首页> 外文会议>International Workshop on Security Protocols >Man-in-the-Middle in Tunnelled Authentication Protocols
【24h】

Man-in-the-Middle in Tunnelled Authentication Protocols

机译:隧道认证协议中的中间中间

获取原文

摘要

Deploying a new security protocol is expensive. This encourages system designers to look for ways of re-using existing infrastructure. When security protocols and components are re-used, it is critical to re-examine the security of the resulting system as a whole. For example, it has become a standard paradigm to run a legacy client authentication protocol within a secure tunnel. The commonest example of such composition is the use of HTTP authentication inside a TLS tunnel. In this paper, we describe a man-in-the-middle attack on such protocol composition. The vulnerability arises if the legacy client authentication protocol is used both in tunnelled and untunnelled forms. Even when the client authentication protocol and the tunnel protocol are both secure, composing them in the customary manner results in an insecure system. We propose a solution to this problem by using a cryptographic binding between the client authentication protocol and the tunnel protocol.
机译:部署新的安全协议是昂贵的。这鼓励系统设计人员寻找重新使用现有基础架构的方法。当重新使用安全协议和组件时,重新检查结果系统的安全性是至关重要的。例如,它已成为在安全隧道内运行传统客户端认证协议的标准范例。这种组合的最常见的例子是在TLS隧道内使用HTTP身份验证。在本文中,我们描述了对此类协议组成的中间人攻击。如果隧道客户端认证协议以隧道和未通知的形式使用,则漏洞出现。即使客户端认证协议和隧道协议都是安全的,也以常规方式构成它们导致不安全的系统。我们通过使用客户端认证协议和隧道协议之间的加密绑定提出解决此问题的解决方案。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号