11 September 2013
PRISM-Proof Security Considerations
More on this topic:
http://www.metzdowd.com/pipermail/cryptography
Date: Wed, 11 Sep 2013 16:30:50 -0400
From: Phillip Hallam-Baker <hallam[at]gmail.com>
To: "cryptography[at]metzdowd.com"
<cryptography[at]metzdowd.com>
Subject: [Cryptography] Summary of the discussion so far
I have attempted to produce a summary of the discussion so far for use as
a requirements document for the PRISM-PROOF email scheme. This is now available
as an Internet draft.
http://www.ietf.org/id/draft-hallambaker-prismproof-req-00.txt
I have left out acknowledgements and references at the moment. That is likely
to take a whole day going back through the list and I wanted to get this
out.
If anyone wants to claim responsibility for any part of the doc then drop
me a line and I will have the black helicopter sent round.
--
Website: http://hallambaker.com/
_______________________________________________
The cryptography mailing
list
cryptography[at]metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography
Internet Engineering Task Force (IETF) Phillip Hallam-Baker
Internet-Draft Comodo Group Inc.
Intended Status: Standards Track September 11, 2013
Expires: March 15, 2014
PRISM-Proof Security Considerations
draft-hallambaker-prismproof-req-00
Abstract
PRISM is reputed to be a classified US government that involves
covert interception of a substantial proportion of global Internet
traffic. This document describe the security concerns such a program
raises for Internet users and security controls that may be employed
to mitigate the risk of pervasive intercept capabilities regardless
of source.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
Copyright Notice
Copyright (c) 2013 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Hallam-Baker March 15, 2014 [Page 1]
Internet-Draft Writing I-Ds using HTML September 2013
Table of Contents
1. Requirements . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Attack Degree . . . . . . . . . . . . . . . . . . . . . . . . 3
2.1. Content Disclosure . . . . . . . . . . . . . . . . . . . 3
2.2. Meta Data Analysis . . . . . . . . . . . . . . . . . . . 4
2.3. Traffic Analysis . . . . . . . . . . . . . . . . . . . . 4
2.4. Denial of Service . . . . . . . . . . . . . . . . . . . . 4
2.5. Protocol Exploit . . . . . . . . . . . . . . . . . . . . 5
3. Attacker Capabilities . . . . . . . . . . . . . . . . . . . . 5
3.1. Passive Observation . . . . . . . . . . . . . . . . . . . 5
3.2. Active Modification . . . . . . . . . . . . . . . . . . . 5
3.3. Cryptanalysis . . . . . . . . . . . . . . . . . . . . . . 6
3.4. Kleptography . . . . . . . . . . . . . . . . . . . . . . 6
3.4.1. Covert Channels in RSA . . . . . . . . . . . . . . . 6
3.4.2. Covert Channels in TLS, S/MIME, IPSEC . . . . . . . 6
3.4.3. Covert Channels in Symmetric Ciphers . . . . . . . . 7
3.4.4. Covert Channels in ECC Curves . . . . . . . . . . . 7
3.4.5. Unusable Cryptography . . . . . . . . . . . . . . . 7
3.5. Lawful Intercept . . . . . . . . . . . . . . . . . . . . 7
3.6. Subversion or Coercion of Intermediaries . . . . . . . . 7
3.6.1. Physical Plant . . . . . . . . . . . . . . . . . . . 8
3.6.2. Internet Service Providers . . . . . . . . . . . . . 8
3.6.3. Router . . . . . . . . . . . . . . . . . . . . . . . 8
3.6.4. End Point . . . . . . . . . . . . . . . . . . . . . 8
3.6.5. Cryptographic Hardware Providers . . . . . . . . . . 8
3.6.6. Certificate Authorities . . . . . . . . . . . . . . 8
3.6.7. Standards Organizations . . . . . . . . . . . . . . 9
4. Controls . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
4.1. Confidentiality . . . . . . . . . . . . . . . . . . . . . 9
4.1.1. Perfect Forward Secrecy . . . . . . . . . . . . . . 10
4.2. Policy, Audit and Transparency . . . . . . . . . . . . . 10
4.2.1. Policy . . . . . . . . . . . . . . . . . . . . . . 10
4.2.2. Audit . . . . . . . . . . . . . . . . . . . . . . . 10
4.2.3. Transparency . . . . . . . . . . . . . . . . . . . . 10
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 11
Hallam-Baker March 15, 2014 [Page 2]
Internet-Draft Writing I-Ds using HTML September 2013
1. Requirements
PRISM is reputed to be a classified US government that involves
covert interception of a substantial proportion of global Internet
traffic. While the precise capabilities of PRISM are unknown the
program is believed to involve traffic and meta-data analysis and
that the intercepts are obtained with the assistance of
intermediaries trusted by Internet end users. Such intermediaries may
or may not include ISPs, backbone providers, hosted email providers
or Certificate Authorities.
Government intercept capabilities pose a security risk to Internet
users even when performed by a friendly government. While use of the
intercept capability may be intended to be restricted to counter-
terrorism and protecting national security, there is a long and
abundant history of such capabilities being abused. Furthermore an
agency that has been penetrated by an Internet privacy activist
seeking to expose the existence of such programs may be fairly
considered likely to be penetrated by hostile governments.
The term 'PRISM-Proof' is used in this series of documents to
describe a communications architecture that is designed to resist or
prevent all forms of covert intercept capability. The concerns to be
addressed are not restricted to the specific capabilities known or
suspected of being supported by PRISM or the NSA or even the US
government and its allies.
2. Attack Degree
Some forms of attack are much harder to protect against than others
and providing protection against some forms of attack may make
another form of attack easier.
The degrees of attack that are of concern depend on the security
concerns of the parties communicating.
2.1. Content Disclosure
Content disclosure is disclosure of the message content. In the case
of an email message disclosure of the subject line or any part of the
message body.
The IETF has a long history of working on technologies to protect
email message content from disclosure beginning with PEM and MOSS. At
present the IETF has two email security standards that address
confidentiality with incompatible message formats and different key
management and distribution approaches.
S/MIME and PGP may both be considered broken in that they reveal the
message subject line and content Meta-data such as the time. This
problem is easily addressed but at the cost of sacrificing backwards
Hallam-Baker March 15, 2014 [Page 3]
Internet-Draft Writing I-Ds using HTML September 2013
compatibility.
2.2. Meta Data Analysis
Meta Data is information that is included in a communication protocol
in addition to the content exchanged, This includes the sender and
receiver of a message, the time, date and headers describing the path
the message has taken in the Internet mail service. Meta-data
analysis permits an attacker to uncover the social network of parties
that are in frequent communication with each other.
Preventing disclosure of meta-data is possible through techniques
such as dead drops and onion routing but such approaches impose a
heavy efficiency penalty and it is generally considered preferable to
limit the parties capable of performing meta-data analysis instead.
The IETF STARTTLS extension to email permits the use of TLS to
encrypt SMTP traffic including meta-data. However use of STARTTLS has
two major limitations. First SMTP is a store and forward protocol and
STARTTLS only protects the messages hop-by-hop. Second there is
currently no infrastructure for determining that an SMTP service
offers STARTTLS support or to validate the credentials presented by
the remote server. The DANE Working Group is currently working on a
proposal to address the second limitation.
2.3. Traffic Analysis
Analysis of communication patterns may also leak information about
which parties are communicating, especially in the case of
synchronous protocols such as chat, voice and video.
Traffic analysis of store and forward protocols such as SMTP is more
challenging, particularly when billions of messages an hour may pass
between the major Webmail providers. But clues such as message length
may permit attackers more leverage than is generally expected.
2.4. Denial of Service
Providing protection against denial of service is frequently at odds
with other security objectives. In most situations it is preferable
for a mail client to not send a message in circumstances where there
is a risk of interception. Thus an attacker may be able to perform a
Denial of Service attack by creating the appearance of an intercept
risk.
Whether the potential compromise of confidentiality or service is
preferable depends on the circumstances. If critical infrastructure
such as electricity or water supply or the operation of a port
depends on messages getting through, it may be preferable to accept a
confidentiality compromise over a service compromise even though
confidentiality is also a significant concern.
Hallam-Baker March 15, 2014 [Page 4]
Internet-Draft Writing I-Ds using HTML September 2013
2.5. Protocol Exploit
Many protocols are vulnerable to attack at the application layer. For
example the use of JavaScript injection in HTML and SQL injection
attacks.
A recent trend in Internet chat services is to permit the
participants in a group chat to share links to images and other
content on other sites. Introducing a link into the chat session
causes every connected client to retrieve the linked resource, thus
allowing an attacker with access to the chat room to discover the IP
address of all the connected parties.
3. Attacker Capabilities
Some forms of attack are available to any actor while others are
restricted to actors with access to particular resources. Any party
with access to the Internet can perform a Denial of Service attack
while the ability to perform traffic analysis is limited to parties
with a certain level of network access.
A major constraint on most interception efforts is the need to
perform the attack covertly so as to not alert the parties to the
fact their communications are not secure and discourage them from
exchange of confidential information. Even governments that
intentionally disclose the ability to perform intercepts for purposes
of intimidation do not typically reveal intercept methods or the full
extent of their capabilities.
3.1. Passive Observation
Many parties have the ability to perform passive observation of parts
of the network. Only governments and large ISPs can feasibly observe
a large fraction of the network but every network provider can
monitor data and traffic on their own network and third parties can
frequently obtain data from wireless networks, exploiting
misconfiguration of firewalls, routers, etc.
A purely passive attack has the advantage to the attacker of being
difficult to detect and impossible to eliminate the possibility that
an intercept has taken place. Passive attacks are however limited in
the information they can reveal and easily defeated with relatively
simple cryptographic techniques.
3.2. Active Modification
Active attacks are more powerful but are more easily detected. Use of
TLS without verification of the end-entity credentials presented by
each side is sufficient to defeat a passive attack but is defeated by
a man-in-the-middle attack substituting false credentials.
Hallam-Baker March 15, 2014 [Page 5]
Internet-Draft Writing I-Ds using HTML September 2013
Active attacks may be used to defeat use of secure after first
contact approaches but at the cost of requiring interception of every
subsequent communication.
While many attackers have the ability to perform ad-hoc active attack
only a few parties have the ability to perform active attack
repeatedly and none can expect to do so with absolute reliability.
A major limitation on active attack is that an attacker can only
perform an active attack if the target is known in advance or the
target presents an opportunity that would compromise previous stored
communications.
3.3. Cryptanalysis
Many parties have the ability to perform cryptanalysis but government
cryptanalytic capabilities may be substantially greater.
3.4. Kleptography
Kleptography is persuading the party to be intercepted to use a form
of cryptography that the attacker knows they can break. Real life
examples of kleptography include the British government encouraging
the continued use of Enigma type cryptography machines by British
colonies after World War II and the requirement that early export
versions of Netscape Navigator and Internet Explorer use 40 bit
symmetric keys.
3.4.1. Covert Channels in RSA
One form of kleptography that is known to be feasible and is relevant
to IETF protocols is employing a RSA modulus to provide a covert
channel. In the normal RSA scheme we choose primes p and q and use
them to calculate n = pq. But the scheme works just as well if we
choose n' and p and look for a prime q in the vicinity of n'/p then
use p and q to calculate the final value of n. Since q ~= n'/p it
follows that n' ~= n. For a 2048 bit modulus, approximately 1000 bits
are available for use as a covert channel.
Such a covert channel may be used to leak some or all of the private
key or the seed used to generate it. The data may be encrypted to
avoid detection.
3.4.2. Covert Channels in TLS, S/MIME, IPSEC
Similar approaches may be used in any application software that has
knowledge of the actual private key. For example a TLS implementation
might use packet framing to leak the key.
Hallam-Baker March 15, 2014 [Page 6]
Internet-Draft Writing I-Ds using HTML September 2013
3.4.3. Covert Channels in Symmetric Ciphers
A hypothetical but unproven possibility is the construction of a
symmetric cipher with a backdoor. Such an attack is far beyond the
capabilities of the open field. A symmetric cipher with a perfect
backdoor would constitute a new form of public key cryptography more
powerful than any known to date. For purposes of kleptography however
it would be sufficient for a backdoor to limit the key space that an
attacker needed to search through brute force or have some other
limitation that is considered essential for public key cryptography.
3.4.4. Covert Channels in ECC Curves
Another hypothetical but unproven possibility is the construction of
a weak ECC Curve or a curve that incorporates a backdoor function. As
with symmetric ciphers, this would require a substantial advance on
the public state of the mathematical art.
3.4.5. Unusable Cryptography
A highly effective form of kleptography would be to make the
cryptographic system so difficult to use that nobody would bother to
do so.
3.5. Lawful Intercept
Lawful intercept is a form of coercion that is unique to government
actors by definition. Defeating court ordered intercept by a domestic
government is outside the scope of this document though defeating
foreign lawful intercept requests may be.
While the US government is known to practice Lawful Intercept under
court order and issue of National Security Letters of questionable
constitutional validity, the scope of such programs as revealed in
public documents and leaks from affected parties is considerably more
restricted than that of the purported PRISM program.
While a Lawful Intercept demand may in theory be directed against any
of the intermediaries listed in the following section on subversion
or coercion, the requirement to obtain court sanction constrains the
number and type of targets against which Lawful Intercept may be
sought and the means by which it is implemented. A court is unlikely
to sanction Lawful Intercept of opposition politicians for the
political benefit of current office holders.
3.6. Subversion or Coercion of Intermediaries
Subversion or coercion of intermediaries is a capability that is
almost entirely limited to state actors. A criminal organization may
coerce an intermediary in the short term but has little prospect of
succeeding in the long term.
Hallam-Baker March 15, 2014 [Page 7]
Internet-Draft Writing I-Ds using HTML September 2013
3.6.1. Physical Plant
The Internet is at base a collection of data moving over wires,
optical cables and radio links. Every form of interconnect that is a
practical means of high bandwidth communication is vulnerable to
interception at the physical layer. Attacks on physical interconnect
require only a knowledge of where the signal cables are routed and a
back hoe.
Even quantum techniques do not necessarily provide a guarantee of
security. While such techniques may be theoretically unbreakable, the
physical realization of such systems tend to fall short. As with the
'unbreakable' One Time Pad, the theoretical security tends to be
exceptionally fragile.
Attacks on the physical plant may enable high bandwidth passive
intercept capabilities and possibly even active capabilities.
3.6.2. Internet Service Providers
Internet Service Providers have access to the physical and network
layer data and are capable of passive or active attacks. ISPs have
established channels for handling Lawful Intercept requests and thus
any employee involved in an intercept request that was outside the
scope of those programs would be on notice that their activities are
criminal.
3.6.3. Router
Compromise of a router is an active attack that provides both passive
and active intercept capabilities. such compromise may be performed
by compromise of the device firmware or of the routing information.
3.6.4. End Point
Compromise of Internet endpoints may be achieved through insertion of
malware or coercion/suborning the platform provider.
3.6.5. Cryptographic Hardware Providers
Deployment of the 'kleptography' techniques described earlier
requires that the attacker be capable of controlling the
cryptographic equipment and software available to the end user.
Compromise of the cryptographic hardware provided is one means by
this might be achieved.
Hallam-Baker March 15, 2014 [Page 8]
Internet-Draft Writing I-Ds using HTML September 2013
3.6.6. Certificate Authorities
Certificate Authorities provide public key credentials to validated
key holders. While compromise of a Certificate Authority is certainly
possible, this is an active attack and the credentials created leave
permanent evidence of the attack.
3.6.7. Standards Organizations
Another route for deployment of cryptography would be to influence
the standards for use of cryptography although this would only permit
the use of kleptographic techniques that are not publicly known.
Another area of concern is that efforts to make strong cryptography
usable through deployment of key discovery infrastructure or security
policy infrastructure may have been intentionally delayed or
discouraged. The chief security failure of the Internet today is that
insecurity is the default and many attacks are able to circumvent
strong cryptography through a downgrade attack.
4. Controls
Traditionally a cryptographic protocol is designed to resist direct
attack with the assumption that protocols that provide protection
against targeted intercept will also provide protection against
pervasive intercept. Consideration of the specific constraints of
pervasive covert intercept demonstrates that a protocol need not
guarantee perfect protection against a targeted intercept to render
pervasive intercept infeasible.
One of the more worrying aspects of the attempt to defend the
legality of PRISM program is the assertion that passive intercept
does not constitute a search requiring court oversight. This suggests
that the NSA is passively monitoring all Internet traffic and that
any statement that a citizen might make in 2013 could potentially be
used in a criminal investigation that began in 2023.
At present Internet communications are typically sent in the clear
unless there is a particular confidentiality concern in which case
techniques that resist active attack are employed. A better approach
would be to always use encryption that resists passive attack,
recognizing that some applications also require resistance to active
attacks.
4.1. Confidentiality
Encryption provides a confidentiality control when the symmetric
encryption key is not known to or discoverable by the attacker. Use
of strong public cryptography provides a control against passive
attacks but not an active attack unless the communicating parties
have a means of verifying the credentials purporting to identify the
Hallam-Baker March 15, 2014 [Page 9]
Internet-Draft Writing I-Ds using HTML September 2013
parties.
4.1.1. Perfect Forward Secrecy
One of the main limitations of simple public key exchange schemes is
that compromise of an end entity decryption key results in compromise
of all the messages encrypted using that key. Perfect Forward Secrecy
is a misnomer for a technique that forces an attacker to compromise a
separate private key for every key exchange. This is usually achieved
by performing two layers of public key exchange using the credentials
of the parties to negotiate a temporary key which is in turn used to
derive the symmetric session key used for communications.
Perfect Forward Secrecy is a misnomer as the secrecy is not
'perfect', should the public key system used to identify the
principals be broken, it is likely that the temporary public key will
be vulnerable to cryptanalysis as well. The value of PFS is not that
it is 'perfect' but that it dramatically increases the cost of an
attack to an attacker.
4.2. Policy, Audit and Transparency
The most underdeveloped area of internet security to date is the lack
of a security policy infrastructure and the audit and transparency
capabilities to support it.
4.2.1. Policy
A security policy describes the security controls that a party
performs or offers to perform. One of the main failings in the
Internet architecture is that the parties have no infrastructure to
inform them of the security policy of the party they are attempting
to communicate with except for the case of Certificate Policy and
Certificate Practices Statements which are not machine readable
documents.
A machine readable policy stating that a party always offers a
minimum level of security provides protection against downgrade
attack.
4.2.2. Audit
Audit is verifying that a party is in compliance with its published
security policy. Some security policies are self-auditing (e.g.
advertising support for specific cryptographic protocols) others may
be audited by automatic means and some may require human
interpretation and evaluation.
Hallam-Baker March 15, 2014 [Page 10]
Internet-Draft Writing I-Ds using HTML September 2013
4.2.3. Transparency
A security policy is transparent if it may be audited using only
publicly available information.
An important application of transparency is by trusted intermediaries
to deter attempted coercion or to demonstrate that a coercion attempt
would be impractical.
Author's Address
Phillip Hallam-Baker
Comodo Group Inc.
philliph[at]comodo.com
Hallam-Baker March 15, 2014 [Page 11]
|