You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
or Trusted Platform Module (TPM). In contrast, application traffic
843
850
keys are stored within the rich operating system, where short-term exposure due
@@ -846,20 +853,24 @@ can be re-established, provided the compromise is no longer active when an
846
853
Extended Key Update is performed.
847
854
848
855
Extended Key Update can restore confidentiality only if the attacker no longer
849
-
has access to either peer and cannot interfere with the Extended Key Update procedure.
850
-
If an adversary retains access to current application traffic keys and
851
-
can act as a man-in-the-middle during the Extended Key Update, then the
852
-
update cannot restore security. In that case, the attacker can impersonate
853
-
each endpoint and substitute key shares, maintaining control of the communication.
854
-
Therefore, Extended Key Update provides recovery only in the case where the
855
-
compromise has ended before the procedure begins.
856
-
857
-
If a compromise occurs before the handshake completes, the ephemeral key exchange, client_handshake_traffic_secret, and server_handshake_traffic_secret could be exposed.
858
-
In that case, only the initial handshake messages and the application data encrypted
859
-
with these secrets can be decrypted until the Extended Key Update procedure completes.
860
-
The Extended Key Update procedure derives fresh application traffic secrets from a
861
-
new ephemeral key exchange, ensuring that all subsequent application data
862
-
remains confidential.
856
+
has access to either peer. If an adversary retains access to current application traffic
857
+
keys and can act as a man-in-the-middle during the Extended Key Update, then the
858
+
update cannot restore security unless {{exported}} is used.
859
+
860
+
If the mechanism defined in {{exported}} is not used, the attacker can
861
+
impersonate each endpoint, substitute EKU messages, and maintain control
862
+
of the communication. When the modified Exported Authenticator is used,
863
+
the CertificateVerify signature is bound to the EKU transcript, so any interference
864
+
with the EKU messages will be detected and the attack prevented.
865
+
866
+
If a compromise occurs before the handshake completes, the ephemeral key exchange,
867
+
client_handshake_traffic_secret, server_handshake_traffic_secret, and the initial
868
+
client_/server_application_traffic_secret could be exposed. In that case, only the
869
+
initial handshake messages and the application data encrypted under the initial
870
+
client_/server_application_traffic_secret can be decrypted until the Extended Key
871
+
Update procedure completes. The Extended Key Update procedure derives fresh
872
+
application_traffic_secrets from a new ephemeral key exchange, ensuring that all
0 commit comments