automated analysis of tls 1 - royalholloway.ac.uk · cas cremers, marko horvat, sam scott, thyla...

14
Automated Analysis of TLS 1.3 0-RTT, Resumption and Delayed Authentication Real World Crypto, 7th January 2016 Cas Cremers Marko Horvat Sam Scott Thyla van der Merwe Cas Cremers, Marko Horvat, Sam Scott, Thyla van der Merwe Automated Analysis of TLS 1.3

Upload: others

Post on 05-Jul-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Automated Analysis of TLS 1 - royalholloway.ac.uk · Cas Cremers, Marko Horvat, Sam Scott, Thyla van der Merwe Automated Analysis of TLS 1.3. Tamarin Cas Cremers, Marko Horvat, Sam

Automated Analysis of TLS 1.30-RTT, Resumption and Delayed Authentication

Real World Crypto, 7th January 2016

CasCremers

MarkoHorvat

SamScott

Thylavan der Merwe

Cas Cremers, Marko Horvat, Sam Scott, Thyla van der Merwe Automated Analysis of TLS 1.3

Page 2: Automated Analysis of TLS 1 - royalholloway.ac.uk · Cas Cremers, Marko Horvat, Sam Scott, Thyla van der Merwe Automated Analysis of TLS 1.3. Tamarin Cas Cremers, Marko Horvat, Sam

New features of TLS 1.3

What’s new in TLS 1.3?

0-RTT handshake mode.

Session resumption merged with PSK mode.

Delayed client authentication mechanism.

The full interaction of all the above components,as well as the regular modes.

Cas Cremers, Marko Horvat, Sam Scott, Thyla van der Merwe Automated Analysis of TLS 1.3

Page 3: Automated Analysis of TLS 1 - royalholloway.ac.uk · Cas Cremers, Marko Horvat, Sam Scott, Thyla van der Merwe Automated Analysis of TLS 1.3. Tamarin Cas Cremers, Marko Horvat, Sam

Objectives

Our goal

Improve the security of TLS 1.3 by analysing the specificationusing state-of-the-art formal analysis methods.

Challenges:

Complex protocol.

Rapidly changing specification.

What class of attacks can we rule out?

Cas Cremers, Marko Horvat, Sam Scott, Thyla van der Merwe Automated Analysis of TLS 1.3

Page 4: Automated Analysis of TLS 1 - royalholloway.ac.uk · Cas Cremers, Marko Horvat, Sam Scott, Thyla van der Merwe Automated Analysis of TLS 1.3. Tamarin Cas Cremers, Marko Horvat, Sam

Tamarin

We built our model for use in the Tamarin prover.

Automated tool for protocol analysis.

Supports loops and branches.

Good symbolic Diffie-Hellman support.

Considers an unbounded number of parties/handshakes.

How does it work?

For simple models/properties, can prove automatically.

Complex models require more user interaction.

A proof shows that a property holds in all possiblecombinations of client, server, and adversary behaviours.

Cas Cremers, Marko Horvat, Sam Scott, Thyla van der Merwe Automated Analysis of TLS 1.3

Page 5: Automated Analysis of TLS 1 - royalholloway.ac.uk · Cas Cremers, Marko Horvat, Sam Scott, Thyla van der Merwe Automated Analysis of TLS 1.3. Tamarin Cas Cremers, Marko Horvat, Sam

Tamarin

Cas Cremers, Marko Horvat, Sam Scott, Thyla van der Merwe Automated Analysis of TLS 1.3

Page 6: Automated Analysis of TLS 1 - royalholloway.ac.uk · Cas Cremers, Marko Horvat, Sam Scott, Thyla van der Merwe Automated Analysis of TLS 1.3. Tamarin Cas Cremers, Marko Horvat, Sam

Building a model

c0start

c1−dhe

c1−psk

c1−kc

c2a c2 c3

ClientHello Receive ServerHello/Finished +Send ClientFinished

Clientauthentication

C1

C 1 PSK

C 1 KC

C 2 PSK

C 2 PSK DHE

C 1 KC Auth

C 1 retry

C2

C 2 KC

C 2 NoAuth

C 2 Auth C 3

C 3 NST

C send

C recv

Cas Cremers, Marko Horvat, Sam Scott, Thyla van der Merwe Automated Analysis of TLS 1.3

Page 7: Automated Analysis of TLS 1 - royalholloway.ac.uk · Cas Cremers, Marko Horvat, Sam Scott, Thyla van der Merwe Automated Analysis of TLS 1.3. Tamarin Cas Cremers, Marko Horvat, Sam

Building a model

Cas Cremers, Marko Horvat, Sam Scott, Thyla van der Merwe Automated Analysis of TLS 1.3

Page 8: Automated Analysis of TLS 1 - royalholloway.ac.uk · Cas Cremers, Marko Horvat, Sam Scott, Thyla van der Merwe Automated Analysis of TLS 1.3. Tamarin Cas Cremers, Marko Horvat, Sam

Verification

We verified the core properties of TLS 1.3 revision 10 as anauthenticated key exchange protocol:

Secrecy of session keys.

Holds for both client and server.Forward secrecy.

Mutual authentication.

Cas Cremers, Marko Horvat, Sam Scott, Thyla van der Merwe Automated Analysis of TLS 1.3

Page 9: Automated Analysis of TLS 1 - royalholloway.ac.uk · Cas Cremers, Marko Horvat, Sam Scott, Thyla van der Merwe Automated Analysis of TLS 1.3. Tamarin Cas Cremers, Marko Horvat, Sam

Attacking client authentication

c0start

c1−dhe

c1−psk

c1−kc

c2a c2 c3

ClientHello Receive ServerHello/Finished +Send ClientFinished

Clientauthentication

C1

C 1 PSK

C 1 KC

C 2 PSK

C 2 PSK DHE

C 1 KC Auth

C 1 retry

C2

C 2 KC

C 2 NoAuth

C 2 Auth C 3

C 3 NST

C send

C Auth

C recv

Cas Cremers, Marko Horvat, Sam Scott, Thyla van der Merwe Automated Analysis of TLS 1.3

Page 10: Automated Analysis of TLS 1 - royalholloway.ac.uk · Cas Cremers, Marko Horvat, Sam Scott, Thyla van der Merwe Automated Analysis of TLS 1.3. Tamarin Cas Cremers, Marko Horvat, Sam

Attacking client authentication

Cas Cremers, Marko Horvat, Sam Scott, Thyla van der Merwe Automated Analysis of TLS 1.3

Page 11: Automated Analysis of TLS 1 - royalholloway.ac.uk · Cas Cremers, Marko Horvat, Sam Scott, Thyla van der Merwe Automated Analysis of TLS 1.3. Tamarin Cas Cremers, Marko Horvat, Sam

Attacking client authentication

Cas Cremers, Marko Horvat, Sam Scott, Thyla van der Merwe Automated Analysis of TLS 1.3

Page 12: Automated Analysis of TLS 1 - royalholloway.ac.uk · Cas Cremers, Marko Horvat, Sam Scott, Thyla van der Merwe Automated Analysis of TLS 1.3. Tamarin Cas Cremers, Marko Horvat, Sam

Attacking client authentication

Cas Cremers, Marko Horvat, Sam Scott, Thyla van der Merwe Automated Analysis of TLS 1.3

Page 13: Automated Analysis of TLS 1 - royalholloway.ac.uk · Cas Cremers, Marko Horvat, Sam Scott, Thyla van der Merwe Automated Analysis of TLS 1.3. Tamarin Cas Cremers, Marko Horvat, Sam

Attacking client authentication

Cas Cremers, Marko Horvat, Sam Scott, Thyla van der Merwe Automated Analysis of TLS 1.3

Page 14: Automated Analysis of TLS 1 - royalholloway.ac.uk · Cas Cremers, Marko Horvat, Sam Scott, Thyla van der Merwe Automated Analysis of TLS 1.3. Tamarin Cas Cremers, Marko Horvat, Sam

Conclusions

This story has a happy ending: revision 10 was proved secure,and the changes in revision 11 appear to address the attack.

First comprehensive analysis of the new TLS 1.3 modes andtheir interaction.

We confirmed the base design is solid.Prevented a potential weakness.

Our state machines and models provide insight into thestructure of TLS implementations.

Future work: improve and build upon this model.

Authors:

Cas [email protected]

Sam [email protected]

Marko [email protected]

Thyla van der [email protected]

Cas Cremers, Marko Horvat, Sam Scott, Thyla van der Merwe Automated Analysis of TLS 1.3