@@ -1476,71 +1476,74 @@ the following compromise scenarios:
1476
1476
- The attacker has access to all secrets of a user for all groups (full state
1477
1477
compromise)
1478
1478
1479
- The MLS protocol provides per-sender chains of symmetric authenticated
1480
- encryption with additional data (AEAD) {{!RFC5116}} keys that are
1481
- generated from Group Secrets. Specifically, each epoch establishes
1482
- a per-sender "Ratchet Secret", which is then used to generate an
1483
- AEAD key, which is used to protect MLS Plaintext messages.
1484
- A new Ratchet Secret is generated and is used to generate the AEAD keys for each
1485
- message. Because of the properties of the key derivation function, it is
1486
- not possible to compute a Ratchet Secret from its corresponding
1487
- AEAD key or compute Ratchet Secret n-1 from Ratchet Secret n.
1488
-
1489
-
1490
- # ## Compromise of Application Ratchet Key material
1479
+ # ## Compromise of Symmetric Keying Material {#symmetric-key-compromise}
1480
+
1481
+ As described above, each MLS epoch creates a new Group Secret.
1482
+
1483
+ These group secrets are then used to create a per-sender Ratchet
1484
+ Secret, which in turn is used to create a per-sender with additional
1485
+ data (AEAD) {{!RFC5116}} key that is then used to encrypt MLS
1486
+ Plaintext messages. Each time a message is sent, the Ratchet Secret
1487
+ is used to create a new Ratchet Secret and a new corresponding AEAD
1488
+ key. Because of the properties of the key derivation function, it is
1489
+ not possible to compute a Ratchet Secret from its corresponding AEAD
1490
+ key or compute Ratchet Secret n-1 from Ratchet Secret n.
1491
+
1492
+ Below, we consider the compromise of each of these pieces of keying
1493
+ material in turn, in ascending order of severity. While this is a
1494
+ limited kind of compromise, it can be realistic in cases of
1495
+ implementation vulnerabilities where only part of the memory leaks to
1496
+ the adversary.
1497
+
1498
+ # ### Compromise of AEAD Keys
1499
+
1491
1500
In some circumstances, adversaries may have access to specific AEAD keys and
1492
- nonces which protect an Application or a Group Operation message. While this is
1493
- a limited kind of compromise, it can be realistic in cases of implementation
1494
- vulnerabilities where only part of the memory leaks to the adversary. As the
1495
- application AEAD keys are derived from the application ratchet secret, compromise
1496
- of a single application ratchet key does not imply compromise of any other AEAD
1497
- key or nonce.
1498
-
1499
- # ## Compromise of Ratchet Secret material
1500
-
1501
- When an Ratchet Secret is compromised, the adversary has access to a set of AEAD keys
1502
- for the same chain and the same epoch, hence can decrypt messages sent using
1503
- keys of this chain. An adversary cannot send a message to a group which appears
1504
- to be from any valid client since they cannot forge the signature.
1505
-
1506
- The MLS protocol will ensure that an adversary cannot compute any secret
1507
- anterior for the same epoch, or for any other epochs. Because of its Forward
1508
- Secrecy guarantees, MLS will also retain secrecy of all other AEAD keys
1509
- generated for *other* MLS clients, outside this dedicated chain of AEAD keys and
1510
- nonces, even within the epoch of the compromise. However the MLS protocol does
1511
- not provide Post Compromise Secrecy for AEAD encryption within an epoch. This
1512
- means that if the AEAD key of a chain is compromised, the adversary can compute
1513
- an arbitrary number of subsequent AEAD keys for that chain.
1514
-
1515
- These guarantees are ensured by the structure of the MLS key schedule which
1516
- provides Forward Secrecy for these AEAD encryptions, across the messages within
1517
- the epoch and also across previous epochs. Those chains are completely disjoint
1518
- and compromising keys across the chains would mean that some Group Secrets have
1519
- been compromised, which is not the case in this attack scenario (we explore
1520
- stronger compromise scenarios as part of the following sections).
1521
-
1522
- MLS provides Post-Compromise Security against an active adaptive attacker across
1523
- epochs for AEAD encryption, which means that as soon as the epoch is changed, if
1524
- the attacker does not have access to more secret material they won't be able to
1525
- access any protected messages from future epochs.
1501
+ nonces which protect an Application or a Group Operation message. Compromise
1502
+ of these keys allows the attacker to decrypt the specific message encrypted with
1503
+ that key but no other; because the AEAD keys are derived from the Ratchet
1504
+ Secret, it cannot generate the next Ratchet Secret and hence not the next AEAD
1505
+ key.
1526
1506
1527
1507
In the case of an Application message, an AEAD key compromise means that the
1528
1508
encrypted application message will be leaked as well as the signature over that
1529
1509
message. This means that the compromise has both confidentiality and privacy
1530
1510
implications on the future AEAD encryptions of that chain. In the case of a
1531
1511
Group Operation message, only the privacy is affected, as the signature is
1532
1512
revealed, because the secrets themselves are protected by HPKE encryption.
1533
-
1534
1513
Note that under that compromise scenario, authentication is not affected in
1535
1514
either of these cases. As every member of the group can compute the AEAD keys
1536
1515
for all the chains (they have access to the Group Secrets) in order to send and
1537
1516
receive messages, the authentication provided by the AEAD encryption layer of
1538
1517
the common framing mechanism is weak. Successful decryption of an AEAD
1539
1518
encrypted message only guarantees that some member of the group sent the message.
1540
1519
1541
- # ## Compromise of the Group Secrets of a single group for one or more group epochs
1542
-
1543
- An adversary who gains access to a set Group secrets--as when a member
1520
+ Compromise of the AEAD keys allows the attacker to send an encrypted message
1521
+ using that key, but cannot send a message to a group which appears
1522
+ to be from any valid client since they cannot forge the signature. This
1523
+ applies to all the forms of symmetric key compromise described in
1524
+ {{symmetric-key-compromise}}.
1525
+
1526
+ # ### Compromise of Ratchet Secret material
1527
+
1528
+ When a Ratchet Secret is compromised, the adversary can compute both the
1529
+ current AEAD keys for a given sender as well as any future keys for that
1530
+ sender in this epoch. Thus, it can decrypt current and future messages
1531
+ by the corresponding sender. However, because it does not have previous
1532
+ Ratchet Secrets, it cannot decrypt past messages as long as those secrets
1533
+ and keys have been deleted.
1534
+
1535
+ Because of its Forward Secrecy guarantees, MLS will also retain
1536
+ secrecy of all other AEAD keys generated for *other* MLS clients,
1537
+ outside this dedicated chain of AEAD keys and nonces, even within the
1538
+ epoch of the compromise. MLS provides Post-Compromise Security
1539
+ against an active adaptive attacker across epochs for AEAD encryption,
1540
+ which means that as soon as the epoch is changed, if the attacker does
1541
+ not have access to more secret material they won't be able to access
1542
+ any protected messages from future epochs.
1543
+
1544
+ # ### Compromise of the Group Secrets of a single group for one or more group epochs
1545
+
1546
+ An adversary who gains access to a set of Group secrets--as when a member
1544
1547
of the group is compromised--is significantly more powerful. In this
1545
1548
section, we consider the case where the signature keys are not
1546
1549
compromised, which can occur if the attacker has access to part of the
@@ -1592,9 +1595,6 @@ generate messages which look valid to other members of the group and to the
1592
1595
infrastructure as they need to have access to group secrets to compute the
1593
1596
encryption keys or the membership tag.
1594
1597
1595
-
1596
-
1597
-
1598
1598
# ## Compromise of the authentication with access to a signature key
1599
1599
1600
1600
The difference between having access to the value of the signature key and only
0 commit comments