3

Alice and Bob are trying to set up a secure conversation, but unknown to them in the middle is Eve, who can intercept and modify all packets sent between them.

The communication goes as follows:

  1. Alice sends a hello to Bob, and includes some parameters (say, an ephemeral Diffie-Hellman public key) A. Eve intercepts the message and replaces A with E.

  2. Bob replies with parameters B, and also sends his certificate which contains his public key and his domain. Eve intercepts this. At this point Eve and Bob derive a shared secret EB from E, B, and their associated private data (say, associated ephemeral DH private keys), which Alice does not know.

  3. Eve forwards the message from (2) to Alice, leaving the certificate the same (not being a CA, she can't create her own) but changing B to E. At this point Alice and Eve derive a shared secret EA from E, A, and associated private data, which Bob does not know.

  4. Alice verifies the certificate. It wasn't tampered with, so no flags are raised.

  5. Alice encrypts a message using Bob's public key (from the certificate) and sends to Bob. It contains the shared secret EA.

  6. Eve intercepts this message (which admittedly she can't decrypt), and discards it. She instead sends Bob a new one, encrypted with his public key, containing the shared secret EB. Bob looks at this and it matches the shared secret he was expecting, and so considers the handshake to be a success.

From now on Bob and Eve have a conversation using the shared secret EB, and Eve and Alice have a conversation using the shared secret EA. Neither Bob or Alice are aware that Eve is eavesdropping.

Supposedly, this is meant to be prevented by the certificate, but I don't understand how.

cpast
  • 7,223
  • 1
  • 29
  • 35
Dallas
  • 71
  • 1
  • 3
  • 2
    At no point does Alice accept a certificate which Eve has a private key for, so Alice is still encrypting everything with Bob's public key and Eve cannot decrypt it. – AlexH Feb 17 '15 at 12:57
  • CAs certify a public key to belong to a specific person/identity. Therefore, neither B nor A will accept a public key from E. – Karl Hardr Feb 17 '15 at 14:09
  • Besides, Eve is traditionally passive attacker (eavesdropper). – Cthulhu Jan 21 '16 at 14:18

2 Answers2

8

No actual security system works like you describe, for exactly this reason. The certificate is not used to encrypt the shared secret to verify that they have the same secret; that would be pointless (you might as well just have one side generate the secret and send it encrypted with the other side's public key). When the shared secret is generated using data not in the certificate, the role of the certificate is to sign that data; a rule of thumb is that you should never accept any input to the key generation process that didn't come from you and isn't signed by a trusted public key (with TLS the CA keys come preloaded into a browser, so they're trusted; the CA-signed certificate then establishes trust in Bob's public key).

In this case, the actual way the communication would work is:

  1. Alice sends Bob A. Eve intercepts it and replaces it with E.
  2. Bob sends back a certificate, B, and a signature for B that can be verified with the certificate. The certificate is for a signing key, not an encryption key (with RSA the difference is just what you designated the key for, but there are algorithms that are encryption-only or signing-only).
  3. Eve intercepts that and replaces B with E. However, she can't sign E with Bob's private key, so she either changes the certificate and signs E with the new one, or leaves the certificate as-is (but doesn't create a new signature with it, because she can't).
  4. Alice sees that either the certificate isn't signed by a CA, or that the signature verification fails (the signature is not a valid signature of E).
  5. Alice terminates the communication, because she knows it's being tampered with.
cpast
  • 7,223
  • 1
  • 29
  • 35
  • 1
    Thanks I didn't realise B was signed with Bob's private key, and verified with Bob's public key. It all makes sense now. – Dallas Feb 19 '15 at 06:23
4

Alice sends hello to Bob which contains a code A. Eve intercepts the message and instead puts a code E.

The above just won't happen. before Alice sends anything, Alice uses the CA's public key(present in her own Certificate store) to verify bob.com(Eve), the verification fails and so Alice will receive a warning saying that Bob's certificate is invalid.

If somehow Alice has Eve's certificate added in Alice's trusted certificate store, then Alice is in big trouble because, then Alice will not verify bob.com against a CA's public key.

JOW
  • 2,319
  • 2
  • 16
  • 24
  • "requests the CA" ... um, no. Alice _uses the certificate_. –  Feb 17 '15 at 18:54
  • If Alice already has Bob's public key before even connecting then she can just use that to send a shared secret to Bob, making the CA unnecessary. – Dallas Feb 19 '15 at 09:01
  • 1
    @Dallas: That would either {require clocks and unbounded state} or {allow [replays](https://en.wikipedia.org/wiki/Replay_attack)}. Additionally, that would require [CCA-security](https://en.wikipedia.org/wiki/Adaptive_chosen-ciphertext_attack) and would either {require clocks and [a specific type of PKE scheme](https://duckduckgo.com/?q=forward-secure+PKE)} or not provide [forward-secrecy](https://en.wikipedia.org/wiki/Forward_secrecy). However, it is true that if "Alice already has Bob's public key before even connecting then" "the CA" is unnecessary. –  Feb 19 '15 at 18:51
  • @Ricky Demer: Yes good point about replay attacks. So you can't really skip any steps even if you know bob's public key before connecting. – Dallas Feb 23 '15 at 04:12