Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH

被引:34
作者
Bhargavan, Karthikeyan [1 ]
Leurent, Gaetan [1 ]
机构
[1] INRIA, Le Chesnay, France
来源
23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016) | 2016年
关键词
D O I
10.14722/ndss.2016.23418
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In response to high-profile attacks that exploit hash function collisions, software vendors have started to phase out the use of MD5 and SHA-1 in third-party digital signature applications such as X.509 certificates. However, weak hash constructions continue to be used in various cryptographic constructions within mainstream protocols such as TLS, IKE, and SSH, because practitioners argue that their use in these protocols relies only on second preimage resistance, and hence is unaffected by collisions. This paper systematically investigates and debunks this argument. We identify a new class of transcript collision attacks on key exchange protocols that rely on efficient collision-finding algorithms on the underlying hash constructions. We implement and demonstrate concrete credential-forwarding attacks on TLS 1.2 client authentication, TLS 1.3 server authentication, and TLS channel bindings. We describe almost-practical impersonation and downgrade attacks in TLS 1.1, IKEv2 and SSH-2. As far as we know, these are the first collision-based attacks on the cryptographic constructions used in these popular protocols. Our practical attacks on TLS were responsibly disclosed (under the name SLOTH) and have resulted in security updates to several TLS libraries. Our analysis demonstrates the urgent need for disabling all uses of weak hash functions in mainstream protocols, and our recommendations have been incorporated in the upcoming Token Binding and TLS 1.3 protocols.
引用
收藏
页数:17
相关论文
共 40 条
[1]   Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice [J].
Adrian, David ;
Bhargavan, Karthikeyan ;
Durumeric, Zakir ;
Gaudry, Pierrick ;
Green, Matthew ;
Halderman, J. Alex ;
Heninger, Nadia ;
Springall, Drew ;
Thome, Emmanuel ;
Valenta, Luke ;
VanderSloot, Benjamin ;
Wustrow, Eric ;
Zanella-Beguelin, Santiago ;
Zimmermann, Paul .
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, :5-17
[2]  
Altman J., 2010, 5929 IETF RFC
[3]  
[Anonymous], 4253 RFC
[4]  
[Anonymous], 2014, TRANSPORT LAYER SECU
[5]  
[Anonymous], 1981, The Art of Computer Programming
[6]  
[Anonymous], 2008, The transport layer security (TLS) protocol version 1.2
[7]  
Bellovin S., 2006, NDSS
[8]   Multi-Ciphersuite Security of the Secure Shell (SSH) Protocol [J].
Bergsma, Florian ;
Dowling, Benjamin ;
Kohlar, Florian ;
Schwenk, Joerg ;
Stebila, Douglas .
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, :369-381
[9]   Verified Contributive Channel Bindings for Compound Authentication [J].
Bhargavan, Karthikeyan ;
Delignat-Lavaud, Antoine ;
Pironti, Alfredo .
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
[10]   Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS [J].
Bhargavan, Karthikeyan ;
Delignat-Lavaud, Antoine ;
Fournet, Cedric ;
Pironti, Alfredo ;
Strub, Pierre-Yves .
2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, :98-113