[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

A Netscape Server implementation error




Hi Sameer

Thanks in advance for the T-shirt, and I like the Web site. On the   
subject of Netscape implementation errors, I note that the SSL protocol   
specification states in section 5.6.1 (CLIENT-MASTER-KEY) that "It is   
also an error if CLEAR-KEY-LENGTH is non-zero and the the CIPHER-KIND is   
not an export cipher".

However, I note that Netscape Commerce Server 1.1 will happily accept a   
"secure" connection using the non-export cipher SSL_CK_RC4_128_WITH_MD5,   
even if the CLEAR-KEY-LENGTH is set to 16 and the *entire* master key is   
sent unencrypted.

Here is an extract from an SSL session with www.netscape.com which   
illustrates the oversight:

 ------------------------------- Start of Session   
 ---------------------------

(1) The session was initialised as normal, and the following values were   
exchanged in the SERVER-HELLO and CLIENT-HELLO:

Challenge:
a2 ff 2e 94 8d f9 f4 e2 2c f6 bd ae 7f 47 db 6c

Connection id:
ef 47 3b 44 db d9 8d 1a f0 da 3e 14 73 97 a3 1f

(2) I then sent the following CLIENT-MASTER-KEY message, which is   
reproduced in full:

SSL Record Header:
80 9a

Message type: SSL_MT_CLIENT_MASTER_KEY
02

Cipher kind: SSL_CK_RC4_128_WITH_MD5
01 00 80

Clear key length: 16
00 10

Encypted key length: 128 bytes
00 80

Key arg length: 0
00 00

Clear key data: the *entire* master key sent in the clear
af 24 2e e8 2b b1 75 d1 27 a2 b8 76 8b 49 c3 f3

Encrypted key: this is a zero-length block formatted using PKCS#1 block   
type 2 and encrypted under Netscape's public key. Since it contains no   
data, an eavesdropper would not need to decrypt it in order to decrypt   
the rest of the session.

af 24 2e e8 2b b1 75 d1 27 a2 b8 76 8b 49 c3 f3
9b 9b 0b ff cd e8 2f 2c 0d 16 4e 90 73 26 4e e7
e0 3f 45 8a ce 9a 21 d6 2a 6b b8 9a 20 4e bc cf
d0 01 36 86 1c db e0 8b a8 e3 4c 9b 15 11 ea 95
b1 50 3f c9 42 9a 97 77 0f 9d 29 97 7e 87 1b 8f
77 b6 c9 c6 53 90 5b 74 4c 92 99 62 ad 8b bf 4c
28 ac 1b 11 32 64 56 c9 f0 d5 6f c9 89 6b 55 3f
b9 42 aa 7b 7c f0 a1 89 93 22 13 46 e2 58 63 23
b2 51 83 92 76 46 05 65 87 86 5b 52 5a d1 02 ee

(3) I calculated the session keys in the normal manner, using the master   
key which was sent entirely in the clear. The result was:

Client read key:
14 3e 84 a6 54 57 d6 51 94 cf 54 f5 5a 29 4a ef

Client write key:
9d e1 16 77 92 ee 89 f2 2d 30 c2 a2 e1 77 9f 5d

(4) Instead of disconnecting, the Netscape server sent the following   
reply (the header has been removed):

28 40 00 75 b8 d6 60 68 f5 cf ba 65 78 49 35 83
d3 3a b5 d3 81 23 2d f8 7d c6 f8 47 4d 0c 62 c3
b4

This was decrypted using the client read key to give the following   
SERVER_VERIFY message:

Message Authentication Code:
7b 95 2a 84 a1 55 fc 59 32 6b 53 ec e0 1d 80 4a

Message type: SSL_MT_SERVER_VERIFY
05

Challenge data (which agrees with the challenge sent in the   
CLIENT-HELLO):
a2 ff 2e 94 8d f9 f4 e2 2c f6 bd ae 7f 47 db 6c

(5) The negotiation phase of the protocol was concluded with encrypted   
CLIENT-FINISHED and SERVER_FINISHED messages as per normal.

(6) I sent the encrypted HTTP command "GET / HTTP/1.0" and received the   
following text (after decryption, stripping MAC and header, etc:

HTTP/1.0 200 OK
Server: Netscape-Commerce/1.1
Date: Tuesday, 19-Sep-95 21:15:23 GMT
Last-modified: Tuesday, 19-Sep-95 21:14:09 GMT
Content-length: 5278
Content-type: text/html

Followed by the Netscape home page, which included the following   
statement:

<A HREF="/newsref/std/random_seed_security.html">Find out</A> how   
Netscape is responding immediately to upgrade customers and minimize risk   
of future threats.

(7) Having obtained the warm, fuzzy feeling I so desired, I closed the   
connection secure in the knowledge that my secrets were safe with   
Netscape.

 -------------------------------- End of Session   
 -----------------------------

This shows that Commerce Server 1.1 is prepared to accept a "secure"   
connection which is completely insecure as the entire master key has been   
sent in the clear and an eavesdropper could decrypt the session without   
any cryptanalysis.

This does not mean that sessions between "well-behaved" browsers and   
Netscape servers are insecure, since the browser will send all 16 bytes   
of the key encrypted. Neither could it be used for an active attack,   
since if a new master was substituted for the one sent by the client,   
this would be detected during authentication of the SERVER-VERIFY   
message.

However, it would provide an opportunity for a malicious browser supplier   
to "doctor" secure browsers so that they sent all (or part) of the master   
key in the clear, even when using non-export ciphers. (Of course there   
are better ways to do this; the "random padding" of PKCS block type 2   
comes to mind).

Although this is not nearly as important a result as Ian and Davids, it   
is the first server hack, so can I have another T shirt?  :-)

Andrew
________________________________________________________________
Andrew Roos <[email protected]>

// C++ programmers have class (but not much inheritance)

PGP Fingerprint: F6 D4 04 6E 4E 16 80 59 3A F2 27 94 8B 9F 40 26
Full key at ftp://ftp.vironix.co.za/PGP-keys/AndrewRoos