Monday, 10 December 2018

TLS v1.3 vs. eTLS


Some months ago, ETSI released the TS103 523-3, which describes the usage of an implementation variant of TLS v1.3 for the Middle Box Security Protocol.

The key complaint is that TLS v1.3 does not allow passive decryption, which is necessary to comply with requests from authorities to have clear text information of an exchange of traffic. This, because TLS v1.3 does not support RSA key exchange and uses ephemeral Diffie-Hellman, instead of static Diffie-Hellman key exchange. These two improvements constitute a high degree of security compared to the previous version of TLS.

I have seen some comments on social networks complaining about the nature of ETSI’s technical specification, which would constitute a downgrade of the security level of the data in transit for the users. And, well, I have some quick thoughts about this.

eTLS features a scheme for longer-lived static Diffie-Hellman keys and allow to re-use the keys across multiple sessions. These characteristics pose high risks, since it would imply to go back to a similar state that we had in TLS v1.2. But if we analyze the use cases under which eTLS is used, I see no difference with common practices in Internet Service Providers (ISP) regarding the routing of encrypted user traffic.

The most common use case is described in clause 4.2.1 (eTLS with enterprise servers) which describes the situation when a customer wants to access some content offered by an ISP.
It describes that TLS v1.3 is used up to the border firewall, and from that point on, eTLS is used between firewall and internal servers.
I find that is a usual practice to break the TLS connection at some point inside the ISP. It may be at the border firewall or in an internal device such as a WAF (Web Application Firewall). This is done to manipulate the user flows in the internal infrastructure. That is the case when it is necessary to perform load balancing between servers. The key idea in here is that the encryption of this data in transit is managed internally by the ISP, secured by certificates between the involved servers. The confidentiality and integrity of the data is not lost and the ISP can have the way to manage the traffic to offer a better service.

In summary, TLS v1.3 would be used over the public Internet (where the most dangerous threats are located), and the less secure eTLS is used inside ISP premises (where one suppose that the threats are reduced).
Now, the worry is about how the ISP is going to manage the static keys (their life cycle management, up to their destruction to guarantee forward secrecy), assure their chain of custody and ensure that there is no abuse of privileges from employees that could use these powerful “keys” to read personal data. This is a topic that relates to the trust that we deposit in our service providers.