Feasibility of Multi-Protocol Attacks

Feasibility of Multi-Protocol Attacks

Feasibility of Multi-Protocol Attacks Cas Cremers Eindhoven University of Technology Department of Mathematics and Computer Science P.O. Box 513, NL-5600 MB Eindhoven, The Netherlands [email protected] Abstract to attack the other protocol. Some examples have been ex- plained in [1, 27]. Because the protocols in these papers Formal modeling and verification of security protocols typ- are constructed especially for the purpose of breaking some ically assumes that a protocol is executed in isolation, with- other protocol, they seem contrived, and it seems unlikely out other protocols sharing the network. We investigate the that they would occur in practice. existence of multi-protocol attacks on protocols described At the other end of the spectrum, sufficient conditions in literature. Given two or more protocols, that share key for compositionality have been established by e.g. Guttman structures and are executed in the same environment, are and Thayer in [15]. Alternative requirements can be found new attacks possible? Out of 30 protocols from literature, in [5, 6, 14]. If all protocols that use the same network and we find that 23 are vulnerable to multi-protocol attacks. key infrastructure satisfy certain requirements, e.g. suffi- We identify two likely attack patterns and sketch a tagging ciently different message structures, compositionality of the scheme to prevent multi-protocol attacks. individual security properties is guaranteed. In that case, in order to prove correctness of the system it suffices to prove correctness of the protocols in isolation. However, the stan- 1. Introduction dard protocols found in literature do not meet these require- ments, and thus the theoretical possibility of multi-protocol In recent years, a number of successful formal methods and attacks remains. corresponding tools have been developed to analyse secu- A third approach to the compositionality problem are rity protocols, e.g. [2, 3, 21, 24]. These methods are gener- methods that aim to establish that a given set of protocols ally limited to verification of protocols that run in isolation: does not interfere. A recent example of such an approach is for a protocol that is used over an untrusted network, the e.g. the invariant based approach in [12]. formal models generally assume that there is only one pro- The question that is answered here is: Are multi-protocol tocol that is using the network. attacks a realistic threat which we should consider when However, the assumption that a protocol is the only pro- using protocols from literature? This question has not tocol run over the untrusted network is not realistic. Un- been addressed before, because verification methods for fortunately, when multiple protocols are used over a shared security protocols traditionally do not scale well. This untrusted network, the problem of verifying security prop- holds for manual methods (e.g. proofs by hand) as well as erties becomes significantly harder. The cause of this is the (semi-)automatic methods. It is feasible to verify small to fact that security properties are not compositional. When medium-sized protocols in isolation, but large and/or com- two protocols, that are correct when run in isolation, are posed protocols have been outside the scope of most formal used over the same network, new attacks might be intro- methods. This lack of scalability has also led to a limited ex- duced. pressiveness of security protocol semantics of formal mod- An attack that necessarily involves more than one pro- els: most models only allow for modeling a single protocol tocol, is called a multi-protocol attack. That such attacks and its requirements. exist has been established by Kelsey, Schneier and Wagner Modifying semantics and tools for such analysis was al- in [18]. They show that given a correct protocol, it is pos- ready pointed out as an open research question in [9], and sible to construct a specially tailored protocol that is also has been addressed partially in e.g. [23, 26]. A seman- correct. When these two protocols are run over the same tics which can handle multi-protocol analysis in an intuitive network, the intruder can use messages from one protocol way, is the operational semantics for security protocols by Cremers and Mauw in [10]. Based on these semantics, the and the work on protocols for authentication and key estab- Scyther tool [8] has been developed. Using this tool, we lishment in [4] by Boyd and Mathuria. This resulted in a set have been able to verify two- and three-protocol composi- of 30 protocols. For these experiments, we have only con- tion of 30 protocols from literature. The tests have revealed sidered three security properties: secrecy and two forms of a significant number of multi-protocol attacks. Because this authentication: non-injective agreement and non-injective particular problem has not been addressed before, all at- synchronisation. Formal definitions of these properties can tacks we find are previously unreported. be found in [10, 11]. We proceed as follows. In Section 2 we will define The computational costs of verifying properties in multi- Multi-Protocol attacks and we describe the conducted ex- protocol environments are exponential w.r.t. the number of periments. The results of the experiments are analysed in protocols. It is therefore currently impossible to verify an Section 3, and two feasible attack patterns are analysed in environment with all these protocols in parallel. Instead, we Section 4. We discuss preventive measures in Section 5 and have chosen to test all possible combinations of two or three draw conclusions in Section 6. protocols from this set. Using this method, it was possible Acknowledgements The author would like to thank to find multi-protocol attacks that involve two or three pro- Sjouke Mauw for suggesting the research problem in the tocols. (Because of complexity, verifying the existence of first place, and Gijs Hollestelle for his work on classifying multi-protocol attacks with four or more protocols is future the attacks. work.) When such a test yielded an attack, it was verified automatically whether the attack actually required multiple 2. Multi-Protocol Attacks protocols, or could be mounted against a single protocol. The verification results also depend on a matching pa- rameter, that is used to make assumptions about the seman- In order to define what a multi-protocol attack is, we as- tics of the read events in the system, and expresses which sume that there exists some model to describe a security classes of so-called type-flaw attacks are possible. We ex- protocol and its properties. In particular, we assume that plain this in more detail in the next section. All tests were there exists a predicate attack(ps; c) for all sets of protocols conducted three times, one time for each possible value of ps and all security properties c, that is true if and only if the matching parameter. In total, over 14000 tests were per- there is an attack possible on the security property c, in an formed to obtain these results. environment where only the protocols in the set ps are be- The experiments have been conducted using the Scyther ing executed. As stated in the introduction, there are many tool [8]. This tool uses a hybrid theorem-proving/model- formalisms and tools that can help in establishing the value checking algorithm, which is an improved version of the of attack(ps; c) for all singleton sets ps. For sets with more algorithm by Song for the Athena tool in [24]. Given a de- than one element, we define Multi-Protocol attacks. scription of a (set of) protocols, it tries to construct a coun- Definition 1 A Multi-Protocol Attack is a tuple (ps; c), terexample for each security claim. Verification of small where ps is a set of protocols, and c is a security property, protocols usually takes less than a second, either resulting iff the following property holds: in an attack description or a proof of correctness in most cases. In the remaining cases, the user can choose to bound 0 0 jpsj > 1 ^ attack(ps; c) ^ 8ps ⊂ ps : :attack(ps ; c) the search space to e.g. a finite number of role instances. Contrary to Athena, Scyther can verify authentication prop- In other words: the set ps contains more than one proto- erties such as synchronisation from [11], and can handle col, there exists an attack on the security property c in an non-atomic keys and multiple key structures. environment with the protocols in ps, and furthermore all protocols in ps are required for the attack. 3. Results Note that this definition does not put any constraints on the intruder behaviour. Therefore, it is more general than The tests reveal that there is a large number of multi- the definition given in [13], where only replaying a message protocol attacks possible on the selected set of protocols. from one protocol into another is allowed. Out of the 30 protocols from literature, 23 had security The question we set out to address was: claims that are correct in isolation, but had attacks when Given a set of security protocols, investigate whether put in parallel with one or two other protocols from the set. multi-protocol attacks occur. If they occur, assess their fea- We classify the results into three groups, based on type-flaw sibility and try to extract any typical attack patterns. categories. A type-flaw attack makes use of the fact that in The set of protocols included in our test is shown in Ta- many cases, agents cannot verify the values that they re- ble 1. The protocols were selected from literature: the Clark ceive. As an example, suppose an agent is expecting to re- and Jacob library in [7], the related SPORE library at [25], ceive a random value, which is often called a nonce.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    8 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us