Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1109/SP.2015.39guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

A Messy State of the Union: Taming the Composite State Machines of TLS

Published: 17 May 2015 Publication History

Abstract

Implementations of the Transport Layer Security (TLS) protocol must handle a variety of protocol versions and extensions, authentication modes, and key exchange methods. Confusingly, each combination may prescribe a different message sequence between the client and the server. We address the problem of designing a robust composite state machine that correctly multiplexes between these different protocol modes. We systematically test popular open-source TLS implementations for state machine bugs and discover several critical security vulnerabilities that have lain hidden in these libraries for years, and have now finally been patched due to our disclosures. Several of these vulnerabilities, including the recently publicized FREAK flaw, enable a network attacker to break into TLS connections between authenticated clients and servers. We argue that state machine bugs stem from incorrect compositions of individually correct state machines. We present the first verified implementation of a composite TLS state machine in C that can be embedded into OpenSSL and accounts for all its supported cipher suites. Our attacks expose the need for the formal verification of core components in cryptographic protocol libraries, our implementation demonstrates that such mechanized proofs are within reach, even for mainstream TLS implementations.

Cited By

View all
  • (2024)A Survey of Protocol FuzzingACM Computing Surveys10.1145/369678857:2(1-36)Online publication date: 10-Oct-2024
  • (2024)Measuring DNS-over-HTTPS Downgrades: Prevalence, Techniques, and Bypass StrategiesProceedings of the ACM on Networking10.1145/36963852:CoNEXT4(1-22)Online publication date: 25-Nov-2024
  • (2024)What Did Come Out of It? Analysis and Improvements of DIDComm MessagingProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690300(4732-4746)Online publication date: 2-Dec-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
SP '15: Proceedings of the 2015 IEEE Symposium on Security and Privacy
May 2015
923 pages
ISBN:9781467369497

Publisher

IEEE Computer Society

United States

Publication History

Published: 17 May 2015

Author Tags

  1. Transport Layer Security
  2. cryptographic protocols
  3. formal methods
  4. man-in-the-middle attacks
  5. software verification

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)A Survey of Protocol FuzzingACM Computing Surveys10.1145/369678857:2(1-36)Online publication date: 10-Oct-2024
  • (2024)Measuring DNS-over-HTTPS Downgrades: Prevalence, Techniques, and Bypass StrategiesProceedings of the ACM on Networking10.1145/36963852:CoNEXT4(1-22)Online publication date: 25-Nov-2024
  • (2024)What Did Come Out of It? Analysis and Improvements of DIDComm MessagingProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690300(4732-4746)Online publication date: 2-Dec-2024
  • (2023)Extracting protocol format as state machine via controlled static loop analysisProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620630(7019-7036)Online publication date: 9-Aug-2023
  • (2023)Three lessons from threemaProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620310(1289-1306)Online publication date: 9-Aug-2023
  • (2023)Stealth Key Exchange and Confined Access to the Record Protocol Data in TLS 1.3Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623099(2901-2914)Online publication date: 15-Nov-2023
  • (2023)Coverage-directed Differential Testing of X.509 Certificate Validation in SSL/TLS ImplementationsACM Transactions on Software Engineering and Methodology10.1145/351041632:1(1-32)Online publication date: 22-Feb-2023
  • (2022)A Symbolic Analysis of Privacy for TLS 1.3 with Encrypted Client HelloProceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security10.1145/3548606.3559360(365-379)Online publication date: 7-Nov-2022
  • (2022)Predicting IPv4 services across all portsProceedings of the ACM SIGCOMM 2022 Conference10.1145/3544216.3544249(503-515)Online publication date: 22-Aug-2022
  • (2022)RetinaProceedings of the ACM SIGCOMM 2022 Conference10.1145/3544216.3544227(530-544)Online publication date: 22-Aug-2022
  • Show More Cited By

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media