Internet Engineering Task Force                           A. Taddei, Ed.
Internet-Draft                                           S. Edwards, Ed.
Intended status: Informational                                  Broadcom
Expires: 12 January 2023                                    11 July 2022


                 ECH for Enterprises and Organizations
                  draft-taddei-ech4ent-introduction-00

Abstract

   This paper reviews some of the Enterprises and Organizations
   requirements and constraints and tests the current Encrypted Client
   Hello (ECH) proposal in these environments.  In particular it
   highlights the need for several clarifications as well as highlights
   known attack vectors which will become easier with the current ECH
   proposal.  The current ECH drafts should consider how they want to
   include enterprises operational security capabilities to mitigate
   these attacks.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on 12 January 2023.

Copyright Notice

   Copyright (c) 2022 IETF Trust and the persons identified as the
   document authors.  All rights reserved.










Taddei & Edwards         Expires 12 January 2023                [Page 1]


Internet-Draft                   ech4ent                       July 2022


   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents (https://trustee.ietf.org/
   license-info) in effect on the date of publication of this document.
   Please review these documents carefully, as they describe your rights
   and restrictions with respect to this document.  Code Components
   extracted from this document must include Revised BSD License text as
   described in Section 4.e of the Trust Legal Provisions and are
   provided without warranty as described in the Revised BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
     1.1.  Requirements Language . . . . . . . . . . . . . . . . . .   3
   2.  Need for clarification on the ECH proposal  . . . . . . . . .   3
     2.1.  DNS impact  . . . . . . . . . . . . . . . . . . . . . . .   3
     2.2.  Client Facing vs Backend Servers need a lot of
           clarification . . . . . . . . . . . . . . . . . . . . . .   3
   3.  Enterprises and Organizations need for Operational
           security  . . . . . . . . . . . . . . . . . . . . . . . .   4
     3.1.  Threat landscape  . . . . . . . . . . . . . . . . . . . .   4
     3.2.  Implications to Enterprises and Organizations . . . . . .   4
     3.3.  The main requirements . . . . . . . . . . . . . . . . . .   4
     3.4.  Evolution of defence approaches . . . . . . . . . . . . .   5
     3.5.  The need for Network based security . . . . . . . . . . .   5
     3.6.  Network Security deployment . . . . . . . . . . . . . . .   8
   4.  Client Complications  . . . . . . . . . . . . . . . . . . . .   8
     4.1.  Devices are not trustable . . . . . . . . . . . . . . . .   8
     4.2.  Attacks targeting the web browser . . . . . . . . . . . .   8
     4.3.  Defence in Depth  . . . . . . . . . . . . . . . . . . . .   9
   5.  Conclusions . . . . . . . . . . . . . . . . . . . . . . . . .  10
   6.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  11
   7.  Security Considerations . . . . . . . . . . . . . . . . . . .  11
   8.  References  . . . . . . . . . . . . . . . . . . . . . . . . .  11
     8.1.  Normative References  . . . . . . . . . . . . . . . . . .  11
     8.2.  Informative References  . . . . . . . . . . . . . . . . .  11
   Acknowledgements  . . . . . . . . . . . . . . . . . . . . . . . .  12
   Contributors  . . . . . . . . . . . . . . . . . . . . . . . . . .  12
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  12

1.  Introduction

   This document aims to contribute to section 5 of [CAMPLING].
   Enterprises and Organizations are both offering online services to
   their customers and support their own digital organization.  As such:

   *  On one hand, they have the requirement that their customers
      receive their services with a good level of Confidentiality,
      Integrity and Availability



Taddei & Edwards         Expires 12 January 2023                [Page 2]


Internet-Draft                   ech4ent                       July 2022


   *  On the other hand, they need to reduce their risks, protect their
      reputation (and all associated aspects), while at the same time
      complying with a diverse and growing list of policies,
      regulations, certification, labelling and guidelines.

   The current ECH proposal is calling for attention on both aspects
   with the need for clarification on how ECH (and DNS) will really work
   in these production environemtns and at the same time how ECH will
   affect operational security.

1.1.  Requirements Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in
   BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
   capitals, as shown here.

2.  Need for clarification on the ECH proposal

   The current ECH proposal shows a very complex setup requiring a new
   Hybrid Cryptography, a significant change in the DNS with new Record
   Resources (RRs) and the introduction of splitting the backend servers
   into client facing server and backend servers (in shared or split
   mode).

2.1.  DNS impact

   The current mechanism of the ECH vector needs a way that the client
   can retrieve that vector and a choice was made to use the DNS for
   this purpose.  Yet this requires to add new RRs with a substantial
   amount of new data.  It seems like this proposal is definitely moving
   the DNS as it is today into a 'Directory Service for Domains'.  What
   would be the consequences of making such a radical direction change
   into the DNS?  Was there any study that shows potential impacts on
   the overall DNS service from various design criteria perspective?

2.2.  Client Facing vs Backend Servers need a lot of clarification

   It is understood that ECH needs to establish the split of the
   targeted servers into a Client Facing and a Backend server (whether
   in shared or split architecture).  However it is extremely unclear on
   how these should be setup and how they will communicate.  Even if
   this is to be left to "implementation", this interaction requires
   clarification and at minimum a more pedagogic explaination and step
   by step approach in the different cases.  Some additional questions:

   *  Are these Client Facing servers meant to be hosted only by CDNs?



Taddei & Edwards         Expires 12 January 2023                [Page 3]


Internet-Draft                   ech4ent                       July 2022


   *  Are these Client Facing servers a new middlebox model where a
      number of auxiliary services (e.g. security services) could be
      provided?

   *  How will these changes affect the way network security and
      monitoring is carried out by companies and organisations today, to
      protect their own employees and data ?

3.  Enterprises and Organizations need for Operational security

3.1.  Threat landscape

   The general threat landscape which was already very large (see
   [SMART]), has significantly increased since the COVID crisis.  Indeed
   as the crisis forced many enterprises and organizations to accelerate
   their digital transformation, it increased the opportunity for the
   cyber criminals and nation states to launch more attacks, leverage
   innovations to their advantages, better select their targets,
   increase their efficiency and increase their rewards, in particular
   with Ransomware based attacks.

3.2.  Implications to Enterprises and Organizations

   Attacks are now damaging Enterprises and Organizations in increasing
   severity:

   *  Loss of revenue with an average between 11-24%

   *  Loss in capitalisation between 1-5%

   *  Degradation by credit notation agencies

   Since the damage is so high, some cyber insurances companies in some
   countries prefer to pay the ransom to mitigate the damage which has
   the unfortunate side effect of funding and encouraging cybercriminals
   to increase their attacks!

3.3.  The main requirements

   Enterprises and Organizations need to protect themselves for a vast
   number of reasons, mainly:

   *  Reduce their Risks.  And in particular as part of any Cyber
      Resilience strategy.

   *  Protect their Reputation.  The term Reputation includes many
      aspects way beyond the traditional enterprises and organization
      assets (data, etc.).



Taddei & Edwards         Expires 12 January 2023                [Page 4]


Internet-Draft                   ech4ent                       July 2022


   *  Comply to a growing diverse set of Policies, Regulations,
      Certifications, Labelling and Guidelines.  This set of artefacts
      is increasing by countries and regions in the world, by the nature
      of the object of the artefact (just in the EU: NIS, EBAG, DORA,
      NIS2, etc.), by the changes of roles (e.g. the ENISA is now
      carrying a Certification Mandate), etc.

3.4.  Evolution of defence approaches

   The defence approaches evolved in the past decades with a few
   milestones: several key formal work on security were developed in the
   70s and the 80s and ended up in X.800 being apparently the last
   formal, international consensus based security architecture.  Then
   several works moved security from a pure on premise perimeter defence
   model, to a tiered/layered defence, to defence in depth, to Jericho
   Forum, to Beyond corp, to Zero Trust and to Secure Access Service
   Edge (SASE).

   On the way, the community and the operational security practioners
   across all the enterprises and organizations on any size and any
   vertical, incrementaly recognized:

   *  Security cannot rely on just one solution.  Just like in other
      areas such aircraft safety, an aircraft would have multiple
      alternative components, systems and methods to decrease the
      probability of hiting a unique point of failure.  Several measures
      are used in conjunction with each other to provide defence in
      depth safety so if one layer fails a another layer can provide
      coverage

   *  Compartmenting perimeters (regardless on how big or small their
      granularity is), like in a submarine, is a good approach to
      resiliency

   *  Not trusting anyone, anything, neither the device, nor the
      network, nor the service endpoints (servers, clouds, etc.), nor
      the application, nor the logs, etc. is a good practice

   *  The acceptance that breaches will occur; and that minimising the
      impact of such a breach (through developing a strong Cyber
      Resiliance) and through the adoption of Zero Trust is best
      practice

3.5.  The need for Network based security

   In general [OPSECNSIMPACT] covered several aspects of the impacts of
   pervasive encryption to Operational Network Security Practices.  We
   will remind some of aspects in the following way:



Taddei & Edwards         Expires 12 January 2023                [Page 5]


Internet-Draft                   ech4ent                       July 2022


   The history of network based attack detection is a long one, dating
   back to the mid-1990's with the first Intrusion Detection Systems
   (IDS) and Proxies.  These started off being fairly simple systems
   which would look in the network traffic for certain string types and
   then alert when seen.  As such they tended to simply look at Layer 4
   traffic and did not understand the behaviours of certain protocols,
   and so was highly prone to false positives.

   Over time the technologies developed and became more protocol aware
   and as the accuracy improved so did the confidence to actually block
   attacks before they reached the targeted endpoint; IDS became
   Intrusion Prevention.  At a higher protocol level Proxies have
   fundamentally not changed much at all, in essence they look at the
   HTTP connection and extract the Server Name Identification (SNI) and
   then check that against a list of known good or bad sites and then
   block or allow.  But they have evolved to allow integration with
   other security products, such as sandboxes, to extract the payload
   and analyse for malware embedded in that content.

   In all cases these 'boundary controls' have been essential to
   organisations in trying to protect their users from malicious attacks
   coming in from the Internet.  But this only considers the inbound
   traffic, what about what users are sending out of an organisation ?
   This is where Data Loss Prevention (DLP) controls come in; allowing
   organisations to look for company confidential data, Personal
   Identifiable Information (PII), and financial data (such as credit
   card data) and stop it egressing the organisation.  Not only are
   these controls used to protect the organisation, but they are also
   essential from a legal and compliance point of view due to
   legislation such as GDPR and PCI.





















Taddei & Edwards         Expires 12 January 2023                [Page 6]


Internet-Draft                   ech4ent                       July 2022


   Increasingly the need for network centric security controls has
   grown, but counter to this has been the ever increasing use of
   encryption.  In the 1990's the amount of internet traffic that was
   encrypted was very small, which easily allowed the traffic and its
   content to be checked.  But today almost all communication is
   encrypted and so the job of monitoring it has also become harder to
   achieve.  From a Proxy perspective, simply looking at the SNI address
   of where the traffic is destined allows for malicious traffic (such
   as malware talking to a Command and Control (C&C) server) to be
   blocked on the Proxy or Firewall.  But in order to read deeper into
   the traffic Deep Packet Inspection (DPI) relies on using a network
   intermediary to sit between the client and the server it is
   connecting to, to decrypt the traffic, analyse it and then re-encrypt
   and send on to the destination.  Again, being able to analyse the SNI
   allows these systems to only decrypt the traffic that the
   organisation is interested in, which is called 'selective decrypt'.
   So normal user activity such as connecting to a news site or social
   media can be ignored while traffic destined for an online email
   system can be decrypted and inspected for malware and DLP controls.

   So why can all this essential analysis not be carried out on the
   endpoint?  In theory it can, but there are several problems and
   limitations with this approach.  One problem is that this endpoint
   software can be turned off and disabled.  Even today, most endpoint
   security software (be it DLP or antimalware based) does not have
   Tamper Controls built into it.  And as can be seen from many high
   profile attacks, such as the recent Sunburst attack that targeted the
   [SOLARWIND] supply chain, the first thing that malware did was
   disable the anti-malware system so that attack would succeed.  So,
   the need for network security as a Mandatory security control is much
   more effective than having endpoint based controls which can be
   turned on and off (and as such can be seen as a Discretionary
   control).  The second problem arise because more and more
   organisations are moving applications and services to the cloud and
   the web browser has become the ubiquitous method to connect to these
   applications.  An increasing focus for security is on protecting the
   web browser from being the initial attack vector and so ensuring the
   content is clean and trusted by the time it arrives at the browser
   adds significant security benefit.  The third problem is that to
   truly run the full set of defence in depth analysis on the endpoint
   will cripple many endpoints due to compute and memory required for
   the full analysis.  Adding security in the network mitigates all of
   these difficulties.








Taddei & Edwards         Expires 12 January 2023                [Page 7]


Internet-Draft                   ech4ent                       July 2022


3.6.  Network Security deployment

   To our knowledge, all fortune 500, fortune 2000, and likely the vast
   majority of enterprise customers deployed a network security solution
   for decades.  This is both motivated by the nature of the attacks,
   the compliancy requirements, but as well by costs as it is easier to
   manage security from the network vs the endpoint (see below).

4.  Client Complications

4.1.  Devices are not trustable

   As [CLESS] showed before its work was stopped, is that a strategy
   pushing security to only the two endpoints of a communication is
   doomed to a lot of trouble as the spectrum of limits affecting
   endpoint security solutions is a very big gap that has not been
   resolved in the past decades and won't be in any short term.

4.2.  Attacks targeting the web browser

   As discussed, the web browser has now become the primary method used
   by users to access applications and services on the internet.
   Hackers know this and so increasingly use attacks that aim to
   compromise the browser including by performing and enabling a Man in
   the Browser [MITB] attack, codified at T1185 in MITRE ATT&CK
   framework [MITB-MITRE].

   In the first instance we have Phishing attacks, which trick the user
   into clicking on a malicious link or opening a malicious file.
   Hackers create domains that look like legitimate websites which often
   are related to delivery companies or tax offices (and these can be
   blocked at the network level through analysing the SNI to understand
   the age of a domain or whether it is known bad).  To evade this
   hackers, have become more stealthy by using legitimate domains (such
   as aws.amazon.com or other similar internet hosting sites) but then
   embedding the malware in the website code itself (i.e.  HTML or
   Java).  In these cases, knowing the SNI is necessary but not
   sufficient (because it is essentially legitimate), so proper analysis
   on the whole page itself is much more important.  In this case the
   web browser will not protect the user as it requires proper analysis,
   which can be done in transit from analysing the network traffic.










Taddei & Edwards         Expires 12 January 2023                [Page 8]


Internet-Draft                   ech4ent                       July 2022


   Other attacks work by compromising the legitimate website itself.
   [MALVERTISING] (malicious advertising) attacks work by creating fake
   adverts that then get displayed on legitimate websites.  In many
   cases the user can get infected by simply viewing the advert and
   again it is not always possible to stop these attacks with simply the
   SNI data; The SNI is necessary but it is only when the specific code
   hidden in the advert is analysed that the attack is detected and
   stopped.  This, again, cannot be done in the browser alone.

   [MAGECART], or Web Skimming is a common form of attack which is
   intended to steal PII and credit card data.  Hackers compromise
   legitimate websites, typically ecommerce related, and add JavaScripts
   which skim the credit card data used by a customer and send that data
   to the hacker.  Other attacks will distribute the malware loaders to
   the user so again they get compromised by simply viewing the
   otherwise legitimate website.  In both cases simply looking at the
   SNI server data is necessary but insufficient; and that the whole
   page needs to be analysed to detect the malicious code.

   Users themselves can also be targeted directly through Social
   Engineering.  A common technique is to use legitimate social
   networks, like LinkedIn, to lure targeted users to open malicious
   files or links.  So the hacker would appear to be a legitimate job
   recruiter with news of a new job opportunity, 'please read this job
   description' is the lure, the user clicks on the link or opens the
   document and the host is compromised.  These communications are
   almost always encrypted and may use specific chat channels to send
   the malware through; the site itself is good and so it is only
   through analysing every object being received on the host, can the
   malware be detected.

   Finally the browser itself can be compromised by the user themselves,
   by installing what looks to be legitimate plug-ins for the browser,
   but in fact they collect browsing habits or may log keyboard
   activity.

4.3.  Defence in Depth

   The concept of Defence in Depth is not a new one [NIST-DID], but it
   is still highly relevant today.  Put simply, Defence in Depth is
   about creating multiple layers of defence to stop hackers.

   Normal internet traffic relies first on the DNS resolution and as
   discussed this can be a simple and effective way to block know bad
   sites i.e. check the domain name against a list of bad sites, or
   analyse the age of the domain and return a zero value if the site is
   known bad or has only existed for a short period of time.




Taddei & Edwards         Expires 12 January 2023                [Page 9]


Internet-Draft                   ech4ent                       July 2022


   Next as the HTTPS connection is made, checking the SNI, decrypting
   the traffic, and analying its content will ensure nothing sensitive
   is being sent or anything malicious is being received.  Again, if
   anything is detected as bad, then block the request/response.  This
   therefore forms the first levels of defence, it should also be noted
   that this network analysis no longer must be down on-premise or as a
   traditional boundary defence, but can also be routed through an
   online service in the model of SASE (Secure Access Service Edge)
   allowing for greater flexibility for remote users and users working
   from home.

   On the endpoint, deploy anti-malware and DLP agents which can analyse
   the data and activity on the endpoint (remembering to make sure there
   are controls in place to stop the software from being deactivated!)
   and this forms the final line of defence.  And this really is the
   point, there will always be a need to deploy agents on the endpoint
   of devices managed by the organisation; but these should only be
   thought of as that last line of defence, and not the only line of
   defence!  It is also worth considering the increase in devices that
   are not managed by the organisation - Bring Your own Device (BYOD);
   how can an organisation protect these devices and ensure that data is
   not being leaked?  The only way to really protect these devices
   relies again on network based analysis for malware and DLP etc.

5.  Conclusions

   This document reminds on the Enterprises and Organizations
   environments, constraints and requirements.  It shows too that the
   current ECH drafts will implicitly:

   *  Leave the security responsibility to the browser and the client
      facing server

   *  The browser cannot be judge and jury as if it is compromised, it
      cannot act properly to protect end users

   *  The client facing server is becoming a new middlebox which is
      creating a number of problems

   *  There is a need for a 3rd party security to add credentials to the
      solution

   This leaves a few questions to the the current ECH drafts:

   *  Can the impacts of ECH on DNS and on the Client Facing vs Backend
      servers be clarified?

   *  Can the problems of enterprises and organizations be acknowledged?



Taddei & Edwards         Expires 12 January 2023               [Page 10]


Internet-Draft                   ech4ent                       July 2022


   *  If not, then this will leave little choices to the defenders to
      use a protocol based clean solution

   *  If yes, then what could be the suggestions to include operational
      security in the ECH design

6.  IANA Considerations

   This memo includes no request to IANA.

7.  Security Considerations

   This document should improve the security of the Internet.

8.  References

8.1.  Normative References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <https://www.rfc-editor.org/info/rfc2119>.

   [RFC8174]  Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
              2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
              May 2017, <https://www.rfc-editor.org/info/rfc8174>.

8.2.  Informative References

   [CAMPLING] Campling, A., Vixie, P., and D. Wright, "Encrypted Client
              Hello Deployment Considerations", 7 March 2022,
              <https://datatracker.ietf.org/doc/draft-campling-ech-
              deployment-considerations/>.

   [CLESS]    Taddei, A., Wueest, C., Roundy, K., and D. Lazanski,
              "Capabilities and Limitations of Endpoint Security
              Solutions", 13 July 2020,
              <https://www.ietf.org/archive/id/draft-taddei-smart-cless-
              introduction-03.txt>.

   [MAGECART] Wikipedia, "Magecart", 3 April 2022,
              <https://en.wikipedia.org/wiki/Web_skimming#Magecart>.

   [MALVERTISING]
              Wikipedia, "Malvertising", 2 June 2022,
              <https://en.wikipedia.org/wiki/Malvertising>.





Taddei & Edwards         Expires 12 January 2023               [Page 11]


Internet-Draft                   ech4ent                       July 2022


   [MITB]     OWASP, "Man-in-the-browser attack", n.d.,
              <https://owasp.org/www-community/attacks/Man-in-the-
              browser_attack>.

   [MITB-MITRE]
              MITRE, "Browser Session Hijacking - T1185", 25 February
              2022, <https://attack.mitre.org/techniques/T1185/>.

   [NIST-DID] NIST, "Glossary - defense-in-depth", n.d.,
              <https://csrc.nist.gov/glossary/term/defense_in_depth#:~:t
              ext=Definition(s)%3A,and%20missions%20of%20the%20organizat
              ion.>.

   [OPSECNSIMPACT]
              Cam-Winget, N., Wang, E., Danyliw, R., and R. DuToit,
              "Impact of TLS 1.3 to Operational Network Security
              Practices", 26 January 2021,
              <https://datatracker.ietf.org/doc/html/draft-ietf-opsec-
              ns-impact-04>.

   [SMART]    McFadden, M., "BCP72 - A Problem Statement", 21 January
              2022, <https://datatracker.ietf.org/doc/draft-mcfadden-
              smart-threat-changes/>.

   [SOLARWIND]
              Symantec, a Division of Broadcom Software Group,
              "SolarWinds (Sunburst) Attack What You Need to Know",
              December 2020, <https://symantec.broadcom.com/en/
              solarwinds-sunburst-attacks>.

Acknowledgements

   This internet draft wants to recognize the systematic efforts of
   Andrew Campling who provides the so-called DNS call every Monday at
   5pm CEST.

Contributors

   Eric Chien
   Broadcom
   Email: Eric.Chien@broadcom.com
   URI:   https://www.linkedin.com/in/eric-chien-66b4b258/


   Eric contributed to the analysis of the Man in the Browser attacks.

Authors' Addresses




Taddei & Edwards         Expires 12 January 2023               [Page 12]


Internet-Draft                   ech4ent                       July 2022


   Arnaud Taddei (editor)
   Broadcom
   1320 Ridder Park Dr
   San Jose, CA 95131
   United States of America
   Phone: 41795061129
   Email: Arnaud.Taddei@broadcom.com
   URI:   https://www.linkedin.com/in/arnaudtaddei/


   Simon Edwards (editor)
   Broadcom
   1320 Ridder Park Dr
   San Jose, CA 95131
   United States of America
   Email: Simon.Edwards@broadcom.com
   URI:   https://www.linkedin.com/in/simononsecurity/


































Taddei & Edwards         Expires 12 January 2023               [Page 13]