Re: [websec] HPKP and Certificate Revocation Check

2013-05-04 Thread vinod kumar
Thanks very much for the detailed analysis of the proposal.

I was mainly thinking of security problems introduced by HPKP scheme. So, i
think, some of the problems you mentioned do not fall in that category.
Those are general problems associated with lack of revocation checking,
like,

1.  The first HTTP request is sent to the attacker anyway, revealing
session cookies.

2.  If the attacker does not employ HPKP headers, the attack will not
be detected.

But HPKP introduces a few DOS attacks on the host. These are:

1.  attacker gets a fraudulently issued certificate for a host which is
not using HPKP. He can add HPKP headers in the response to block out the
host.

2.  attacker steals host’s private key. This attack applies to hosts
supporting HPKP and those who don’t.

You generalize these attacks as DOS attacks. In the case of a typical DOS
attack, once the host finds out the occurrence of the attack, he can take
remedial action and recover from the situation.

But in the above attacks, host gets permanently blocked from connecting to
the affected UA’s and there is no way the host can unblock the UA.  Of
course, the user can remove the pin for the host (how does he decide?), but
any user action is always tricky and introduces other security
vulnerabilities.

Coming back to revocation checking for HPKP, it addresses DOS attack(2). We
don’t have to mandate revocation check whenever HPKP headers are received
but only in the following cases:

1.  The host is not a pinned host and an HPKP header is received.

2.  The host is a pinned host and the HPKP header contains a new pin
set.

3.  The host is a pinned host and the max age value is less than the
remaining age(?). I don’t think the attacker gets any benefit by extending
the max age of the current pins.

We may stipulate that if revocation check doesn’t pass in the above cases,
the HPKP headers will not be accepted.

I hope this modification alleviate the concern expressed in ‘From the site
operator who deploys HPKP: weakness’ section.

We may be able to provide some solution using OCSP stapling as you
suggested, that is something to explore.


On Fri, May 3, 2013 at 2:43 AM, Ryan Sleevi wrote:

> On Thu, May 2, 2013 2:50 am, vinod kumar wrote:
> >  Hi,
> >
> >  I would like to discuss a possible vulnerability in Public Key Pinning
> >  scheme (http://datatracker.ietf.org/doc/draft-ietf-websec-key-pinning/),
> >  related to certificate revocation checking. I would appreciate if
> anybody
> >  can review and verify my observations.
> >
> >  Section 2.6 the draft states that when the UA connects to a pinned host,
> >  it
> >  must terminate the TLS connection, if there are any errors. The referred
> >  rfc, RFC 6797, clarifies that error could be related to certificate
> >  revocation checking or server identity checking.
> >
> >  But it is not mandatory that during TLS handshake, UA performs
> certificate
> >  revocation or an assertive answer is found about the revocation status
> of
> >  the certificate. The reasons could be:
> >
> >  1.  OCSP is disabled by default at the UA and the user has not
> changed
> >  it.
> >
> >  2.  OCSP checking is disabled by the user.
> >
> >  3.  OCSP check is performed but no answer is obtained from the OCSP
> >  server within the stipulated timeout.
> >
> >  So it is very much possible that the UA accepts the PKP header from the
> >  host without verifying the revocation status of the host certificate
> used
> >  in TLS handshake.
> >
> >  In the case of the host losing its private key to an attacker, the
> >  attacker
> >  may be able to block the host permanently from connecting to the UA, as
> >  explained below. The host’s CA would have revoked the certificate but
> the
> >  unreliability in revocation checking creates a vulnerability.
> >
> >  Suppose an attacker is in possession of the private key of the host and
> >  the
> >  host certificate is duly revoked by the issued CA. Attacker may succeed
> in
> >  diverting the UA to his server when UA tries to connect to the valid
> host.
> >  Attacker may mount a DNS attack or a MIM attack to achieve this. Since
> he
> >  posses the valid private key, the TLS connection will be successful. The
> >  only other thing he needs is that UA doesn’t get to know the revocation
> >  status of the certificate. Here, the attacker is able to make the UA
> >  accept
> >  whatever PKP headers sent in the HTTP response.
> >
> >  Say, the attacker has two key pairs, KeyPair1 and Keypair2, and holds a
> >  valid certificate for KeyPair1.
> >
> >  He constructs a PKP header,
> >
> >  Public-Key-Pins: max-age= (maximum possible value);
> >
> > pin-sha1= (pin corresponding to compromised key);
> >
> > pin-sha1= (pin corresponding to KeyPair1);
> >
> >  When UA accepts this PKP header, effectively the attacker is able to
> set a
> >  new backup pin.
> >
> >  The attacker can set a new PKP header in subsequent connection

Re: [websec] HPKP and Certificate Revocation Check

2013-05-02 Thread Ryan Sleevi
On Thu, May 2, 2013 2:50 am, vinod kumar wrote:
>  Hi,
>
>  I would like to discuss a possible vulnerability in Public Key Pinning
>  scheme (http://datatracker.ietf.org/doc/draft-ietf-websec-key-pinning/ ),
>  related to certificate revocation checking. I would appreciate if anybody
>  can review and verify my observations.
>
>  Section 2.6 the draft states that when the UA connects to a pinned host,
>  it
>  must terminate the TLS connection, if there are any errors. The referred
>  rfc, RFC 6797, clarifies that error could be related to certificate
>  revocation checking or server identity checking.
>
>  But it is not mandatory that during TLS handshake, UA performs certificate
>  revocation or an assertive answer is found about the revocation status of
>  the certificate. The reasons could be:
>
>  1.  OCSP is disabled by default at the UA and the user has not changed
>  it.
>
>  2.  OCSP checking is disabled by the user.
>
>  3.  OCSP check is performed but no answer is obtained from the OCSP
>  server within the stipulated timeout.
>
>  So it is very much possible that the UA accepts the PKP header from the
>  host without verifying the revocation status of the host certificate used
>  in TLS handshake.
>
>  In the case of the host losing its private key to an attacker, the
>  attacker
>  may be able to block the host permanently from connecting to the UA, as
>  explained below. The host’s CA would have revoked the certificate but the
>  unreliability in revocation checking creates a vulnerability.
>
>  Suppose an attacker is in possession of the private key of the host and
>  the
>  host certificate is duly revoked by the issued CA. Attacker may succeed in
>  diverting the UA to his server when UA tries to connect to the valid host.
>  Attacker may mount a DNS attack or a MIM attack to achieve this. Since he
>  posses the valid private key, the TLS connection will be successful. The
>  only other thing he needs is that UA doesn’t get to know the revocation
>  status of the certificate. Here, the attacker is able to make the UA
>  accept
>  whatever PKP headers sent in the HTTP response.
>
>  Say, the attacker has two key pairs, KeyPair1 and Keypair2, and holds a
>  valid certificate for KeyPair1.
>
>  He constructs a PKP header,
>
>  Public-Key-Pins: max-age= (maximum possible value);
>
> pin-sha1= (pin corresponding to compromised key);
>
> pin-sha1= (pin corresponding to KeyPair1);
>
>  When UA accepts this PKP header, effectively the attacker is able to set a
>  new backup pin.
>
>  The attacker can set a new PKP header in subsequent connection. He can use
>  KeyPair1 in the TLS handshake.
>
>  Public-Key-Pins: max-age= (maximum possible value);
>
> pin-sha1= (pin corresponding to KeyPair1);
>
> pin-sha1= (pin corresponding to KeyPair2);
>
>  Now the UA sets both pins to be attacker’s pins and the valid host is
>  permanently blocked from connecting to the UA.
>
>  To avoid this attack, shouldn’t we mandate revocation checking when PKP
>  headers are accepted?
>
>
>  Thanks,
>
>  Vinod.

This attack exists even if you're not in possession of the server's
private key - you may have obtained a fraudulently issued certificate for
a site that wasn't using HPKP already, an attack that's been discussed at
some length so far.

If I understand your proposal correctly, you would see UAs establish an
SSL/TLS connection, send a request (which may include sensitive data that
is otherwise desired to be protected - such as cookies), and then on
receipt of the request, when the server sends back an HPKP header, perform
a secondary revocation check?

1) What if the user has explicitly disabled revocation checking
2) I'm assuming you mean "revocation checking in hard(est) fail(ure)
mode", since anything short of that would be pointless, given all the
attacks that trivially exist.

If we think about the risk/benefits carefully - from the side of the
attacker, the site operator who deploys HPKP, the site operator that
doesn't deploy HPKP, and the user - I think the solution is much less
compelling.

>From the attacker:
- Strengths
 * Attacker can DOS a site by deploying a malicious HPKP header
- Weaknesses
 * Deploying an HPKP header would force revocation checking, potentially
revealing their attack. However, by simply *not deploying an HPKP
header*, their attack MAY not be noticed (even by clients who DO
revocation checking)
 * It requires some form of privileged connection/MITM to deploy. An
attacker with such a position can equally DOS a site at lower layers in
the protocol.
- Questions:
 * Whether or not the window of time that an attacker can DOS a site via
HPKP is less than, equal to, or greater than the window of time that an
attacker can DOS a site via lower-level protocol. This is the ongoing
max-age discussion.

>From the site operator who deploys HPKP:
- Strengths:
 * None particular over HPKP
- Weaknesses:
 * Users will pay sig

[websec] HPKP and Certificate Revocation Check

2013-05-02 Thread vinod kumar
Hi,

I would like to discuss a possible vulnerability in Public Key Pinning
scheme (http://datatracker.ietf.org/doc/draft-ietf-websec-key-pinning/ ),
related to certificate revocation checking. I would appreciate if anybody
can review and verify my observations.

Section 2.6 the draft states that when the UA connects to a pinned host, it
must terminate the TLS connection, if there are any errors. The referred
rfc, RFC 6797, clarifies that error could be related to certificate
revocation checking or server identity checking.

But it is not mandatory that during TLS handshake, UA performs certificate
revocation or an assertive answer is found about the revocation status of
the certificate. The reasons could be:

1.  OCSP is disabled by default at the UA and the user has not changed
it.

2.  OCSP checking is disabled by the user.

3.  OCSP check is performed but no answer is obtained from the OCSP
server within the stipulated timeout.

So it is very much possible that the UA accepts the PKP header from the
host without verifying the revocation status of the host certificate used
in TLS handshake.

In the case of the host losing its private key to an attacker, the attacker
may be able to block the host permanently from connecting to the UA, as
explained below. The host’s CA would have revoked the certificate but the
unreliability in revocation checking creates a vulnerability.

Suppose an attacker is in possession of the private key of the host and the
host certificate is duly revoked by the issued CA. Attacker may succeed in
diverting the UA to his server when UA tries to connect to the valid host.
Attacker may mount a DNS attack or a MIM attack to achieve this. Since he
posses the valid private key, the TLS connection will be successful. The
only other thing he needs is that UA doesn’t get to know the revocation
status of the certificate. Here, the attacker is able to make the UA accept
whatever PKP headers sent in the HTTP response.

Say, the attacker has two key pairs, KeyPair1 and Keypair2, and holds a
valid certificate for KeyPair1.

He constructs a PKP header,

Public-Key-Pins: max-age= (maximum possible value);

   pin-sha1= (pin corresponding to compromised key);

   pin-sha1= (pin corresponding to KeyPair1);

When UA accepts this PKP header, effectively the attacker is able to set a
new backup pin.

The attacker can set a new PKP header in subsequent connection. He can use
KeyPair1 in the TLS handshake.

Public-Key-Pins: max-age= (maximum possible value);

   pin-sha1= (pin corresponding to KeyPair1);

   pin-sha1= (pin corresponding to KeyPair2);

Now the UA sets both pins to be attacker’s pins and the valid host is
permanently blocked from connecting to the UA.

To avoid this attack, shouldn’t we mandate revocation checking when PKP
headers are accepted?


Thanks,

Vinod.
___
websec mailing list
websec@ietf.org
https://www.ietf.org/mailman/listinfo/websec