Protecting Encrypted Cookies from Compression Side-Channel Attacks Douglas Stebila

Protecting Encrypted Cookies from Compression Side-Channel Attacks Douglas Stebila

Protecting encrypted cookies from compression side-channel attacks Douglas Stebila Joint work with Janaka Alawatugoda (QUT) and Colin Boyd (NTNU) Supported by ARC Discovery Project DP130104304. Financial Crypto 2015 • IACR eprint 2014/724 Royal Holloway, University of London • January 22, 2015 Royal Holloway • 2015/01/22 Protecting encrypted cookies from compression side-channel attacks • Stebila 2 Introduction Encryption and compression Royal Holloway • 2015/01/22 Protecting encrypted cookies from compression side-channel attacks • Stebila 3 Symmetric key encryption A symmetric key Main security goal: encryption scheme • indistinguishability is a triple of algorithms: Attacker cannot tell apart • KeyGen() –> k encryptions of two messages • Enck(m) –> c of the same length: • Deck(c) –> m Enck(m0) looks like Enck(m1) KeyGen and Enc when |m0|=|m1| can be probabilistic Royal Holloway • 2015/01/22 Protecting encrypted cookies from compression side-channel attacks • Stebila 4 Symmetric key encryption I voted for Bush. Enck 8jv0cKErN3aafBc6i len = 17 I voted for Gore. Enck WpmuUzU581bgOvMLZ len = 17 same length input => same length output Royal Holloway • 2015/01/22 Protecting encrypted cookies from compression side-channel attacks • Stebila 5 Compression A compression Main security goal: scheme is a pair of • none algorithms: • Comp(m) –> o Main functionality goal: • Decomp(o) –> m • |Comp(m)| << |m| for common distribution of m Comp may be • Can’t be true for all m due probabilistic (but to Shannon’s theorem usually isn’t) Royal Holloway • 2015/01/22 Protecting encrypted cookies from compression side-channel attacks • Stebila 6 Compression not much not much Comp redundancy here redundancy here len = 24 more more more 4{more } Comp more redundancy redundancy len = 18 same length input => possibly different length output Royal Holloway • 2015/01/22 Protecting encrypted cookies from compression side-channel attacks • Stebila 7 Compression then encryption not much wYvXqQpMESn& Comp Enc redundancy here k tFKSiYsYLm8j len = 24 more more more lQQeOMh0q Comp Enc more redundancy k plTmyEinS len = 18 same length input => possibly different length output Royal Holloway • 2015/01/22 Protecting encrypted cookies from compression side-channel attacks • Stebila 8 A test Man. U. Arsenal 2005-2014 2005-2014 loser loser loser loser CHAMP CHAMP loser loser CHAMP loser loser loser CHAMP loser loser loser CHAMP loser loser loser Royal Holloway • 2015/01/22 Protecting encrypted cookies from compression side-channel attacks • Stebila 9 Comp Enck Royal Holloway • 2015/01/22 Protecting encrypted cookies from compression side-channel attacks • Stebila 10 Which ciphertext is for which message? yI5pDrFhPk3 D1fAGUR1zqv 15Cmymr6xCb lhXdX3c8qd+ LTVEAx BYBwK6dAnoG GQGCmvFIM9/ s6WJjgr2 Royal Holloway • 2015/01/22 Protecting encrypted cookies from compression side-channel attacks • Stebila 11 One message compresses more Arsenal Man. U. 2005-2014 2005-2014 10{loser } 2{loser } 2{CHAMP } 3{CHAMP loser } Royal Holloway • 2015/01/22 Protecting encrypted cookies from compression side-channel attacks • Stebila 12 Deflate (LZ77) compression algorithm • Replaces repeated strings with back references (distance, length) to previous occurrence. You say potato, You say potato, Comp I say potahto. I (-14,8)hto. • Important parameter: window size • How far back does it go to search for occurrences? • a.k.a. dictionary size Royal Holloway • 2015/01/22 Protecting encrypted cookies from compression side-channel attacks • Stebila 13 CRIME attack on compression in TLS Royal Holloway • 2015/01/22 Protecting encrypted cookies from compression side-channel attacks • Stebila 14 TLS record layer MAC Pad Encrypt Royal Holloway • 2015/01/22 Protecting encrypted cookies from compression side-channel attacks • Stebila 15 Compression in TLS record layer Compress MAC Pad Encrypt Royal Holloway • 2015/01/22 Protecting encrypted cookies from compression side-channel attacks • Stebila 16 Secret values in HTTP documents GET / Host: www.facebook.com User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:34.0) Gecko/20100101 Firefox/34.0 Accept: text/html,application/xhtml+xml,application/ xml;q=0.9,*/*;q=0.8 This secret cookie Accept-Language: identien-US,en;qfies my session=0.5 Accept-Encoding: togzip Facebook, deflate DNT: 1 Cookie: datr=DzK9VBnObWDqfL7XLwGSSEsu; reg_fb_ref=https %3A%2F%2Fwww.facebook.com%2F; reg_fb_gate=https%3A%2F %2Fwww.facebook.com%2F; dpr=2 Connection: keep-alive Cache-Control: max-age=0 Royal Holloway • 2015/01/22 Protecting encrypted cookies from compression side-channel attacks • Stebila 17 Transmitting an HTTP request User Browser (HTTP) Browser (TLS) • Requests • Creates GET • Input: HTTP www.facebook.com request with saved message cookie • Compress Send over • MAC Internet • Pad • Encrypt Royal Holloway • 2015/01/22 Protecting encrypted cookies from compression side-channel attacks • Stebila 18 Attack Please send a GET request for https://www.facebook.com/?datr=A Royal Holloway • 2015/01/22 Protecting encrypted cookies from compression side-channel attacks • Stebila 19 Attack Please send a GET request for https://www.facebook.com/?datr=A Ad GET /?datr=A Host: www.facebook.com Cookie: datr=DzK9VBnObW DqfL7XLwGSSEsu ... Royal Holloway • 2015/01/22 Protecting encrypted cookies from compression side-channel attacks • Stebila 20 Attack Please send a GET request for https://www.facebook.com/?datr=A Observes compressed & encrypted request Ad VGytgpDn/1Ym5oCdB3Vh2 D5EmdjLRdkx7tEvKG43WJ yD++cx8CJlBbetQejiXLX +oQO9bnUMYQwtglOSf9bf oyWJkYxHsKfqYNqWAfCIg 8U5BK92Ayvk858MJOnTuK len = 204 Royal Holloway • 2015/01/22 Protecting encrypted cookies from compression side-channel attacks • Stebila 21 Attack Please send a GET request for https://www.facebook.com/?datr=B Observes compressed & encrypted request Ad UQ5ItQ1Y4BVCy37Fhu5K4 hyre7l5P4pWwAYfvnzg9m R5Qq250PF1yQpf83AFJ34 QS+9BPjUnBzVGENe15r29 rY9tRfIFAdE8ecEmVTFtl zHy+8EIwxDK67rxM29clJ len = 204 Royal Holloway • 2015/01/22 Protecting encrypted cookies from compression side-channel attacks • Stebila 22 Attack Please send a GET request for https://www.facebook.com/?datr=C Observes compressed & encrypted request Ad Wdb42n0LeQbVweAoiCZxE j9O0U+qaGPPbe9Sebz2Dx GhYWj9U4X0cKYyBpTSpB4 4dOqd4DpCscHEsBdg0p6q DXiSBJ+MLOKbpRvAAmPhy 9Sn9VPnsHgKyB4I1lgCKA len = 204 Royal Holloway • 2015/01/22 Protecting encrypted cookies from compression side-channel attacks • Stebila 23 Attack Please send a GET request for https://www.facebook.com/?datr=D Observes compressed & encrypted request Ad O8Gb8JwSuoNrcQ7190KSs nM7n22lOtByzmvv555ZP+ +4lNW2wIuRrTF6KlKdjOB 425VVDUbKKdHNF9YaaxTy lVWBVo1ApZ4PTSnB1J0pt jAsecGXjRXOXTwye len = 199 Royal Holloway • 2015/01/22 Protecting encrypted cookies from compression side-channel attacks • Stebila 24 Attack Please send a GET request for https://www.facebook.com/?datr=Da Observes compressed & encrypted request Ad Ok3MV18blnYFIjz2tcucQ x2mJ8MLULVqMSYO9Lo1r0 wxwjEG8pLwaPaVtrnf46l ypdqbYQ22oJw63ixkS1HR QVfz8UKs9tOhPvTAwUiwS yukxrKq9x9I+3fO8lv8aU len = 205 Royal Holloway • 2015/01/22 Protecting encrypted cookies from compression side-channel attacks • Stebila 25 Attack Please send a GET request for https://www.facebook.com/?datr=D Observes compressed & encrypted request Repeated text => compression Ad GET /?datr=D Host: www.facebook.com Cookie: datr=DzK9VBnObW DqfL7XLwGSSEsu ... Royal Holloway • 2015/01/22 Protecting encrypted cookies from compression side-channel attacks • Stebila 26 CRIME attack on TLS “Compression Ratio Info-leak Made Easy” • “Rizzo and Duong A few tricky bits to make it [ekoparty 2012] work in TLS: • TLS splits plaintext into 16K • Victim visits adversary- records then compresses and controlled page encrypts each record separately • Adversarial Javascript causes browser to make many • Need to ensure that you can requests observe length differences • Figure out 1st letter of cookie based on compression • Figure out 2nd letter of cookie • • Figure out 3rd letter of cookie But it can be made to work! • … Royal Holloway • 2015/01/22 Protecting encrypted cookies from compression side-channel attacks • Stebila 27 CRIME wasn’t new • Kelsey [FSE 2002] theorized length-based attacks on compression-encryption with adversary-chosen prefix. Royal Holloway • 2015/01/22 Protecting encrypted cookies from compression side-channel attacks • Stebila 28 Impact of CRIME attack January 7, 2015 • https://www.trustworthyinternet.org/ssl-pulse/ Royal Holloway • 2015/01/22 Protecting encrypted cookies from compression side-channel attacks • Stebila 29 But… • Compression is present elsewhere on the Internet. • HTTP allows gzip compression of the body Royal Holloway • 2015/01/22 Protecting encrypted cookies from compression side-channel attacks • Stebila 30 BREACH attack on compression in HTTP Royal Holloway • 2015/01/22 Protecting encrypted cookies from compression side-channel attacks • Stebila 31 BREACH attack • Attack against “Browser Reconnaissance HTTP compression and Exfiltration via hypothesized in Adaptive Compression of CRIME Hypertext” presentation • attack demonstrated against secrets in HTML • Gluck, Harris, Prado [Black Hat 2013] Royal Holloway • 2015/01/22 Protecting encrypted cookies from compression side-channel attacks • Stebila 32 Cross-site request forgery Please send a GET request for https://www.bank.com/transfer ?to=Eve&amount=1000000 GET /transfer?to=Eve $ &amount=1000000 Host: www.bank.com Cookie: account=Alice ... Royal Holloway • 2015/01/22 Protecting encrypted cookies from compression side-channel attacks

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    71 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us