encryption everywhere - internet engineering task … users privacy at protocol level necessary !...

25
1 Encryption Everywhere Adapting to a New Reality that favors Security and Privacy Kathleen Moriarty EMC Office of CTO IETF Security Area Director (Speaking for myself, not the IETF)

Upload: nguyentuong

Post on 26-Mar-2018

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Encryption Everywhere - Internet Engineering Task … Users privacy at protocol level necessary ! Current techniques used by operators may no longer be possible in an encrypted Internet

1

Encryption Everywhere Adapting to a New Reality that favors Security and Privacy

Kathleen Moriarty EMC Office of CTO IETF Security Area Director (Speaking for myself, not the IETF)

Page 2: Encryption Everywhere - Internet Engineering Task … Users privacy at protocol level necessary ! Current techniques used by operators may no longer be possible in an encrypted Internet

2

Agenda

� Protocol and Cipher Suite Support � Background on changes to increase deployment of

encryption

� Opportunistic Security

� The Effects of Ubiquitous Encryption

Page 3: Encryption Everywhere - Internet Engineering Task … Users privacy at protocol level necessary ! Current techniques used by operators may no longer be possible in an encrypted Internet

3

SSLv3 has been deprecated Remove it from products

�  SSLv3 has been deprecated, TLS 1.2 is the current recommendation

–  Use of OpenSSL doesn’t mean you are using SSL –  TLS 1.0 should be removed as well –  TLS 1.2 has improved cipher suites over TLS 1.1

�  Browsers now show when conditions don’t meet recommendations, example: https://

–  To see how browsers react try: https://badssl.com/

�  IETF published a deprecation draft: –  https://datatracker.ietf.org/doc/draft-ietf-tls-sslv3-diediedie/ –  Attacks against SSLv3 included

Page 4: Encryption Everywhere - Internet Engineering Task … Users privacy at protocol level necessary ! Current techniques used by operators may no longer be possible in an encrypted Internet

4

TLS Attacks and Recommendations TLS 1.2 with recommended cipher suites and configuration

� TLS 1.2 is the current recommended version, with TLS 1.3 nearing publication

� TLS and DTLS Best Practices –  https://datatracker.ietf.org/doc/rfc7525/ –  Cipher suite recommendations

▪  Guidance provided is specific to needs of implementations –  Perfect Forward Secrecy (PFS) is now pretty much expected –  Development and implementation guidance provided to

avoid known attacks, including use of tools like wireshark ▪  This means many tools that intercept sessions will break

� Summary of attacks against TLS –  https://datatracker.ietf.org/doc/rfc7457/

Page 5: Encryption Everywhere - Internet Engineering Task … Users privacy at protocol level necessary ! Current techniques used by operators may no longer be possible in an encrypted Internet

5

Crypto Forum Research Group (CFRG) TLS Cipher suites

�  Selecting new cipher suites for TLS –  Motivation for CFRG starting this work: Reduced trust in NIST

▪  Note that NIST has taken some steps to improve trusthttp://csrc.nist.gov/publications/drafts/nistir-7977/nistir_7977_draft.pdf

▪  NIST Curves still required, selection of curves depends on customer base.

▪  CFRG selection did not include NIST curves, but that doesn’t change product implementation requirements necessarily.

–  CFRG process includes a series of consensus polls –  Improving side channel resistance and performance by

selecting new curves from academia –  Working on consensus around requirements:

▪  Just wrapping up poll on signatures and properties —  http://www.ietf.org/mail-archive/web/cfrg/current/msg06792.html

▪  Prior polls on signatures and curves —  http://www.ietf.org/mail-archive/web/cfrg/current/msg06619.html —  http://www.ietf.org/mail-archive/web/cfrg/current/msg06521.html

Page 6: Encryption Everywhere - Internet Engineering Task … Users privacy at protocol level necessary ! Current techniques used by operators may no longer be possible in an encrypted Internet

6

CFRG Crypto Decisions – Starts with Requirements �  Decisions? Not sure when they will be done �  CFRG is iterating through consensus process on requirements �  2 curves have been selected,

https://tools.ietf.org/html/draft-irtf-cfrg-curves-02 �  Curve25519 – approx 128 bits of security; already deployed in several

places �  Goldilocks – offers good performance-security trade-off at higher

security level (approx 224 bits of security)

�  Diffie Hellman Key exchange defined for both curves �  In principle, these curves can be deployed “as is” in TLS in combination

with existing signature schemes

�  Signature schemes to replace RSA and ECDSA in TLS �  Many drafts have been published with Ed25519, nothing has been

selected – hold on!

Content from CFRG chair, Kenny Paterson

Page 7: Encryption Everywhere - Internet Engineering Task … Users privacy at protocol level necessary ! Current techniques used by operators may no longer be possible in an encrypted Internet

7

Salsa, ChaCha, Anyone? ChaCha20 and Poly1305 Support being added to Protocols

�  RC4 replacement when no AES hardware in use

�  ChaCha20 is a stream cipher, variant of Salsa20 –  Consistently faster than AES and more conservative design –  Inputs include:

▪  256-bit key ▪  96-bit nonce (initialization vector) ▪  32-bit initial counter ▪  Of course, plaintext

–  20 rounds (column & diagonal) performed

�  Poly1305 algorithm is a one-time authenticator –  Input 256-bit one-time key, 96-bit –  Designed to ensure forged messages are rejected with high probability

�  Protocol integration: –  IPsec: https://datatracker.ietf.org/doc/draft-ietf-ipsecme-chacha20-poly1305 –  TLS: Not sure if this is going forward:

https://datatracker.ietf.org/doc/draft-agl-tls-chacha20poly1305/

�  Background & Implementation Advice: –  See RFC7539 for guidance on libraries for Poly1305 to avoid side-channel attacks and

performance issues. Be sure to read security considerations for additional advice!

Both algorithms by: D. J. Bernstein

Page 8: Encryption Everywhere - Internet Engineering Task … Users privacy at protocol level necessary ! Current techniques used by operators may no longer be possible in an encrypted Internet

8

Security, Privacy, and the Effects of Ubiquitous Encryption

Page 9: Encryption Everywhere - Internet Engineering Task … Users privacy at protocol level necessary ! Current techniques used by operators may no longer be possible in an encrypted Internet

9

Motivation for Increased Privacy Protections

BULLRUN/EDGEHILL FOXACID PRISM

RADON TRAILBLAZER TREASUREMAP

Page 10: Encryption Everywhere - Internet Engineering Task … Users privacy at protocol level necessary ! Current techniques used by operators may no longer be possible in an encrypted Internet

10

Privacy & Confidentiality on the Internet Current IETF and IAB Guidance

�  IETF Privacy Considerations for Internet protocols –  https://datatracker.ietf.org/doc/rfc6973/ –  Data protection ▪  Object level encryption ▪  Determining when data is not necessary ▪  Obscuring data or generalizing when possible ▪  Protections on sensitive data and indexes to that data

–  Push for encrypted traffic

�  IAB Statement on Internet Confidentiality –  https://www.iab.org/2014/11/14/iab-statement-on-

internet-confidentiality/

Page 11: Encryption Everywhere - Internet Engineering Task … Users privacy at protocol level necessary ! Current techniques used by operators may no longer be possible in an encrypted Internet

11

Pervasive Monitoring Changed the Game

• 

• 

Page 12: Encryption Everywhere - Internet Engineering Task … Users privacy at protocol level necessary ! Current techniques used by operators may no longer be possible in an encrypted Internet

12

New IETF Work Related to Pervasive Monitoring (PM)

•  “Pervasive Monitoring Is an Attack” –  RFC7258/BCP188 published after major IETF LC debate –

sets the basis for further actions –  https://www.rfc-editor.org/rfc/rfc7258.txt –  BCP says to consider PM in IETF work –  Existing-RFC privacy/PM review team formed

• Opportunistic security (OS) –  Provides a way to get much easier deployment for some

intermediate level of security –  Fallback to unauthenticated encrypted sessions instead of

plaintext –  Updates to supported algorithms –  Lower the barriers for key and certificate management –  https://datatracker.ietf.org/doc/rfc7435/

Page 13: Encryption Everywhere - Internet Engineering Task … Users privacy at protocol level necessary ! Current techniques used by operators may no longer be possible in an encrypted Internet

13

IETF Work related to PM and Opportunistic Security •  Using TLS in Applications (UTA WG)

–  Update existing RFCs on how to use TLS in applications and mandate implementation of non-PFS ciphersuites

–  BCPs for TLS and DTLS attacks and configurations •  TLS 1.3 (TLS WG)

–  TLS 1.3 being developed aiming for better handshake performance and encryption properties (use of DANE for end-to-end encryption)

–  And learning from our history of previous TLS problems •  HTTP/2.0 (HTTPBIS WG)

–  Major deployment model: HTTP over TLS, but not required yet •  TCP Increased Security (TCPInc)

–  Provide TLS functionality within TCP –  Support Opportunistic security with a way to hook in authentication

•  DNS Privacy (DPRIVE) –  Reducing exposure of sensitive names found in DNS –  https://datatracker.ietf.org/doc/draft-bortzmeyer-dnsop-dns-privacy/

•  IPsec –  NULL authentication support for Opportunistic Security approach

Page 14: Encryption Everywhere - Internet Engineering Task … Users privacy at protocol level necessary ! Current techniques used by operators may no longer be possible in an encrypted Internet

14

How are Operators and Security Professionals Impacted?

The Effects of Ubiquitous Encryption https://datatracker.ietf.org/doc/draft-mm-wg-effect-encrypt/

Page 15: Encryption Everywhere - Internet Engineering Task … Users privacy at protocol level necessary ! Current techniques used by operators may no longer be possible in an encrypted Internet

15

Effects of Ubiquitous Encryption Editors: Kathleen Moriarty & Al Morton

�  Increased encryption impacts security & network operations

–  Shift how these functions are performed –  New methods to monitor and protect data will evolve –  In more drastic circumstances, ability to monitor may be

eliminated

� Collection of current security and network management functions impacted by encryption

–  Draft does not attempt to solve these problems –  It merely documents the current state to assist in the

development of alternate options to achieve the intended purpose of the documented practices

Page 16: Encryption Everywhere - Internet Engineering Task … Users privacy at protocol level necessary ! Current techniques used by operators may no longer be possible in an encrypted Internet

16

What’s the Problem? Encryption blocked to prevent impact on current operations

�  Clear text has been used to inject ads, as well as monitor traffic for network and security purposes

�  Operational capabilities are diminishing, some operators responded by stopping encryption negotiation

�  Typically required exposure (media & regulators) to correct

010100101010001001111001010101001

Ad Injection

More recently, the Great Cannon

Page 17: Encryption Everywhere - Internet Engineering Task … Users privacy at protocol level necessary ! Current techniques used by operators may no longer be possible in an encrypted Internet

17

Middlebox Monitoring Traffic Interception and Pattern Matching

�  Traffic Analysis Fingerprinting –  Encrypted and clear text pattern matching

▪  Attack detection and monitoring ▪  Invade Privacy, web traffic

�  Traffic Surveys –  Observations over time –  Inferences about observed traffic using maximal information available –  Accuracy of patterns decline with encryption

�  Deep Packet Inspection –  Analysis of user flows and apps (for resource optimization) –  Used with content distribution networks to improve efficiency

▪  Note: CDNs moving to end-to-end control of data now

�  Data Compression Gateway –  Minimize traffic required using resource-constrained services, e.g.,

Data Caps

Page 18: Encryption Everywhere - Internet Engineering Task … Users privacy at protocol level necessary ! Current techniques used by operators may no longer be possible in an encrypted Internet

18

Performance Management and Troubleshooting Current methods for existing functions impacted by encryption

� Availability and Performance monitoring impacted by move to encryption

–  Inability to discern difference between network and host-related causes of unavailability

�  Inaccuracy will increase and efficiency of repair activities will decrease

� Use of websockets will make application differentiation more difficult

Page 19: Encryption Everywhere - Internet Engineering Task … Users privacy at protocol level necessary ! Current techniques used by operators may no longer be possible in an encrypted Internet

19

Encryption in Hosted SP Environments Drivers different for Increased Security Protections

� Management Access –  SP access to manage infrastructure: encrypted or isolated –  Customer management access encrypted

� Hosted Applications –  Increasingly sensitive applications –  Data leakage protection (DLP) now limited

�  Access Control Management and monitoring shifting –  Logs may be used as an alternative monitoring data source –  Monitoring and filtering may be restricted to:

▪  2-tuple IP-level with source and destination IP addresses alone, or

▪  5-tuple IP and protocol-level with source IP address, destination IP address, protocol number, source port number, and destination port number.

Page 20: Encryption Everywhere - Internet Engineering Task … Users privacy at protocol level necessary ! Current techniques used by operators may no longer be possible in an encrypted Internet

20

Data Storage Capabilities changed, but solution providers have adapted

� Host-level encryption –  End-to-end, encrypted at application or prior to transition

to hosted environment –  Backup, external storage

� Disk encryption, Data at Rest –  Requires transport encryption to protect data on the wire –  May only be used to protect from physical theft of disk –  Controller based encryption or Self Encrypting Drives

� Data replication between data centers –  IPsec may limit ability to monitor

� MACsec – IEEE 802.1AE –  Layer 2 encryption between data centers

Page 21: Encryption Everywhere - Internet Engineering Task … Users privacy at protocol level necessary ! Current techniques used by operators may no longer be possible in an encrypted Internet

21

Incident Monitoring

Information

Denial of

Service

© Copyright 2015 EMC Corporation. All rights reserved.

Page 22: Encryption Everywhere - Internet Engineering Task … Users privacy at protocol level necessary ! Current techniques used by operators may no longer be possible in an encrypted Internet

22

Summary Use of Encryption Encouraged to Protect Users Privacy

�  Follow TLS best practices recommendations! –  Support TLS 1.2, –  Remove support for SSLv3 and TLS 1.0

�  Encryption increasing –  in response to known threats and –  move of sensitive application & data to hosted environments

�  Protecting Users privacy at protocol level necessary �  Current techniques used by operators may no longer be

possible in an encrypted Internet � Devise new methods to accomplish goals

–  First document those goals and understanding objectives –  Contribute to draft: “Effects of Ubiquitous Encryption”

Page 23: Encryption Everywhere - Internet Engineering Task … Users privacy at protocol level necessary ! Current techniques used by operators may no longer be possible in an encrypted Internet

Thank you!

Page 24: Encryption Everywhere - Internet Engineering Task … Users privacy at protocol level necessary ! Current techniques used by operators may no longer be possible in an encrypted Internet

24

Mission of the IETF

Make the Internet work better by producing high quality, relevant technical documents

that influence the way people design, use, and manage the Internet.

RFC3935

24

Page 25: Encryption Everywhere - Internet Engineering Task … Users privacy at protocol level necessary ! Current techniques used by operators may no longer be possible in an encrypted Internet

25

Ethos of the IETF

• Open standards process –  Everyone is invited to participate at all levels –  Our primary venue is email –  All working and published documents are freely

available online • One Internet

–  Open standards for a global Internet –  Maximum interoperability and scalability –  Avoid specialized protocols in different places

–  Contributions are judged on technical merits: rough consensus and running code, RFC7282