python-spake2 icon indicating copy to clipboard operation
python-spake2 copied to clipboard

Add check for Key Degradation Attack

Open tuxmike opened this issue 6 years ago • 5 comments

Found out, that the SPAKE2-implementation is missing an important check for key degradation, where an attacker is able to degrade the keys to identitiy (zero element), when he gets to know the password. (see https://moderncrypto.org/mail-archive/curves/2015/000427.html) This is critical, because, it would destroy PFS on the channel, and makes MiM much more easier.

~~@TODO: just added a small check for zero element, but had no time to really test it.~~ @TODO: didn't check the relevance for SPAKE2+

Regards, Mike

tuxmike avatar Jul 19 '18 07:07 tuxmike

Coverage Status

Coverage increased (+0.2%) to 96.441% when pulling 60b00f41ebea1227d5551835357f292a651c7127 on tuxmike:keydegradationcheck into 43d0b84d99e304f2caa18df7067dd2b2742c18c1 on warner:master.

coveralls avatar Jul 19 '18 11:07 coveralls

Strange, the python 3.3 build always fails... guess it has nothing to do with my PR...

tuxmike avatar Jul 19 '18 13:07 tuxmike

Hey, thanks for looking into this.. sorry it's taken me so long to follow up.

It sounds like a reasonable patch to make. The py3.3 build was problematic for other reasons.. we've removed it (and py34 too), so if you were to rebase your patch to current trunk, I think it would pass.

I'd like to understand the attack properly. If I understand it correctly:

  • the attacker has control over the network, and mounts a standard MitM attack
  • the attacker also knows the shared secret password being used by Alice and Bob
  • the attacker examines Alice's message going to Bob, modifies it by multiplying, then sends the result to Bob as if it were from Alice
  • the attacker does the same thing with Bob's message to Alice
  • Alice and Bob now both wind up with a K value of the identity element, which is predictable to the attacker

This implementation follows the SPAKE2 advice/spec and hashes the entire transcript (including the received message) to build the session key (self._finalize(K_bytes) calls finalize_SPAKE2(idA, idB, X_msg, Y_msg, K_bytes, pw)). So I believe Alice will see one key (basically hash(K=0, real_X_msg, fake_Y_msg)) and Bob will see a different key (hash(K=0, fake_X_msg, real_Y_msg)). The attacker will know both keys, and they can decrypt/manipulate/reencrypt in the usual MitM style. But if Alice and Bob had some out-of-band way to compare their session keys, they could discover the discrepancy.

If we weren't including the messages in the transcript, then both session keys would be the same (and known to the attacker), which means out-of-band comparison would not reveal the attack. This patch would then prevent the password-knowing MitM attacker from pulling off an undiscoverable attack, leaving them the expected ability to pull off a discoverable attack.

Any attacker who knows the secret password and can get in the middle of the conversation can pull off a discoverable attack without any special math, they just execute the protocol normally with Alice (producing an Alice-Attacker key), and again with Bob (producing a Bob-Attacker key), and decrypt/reencrypt all the messages going through. But since the keys are different, an out-of-band comparison could reveal it. Being able to force the key to a known value would thwart this comparison check, but only if the key depends just on K and not also on the protocol transcript.

Does that seem right?

warner avatar Jul 15 '19 00:07 warner

Hi warner, did not see your reply until know. Yes, you described that totally right. If the session key is built from both K and transcript, it should be fine / reduce to classic MitM.

Beside you considerations, without the patch, it is also possible to force K to 0 just from a malicious Alice: If she sets her ephemeral key to 0, this will also force K to 0. But it (luckily) does not harm PFS, as the transcript will add Bobs ephemeral key in form of his sent Y key.

But there may exist other attacks using this method that we did not consider, who knows...

I think it regardless makes sense, to prevent manipulated X/Y values to remove the ephemeral/PFS part of the key exchange (producing K).

tuxmike avatar Nov 09 '19 11:11 tuxmike

CI still fails...

tuxmike avatar Nov 09 '19 12:11 tuxmike