论文标题

部分可观测时空混沌系统的无模型预测

How Not to Handle Keys: Timing Attacks on FIDO Authenticator Privacy

论文作者

Kepkowski, Michal, Hanzlik, Lucjan, Wood, Ian, Kaafar, Mohamed Ali

论文摘要

本文提出了对FIDO2(快速身份在线)身份验证协议的计时攻击,该协议允许攻击者链接存储在脆弱身份验证器中的用户帐户,这是一个严重的隐私问题。 FIDO2是FIDO行业联盟针对安全令牌在线身份验证指定的新标准。它通过提供在身份验证过程中使用USB令牌或其他身份验证器作为第二个因素来补充W3C WebAuthn规范。从密码学的角度来看,该协议是一种简单的挑战 - 响应,其中椭圆曲线数字签名算法用于签署挑战。为了保护用户的隐私,令牌使用每个服务使用唯一的密钥对。为了适应小记忆,令牌使用各种技术,这些技术利用了该服务发送给令牌的特殊参数,称为密钥句柄。我们通过实施密钥手柄的处理方式来识别和分析漏洞,从而允许攻击者在多个服务上远程链接用户帐户。我们表明,对于脆弱的身份验证者,处理其他服务但正确的身份验证器的关键处理所需的时间与其他身份验证器但正确但正确的服务之间存在差异。此差异可用于执行正时攻击,从而使对手可以在服务中链接用户的帐户。我们提出了几个现实世界中的对手实例,这些例子可以执行我们的攻击并可以从链接帐户中受益。我们发现,尽管FIDO 1级认证,但我们测试的八个硬件身份验证者中有两个很脆弱。由于安全原因,这种漏洞不能轻易缓解身份验证器,因为它们通常不允许固件更新。此外,我们表明,由于现有浏览器实现WebAuthn标准的方式,可以远程执行攻击。

This paper presents a timing attack on the FIDO2 (Fast IDentity Online) authentication protocol that allows attackers to link user accounts stored in vulnerable authenticators, a serious privacy concern. FIDO2 is a new standard specified by the FIDO industry alliance for secure token online authentication. It complements the W3C WebAuthn specification by providing means to use a USB token or other authenticator as a second factor during the authentication process. From a cryptographic perspective, the protocol is a simple challenge-response where the elliptic curve digital signature algorithm is used to sign challenges. To protect the privacy of the user the token uses unique key pairs per service. To accommodate for small memory, tokens use various techniques that make use of a special parameter called a key handle sent by the service to the token. We identify and analyse a vulnerability in the way the processing of key handles is implemented that allows attackers to remotely link user accounts on multiple services. We show that for vulnerable authenticators there is a difference between the time it takes to process a key handle for a different service but correct authenticator, and for a different authenticator but correct service. This difference can be used to perform a timing attack allowing an adversary to link user's accounts across services. We present several real world examples of adversaries that are in a position to execute our attack and can benefit from linking accounts. We found that two of the eight hardware authenticators we tested were vulnerable despite FIDO level 1 certification. This vulnerability cannot be easily mitigated on authenticators because, for security reasons, they usually do not allow firmware updates. In addition, we show that due to the way existing browsers implement the WebAuthn standard, the attack can be executed remotely.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源