ACTN) is
>>    described in RFC 8453.  It defines an SDN-based architecture that
>>    relies on the concept of network and service abstraction to detach
>>    network and service control from the underlying data plane.
>> 
>>    This document outlines the applicability of ACTN to network slicing
>>    in a Traffic Engineered (TE) network that utilizes IETF technologies.
>>    It also identifies the features of network slicing not currently
>>    within the scope of ACTN, and indicates where ACTN might be extended.
>> 
>> 
>> 
>> 
>> The file can be obtained via
>> https://datatracker.ietf.org/doc/draft-ietf-teas-applicability-actn-slicing/
>> 
>> 
>> 
>> No IPR declarations have been submitted directly on this I-D.
>> 
>> 
>> 
>> 
>> 
>> 
>> ------------------------------
>> 
>> Subject: Digest Footer
>> 
>> _______________________________________________
>> IETF-Announce mailing list -- ietf-announce@xxxxxxxx
>> To unsubscribe send an email to ietf-announce-leave@xxxxxxxx
>> 
>> 
>> ------------------------------
>> 
>> End of IETF-Announce Digest, Vol 243, Issue 18
>> **********************************************
> -- 
> last-call mailing list -- last-call@xxxxxxxx
> To unsubscribe send an email to last-call-leave@xxxxxxxx

-- 
last-call mailing list -- last-call@xxxxxxxx
To unsubscribe send an email to last-call-leave@xxxxxxxx




[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux