On the robustness of applications based on the SSL and TLS security Protocols

被引:0
|
作者
Berbecaru, Diana [1 ]
Lioy, Antonio [1 ]
机构
[1] Politecn Torino, Dipartimento Automat & Informat, Corso Duca Abruzzi 24, I-10129 Turin, Italy
来源
关键词
security; SSL/TLS; truncation attack; MITM attack;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The SSL and TLS security protocols have been designed and implemented to provide end-to-end data security. This includes data integrity that is the data cannot be modified, replayed or reordered by an attacker without being detected at the receiving endpoint. SSL and TLS however does not provide data delivery integrity, in the sense they do not guarantee that all the sent data will actually arrive at the other side. This is because, for example, SSL/TLS cannot know in advance which is the exact size of the data to be sent over the secured channel. The mosts recent versions (SSLv3 and TLSv1) provide some form of protection against loss of data records by means of sequence numbers and specialized close-notify alert messages to be sent when tearing down the SSL connection. Unfortunately, this is not enough when the last record containing application data together with the closure alert are deleted on purpose, as it happens in the truncation attacks. SSLv3/TLSv1 specifications do not indicate what should happen (at the application level) if the close-notify message never arrives at the receiver. Consequently, for applications where it is important to ascertain that the data reached untruncated the other party, it is required to have an additional control at the application level. In this paper we show (based on practical tests) that some widely-used applications implementing SSLv3 and TLSvl do not perform further controls on the size of the data to be received, and thus they are vulnerable to truncation attacks. For tests we implemented a specialized MITMSSL tool, used to manipulate the SSL/TLS records exchanged between two communicating parties.
引用
收藏
页码:248 / +
页数:3
相关论文
共 50 条
  • [1] SSL and TLS protocols: how to address critical security issues
    Swiss Fed. Strategy U. Info. T.
    不详
    [J]. Computer Security Journal, 2000, 16 (01): : 15 - 38
  • [2] Design of an enhancement for SSL/TLS protocols
    Elgohary, Ashraf
    Sobh, Tarek S.
    Zaki, M.
    [J]. COMPUTERS & SECURITY, 2006, 25 (04) : 297 - 306
  • [3] Planning-based Security Testing of the SSL/TLS Protocol
    Bozic, Josip
    Kleine, Kristoffer
    Simos, Dimitris E.
    Wotawa, Franz
    [J]. 10TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS - ICSTW 2017, 2017, : 347 - 355
  • [4] Security Tests for Mobile Applications - Why using TLS/SSL is not enough.
    Kieseberg, Peter
    Fruehwirt, Peter
    Schrittwieser, Sebastian
    Weippl, Edgar
    [J]. 2015 IEEE EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS (ICSTW), 2015,
  • [5] Implementation of a Security Layer for the SSL/TLS Protocol
    Ordean, Mihai
    Giurgiu, Mircea
    [J]. 2010 9TH INTERNATIONAL SYMPOSIUM ON ELECTRONICS AND TELECOMMUNICATIONS (ISETC), 2010, : 209 - 212
  • [6] THE MAIN STAGES OF DEVELOPMENT OF THE CRYPTOGRAPHIC PROTOCOLS SSL/TLS AND IPsec
    Martynenkov, I., V
    [J]. PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2021, (51): : 31 - 67
  • [7] A comprehensive study on security attacks on SSL/TLS Protocol
    Sirohi, Preeti
    Agarwal, Amit
    Tyagi, Sapna
    [J]. PROCEEDINGS ON 2016 2ND INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2016, : 893 - 897
  • [8] Research on Security of the Extended SSL/TLS Protocol Based on Trusted Platform Module
    Yu, Yue
    Sun, Hao
    Yu, Fajiang
    Kong, Yanan
    [J]. ASIA-PACIFIC YOUTH CONFERENCE ON COMMUNICATION TECHNOLOGY 2010 (APYCCT 2010), 2010, : 861 - 866
  • [9] An Improved Security Authentication Mechanism for Parlay/OSA Framework based on SSL\TLS
    Fan Zi-Fu
    Zhang Yi
    Wan Xiao-Yu
    [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 441 - 444
  • [10] Implementation of SSL/TLS Security with MQTT Protocol in IoT Environment
    Iqbal Luqman Bin Mohd Paris
    Mohamed Hadi Habaebi
    Alhareth Mohammed Zyoud
    [J]. Wireless Personal Communications, 2023, 132 : 163 - 182