OASIS PKCS 11 TC

 View Only
  • 1.  Re: [pkcs11] Sensitivity and extractability of derived keys

    Posted 08-14-2013 10:09
    Michael, Can you point me to the section of the spec which mentions 3) ? Also, I believe 3) is an option, an open option. You do 3) only if you absolutely need it. Otherwise, by default, one should not do 3). Thanks! -Oscar


  • 2.  Re: [pkcs11] Sensitivity and extractability of derived keys

    Posted 08-14-2013 15:38
    On 8/14/2013 6:08 AM, Oscar So wrote: Michael, Can you point me to the section of the spec which mentions 3) ? Robert mostly copied the TLS12 stuff from TLS. That text is in the TLS (2.25.5) section (and is in the SSL 2.24.5 section as well). I haven't had a chance to look elsewhere. Mike Also, I believe 3) is an option, an open option. You do 3) only if you absolutely need it. Otherwise, by default, one should not do 3). Thanks! -Oscar


  • 3.  Re: [pkcs11] Sensitivity and extractability of derived keys

    Posted 08-14-2013 16:11
    Thanks Michael. I think you are referring to 6.25.5 (Master key derivation). I still don't see 3). Say 3) is there, I believe it's still fine to have 3) , and having all options open for the implementor. I also strongly believe that the implementor will have to reference the Key Management Security Policy (set by Security Administrator), and set these sensitivity attributes accordingly. -Oscar On 08/14/13 08:38 AM, Michael StJohns wrote: On 8/14/2013 6:08 AM, Oscar So wrote: Michael, Can you point me to the section of the spec which mentions 3) ? Robert mostly copied the TLS12 stuff from TLS. That text is in the TLS (2.25.5) section (and is in the SSL 2.24.5 section as well). I haven't had a chance to look elsewhere. Mike Also, I believe 3) is an option, an open option. You do 3) only if you absolutely need it. Otherwise, by default, one should not do 3). Thanks! -Oscar


  • 4.  Re: [pkcs11] Sensitivity and extractability of derived keys

    Posted 08-14-2013 18:20
    Plane has wifi - who knew? On 8/14/2013 12:07 PM, Oscar So wrote: Thanks Michael. I think you are referring to 6.25.5 (Master key derivation). I still don't see 3). It's 2.25.5 in the 2.40 first rev doc set - in the pkcs11-curr-v2.40-wd01.pdf. It says: This mechanism has the following rules about key sensitivity and extractability: ? The CKA_SENSITIVE and CKA_EXTRACTABLE attributes in the template for the new key can both be specified to be either CK_TRUE or CK_FALSE. If omitted, these attributes each take on some default value. Which is what I meant by (3). Say 3) is there, I believe it's still fine to have 3) , and having all options open for the implementor. I also strongly believe that the implementor will have to reference the Key Management Security Policy (set by Security Administrator), and set these sensitivity attributes accordingly. The issue is mostly that I can't get the PKCS11 module to prevent an attacker from repeating the derive (using the original key material and a new template) and setting the sensitivity to "not sensitive". As I said, my threat model is to protect against authorized but illegitimate users (e.g. the application using the HSM was hacked) being able to extract key material. If the pre-master key had a CKA_DERIVE_TEMPLATE and that template had CKA_SENSITIVE=true and CKA_EXTRACTABLE=false (template set when the key was generated or derived from the DH or ECDH key) then the subsidiary keys should be protected against the type of attack I envisioned. But right now there's no CKA_DERIVE_TEMPLATE and that is limiting PKCS11 the ability to protect secondary key material. BTW - 2.3.9, 2.3.10, 2.3.11, 2.4.10, - ECDH and a bunch of others (search for "key sensitivity") also use (3) as their treatment. (*sigh* even SHA1 key derivation). -Oscar On 08/14/13 08:38 AM, Michael StJohns wrote: On 8/14/2013 6:08 AM, Oscar So wrote: Michael, Can you point me to the section of the spec which mentions 3) ? Robert mostly copied the TLS12 stuff from TLS. That text is in the TLS (2.25.5) section (and is in the SSL 2.24.5 section as well). I haven't had a chance to look elsewhere. Mike Also, I believe 3) is an option, an open option. You do 3) only if you absolutely need it. Otherwise, by default, one should not do 3). Thanks! -Oscar