Paper 2021/553
PARASITE: PAssword Recovery Attack against Srp Implementations in ThE wild
Daniel De Almeida Braga, Pierre-Alain Fouque, and Mohamed Sabt
Abstract
Protocols for password-based authenticated key exchange (PAKE) allow two users sharing only a short, low-entropy password to establish a secure session with a cryptographically strong key. The challenge in designing such protocols is that they must resist offline dictionary attacks in which an attacker exhaustively enumerates the dictionary of likely passwords in an attempt to match the used password. In this paper, we study the resilience of one particular PAKE against these attacks. Indeed, we focus on the Secure Remote Password (SRP) protocol that was designed by T. Wu in 1998. Despite its lack of formal security proof, SRP has become a de-facto standard. For more than 20 years, many projects have turned towards SRP for their authentication solution, thanks to the availability of open-source implementations with no restrictive licenses. Of particular interest, we mention the Stanford reference implementation (in C and Java) and the OpenSSL one (in C). In this paper, we analyze the security of the SRP implementation inside the OpenSSL library. In particular, we identify that this implementation is vulnerable to offline dictionary attacks. Indeed, we exploit a call for a function computing modular exponentiation of big numbers in OpenSSL. In the SRP protocol, this function leads to the call of a non-constant time function, thereby leaking some information about the used password when leveraging cache-based Flush+Reload timing attack. Then, we show that our attack is practical, since it only requires one single trace, despite the noise of cache measurements. In addition, the attack is quite efficient as the reduction of some common dictionaries is very fast using modern resources at negligible cost. We also prove that the scope of our vulnerability is not only limited to OpenSSL, since many other projects, including Stanford's, ProtonMail and Apple Homekit, rely on OpenSSL, which makes them vulnerable. We find that our flaw might also impact projects written in Python, Erlang, JavaScript and Ruby, as long as they load the OpenSSL dynamic library for their big number operations. We disclosed our attack to OpenSSL who acknowledged the attack and timely fixed the vulnerability.
Note: PoC of the attack available at: https://gitlab.inria.fr/ddealmei/poc-openssl-srp
Metadata
- Available format(s)
- Category
- Implementation
- Publication info
- Published elsewhere. Proceedings of Conference on Computer and Communications Security (CCS ’21)
- DOI
- 10.1145/3460120.3484563
- Keywords
- SRPPAKEFlush+ReloadPDAOpenSSL
- Contact author(s)
- daniel de-almeida-braga @ irisa fr
- History
- 2021-09-14: revised
- 2021-04-27: received
- See all versions
- Short URL
- https://ia.cr/2021/553
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2021/553, author = {Daniel De Almeida Braga and Pierre-Alain Fouque and Mohamed Sabt}, title = {{PARASITE}: {PAssword} Recovery Attack against Srp Implementations in {ThE} wild}, howpublished = {Cryptology {ePrint} Archive, Paper 2021/553}, year = {2021}, doi = {10.1145/3460120.3484563}, url = {https://eprint.iacr.org/2021/553} }