信息网络安全 ›› 2020, Vol. 20 ›› Issue (3): 65-74.doi: 10.3969/j.issn.1671-1122.2020.03.009

• 技术研究 • 上一篇    下一篇

一种防范TLS协议降级攻击的浏览器安全模型

张兴隆1,2, 李钰汀1,2, 程庆丰1,2(), 郭路路1,2   

  1. 1.战略支援部队信息工程大学,郑州 450002
    2.数学工程与先进计算国家重点实验室,郑州 450002
  • 收稿日期:2019-05-15 出版日期:2020-03-10 发布日期:2020-05-11
  • 作者简介:

    作者简介:张兴隆(1994—),男,安徽,硕士研究生,主要研究方向为密码学和信息安全;李钰汀(1996—),女,河南,硕士研究生,主要研究方向为密码学和信息安全;程庆丰(1979—),男,辽宁,副教授,博士,主要研究方向为密码学和信息安全;郭路路(1990—),男,河南,硕士,主要研究方向为信息安全和漏洞挖掘。

  • 基金资助:
    国家自然科学基金[61872449]

A Browser Security Model for Preventing TLS Protocol Downgrade Attacks

ZHANG Xinglong1,2, LI Yuting1,2, CHENG Qingfeng1,2(), GUO Lulu1,2   

  1. 1. PLA Strategic Support, Force Information Engineering University, Zhengzhou 450002, China
    2. State Key Laboratory of Mathematics Engineering and Advanced Computing, Zhengzhou 450002, China
  • Received:2019-05-15 Online:2020-03-10 Published:2020-05-11

摘要:

在TLS握手期间,攻击者可以利用一个或两个通信方对旧版本或弱密码套件的支持发起一系列的攻击,这种攻击被称为降级攻击。近年来与TLS相关的降级攻击被广泛研究,可以发现这些攻击并非完全相同,现有文献缺乏一种有效的分类法对它们进行分类和比较,从而在全局视角下研究降级攻击。基于此,文章提出了一种降级攻击的分类方法,并按照该方法对15种已经公开发布的针对TLS协议的降级攻击方法进行了分类。进一步,文章提出了一种轻量级机制,用于Web浏览器中的细粒度TLS安全配置。该机制允许浏览器为进入敏感域的连接强制实施最佳TLS安全配置,同时保持其余连接实施默认配置,从而检测并防止降级攻击和服务器错误配置。

关键词: TLS, 降级攻击, Web浏览器, 细粒度TLS安全配置

Abstract:

During a TLS handshake, an attacker who uses one or two parties to support an old version or a weak cipher suite for a series of attacks is called a downgrade attack. In recent years, TLS-related downgrade attacks have been extensively studied. In-depth study of these attacks reveals that they are not identical. The existing literature lacks a taxonomy to classify and compare them, which helps to study downgrade attacks from a global perspective. Based on this, the article proposes a classification method for downgrade attacks, focusing on fifteen kinds of downgraded attacks against the TLS protocol that have been publicly released. In addition, the article proposes a lightweight mechanism for fine-grained TLS security configuration in Web browsers. This mechanism allows the browser to enforce optimal TLS security configuration for connections entering sensitive domains while maintaining the default configuration of the remaining connections. This article mechanism can detect and prevent downgrade attacks and server misconfiguration.

Key words: TLS, downgrade attack, Web browser, fine-grained TLS security configuration

中图分类号: