Verified Contributive Channel Bindings for Compound Authentication

被引:2
作者
Bhargavan, Karthikeyan [1 ]
Delignat-Lavaud, Antoine [1 ]
Pironti, Alfredo [1 ]
机构
[1] INRIA Paris Rocquencourt, Paris, France
来源
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015) | 2015年
关键词
SECURITY ANALYSIS; PROTOCOL;
D O I
10.14722/ndss.2015.23277
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Compound authentication protocols, such as EAP in IKEv2 or SASL over TLS, bind application-level authentication to a transport-level authenticated channel in order to obtain strong composite authentication under weak trust assumptions. Despite their wide deployment, these protocols remain poorly understood, leading to several credential forwarding man-in-the-middle attacks. We present the first formal models for several compound authentication protocols, and analyze them against a rich threat model that includes compromised certificates, leaked session keys, and Diffie-Hellman small subgroup confinement. Our analysis uncovers new compound authentication attacks on TLS renegotiation, SSH re-exchange, IKEv2 resumption, and a number of other channel binding proposals. We propose new channel bindings and formally evaluate their effectiveness using the automated symbolic cryptographic protocol verifier, ProVerif. Our automated analysis is the first to reconstruct the recently published triple handshake attacks on TLS, and the first to provide rigorous guarantees for its proposed countermeasure.
引用
收藏
页数:15
相关论文
共 53 条
[1]   Mobile values, new names, and secure communication [J].
Abadi, M ;
Fournet, C .
ACM SIGPLAN NOTICES, 2001, 36 (03) :104-115
[2]  
Aboba B., 2004, 3748 IETF RFC 3748 IETF RFC
[3]  
Akhawe D., 2013, P 22 INT C WORLD WID, P59, DOI [DOI 10.1145/2488388.2488395, 10.1145/2488388.2488395]
[4]  
Altman J, 2010, 5929 IETF RFC 5929 IETF RFC
[5]  
Anderson Ross., 1996, ASIACRYPT
[6]  
[Anonymous], 2007, NIST SPECIAL PUBLICA
[7]  
[Anonymous], 2012, USENIX SECURITY
[8]  
Asokan N., 2005, SECURITY PROTOCOLS
[9]  
Avalle Matteo, 2011, International Journal of Secure Software Engineering, V2, P34, DOI 10.4018/jsse.2011100103
[10]  
Balfanz D, 2013, TLS CHANNEL IDS TLS CHANNEL IDS