Skip to content

Commit b6f4701

Browse files
authored
Merge pull request #230 from mlswg/aead_key_compromise_cleanup
Aead key compromise cleanup
2 parents e99caf0 + 0a6b68a commit b6f4701

File tree

1 file changed

+53
-53
lines changed

1 file changed

+53
-53
lines changed

draft-ietf-mls-architecture.md

+53-53
Original file line numberDiff line numberDiff line change
@@ -1476,71 +1476,74 @@ the following compromise scenarios:
14761476
- The attacker has access to all secrets of a user for all groups (full state
14771477
compromise)
14781478

1479-
The MLS protocol provides per-sender chains of symmetric authenticated
1480-
encryption with additional data (AEAD) {{!RFC5116}} keys that are
1481-
generated from Group Secrets. Specifically, each epoch establishes
1482-
a per-sender "Ratchet Secret", which is then used to generate an
1483-
AEAD key, which is used to protect MLS Plaintext messages.
1484-
A new Ratchet Secret is generated and is used to generate the AEAD keys for each
1485-
message. Because of the properties of the key derivation function, it is
1486-
not possible to compute a Ratchet Secret from its corresponding
1487-
AEAD key or compute Ratchet Secret n-1 from Ratchet Secret n.
1488-
1489-
1490-
### Compromise of Application Ratchet Key material
1479+
### Compromise of Symmetric Keying Material {#symmetric-key-compromise}
1480+
1481+
As described above, each MLS epoch creates a new Group Secret.
1482+
1483+
These group secrets are then used to create a per-sender Ratchet
1484+
Secret, which in turn is used to create a per-sender with additional
1485+
data (AEAD) {{!RFC5116}} key that is then used to encrypt MLS
1486+
Plaintext messages. Each time a message is sent, the Ratchet Secret
1487+
is used to create a new Ratchet Secret and a new corresponding AEAD
1488+
key. Because of the properties of the key derivation function, it is
1489+
not possible to compute a Ratchet Secret from its corresponding AEAD
1490+
key or compute Ratchet Secret n-1 from Ratchet Secret n.
1491+
1492+
Below, we consider the compromise of each of these pieces of keying
1493+
material in turn, in ascending order of severity. While this is a
1494+
limited kind of compromise, it can be realistic in cases of
1495+
implementation vulnerabilities where only part of the memory leaks to
1496+
the adversary.
1497+
1498+
#### Compromise of AEAD Keys
1499+
14911500
In some circumstances, adversaries may have access to specific AEAD keys and
1492-
nonces which protect an Application or a Group Operation message. While this is
1493-
a limited kind of compromise, it can be realistic in cases of implementation
1494-
vulnerabilities where only part of the memory leaks to the adversary. As the
1495-
application AEAD keys are derived from the application ratchet secret, compromise
1496-
of a single application ratchet key does not imply compromise of any other AEAD
1497-
key or nonce.
1498-
1499-
### Compromise of Ratchet Secret material
1500-
1501-
When an Ratchet Secret is compromised, the adversary has access to a set of AEAD keys
1502-
for the same chain and the same epoch, hence can decrypt messages sent using
1503-
keys of this chain. An adversary cannot send a message to a group which appears
1504-
to be from any valid client since they cannot forge the signature.
1505-
1506-
The MLS protocol will ensure that an adversary cannot compute any secret
1507-
anterior for the same epoch, or for any other epochs. Because of its Forward
1508-
Secrecy guarantees, MLS will also retain secrecy of all other AEAD keys
1509-
generated for *other* MLS clients, outside this dedicated chain of AEAD keys and
1510-
nonces, even within the epoch of the compromise. However the MLS protocol does
1511-
not provide Post Compromise Secrecy for AEAD encryption within an epoch. This
1512-
means that if the AEAD key of a chain is compromised, the adversary can compute
1513-
an arbitrary number of subsequent AEAD keys for that chain.
1514-
1515-
These guarantees are ensured by the structure of the MLS key schedule which
1516-
provides Forward Secrecy for these AEAD encryptions, across the messages within
1517-
the epoch and also across previous epochs. Those chains are completely disjoint
1518-
and compromising keys across the chains would mean that some Group Secrets have
1519-
been compromised, which is not the case in this attack scenario (we explore
1520-
stronger compromise scenarios as part of the following sections).
1521-
1522-
MLS provides Post-Compromise Security against an active adaptive attacker across
1523-
epochs for AEAD encryption, which means that as soon as the epoch is changed, if
1524-
the attacker does not have access to more secret material they won't be able to
1525-
access any protected messages from future epochs.
1501+
nonces which protect an Application or a Group Operation message. Compromise
1502+
of these keys allows the attacker to decrypt the specific message encrypted with
1503+
that key but no other; because the AEAD keys are derived from the Ratchet
1504+
Secret, it cannot generate the next Ratchet Secret and hence not the next AEAD
1505+
key.
15261506

15271507
In the case of an Application message, an AEAD key compromise means that the
15281508
encrypted application message will be leaked as well as the signature over that
15291509
message. This means that the compromise has both confidentiality and privacy
15301510
implications on the future AEAD encryptions of that chain. In the case of a
15311511
Group Operation message, only the privacy is affected, as the signature is
15321512
revealed, because the secrets themselves are protected by HPKE encryption.
1533-
15341513
Note that under that compromise scenario, authentication is not affected in
15351514
either of these cases. As every member of the group can compute the AEAD keys
15361515
for all the chains (they have access to the Group Secrets) in order to send and
15371516
receive messages, the authentication provided by the AEAD encryption layer of
15381517
the common framing mechanism is weak. Successful decryption of an AEAD
15391518
encrypted message only guarantees that some member of the group sent the message.
15401519

1541-
### Compromise of the Group Secrets of a single group for one or more group epochs
1542-
1543-
An adversary who gains access to a set Group secrets--as when a member
1520+
Compromise of the AEAD keys allows the attacker to send an encrypted message
1521+
using that key, but cannot send a message to a group which appears
1522+
to be from any valid client since they cannot forge the signature. This
1523+
applies to all the forms of symmetric key compromise described in
1524+
{{symmetric-key-compromise}}.
1525+
1526+
#### Compromise of Ratchet Secret material
1527+
1528+
When a Ratchet Secret is compromised, the adversary can compute both the
1529+
current AEAD keys for a given sender as well as any future keys for that
1530+
sender in this epoch. Thus, it can decrypt current and future messages
1531+
by the corresponding sender. However, because it does not have previous
1532+
Ratchet Secrets, it cannot decrypt past messages as long as those secrets
1533+
and keys have been deleted.
1534+
1535+
Because of its Forward Secrecy guarantees, MLS will also retain
1536+
secrecy of all other AEAD keys generated for *other* MLS clients,
1537+
outside this dedicated chain of AEAD keys and nonces, even within the
1538+
epoch of the compromise. MLS provides Post-Compromise Security
1539+
against an active adaptive attacker across epochs for AEAD encryption,
1540+
which means that as soon as the epoch is changed, if the attacker does
1541+
not have access to more secret material they won't be able to access
1542+
any protected messages from future epochs.
1543+
1544+
#### Compromise of the Group Secrets of a single group for one or more group epochs
1545+
1546+
An adversary who gains access to a set of Group secrets--as when a member
15441547
of the group is compromised--is significantly more powerful. In this
15451548
section, we consider the case where the signature keys are not
15461549
compromised, which can occur if the attacker has access to part of the
@@ -1592,9 +1595,6 @@ generate messages which look valid to other members of the group and to the
15921595
infrastructure as they need to have access to group secrets to compute the
15931596
encryption keys or the membership tag.
15941597

1595-
1596-
1597-
15981598
### Compromise of the authentication with access to a signature key
15991599

16001600
The difference between having access to the value of the signature key and only

0 commit comments

Comments
 (0)