Forging Digital Signatures



Similar documents
A Noval Approach for S/MIME

Chapter 6 Electronic Mail Security

Cryptography and Network Security Chapter 15

Electronic Mail Security. Security. is one of the most widely used and regarded network services currently message contents are not secure

Network Security Essentials Chapter 7

PGP from: Cryptography and Network Security

Cryptography and Network Security

CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure

GlobalSign Enterprise Solutions

DKIM Enabled Two Factor Authenticated Secure Mail Client

Cryptography and Network Security Chapter 14

Electronic Mail Security

TCS-CA. Outlook Express Configuration [VERSION 1.0] U S E R G U I D E

User Guide May Using Certificates in Outlook Express

Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

Message Authentication Signature Standards (MASS) BOF. Jim Fenton Nathaniel Borenstein

Standards and Products. Computer Security. Kerberos. Kerberos

User Guide Using Certificate in Microsoft Outlook Express

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Grid Computing - X.509

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Savitribai Phule Pune University

A Security Flaw in the X.509 Standard Santosh Chokhani CygnaCom Solutions, Inc. Abstract

Installing your Digital Certificate & Using on MS Out Look 2007.

Network Security - Secure upper layer protocols - Background. Security. Question from last lecture: What s a birthday attack? Dr.

Secure Part II Due Date: Sept 27 Points: 25 Points

Sending Secure Electronic Mail (S/MIME) in Java (CAPS) the Easy Way May, 2009

Authentication Applications

Managing and Securing Computer Networks. Guy Leduc. Chapter 3: Securing applications. Chapter goals: security in practice:

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.

Security. Issues:

Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

, SNMP, Securing the Web: SSL

I. Configuring Digital signature certificate in Microsoft Outlook 2003:

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, Page 1

Network Security - ISA 656 Security

The Role of Digital Certificates in Contemporary Government Systems: the Case of UAE Identity Authority

National Certification Authority Framework in Sri Lanka

NISTIR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards

Introduction to Network Security Key Management and Distribution

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.

How To Send An Encrypted In Outlook 2000 (For A Password Protected ) On A Pc Or Macintosh (For An Ipo) On Pc Or Ipo (For Pc Or For A Password Saf ) On An Iphone Or

Ciphermail S/MIME Setup Guide

Unifying Information Security. Implementing Encryption on the CLEARSWIFT SECURE Gateway

Certificate Authorities and Public Keys. How they work and 10+ ways to hack them.

How To Understand And Understand The Security Of A Key Infrastructure

Ciphermail for Android Quick Start Guide

ACNS Delivery via

Chapter 4. Authentication Applications. COSC 490 Network Security Annie Lu 1

Public-Key Infrastructure

Key Management and Distribution

Federal S/MIME V3 Client Profile

Transport Level Security

CS549: Cryptography and Network Security

Wireless Mobile Internet Security. 2nd Edition

VoIP Security. Seminar: Cryptography and Security Michael Muncan

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

Ciphire Mail Encryption and Authentication

An Introduction to Cryptography as Applied to the Smart Grid

Taxonomy of Security Protocol

Chapter 17. Transport-Level Security

NETWORK ADMINISTRATION AND SECURITY

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

IT Networks & Security CERT Luncheon Series: Cryptography

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

The Concept of Trust in Network Security

Secured Mail through PGP Mail Gateway

Using Entrust certificates with Microsoft Office and Windows

WebSphere DataPower Release FIPS and NIST SP a support.

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Setting up secure communication with Ericsson. Guideline for Ericsson partners

Lecture 13. Public Key Distribution (certification) PK-based Needham-Schroeder TTP. 3. [N a, A] PKb 6. [N a, N b ] PKa. 7.

Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions

4.1: Securing Applications Remote Login: Secure Shell (SSH) PEM/PGP. Chapter 5: Security Concepts for Networks

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

to hide away details from prying eyes. Pretty Good Privacy (PGP) utilizes many

Cryptography and Security

TLS and SRTP for Skype Connect. Technical Datasheet

High-speed cryptography and DNSCurve. D. J. Bernstein University of Illinois at Chicago

Securing End-to-End Internet communications using DANE protocol

Public Key Applications & Usage A Brief Insight

Understanding Digital Certificates and Wireless Transport Layer Security (WTLS)

Chapter 10. Network Security

. Daniel Zappala. CS 460 Computer Networking Brigham Young University

DomainKeys Identified Mail DKIM authenticates senders, message content

Transcription:

Forging Digital Signatures Albert Levi Sabanci University Istanbul, TURKEY levi@sabanciuniv.edu ACSAC 2002

Outline What s a digital signature? How S/MIME handles digital signatures? How to obtain a certificate (a.k.a. digital ID) Tricks that you can do to get a bogus certificate Sending a signed message using other s name Scope of a S/MIME signature and related problems How to interpret a digital signature? 2

What is Digital Signature? Cryptographic processing over the message Uses public-key cryptography Public Key Private Key Public Key 3

In More Cryptographic Terms (e.g. RSA) Private Key Message Crypto system Message Hash Algorithm Hash Hash Signature Public Key =? Hash Algorithm Cryptosystem Hash 4 Sender Receiver

S/MIME Secure/Multipurpose Internet Mail Extensions A standard way for email encryption and signing IETF effort (RFCs 2632, 2633, 2634) Industry support Not a standalone software, a system that is to be supported by email clients Previous slide shows how S/MIME handles digital signatures Also provides encryption 5

Quick E-mail History SMTP and RFC 822 only ASCII messages MIME (Multipurpose Internet Mail Extensions) content type Almost any of information can appear in an email message S/MIME: Secure MIME new content types, like signature, encrypted data 6

Certificates Finding out correct public key of a user Endorsed binding between the public key and the owner Endorsed by a trusted Certification Authority (CA) via CA s signature over the certificate How to determine user by name? by e-mail address?

Certificate Management in S/MIME CA-centered CA certificates come with the client software An ordinary user is not aware of the CAs that he/she trusts Certificates are sent along with the signed messages

Certificate Management in S/MIME One should get a certificate from a CA in order to send signed messages Certificates classes (common practice by most CAs) Class 1 Class 2 Class 3 Tighter identity validation Easier to issue CA certification policies (Certificate Practice Statement) ID-control practices Class 1: only email address Class 2: against third party database Class 3: apply in person and submit picture IDs and/or hard documentation

Attack 1: Class 1 Certificate Attack No identity check during registration Binding between public key and e-mail address It is possible to enroll under a different name Name spoofing is possible in signed messages E-mail clients do not make this fact explicit to average users 10

Attack 1: Class 1 Certificate Attack Step 1: Get an e-mail address that implies the person you want to imitate Step 2: Register for a certificate with that bogus name and e-mail address Step 3: Step up an outgoing e-mail account at your favorite e-mail client software with that bogus name Step 4: Send bogus signed messages 11

Step 2: Registration 12

Step 2: Registration 13

Step 2: Registration 14

Step 2: Registration 15

Step 2: Registration 16

Step 2: Registration Certificate is now installed 17

Step 3: Set up local account 18

Step 4: Send signed but bogus messages 19

What s Wrong? Loose control for Class 1 certificates for commercial reasons visibility market share The system becomes less secure for the name of security

Attack 2: Use one s certificate to send e- mails under another name Step 1: Set up another e-mail account at local client Same e-mail address But a different name Step 2: Send bogus signed messages 21

Step 1: Set up another account 22

Step 2: Send bogus signed message 23

What s Wrong? During verification, e-mail client does not match the name in certificate with the name in e-mail Only e-mail addresses are matched (as mentioned in RFC 2632 (S/MIME Certificate Handling) Verifier s manual check is needed Not a specific problem of class-1 certificates Same attack is possible using class-2 and class-3 certificates E-mail clients are not concerned with certificate classes 24

Attack 3: Forging the header The scope of a S/MIME signature does not include the e-mail header from, to, cc, subject, date RFC 2633 S/MIME is used to secure MIME entities. A MIME entity may be a sub- part, sub-parts of a message, or the whole message with all its sub- parts. A MIME entity that is the whole message includes only the MIME headers and MIME body, and does not include the RFC- 822 headers. Indeed, the mail header is modified without changing the verification status Problem of all classes of certificates 25

Attack 3: Forging the header RFC 822 headers resemble envelopes Signature of the letter does not cover the envelope so the signature over the email message does not cover the RFC-822 header But we do not write subject over the envelopes 26

What should be done? Class 1 certificates should be discontinued All certificate must be issued with a personal presence requirement or by the approval of trusted registration authorities E-mail clients must be aware of certificate classes and issue appropriate warnings to the verifiers

What should be done? It is up to you whether to believe a digital signature is valid or not Use your reasoning, not your e-mail client s Try to identify people by their e-mail addresses Examine the details of certificate of the other party Do not trust Class 1 certificates Ask the sender to put all sensitive information within the message Sender s identity Subject Date Don t let subject say all!