TLS Attacks Flashcards
Replay attack
attacker just replays messages he previously observed. He can’t decrypt these messages, but they mean something to the server. use nonces generated by server/leg.client to counter replay attacks.
explain FREAK attack
active MitM client/server connection
- change client hello message to contain the RSA_EXPORT cipher.
- faulty server responds with 512 bit RSA value (easy to break)
- attacker changes server_hello back to reflect client_hello
- faulty client accepts 512 bit RSA value although he did not request RSA_EXPORT
- client sends pms encrypted with 512 bit RSA
- attacker decrypts message with precomputed priv key for RSA value and gets pms
- server sends ServerFinished and attacker alters it to reflect the clients view of the handshake (easy having pms)
- client sends ClientFinished and attacker alters it to reflect the servers view of the handshake (easy having pms)
explain Heartbleed attack
exploits heartbeat messages used to keep connection open:
client sends “sheep” and buffer_length=5 to server and expects a message “sheep” back. if buffer_length is longer than message, the server sends some of its memory, might be sensitive data
attacker sends: “sheep” and buffer_length=2000
client authentication does not help, because heartbeat messages can be send during handshake, before client would be auth.
explain replay attack with two servers hosting the same service (with 0-RTT)
- client connects to server A (full handshake)
- client issues another request. 0-RTT is used
- attacker blocks response from A.
- attacker replays 0-RTT request to server B and lets Bs response through
- client will retry the request using the full handshake with B
- -> client has issued the same request twice
0-RTT protocol and problems
- client sends PSK and application data encrypted with this key (optional DH value for later forward sec)
- server Finished
- Client finished
ISSUE:
- vulnerable to replay attacks: server is not authenticated in first message (especially in distributed server environments)
- no forward security
1-RTT protocol
client guesses which DH group server supports and just sends that value.
Attacks/problems on/with RC4
the first 256 bits of the keystream in RC4 are biased. wiht enough ciphertexts the attacker can recover the planetext
–>solution: drop first 256 bits of keystream