| 1 | /*! # A review of protocol vulnerabilities |
| 2 | |
| 3 | ## CBC MAC-then-encrypt ciphersuites |
| 4 | |
| 5 | Back in 2000 [Bellare and Namprempre](https://eprint.iacr.org/2000/025) discussed how to make authenticated |
| 6 | encryption by composing separate encryption and authentication primitives. That paper included this table: |
| 7 | |
| 8 | | Composition Method | Privacy | | | Integrity | | |
| 9 | |--------------------|---------|-|-|-----------|-| |
| 10 | || IND-CPA | IND-CCA | NM-CPA | INT-PTXT | INT-CTXT | |
| 11 | | Encrypt-and-MAC | insecure | insecure | insecure | secure | insecure | |
| 12 | | MAC-then-encrypt | secure | insecure | insecure | secure | insecure | |
| 13 | | Encrypt-then-MAC | secure | secure | secure | secure | secure | |
| 14 | |
| 15 | One may assume from this fairly clear result that encrypt-and-MAC and MAC-then-encrypt compositions would be quickly abandoned |
| 16 | in favour of the remaining proven-secure option. But that didn't happen, not in TLSv1.1 (2006) nor in TLSv1.2 (2008). Worse, |
| 17 | both RFCs included incorrect advice on countermeasures for implementers, suggesting that the flaw was "not believed to be large |
| 18 | enough to be exploitable". |
| 19 | |
| 20 | [Lucky 13](http://www.isg.rhul.ac.uk/tls/Lucky13.html) (2013) exploited this flaw and affected all implementations, including |
| 21 | those written [after discovery](https://aws.amazon.com/blogs/security/s2n-and-lucky-13/). OpenSSL even had a |
| 22 | [memory safety vulnerability in the fix for Lucky 13](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2107), which |
| 23 | gives a flavour of the kind of complexity required to remove the side channel. |
| 24 | |
| 25 | rustls does not implement CBC MAC-then-encrypt ciphersuites for these reasons. TLSv1.3 removed support for these |
| 26 | ciphersuites in 2018. |
| 27 | |
| 28 | There are some further rejected options worth mentioning: [RFC7366](https://tools.ietf.org/html/rfc7366) defines |
| 29 | Encrypt-then-MAC for TLS, but unfortunately cannot be negotiated without also supporting MAC-then-encrypt |
| 30 | (clients cannot express "I offer CBC, but only EtM and not MtE"). |
| 31 | |
| 32 | ## RSA PKCS#1 encryption |
| 33 | |
| 34 | "RSA key exchange" in TLS involves the client choosing a large random value and encrypting it using the server's |
| 35 | public key. This has two overall problems: |
| 36 | |
| 37 | 1. It provides no _forward secrecy_: later compromise of the server's private key breaks confidentiality of |
| 38 | *all* past sessions using that key. This is a crucial property in the presence of software that is often |
| 39 | [poor at keeping a secret](http://heartbleed.com/). |
| 40 | 2. The padding used in practice in TLS ("PKCS#1", or fully "RSAES-PKCS1-v1_5") has been known to be broken since |
| 41 | [1998](http://archiv.infsec.ethz.ch/education/fs08/secsem/bleichenbacher98.pdf). |
| 42 | |
| 43 | In a similar pattern to the MAC-then-encrypt problem discussed above, TLSv1.0 (1999), TLSv1.1 (2006) and TLSv1.2 (2008) |
| 44 | continued to specify use of PKCS#1 encryption, again with incrementally more complex and incorrect advice on countermeasures. |
| 45 | |
| 46 | [ROBOT](https://robotattack.org/) (2018) showed that implementations were still vulnerable to these attacks twenty years later. |
| 47 | [The Marvin Attack](https://people.redhat.com/~hkario/marvin/) (2023) demonstrated the same a further five years later. |
| 48 | |
| 49 | rustls does not support RSA key exchange. TLSv1.3 also removed support. |
| 50 | |
| 51 | ## BEAST |
| 52 | |
| 53 | [BEAST](https://vnhacker.blogspot.com/2011/09/beast.html) ([CVE-2011-3389](https://nvd.nist.gov/vuln/detail/CVE-2011-3389)) |
| 54 | was demonstrated in 2011 by Thai Duong and Juliano Rizzo, |
| 55 | and was another vulnerability in CBC-based ciphersuites in SSLv3.0 and TLSv1.0. CBC mode is vulnerable to adaptive |
| 56 | chosen-plaintext attacks if the IV is predictable. In the case of these protocol versions, the IV was the previous |
| 57 | block of ciphertext (as if the entire TLS session was one CBC ciphertext, albeit revealed incrementally). This was |
| 58 | obviously predictable, since it was published on the wire. |
| 59 | |
| 60 | OpenSSL contained a countermeasure for this problem from 2002 onwards: it encrypts an empty message before each real |
| 61 | one, so that the IV used in the real message is unpredictable. This was turned off by default due to bugs in IE6. |
| 62 | |
| 63 | TLSv1.1 fix this vulnerability, but not any of the other deficiencies of CBC mode (see above). |
| 64 | |
| 65 | rustls does not support these ciphersuites. |
| 66 | |
| 67 | ## CRIME |
| 68 | |
| 69 | In 2002 [John Kelsey](https://www.iacr.org/cryptodb/archive/2002/FSE/3091/3091.pdf) discussed the length side channel |
| 70 | as applied to compression of combined secret and attacker-chosen strings. |
| 71 | |
| 72 | Compression continued to be an option in TLSv1.1 (2006) and in TLSv1.2 (2008). Support in libraries was widespread. |
| 73 | |
| 74 | [CRIME](https://en.wikipedia.org/wiki/CRIME) ([CVE-2012-4929](https://nvd.nist.gov/vuln/detail/CVE-2012-4929)) |
| 75 | was demonstrated in 2012, again by Thai Duong and Juliano Rizzo. It attacked several protocols offering transparent |
| 76 | compression of application data, allowing quick adaptive chosen-plaintext attacks against secret values like cookies. |
| 77 | |
| 78 | rustls does not implement compression. TLSv1.3 also removed support. |
| 79 | |
| 80 | ## Logjam / FREAK |
| 81 | |
| 82 | Way back when SSL was first being born, circa 1995, the US government considered cryptography a munition requiring |
| 83 | export control. SSL contained specific ciphersuites with dramatically small key sizes that were not subject |
| 84 | to export control. These controls were dropped in 2000. |
| 85 | |
| 86 | Since the "export-grade" ciphersuites no longer fulfilled any purpose, and because they were actively harmful to users, |
| 87 | one may have expected software support to disappear quickly. This did not happen. |
| 88 | |
| 89 | In 2015 [the FREAK attack](https://mitls.org/pages/attacks/SMACK#freak) ([CVE-2015-0204](https://nvd.nist.gov/vuln/detail/CVE-2015-0204)) |
| 90 | and [the Logjam attack](https://weakdh.org/) ([CVE-2015-4000](https://nvd.nist.gov/vuln/detail/CVE-2015-4000)) both |
| 91 | demonstrated total breaks of security in the presence of servers that accepted export ciphersuites. FREAK factored |
| 92 | 512-bit RSA keys, while Logjam optimised solving discrete logs in the 512-bit group used by many different servers. |
| 93 | |
| 94 | Naturally, rustls does not implement any of these ciphersuites. |
| 95 | |
| 96 | ## SWEET32 |
| 97 | |
| 98 | Block ciphers are vulnerable to birthday attacks, where the probability of repeating a block increases dramatically |
| 99 | once a particular key has been used for many blocks. For block ciphers with 64-bit blocks, this becomes probable |
| 100 | once a given key encrypts the order of 32GB of data. |
| 101 | |
| 102 | [Sweet32](https://sweet32.info/) ([CVE-2016-2183](https://nvd.nist.gov/vuln/detail/CVE-2016-2183)) attacked this fact |
| 103 | in the context of TLS support for 3DES, breaking confidentiality by analysing a large amount of attacker-induced traffic |
| 104 | in one session. |
| 105 | |
| 106 | rustls does not support any 64-bit block ciphers. |
| 107 | |
| 108 | ## DROWN |
| 109 | |
| 110 | [DROWN](https://drownattack.com/) ([CVE-2016-0800](https://nvd.nist.gov/vuln/detail/CVE-2016-0800)) is a cross-protocol |
| 111 | attack that breaks the security of TLSv1.2 and earlier (when used with RSA key exchange) by using SSLv2. It is required |
| 112 | that the server uses the same key for both protocol versions. |
| 113 | |
| 114 | rustls naturally does not support SSLv2, but most importantly does not support RSA key exchange for TLSv1.2. |
| 115 | |
| 116 | ## Poodle |
| 117 | |
| 118 | [POODLE](https://cdn1.vox-cdn.com/uploads/chorus_asset/file/2354994/ssl-poodle.0.pdf) ([CVE-2014-3566](https://nvd.nist.gov/vuln/detail/CVE-2014-3566)) |
| 119 | is an attack against CBC mode ciphersuites in SSLv3. This was possible in most cases because some clients willingly |
| 120 | downgraded to SSLv3 after failed handshakes for later versions. |
| 121 | |
| 122 | rustls does not support CBC mode ciphersuites, or SSLv3. Note that rustls does not need to implement `TLS_FALLBACK_SCSV` |
| 123 | introduced as a countermeasure because it contains no ability to downgrade from TLS 1.2 to earlier protocol versions, |
| 124 | and TLS 1.3 has protocol-level downgrade protection based on the [ServerHello server random value](https://www.rfc-editor.org/rfc/rfc8446#section-4.1.3). |
| 125 | |
| 126 | ## GCM nonces |
| 127 | |
| 128 | [RFC5288](https://tools.ietf.org/html/rfc5288) introduced GCM-based ciphersuites for use in TLS. Unfortunately |
| 129 | the design was poor; it reused design for an unrelated security setting proposed in RFC5116. |
| 130 | |
| 131 | GCM is a typical nonce-based AEAD: it requires a unique (but not necessarily unpredictable) 96-bit nonce for each encryption |
| 132 | with a given key. The design specified by RFC5288 left two-thirds of the nonce construction up to implementations: |
| 133 | |
| 134 | - wasting 8 bytes per TLS ciphertext, |
| 135 | - meaning correct operation cannot be tested for (e.g., in protocol-level test vectors). |
| 136 | |
| 137 | There were no trade-offs here: TLS has a 64-bit sequence number that is not allowed to wrap and would make an ideal nonce. |
| 138 | |
| 139 | As a result, a [2016 study](https://eprint.iacr.org/2016/475.pdf) found: |
| 140 | |
| 141 | - implementations from IBM, A10 and Citrix used randomly-chosen nonces, which are unlikely to be unique over long connections, |
| 142 | - an implementation from Radware used the same nonce for the first two messages. |
| 143 | |
| 144 | rustls uses a counter from a random starting point for GCM nonces. TLSv1.3 and the Chacha20-Poly1305 TLSv1.2 ciphersuite |
| 145 | standardise this method. |
| 146 | |
| 147 | ## Renegotiation |
| 148 | |
| 149 | In 2009 Marsh Ray and Steve Dispensa [discovered](https://kryptera.se/Renegotiating%20TLS.pdf) that the renegotiation |
| 150 | feature of all versions of TLS allows a MitM to splice a request of their choice onto the front of the client's real HTTP |
| 151 | request. A countermeasure was proposed and widely implemented to bind renegotiations to their previous negotiations; |
| 152 | unfortunately this was insufficient. |
| 153 | |
| 154 | rustls does not support renegotiation in TLSv1.2. TLSv1.3 also no longer supports renegotiation. |
| 155 | |
| 156 | ## 3SHAKE |
| 157 | |
| 158 | [3SHAKE](https://www.mitls.org/pages/attacks/3SHAKE) (2014) described a complex attack that broke the "Secure Renegotiation" extension |
| 159 | introduced as a countermeasure to the previous protocol flaw. |
| 160 | |
| 161 | rustls does not support renegotiation for TLSv1.2 connections, or RSA key exchange, and both are required for this attack |
| 162 | to work. rustls implements the "Extended Master Secret" (RFC7627) extension for TLSv1.2 which was standardised as a countermeasure. |
| 163 | |
| 164 | TLSv1.3 no longer supports renegotiation and RSA key exchange. It also effectively incorporates the improvements made in RFC7627. |
| 165 | |
| 166 | ## KCI |
| 167 | |
| 168 | [This vulnerability](https://kcitls.org/) makes use of TLS ciphersuites (those offering static DH) which were standardised |
| 169 | yet not widely used. However, they were implemented by libraries, and as a result enabled for various clients. It coupled |
| 170 | this with misconfigured certificates (on services including facebook.com) which allowed their misuse to MitM connections. |
| 171 | |
| 172 | rustls does not support static DH/EC-DH ciphersuites. We assert that it is misissuance to sign an EC certificate |
| 173 | with the keyUsage extension allowing both signatures and key exchange. That it isn't is probably a failure |
| 174 | of CAB Forum baseline requirements. |
| 175 | */ |
| 176 | |