Downgrade Attacks by Example
How Compatibility breaks Security Michael Rodler (@f0rki) 2012-01-21
Michael Rodler Downgrade Attacks 1 / 39
Downgrade Attacks by Example How Compatibility breaks Security - - PowerPoint PPT Presentation
Downgrade Attacks by Example How Compatibility breaks Security Michael Rodler (@f0rki) 2012-01-21 Michael Rodler Downgrade Attacks 1 / 39 About me about me @f0rki, http://f0rki.at Student Sichere Informationssysteme Bachelor at
Michael Rodler Downgrade Attacks 1 / 39
◮ 5th semester
◮ Annual security conference at Hagenberg ◮ 18./19. April 2012 ◮ www.securityforum.at Michael Rodler Downgrade Attacks 2 / 39
◮ ... protocol version ◮ ... protocol features ◮ ... crypto algorithms ◮ ... etc. Michael Rodler Downgrade Attacks 3 / 39
Michael Rodler Downgrade Attacks 4 / 39
Michael Rodler Downgrade Attacks 4 / 39
◮ was fixed in SSL 3.0 in 1995
1called Ciphersuite Rollback Attack back then Michael Rodler Downgrade Attacks 5 / 39
Michael Rodler Downgrade Attacks 6 / 39
Michael Rodler Downgrade Attacks 6 / 39
◮ change_cipher_spec – change to negotiated parameters ◮ finished – hash over handshake, key material
◮ detects tampering of handshake messages Michael Rodler Downgrade Attacks 7 / 39
Michael Rodler Downgrade Attacks 8 / 39
Michael Rodler Downgrade Attacks 8 / 39
◮ First SMTP RFC in 1982
◮ RFC for STARTTLS extension to SMTP in 2002
Michael Rodler Downgrade Attacks 9 / 39
◮ STARTTLS, STLS commandos ◮ Client requests switching to TLS secured connection
◮ imaps, pops ◮ no attack vector here Michael Rodler Downgrade Attacks 10 / 39
Michael Rodler Downgrade Attacks 11 / 39
Michael Rodler Downgrade Attacks 11 / 39
Michael Rodler Downgrade Attacks 12 / 39
Michael Rodler Downgrade Attacks 12 / 39
Michael Rodler Downgrade Attacks 13 / 39
Michael Rodler Downgrade Attacks 13 / 39
Michael Rodler Downgrade Attacks 14 / 39
Michael Rodler Downgrade Attacks 14 / 39
Michael Rodler Downgrade Attacks 15 / 39
◮ links in html ◮ 302 Redirects ◮ Connection: Upgrade Header
Michael Rodler Downgrade Attacks 16 / 39
Michael Rodler Downgrade Attacks 17 / 39
Michael Rodler Downgrade Attacks 17 / 39
◮ Specifications only for $$$ ◮ → hard to analyze
◮ simple/primitve protocol ◮ Wireshark decoder exists
◮ complex and obscure ◮ no wireshark decoder (only partial implementation)
Michael Rodler Downgrade Attacks 18 / 39
Michael Rodler Downgrade Attacks 19 / 39
Michael Rodler Downgrade Attacks 20 / 39
◮ Replace Handshake Packets with older Version ◮ Combinations of versions and platforms behave differently ◮ many WTF?!? moments...
◮ Downgrade to Oracle 8i level ◮ metasploit module – release? Michael Rodler Downgrade Attacks 21 / 39
Michael Rodler Downgrade Attacks 22 / 39
Michael Rodler Downgrade Attacks 23 / 39
Michael Rodler Downgrade Attacks 24 / 39
◮ espescially JDBC driver
Michael Rodler Downgrade Attacks 25 / 39
Michael Rodler Downgrade Attacks 26 / 39
◮ Open Spezifikation [4]
◮ Wireshark Decoder exists
◮ Native authentication ◮ Integrated/Windows authentication Michael Rodler Downgrade Attacks 27 / 39
◮ no problem: obfuscation algorithm is in the standard Michael Rodler Downgrade Attacks 28 / 39
◮ no problem: obfuscation algorithm is in the standard
Michael Rodler Downgrade Attacks 28 / 39
Michael Rodler Downgrade Attacks 29 / 39
Michael Rodler Downgrade Attacks 30 / 39
◮ SSL Certificate is not checked Michael Rodler Downgrade Attacks 31 / 39
◮ SSL Certificate is not checked
◮ Sends protocol version, features, etc. ◮ One field is called "‘Encryption"’ :) Michael Rodler Downgrade Attacks 31 / 39
◮ SSL Certificate is not checked
◮ Sends protocol version, features, etc. ◮ One field is called "‘Encryption"’ :)
Michael Rodler Downgrade Attacks 31 / 39
◮ Sets “Encryption” field to “ENCRYPT_NOT_SUP”
Michael Rodler Downgrade Attacks 32 / 39
Michael Rodler Downgrade Attacks 33 / 39
◮ default during setup ◮ Microsofts recomendation
Michael Rodler Downgrade Attacks 34 / 39
◮ default during setup ◮ Microsofts recomendation
Michael Rodler Downgrade Attacks 34 / 39
◮ no all or nothing ◮ allow Integrity protection without Encryption
Michael Rodler Downgrade Attacks 35 / 39
Michael Rodler Downgrade Attacks 36 / 39
Michael Rodler Downgrade Attacks 37 / 39
Michael Rodler Downgrade Attacks 38 / 39
Michael Rodler Downgrade Attacks 39 / 39