Movatterモバイル変換


[0]ホーム

URL:


Skip to main content

Email updates on news, actions,
and events in your area.
Join EFF Lists
Electronic Frontier Foundation
Donate
Podcast Episode: Cryptography Makes a Post-Quantum Leap

ETS Isn't TLS and You Shouldn't Use It

DEEPLINKS BLOG
ByJacob Hoffman-Andrews
February 26, 2019
Encrypt the Web (security hole)

ETS Isn't TLS and You Shouldn't Use It

Encrypt the Web (security hole)

The good news:TLS 1.3 is available, and the protocol, which powers HTTPS and many other encrypted communications, is better and more secure than its predecessors (including SSL).

The bad news: Thanks to afinancial industry group called BITS, there’s a look-alike protocol brewing calledETS (or eTLS) that intentionally disables important security measures in TLS 1.3. If someone suggests that you should deploy ETS instead of TLS 1.3, they are selling you snake oil and you should run in the other direction as fast as you can.

 It's Better Than ETS

ETS vs. TLS / SSL

ETS removesforward secrecy, a feature that is so widely used and valued in TLS 1.2 that TLS 1.3 made it mandatory. This removal invisibly undermines security and has the potential to seriously worsen data breaches. As the ETS / eTLS spec says: "eTLS does not provide per-session forward secrecy. Knowledge of a given static Diffie-Hellman private key can be used to decrypt all sessions encrypted with that key."

In earlier versions of TLS and SSL, forward secrecy was an optional feature. If enabled, it ensured that intercepted communications couldn’t be retrospectively decrypted,even by someone who later got a copy of the server’s private key. This remarkable property is so valuable for security that the Internet Engineering Task Force (IETF), which develops Internet standards including TLS, decided that TLS 1.3 wouldonly offer algorithms that provide forward secrecy. The post-facto decryption weakness in TLS 1.2 and earlier versions is now considered a bug. It’s a product of its time that was produced by a number of factors, like government pressure not to implement stronger algorithms, a cloud of patent-related uncertainty around elliptic curve algorithms, and processor speed in the early 2000’s.

Nowadays, it just makes plain sense to use forward secrecy for all TLS connections. Unfortunately, during the long tenure of TLS 1.2, some companies, mostly banks, came to rely on its specific weaknesses. Late in the TLS 1.3 process,BITS came forward on behalf of these companies and said their members “depend upon the ability to decrypt TLS traffic to implement data loss protection, intrusion detection and prevention, malware detection, packet capture and analysis, and DDoS mitigation.” In other words, BITS members send a copy of all encrypted traffic somewhere else for monitoring. The monitoring devices have a copy of all private keys, and so can decrypt all that traffic. They’d like TLS 1.3 to offer algorithms that disable forward secrecy so they can keep doing this decryption.

But there’s a real harm that comes from weakening a critical protocol to provide easier in-datacenter monitoring for a small handful of organizations. Public-facing web servers might also implement the proposed weaker algorithms, either intentionally or accidentally, and this would expose billions of people’s data to easier snooping. Plus, this isn’t even a good way to do in-datacenter monitoring–with control of the servers, an organization can log data at their servers rather than relying on post-hoc decryption. Server-side logging can also redact sensitive data like plaintext passwords that should never be retained.

In response to these objections, some IETF participants produced amodest proposal: By tweaking some parameters, they could make a TLS 1.3 server look like it was providing forward secrecy, but actually not provide it. This proposal, mentioned earlier and called “Static Diffie-Hellman,” would misuse a number in the handshake that is supposed to be random and discarded after each handshake. Instead of randomly generating that number (the Diffie-Hellman private key), a server using this technique would use the same number for all connections, and make sure to share a copy of it with the devices doing decryption. This would only require changes to servers, not clients, and would look just like the secure version of TLS 1.3.

After much discussion, IETF decided not to standardize this modest proposal. Its risks were too great. So BITS took it to another standards organization,ETSI, which was more willing to play ball. ETSIhas been working on its weakened variant since 2017, and in October 2018 released a documentcalling their proposal eTLS. They evensubmitted public comment asking NIST to delay publication ofnew guidelines on using TLS 1.3 and recommend eTLS instead.

“Enterprise” Transport Security Tries to Use TLS’ Good Name

Meanwhile, the IETF caught wind of this andstrenuously objected to the misleading use of the name TLS in “eTLS:” “Our foremost concern remains the use of a name that implies the aegis of Transport Layer Security (TLS), a well-known protocol which has been developed by the IETF for over twenty years.” ETSIbacked down, and the next revision of their weakened variant will be called “ETS” instead. Instead of thinking of this as “Enterprise Transport Security,” which the creators say the acronym stands for, you should think of it as “Extra Terrible Security.”

Internet security as a whole is greatly improved by forward secrecy. It’s indefensible to make it worse in the name of protecting a few banks from having to update their legacy decrypt systems. Decryption makes networks less secure, and anyone who tells you differently is selling something (probably a decryption middlebox). Don’t use ETS, don’t implement it, and don’t standardize it.

Join EFF Lists

Discover more.

Email updates on news, actions, events in your area, and more.
Thanks, you're awesome! Please check your email for a confirmation link.
Oops something is broken right now, please try again later.

Related Updates

How to Fix the Internet - Deirdre Connolly - Cryptography Makes a Post-Quantum Leap
Deeplinks Blog byJosh Richman | July 2, 2025

Podcast Episode: Cryptography Makes a Post-Quantum Leap

The cryptography that protects our privacy and security online relies on the fact that even the strongest computers will take essentially forever to do certain tasks, like factoring prime numbers and finding discrete logarithms which are important forRSA encryption,Diffie-Hellman key...

A silhouette of a police officer, with spying eye on his hat

How Cops Can Get Your Private Online Data

Can the cops get your online data? In short, yes. There are a variety of US federal and state laws which give law enforcement powers to obtain information that you provided to online services. But, there are steps you as a user and/or as a service provider can take to...
crossed keys security icon banner

FBI Warning on IoT Devices: How to Tell If You Are Impacted

On June 5th, the FBIreleased a PSA titled “Home Internet Connected Devices Facilitate Criminal Activity.” This PSA largely references devices impacted by the latest generation ofBADBOX malware (as named by HUMAN’s Satori Threat Intelligence and Research team) that EFF researchers...

A flying cat in a space suit with a badge of the trans flag, leaving a rainbow trail.

Standing Up for LGBTQ+ Digital Safety this International Day Against Homophobia

Lawmakers and regulators around the world have been prolific with passinglegislation restricting freedom of expression and privacy for LGBTQ+ individuals and fueling offline intolerance. Online platforms are also complicit in this pervasive ecosystem bycensoring pro-LGBTQ+ speech, forcing LGBTQ+ individuals to...

fingers prepared to flick a small person with a megaphone off the screen
Deeplinks Blog byJason Kelley | April 28, 2025

Congress Passes TAKE IT DOWN Act Despite Major Flaws

It would give the powerful a dangerous new route to manipulate platforms into removing lawful speech that they simply don't like, with President Trump himself saying that he would use the law to censor his critics. The bill passed the Senate in February, and it now heads to the president's...
crossed keys security icon banner
Press Release | April 28, 2025

EFF Leads Prominent Security Experts in Urging Trump Administration to Leave Chris Krebs Alone

SAN FRANCISCO – The Trump Administration must cease its politically motivated investigation of former U.S. Cybersecurity and Infrastructure Security Agency Director Christopher Krebs, the Electronic Frontier Foundation (EFF) and dozens hundreds (see update below) of prominent cybersecurity and election security experts urged in an open letter. The letter – signed...

A multi-colored bullhorn icon surrounded by grey-blue hexagons

Cybersecurity Community Must Not Remain Silent On Executive Order Attacking Former CISA Director

Cybersecurity professionals and the infosec community have essential roles to play in protecting our democracy, securing our elections, and building, testing, and safeguarding government infrastructure. It is critically important for us to speak up to ensure that essential work continues and that those engaged in these good faith efforts are...

Deeplinks Blog byAlexis Hancock | April 10, 2025

Certbot 4.0: Long Live Short-Lived Certs!

When Let’s Encrypt, a free certificate authority,started issuing 90 day TLS certificates for websites, it was considered a bold move that helped push the ecosystem towards shorter certificate life times. Beforehand, certificate authorities normally issued certificate lifetimes lasting a year or more. With4.0,...

drawing of a fish in the sea

Simple Phish Bait: EFF Is Not Investigating Your Albion Online Forum Account

We recently learned that users of the Albion Onlinegaming forum have received direct messages purporting to be from us. That message, which leverages the fear of an account ban, is a phishing attempt.If you’re an Albion Online forum user and receive a message that claims to be from...

Photo of Ron Deibert and Chasing Shadows Book Cover
Deeplinks Blog byMelissa Srago | February 27, 2025

EFF In Conversation With Ron Deibert on Chasing Shadows

Join EFF's Cindy Cohn and Eva Galperin in conversation with Ron Deibert of the University of Toronto’s Citizen Lab, to discuss Ron’s latest book: Chasing Shadows: Cyber Espionage, Subversion and the Global Fight for Democracy.

Discover more.

Email updates on news, actions, events in your area, and more.
Thanks, you're awesome! Please check your email for a confirmation link.
Oops something is broken right now, please try again later.

Back to top

EFF Home

Follow EFF:

Check out our 4-star rating onCharity Navigator.

Contact

About

Issues

Updates

Press

Donate

JavaScript license information

[8]ページ先頭

©2009-2025 Movatter.jp