Man-in-the-Middle attacks revisited Hugo Jonker, Rolando Trujillo, - - PowerPoint PPT Presentation

man in the middle attacks revisited
SMART_READER_LITE
LIVE PREVIEW

Man-in-the-Middle attacks revisited Hugo Jonker, Rolando Trujillo, - - PowerPoint PPT Presentation

Man-in-the-Middle attacks revisited Hugo Jonker, Rolando Trujillo, Sjouke Mauw Man-in-the-middle attack Diffie-Hellman Alice Bob new na new nb g na g nb K = (g nb ) na K = (g na ) nb Man-in-the-middle attack Diffie-Hellman Alice Bob Alice


slide-1
SLIDE 1

Man-in-the-Middle attacks revisited

Hugo Jonker, Rolando Trujillo, Sjouke Mauw

slide-2
SLIDE 2

Man-in-the-middle attack

Alice Bob new na new nb gna gnb Diffie-Hellman K = (gnb)na K = (gna)nb

slide-3
SLIDE 3

Man-in-the-middle attack

Alice Bob new na new nb gna gnb Alice Eve new na new nb gna gnb Diffie-Hellman K = (gnb)na K = (gna)nb

slide-4
SLIDE 4

Man-in-the-middle attack

Alice Bob new na new nb gna gnb Alice Eve new na new nb gna gnb Diffie-Hellman Diffie-Hell, man! K = (gnb)na K = (gna)nb

slide-5
SLIDE 5

Needham-Schroeder

Roger Michael new na new nb {Roger, na}pk(Michael) {na, nb}pk(Roger) {nb}pk(Michael) Talking to Roger

slide-6
SLIDE 6

Needham, Schroeder & Lowe '95

Roger Michael new na new nb {Roger, na}pk(Gavin) {na, nb}pk(Roger) {nb}pk(Gavin) Gavin Gavin {Roger, na}pk(Michael) {na, nb}pk(Roger) {nb}pk(Lowe) Talking to Roger

slide-7
SLIDE 7

Just a few of many examples

  • Academic:

– Diffie-Hellman: 1976? – Lowe on Needham-Schroeder: 1995

  • Practice:

– Moxie Marlinspike:

  • SSLsniff: 2002 attacks IE5.5
  • SSLstrip: 2009 (Black Hat 2009)

Conclusion: we're abundantly aware.

slide-8
SLIDE 8

Stopping the MitM?

  • Theory:

– Modelchecking (~ 1995) – Tagging (~ 2003) – Tool support (mCRL, Scyther, Tamarin,...)

  • Practice:

– Certificate Authorities – DNSSec – Certificate Pinning – ...

slide-9
SLIDE 9

Stopping the MitM?

  • Theory:

– Modelchecking (~ 1995) – Tagging (~ 2003) – Tool support (mCRL, Scyther, Tamarin,...)

  • Practice:

– Certificate Authorities – DNSSec – Certificate Pinning – ...

Conclusion: we've got this.

slide-10
SLIDE 10

Meanwhile...

slide-11
SLIDE 11

POODLE attack [MDK14]

  • Force downgrade of TLS
  • Attack SSLv3.0

– RC4 is biased

slide-12
SLIDE 12

FREAK attack [S&P15]

  • US export restrictions mandated weak

crypto (RSA < 512 bits)

  • Still supported in some TLS

implementations

  • MitM changes cipher spec to “weak crypto”
slide-13
SLIDE 13

LOGJAM attack [CCS15]

slide-14
SLIDE 14

DROWN attack [ASS+16]

  • Take client's encrypted TLS messages
  • Use SSLv2.0 server as decryption oracle
slide-15
SLIDE 15

DROWN attack [ASS+16]

  • Take client's encrypted TLS messages
  • Use SSLv2.0 server as decryption oracle

In general, the attacker must passively capture about 1,000 TLS sessions using RSA key exchange, make 40,000 SSLv2 connections to the victim server and perform 250 symmetric encryption operations.

slide-16
SLIDE 16

That's all theoretical, right?

MitM devices for cellphones:

  • Stingray:

$68,000

  • Gossamer: $19,000
  • Triggerfish: $90,000
  • Hailstorm:

$170,000

slide-17
SLIDE 17

Conclusion: We definitely do not “have” this.

slide-18
SLIDE 18

Exploited flaws

  • POODLE, Logjam, FREAK, DROWN:

initialisation

  • Cellphone MitM devices:

new properties Both cases: not accounted for by protocol.

slide-19
SLIDE 19

Categorising attacks

  • Protocol context

– Initialisation

  • User context

– location

slide-20
SLIDE 20

Solution directions

Embed context into formal security proofs

  • With a trusted partner:

context agreement

  • Without a trusted partner:

context verification

slide-21
SLIDE 21

Context agreement

Note: agreement on observed context, not on actual context.

slide-22
SLIDE 22

Context verification

slide-23
SLIDE 23

Example application: GSM

slide-24
SLIDE 24

Conclusion

  • Man-in-the-middle attacks still exist
  • They are preventable
  • Prevention:

– Account for context

  • Protocol context (initialisation)
  • User context (location)

– With or without trusted partner

slide-25
SLIDE 25

Thank you for your attention!