summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--directions/directions.bib8
-rw-r--r--directions/research_directions.pdfbin2744279 -> 1192189 bytes
-rw-r--r--directions/research_directions.tex524
3 files changed, 343 insertions, 189 deletions
diff --git a/directions/directions.bib b/directions/directions.bib
index b7e58f2..cfce930 100644
--- a/directions/directions.bib
+++ b/directions/directions.bib
@@ -192,3 +192,11 @@
year = {2018}
}
+@misc{rfc2104,
+ author = {Krawczyk, H. and Bellare, M. and Canetti, R.},
+ month = {feb},
+ title = {RFC2104 - HMAC: Keyed-Hashing for Message Authentication},
+ x-color = {#009966},
+ year = {1997}
+}
+
diff --git a/directions/research_directions.pdf b/directions/research_directions.pdf
index 201f839..ae8a85a 100644
--- a/directions/research_directions.pdf
+++ b/directions/research_directions.pdf
Binary files differ
diff --git a/directions/research_directions.tex b/directions/research_directions.tex
index ce95f17..1e9f782 100644
--- a/directions/research_directions.tex
+++ b/directions/research_directions.tex
@@ -50,17 +50,24 @@
\author{Sebastian Götte {\texttt<secureusb@jaseg.net>} @Mori lab, Waseda University}
\title{Research directions in secure USB devices}
-\date{November 19 2018}
+\date{December 12 2018}
\begin{document}
\maketitle
-\section{Problem definition}
+\section{Introduction}
+\subsection{Problem definition}
A computer's USB interface is hard to secure. Though overall security is quite good today, the USB interface has not
received enough attention. In particular HIDs are a problem, as they are naturally very highly privileged.
Off-the-shelf USB HID attack tools exist. In particular from a security point of view extremely bad ideas such as
WebUSB\cite{misc01} are set to increase this already large attack surface even further.
-\section{State of the art}
+\subsection{Contributions}
+This work includes three key contributions. First, it demonstrates a practical implementation of a complete,
+backwards-compatible secure USB system using QubesOS and a single new piece of security hardware. Second, it shows a
+novel interactive user-friendly cryptographic handshaking scheme based on out-of-band communication. Third, it shows and
+proposes some techniques for the design of general secure protocols that are not limited to USB alone.
+
+\section{The state of the art in mitigation}
Several ways to secure the USB interface have been proposed that can be broadly categorized as follows.
\begin{itemize}
\item USB firewalls are software or hardware that protects the host from requests deemed invalid similar to a network firewall\cite{tian01,angel01,kang01,bates01,loe01}.
@@ -88,8 +95,9 @@ Several ways to secure the USB interface have been proposed that can be broadly
\end{table}
\footnotetext{Requires separate USB host controller for HIDs}
-Overall, QubesOS is the only significant practical advance towards securing this interface. Other approaches have not
-been successful so far. A likely reason for this is large market inertia and necessary backwards-compatibility.
+We compare these approaches w.r.t. several attacks in \ref{approach_comparison}. Overall we found that QubesOS is the
+only advance towards securing this interface that is both \emph{practical} and \emph{effective}. Other approaches have
+not been successful so far. A likely reason for this is large market inertia and necessary backwards-compatibility.
QubesOS approaches the problem by running a separate VM with the USB host controllers mapped through via IOMMU. This VM
runs a linux kernel with a small set of white-listed USB device drivers (HID and mass storage device) and a USB-over-IP
@@ -100,9 +108,47 @@ USB-over-IP-over-QubesRPC, a Xen vChan-based inter-VM communication system.
QubesOS is still lacking in that it's compartmentalization becomes essentially useless when it is used with a USB HID
keyboard that does not have its own dedicated PCIe USB host controller, as any normal desktop and most recent laptop
computers. The issue here is that USB HID is neither authenticated nor encrypted, and the untrusted USB VM sits in the
-middle of this data stream, which thus allows it trivial privilege escalation.
-
-\section{Project goal}
+middle of this data stream, which thus allows it trivial privilege escalation via keystroke injection.
+
+\subsection{Usage scenarios}
+
+Today USB's level security is still adequate for most everyday users. In general, attacks against USB either require
+special malicious hardware or require re-flashing of existing peripherals with custom malicious firmware. Today's
+low-level cybercrime targeting everyday users is still focused on much easier tasks such as stealing passwords through
+phishing, installing cryptolocker malware by means of malicious email attachments and extracting sensitive user data
+with malicious browser addons. Fortunately, we have not yet entered an age where average computer users need to worry
+about the type of attack this work defends against. Still, it can be expected that with the general increase of overall
+computer security, eventually attackers will have to graduate to more advanced means--and since at this time the
+landscape of effective defenses against USB attacks is very sparse, your author considers it important to explore the
+avenues to effective defence ealier rather than later in order to be prepared for evolving attacks.
+
+Despite the banality of everyday cybersecurity described above, there already are some people and organizations who face
+advanced attacks including USB attacks. Due to their exceedingly simple execution, USB HID attacks are a very attractive
+way to perform targeted attacks. For this reason, specialized USB attack hardware is already available commercially at
+low cost. For users facing targeted attacks like this, SecureHID might already provide practical benefits.
+
+The users most at risk of targeted attacks are those either working with highly sensitive data or working with highly
+privileged access. The former group would include people such as journalists working with their sources and politicians
+working with confidential information. The latter group would include law enforcement officials, often being endowed
+with wide-ranging electronic access to databases and other confidential information. Further, system administrators and
+computer programmers are often provided highly privileged access to critical systems for software deployment using
+systems such as Ansible or uploading software packages into software repositories such as PyPI.
+
+In all of these scenarios there are many users with very poweful adversaries. In case of a software developer or systems
+administrator that would be competing companies or foreign intelligence agencies trying to gain access to internal
+networks to steal confidential information. In case of a journalist that would be whoever they are writing about and
+here the most interesting articles might come with the most powerful enemies. Finally, a security researcher would by
+nature of their work, out of academic interest specifically be looking for the most dangerous targets they could find.
+
+Some users might be able to reduce their attack surface to USB attacks by reducing their use of untrusted USB devices,
+but in many everyday scenarios such as those described above this is not an option. A security researcher needs to
+connect to untrusted devices in order to analyze them, and using a second, isolated machine for this is very
+inconvenient. A journalist or politician will frequently have to read USB flash drives with documents for their work,
+and again simply solving the problem by air-gapping is an effective but impractical mitigation. In all of these cases,
+SecureHID would be an effective mitigation.
+
+\section{Approach}
+\subsection{System overview}
The goal of SecureHID is to enable the first reasonably secure system using both HID and arbitrary untrusted devices on
the same USB host controller, based on QubesOS. SecureHID consists of a USB HID encryption box to be put between
keyboard and computer and a piece of software run inside QubesOS. After initial pairing with the host software, the
@@ -111,6 +157,24 @@ host. The host software running outside the untrusted USB VM will receive the en
untrusted USB VM, verify and decrypt it, and inject the received HID input events into Qubes's input event handling
system.
+A schematic diagram of a system employing SecureHID is shown in figure \ref{diagram_with}. Two major points that can be
+seen here are that first, SecureHID requires no specialized hardware on either end and transparently plugs into the
+existing USB stack. Second, a SecureHID-protected setup has two well-defined security boundaries, one inside the
+SecureHID device between host and device side, and one in the host operating system between USB driver VM and
+hypervisor.
+
+These security boundaries allow a clean separation of a SecureHID setup into untrusted and trusted domains and greatly
+simpliefies reasoning about overall system security. Communication across these security boundaries is limited to the
+simple SecureHID protocol. We describe the design of the SecureHID protocol in section \ref{prot_desc} and elaborate
+its security properties in section \ref{prot_ver}. The security of the protocol's core components has been formally
+verified in the past and the protocol has been kept simple enough to allow exhaustive verification and testing.
+
+\begin{figure}[H]
+ \includegraphics[scale=0.8]{system_diagram_with_secureusb.eps}
+ \caption{Diagram of a SecureHID-protected system}
+ \label{diagram_with}
+\end{figure}
+
\subsection{Audio and other sensitive USB devices}
This system is sufficient to secure any USB setup, especially unmodified desktop PCs or laptops where a USB host
controller is shared between both HIDs and other devices. Attack surface is reduced such that a \emph{full compromise}
@@ -130,88 +194,25 @@ Since sensitive HIDs are isolated from other USB devices effectively on a separa
\textcite{neugschwandtner01} are entirely prevented. Even much scarier physical attacks on USB such as \textcite{su01}
are prevented given an adequate hardware implementation, which fortunately is no too complicated.
-\subsection{Diagram of a conventional setup}
-\begin{figure}[H]
- \includegraphics[scale=0.8]{system_diagram_without_secureusb.eps}
- \caption{Diagram of a conventional unprotected system}
- \label{diagram_without}
-\end{figure}
-\subsection{Diagram of a SecureHID-protected system}
-\begin{figure}[H]
- \includegraphics[scale=0.8]{system_diagram_with_secureusb.eps}
- \caption{Diagram of a SecureHID-protected system}
- \label{diagram_with}
-\end{figure}
-
-\subsection{Key points}
-\begin{itemize}
- \item A practical example of a complete, secure USB system using Qubes
- \item A novel interactive user-friendly side channel-based cryptographic handshaking scheme
- \item An example of a secure USB-based protocol
-\end{itemize}
+\section{Cryptographic design}
-\section{Project state}
-A working prototype has been completed.
-
-\subsection{Completed}
-\begin{itemize}
- \item Rough protocol design
- \item Protocol implementation based on \textcite{perrin01} using noise-c (microcontroller) and noiseprotocol (python/host)
- \item SRAM-based key storage with SRAM wear levelling
- \item host/device signature checking
- \item host/device key generation
- \item proper circuit design because I was bored last weekend (see appendix \ref{ch:renderings})
-\end{itemize}
-
-\subsection{Open issues}
-\begin{itemize}
- \item Both noise-c and noiseprotocol have poor code and API quality. Since most noise functionality is not needed,
- just implement the protocol in bare C/python based on cryptographic primitives and scrap higher-level protocol
- implementations (though they've been useful so far during prototyping).
- \item Implement HID mouse host support
- \item Test USB hub support
- \item Replace the serial link with a custom USB link using an STM32F103 instead of the CH340G USB/serial converter
- \item Properly integrate prototype host client with qubes infrastructure
- \item Implement photodiode/monitor-based pairing side-channel
-\end{itemize}
+\subsection{Protocol description}
+\label{prot_desc}
+The basic protocol consists of two stages: \textsc{pairing} and \textsc{data}. When the device powers up, it enters
+\textsc{pairing} state. When the host enumerates a new device, it enters \textsc{pairing} state. If any fatal
+communication errors occur, both host and device re-enter \textsc{pairing} state. To make the implementation robust
+against host software crashing, devices being unplugged etc. without opening it up to attacks, the host can request the
+device to re-enter \textsc{pairing} state a limited number of times after powerup.
-\section{Possible directions}
-\begin{itemize}
- \item Elaborate handshake security properties
- \begin{itemize}
- \item Possibly investigate other applications of this type of interactive handshake
- \item Possibly contrast to carmera/other backchannel systems
- \item IMHO the pairing scheme is the most interesting part of this project from a scientific point of view
- \end{itemize}
- \item Elaborate overall security properties of QubesOS-based system
- \item Elaborate possible DisplayPort/HDMI-based display encryption $\rightarrow$ Bunnie's NeTV2 w/ HDMI/eDP converter
- \item Elaborate possible encrypted remote input (SSH) setups
- \begin{itemize}
- \item This might turn out to be really interesting
- \item For this to be usable the host needs to tell the device at least which keyslot to use which could turn
- out to be complex to implement securely
- \item Considering complexity, this might turn into its own research project
- \end{itemize}
- \item Showcase secure hardware interface design, contrast with wireguard protocol design
- \begin{itemize}
- \item Formally derive handshake security properties
- \item Formally derive host/device protocol security properties using noise spec
- \item Formally verify and thouroughly unit-test the host/device protocol implementation on all layers
- \item IMHO this is the most interesting part of this project from an engineering point of view
- \end{itemize}
-% Waiting
- \item Create custom hardware prototype
- \item Benchmark cryptography routines (will likely turn out to be ``wayyy fast'' for HID, fast enough for full-speed
- USB. High-speed cannot be done with the current architecture as we can't get data out the chip at high-speed
- data rates. \textcite{srivaths01} raise the issue of running crypto on embedded systems, but in this case it
- turns out with somewhat modern hardware and cryptography there is no problem at all.
-\end{itemize}
+\textsc{pairing} state consists of a number of substates as set by \textcite{perrin01}. The device runs noise's
+\textsc{XX} scheme, i.e. both host and device each contribute both one ephemeral key $e$ and one static key $s$ to the
+handshake, and the public halves of the static keys are transmitted during handshake encrypted by the emphemeral keys.
-\newpage
-\appendix
-\section{High-level protocol design}
+The cryptographic primitives instantiated in the prototype are X25519 for the ECDH primitive, BLAKE2s as a hash and
+ChaCha20-Poly1305 as AEAD for the data phase. ECDH instead of traditional DH was chosen for its small key size and fast
+computation. Since no variant of RSA is used, key generation is fast. An ad-hoc prototype device-side random number
+generator has been implemented based on BLAKE2s and the STM32's internal hardware RNG.
-\subsection{Protocol description}
\begin{figure}
\centering
\begin{sequencediagram}
@@ -274,6 +275,161 @@ A working prototype has been completed.
\label{protocol_diagram}
\end{figure}
+A successful pairing looks like this:
+\begin{enumerate}
+\item \textbf{Handshake.} \textsc{device} is connected to \textsc{host}
+\item \textsc{host} initiates pairing by sending \textsc{initiate handshake} to device
+\item \textsc{device} and \textsc{host} follow noise state machine for the \textsc{XX} handshake. See figure
+ \ref{crypto_diagram} for a complete flowchart of cryptographic operations during this handshake. The handshake and
+ subsequent Noise protocol communication are specified in \textcite{perrin01} and their security properties are
+ formally verified in \textcite{kobeissi01}. Section \ref{sec_prop} analyzes the implications of these security
+ properties for this research.
+\item After the handshake completes, both \textsc{device} and \textsc{host} have received each other's static public key
+ $rs$ and established a shared secret connection key. At this point, the possibility of an MITM attacker having
+ actively intercepted the handshake remains. At this point \textsc{device} and \textsc{host} will both notice they do
+ not yet know each other's static keys. \textsc{host} will respond to this by showing the pairing GUI dialog.
+ \textsc{deivce} will sound an alarm to indicate an untrusted connection to the user.
+\item \textbf{Channel binding.} Both \textsc{device} and \textsc{host} calculate the \emph{handshake hash} as per noise
+ spec\cite{perrin01}. This hash uniquely identifies this session and depends on both local and remote ephemeral and
+ static keys $le, re, ls, rs$. Both parties encode a 64-bit part of this hash into a sequence of english words by
+ dictionary lookup. This sequence of words is called the \emph{fingerprint} of the connection.
+\item \textsc{host} prompts the user to enter the \emph{fingerprint} into a keyboard connected to \textsc{device}. The
+ user presses the physical pairing button on \textsc{device} to stop the alarm and start pairing. This step prevents
+ an attacker from being able to cause the device to send unencrypted input without user interaction by starting
+ pairing.
+\item As the user enters the \emph{fingerprint}, \textsc{device} relays any input over the yet-unauthenticated encrypted
+ noise channel to \textsc{host}. \textsc{host} displays the received user input in plain text in a regular input
+ field in the pairing GUI. This display is only for user convenience and not relevant to the cryptographic handshake.
+ A consequence of this is that a MITM could observe the \emph{fingerprint}\footnote{
+ A MITM could also modify the fingerprint information sent from \textsc{device} to \textsc{host}. This would be
+ very obvious to the user, since the fingerprint appearing on the \textsc{host} screen would differ from what she
+ types.
+ }. We show in section \ref{prot_ver} that this does not reduce the protocol's security.
+\item When the user has completed entering the fingerprint, the device checks the calculated fingerprint against the
+ entered data. If both match, the host is signalled \textsc{success} and \textsc{data} phase is entered. If they do
+ not match, the host is signalled \textsc{failure}\footnote{
+ Note that this means a MITM could intercept the \textsc{failure} message and forge a \textsc{success} message.
+ This means both are just for user convenience \emph{absent} an attacker. If an attacker is present, she will be
+ caught in the next pairing step.
+ } and \textsc{pairing} state is re-entered unless the maximum number of tries since powerup has been exceeded.
+ Failure is indicated to the user by \textsc{device} through a very annoying beep accompanied by angrily flashing
+ LEDs.
+\item \textbf{Data phase.} \textsc{host} asks the user for confirmation of pairing \emph{in case the device did not
+ sound an alarm} by pressing a button on the GUI. When the user does this, the host enters \textsc{data} state and
+ starts input passthrough.
+\end{enumerate}
+
+Roughly speaking, this protocol is secure given that the only way to MITM a (EC)DH key exchange is to perform two (EC)DH
+key exchanges with both parties, then relay messages. Since both parties have different static keys, the resulting two
+(EC)DH sessions will have different handshake hashes under the noise framework. The channel binding step reliably
+detects this condition through an out-of-band transmission of the \textsc{host} handshake hash to \textsc{device}.
+
+The only specialty here is that this OOB transmission is relayed back from \textsc{device} to \textsc{host} allowing the
+MITM to intercept it. This is only done for user convenience absent a MITM and the result is discarded by \textsc{host}.
+Since the handshake hash does as a hash does not leak any sensitive information about the keys used during the
+handshake, it being exposed does not impact protocol security.
+
+\subsection{Protocol verifictation}
+\label{prot_ver}
+\subsubsection{Noise security properties}
+\label{sec_prop}
+According to \textcite{perrin01} and proven by \textcite{kobeissi01} Noise's XX pattern provides strong forward-secrecy,
+sender and receiver authentication and key compromise impersonation resistance. Strong forward secrecy means an attacker
+can only decrypt messages by compromising the receivers private key and performing an active impersonation.
+
+Strong forward secrecy rules out both physical and protocol-level eavesdropping attacks by malicious USB devices and
+implies that an attacker can never decrypt past protocol sessions. An implication of the static key checks done on both
+sides of the connection is that an attacker would need to compromise both host and device in order to remain undetected
+for e.g. keylogging. Compromising only one party the worst that can be done is impersonating the SecureHID device to
+perform a classical HID attack. In this case, the attacker cannot read user input. The user would notice this by
+SecureHID indicating a not connected status and no input being accepted.
+% FIXME possibly detect this by having session counter etc.?
+
+To verify that these security properties extend to the overall SecureHID protocol it suffices to show the following
+three properties.
+\begin{enumerate}
+\item The SecureHID implementation of Noise XX adheres to the Noise specification, i.e. the handshake is performed
+ correctly. \label{adh0}
+\item Both sides' static keys are verified. \label{adh1}
+\item All sensitive data is encapsulated in Noise messages after the handshake has ended, and none is sent before.
+ \label{adh2}
+\end{enumerate}
+
+\ref{adh0} has been validated by manual code review and cross-validation of our implementation against other Noise
+implementations. % FIXME write more, do more here
+\ref{adh1} has been validated by manual code review. %FIXME do simulation here
+Since all sensitive data in our application is handled on the device in a single place (the USB HID request handling
+routine), \ref{adh2} is easily validated by code review. USB HID reports are only transmitted either encrypted after the
+handshake has been completed or in plain during pairing. Since the host will only inject reports into the input
+subsystem that have been properly authenticated and encrypted (and not the unauthenticated reports sent during pairing),
+the protocol is secure in this regard.
+% FIXME only start pairing after button press
+
+\subsubsection{Handshake hash non-secrecy}
+
+To analyze the impact of disclosing the handshake hash to an adversary we must consider it's definition. The noise
+protocol specification gives its definition, but does not % FIXME double-check this
+guarantee that it can be disclosed to an adversary without compromising security. Figure \ref{crypto_diagram} contains a
+flowchart of the derivation of both initiator-transmit and initiator-receive symmetric encryption keys $k_{1,2}$ and the
+handshake hash $h$ during the Noise handshake. The definitions of MixHash and MixKey according to the Noise protocol
+specification are as follows.
+
+\begin{align}
+ \text{MixHash}(h,\text{input}) &= h' = H(h || \text{input})\\
+ \text{MixKey}(ck, \text{input}) &= (ck', k_\text{temp}) = \text{HKDF}(ck, \text{input}, 2)\\
+\end{align}
+
+Noise's hash-based key derivation function (HKDF) is defined using the HMAC defined in RFC2104\cite{rfc2104}. The hash
+function $H$ employed here depends on the cipher spec used, in this work it is BLAKE2s.
+\begin{equation}
+ \text{HMAC}(K, \text{input}) = H\left(\left(K \oplus opad\right)
+ || H\left(\left(K \oplus ipad\right) || \text{input} \right)\right)
+\end{equation}
+
+The HKDF is defined for two and three outputs as follows.
+\begin{equation}
+ \text{HKDF}(ck, \text{input}, n_\text{out}) =
+ \left\{\begin{array}{ll}
+ (q_0, q_1) &: n_\text{out} = 2\\
+ (q_0, q_1, q_2) &: n_\text{out} = 3\\
+ \end{array}\right.
+\end{equation}
+
+The outputs $q_i$ are derived from chained HMAC invocations. First, a temporary key $t'$ is derived from the chaining key $ck$
+and the input data using the $HMAC$, then depending on $n_\text{out}$ the HMAC is chained twice or thrice to produce
+$q_{\{0,1,2\}}$.
+\begin{gather}
+ t' = \text{HMAC}(ck, \text{input})\\
+ \underbrace{\text{HMAC} \Bigl(t',
+ \underbrace{\text{HMAC} \bigl(t',
+ \underbrace{\text{HMAC} (t',
+ 1_{16})}_{q_0}
+ || 2_{16}\bigr)}_{q_1}
+ || 3_{16}\Bigr)}_{q_2}
+\end{gather}
+
+Figure \ref{crypto_diagram} shows the two properties relevant to this protocol implementation's security:
+\begin{enumerate}
+\item Initiator and responder ephemeral and static keys are all mixed into the handshake hash at least once.\label{fp1}
+\item Knowledge of the handshake hash does not yield any information on the symmetric AEAD keys $k_1$ and $k_2$.\label{fp2}
+\end{enumerate}
+
+\ref{fp1} is evident since $e_i$ and $e_r$ are mixed in directly and $s_i$ and $s_r$ are mixed in after encryption with
+temporary encryption keys derived from $ck$ at the $s\rightarrow$ and $s\leftarrow$ steps
+during the handshake.
+
+We can see \ref{fp2} applies by following the derivation of $h$ backwards. If an attacker learned anything about $k1$ or
+$k2$ during an attack by (also) observing $h$ that they did not learn before, we could construct an oracle allowing both
+reversal of $H$ in the final invocation of $MixHash$ and breaking $E$ using this attacker. The attacker would have to
+reverse $H$ at some point since $h = H(\hdots)$ in the final invocation of MixHash. The attacker would have to recover
+the key of $E$ in at least one invocation since $s_i$ and $s_r$ are only mixed into $h$ after either being encrypted
+using $E$ or being used after ECDH to generate a key for $E$. Since the result of ECDH on $e_i$ and $e_r$ is mixed into
+$h$ in the $ee\leftarrow$ and following DecryptAndHash steps, $h$ is blinded to an attacker so that they cannot even
+determine a given $k_1$ and $k_2$ match a given $h$ without compromising ECDH security.
+
+This means that given the underlying primitives are secure, we do not leak any information on $k1$ or $k2$ by disclosing
+$h$.
+
\begin{figure}[h!]
\centering
\tikzset{%
@@ -429,112 +585,44 @@ A working prototype has been completed.
\node[phaselbl, rectangle] at ($ (b3) !0.5! (b3 |- hout) $) (fin){fin};
\end{tikzpicture}
- \caption{Cryptographic flowchart of Noise XX handshake}
+ \caption{Cryptographic flowchart of Noise XX handshake.}
\label{crypto_diagram}
\end{figure}
-The basic protocol consists of two stages: \textsc{pairing} and \textsc{data}. When the device powers up, it enters
-\textsc{pairing} state. When the host enumerates a new device, it enters \textsc{pairing} state. If any fatal
-communication errors occur, both host and device re-enter \textsc{pairing} state. To make the implementation robust
-against host software crashing, devices being unplugged etc. without opening it up to attacks, the host can request the
-device to re-enter \textsc{pairing} state a limited number of times after powerup.
-
-\textsc{pairing} state consists of a number of substates as set by \textcite{perrin01}. The device runs noise's
-\textsc{XX} scheme, i.e. both host and device each contribute both one ephemeral key $e$ and one static key $s$ to the
-handshake, and the public halves of the static keys are transmitted during handshake encrypted by the emphemeral keys.
-
-The cryptographic primitives instantiated in the prototype are X25519 for the ECDH primitive, BLAKE2s as a hash and
-ChaCha20-Poly1305 as AEAD for the data phase. ECDH instead of traditional DH was chosen for its small key size and fast
-computation. Since no variant of RSA is used, key generation is fast. An ad-hoc prototype device-side random number
-generator has been implemented based on BLAKE2s and the STM32's internal hardware RNG.
-
-A successful protocol run always starts like this:
-\begin{enumerate}
-\item \textbf{Handshake.} \textsc{device} is connected to \textsc{host}
-\item \textsc{host} initiates pairing by sending \textsc{initiate handshake} to device
-\item \textsc{device} and \textsc{host} follow noise state machine for \textsc{XX} handshake
-\item After the handshake completes, both \textsc{device} and \textsc{host} have received each other's static public key
- $rs$ and established a shared secret connection key. At this point, the possibility of an MITM attacker having
- actively intercepted the handshake remains.
-\item \textbf{Channel binding.} Both \textsc{device} and \textsc{host} calculate the \emph{handshake hash} as per noise spec\cite{perrin01}. This
- hash uniquely identifies this session and depends on both local and remote ephemeral and static keys $le, re, ls,
- rs$. Both parties encode a 64-bit part of this hash into a sequence of english words by dictionary lookup. This
- sequence of words is called the \emph{fingerprint} of the connection.
-\item \textsc{host} prompts the user to enter the \emph{fingerprint} into a keyboard connected to \textsc{device}.
-\item As the user enters the \emph{fingerprint}, \textsc{device} relays any input over the yet-unauthenticated encrypted
- noise channel to \textsc{host}. \textsc{host} displays the received user input in plain text in a regular input
- field in the pairing GUI. This display is only for user convenience and not relevant to the cryptographic handshake.
- A consequence of this is that a MITM could observe the \emph{fingerprint}\footnote{
- A MITM could also modify the fingerprint information sent from \textsc{device} to \textsc{host}. This would be
- very obvious to the user, since the fingerprint appearing on the \textsc{host} screen would differ from what she
- types.
- }.
-\item When the user has completed entering the fingerprint, the device checks the calculated fingerprint against the
- entered data. If both match, the host is signalled \textsc{success} and \textsc{data} phase is entered. If they do
- not match, the host is signalled \textsc{failure}\footnote{
- Note that this means a MITM could intercept the \textsc{failure} message and forge a \textsc{success} message.
- This means both are just for user convenience \emph{absent} an attacker. If an attacker is present, she will be
- caught in the next pairing step.
- } and \textsc{pairing} state is re-entered unless the maximum number of tries since powerup has been exceeded.
- Failure is indicated to the user by \textsc{device} through a very annoying beep accompanied by angrily flashing
- LEDs.
-\item \textbf{Data phase.} \textsc{host} asks the user for confirmation of pairing \emph{in case the device did not sound an alarm} by
- pressing a button on the GUI. When the user does this, the host enters \textsc{data} state and starts input
- passthrough.
-\end{enumerate}
-
-Roughly speaking, this protocol is secure given that the only way to MITM a (EC)DH key exchange is to perform two (EC)DH
-key exchanges with both parties, then relay messages. Since both parties have different static keys, the resulting two
-(EC)DH sessions will have different handshake hashes under the noise framework. The channel binding step reliably
-detects this condition through an out-of-band transmission of the \textsc{host} handshake hash to \textsc{device}.
-
-The only specialty here is that this OOB transmission is relayed back from \textsc{device} to \textsc{host} allowing the
-MITM to intercept it. This is only done for user convenience absent a MITM and the result is discarded by \textsc{host}.
-Since the handshake hash does as a hash does not leak any sensitive information about the keys used during the
-handshake, it being exposed does not impact protocol security.
-
-\subsection{Protocol verifictation}
-According to \textcite{perrin01} and proven by \textcite{kobeissi01} Noise's XX pattern provides strong forward-secrecy,
-sender and receiver authentication and key compromise impersonation resistance. Strong forward secrecy means an attacker
-can only decrypt messages by compromising the receivers private key and performing an active impersonation.
-
-Strong forward secrecy rules out both physical and protocol-level eavesdropping attacks by malicious USB devices and
-implies that an attacker can never decrypt past protocol sessions. An implication of the static key checks done on both
-sides of the connection is that an attacker would need to compromise both host and device in order to remain undetected
-for e.g. keylogging. Compromising only one party the worst that can be done is impersonating the SecureHID device to
-perform a classical HID attack. In this case, the attacker cannot read user input. The user would notice this by
-SecureHID indicating a not connected status and no input being accepted.
-% FIXME possibly detect this by having session counter etc.?
-
-To verify that these security properties extend to the overall SecureHID protocol it suffices to show that the SecureHID
-implementation adheres to Noise XX, i.e. the handshake is correctly performed, both sides' static keys are verified and
-all data is encapsulated in Noise messages after the handshake has ended.
-
-\section{PCB design renderings}
-\label{ch:renderings}
-
-\begin{figure}[H]
- \centering
- \begin{subfigure}[b]{0.8\textwidth}
- \centering
- \includegraphics[width=0.8\textwidth]{pcb_front.png}
- \caption{PCB front}
- \end{subfigure} %
- \begin{subfigure}[b]{0.8\textwidth}
- \centering
- \includegraphics[width=0.8\textwidth]{pcb_back.png}
- \caption{PCB back}
- \end{subfigure}
- \caption{PCB design 3D renderings}
- \label{fig:pcb3d}
-\end{figure}
-
-\begin{figure}[H]
- \centering
- \includegraphics[width=0.6\textwidth]{takachi_case.png}
- \caption{Off-the-shelf enclosure the PCB is made to fit}
- \label{fig:case}
-\end{figure}
+\section{Hardware implementation}
+% FIXME
+
+\section{Evaluation}
+% FIXME
+
+\section{Conclusion}
+% FIXME
+
+%\section{PCB design renderings}
+%\label{ch:renderings}
+
+%\begin{figure}[H]
+% \centering
+% \begin{subfigure}[b]{0.8\textwidth}
+% \centering
+% \includegraphics[width=0.8\textwidth]{pcb_front.png}
+% \caption{PCB front}
+% \end{subfigure} %
+% \begin{subfigure}[b]{0.8\textwidth}
+% \centering
+% \includegraphics[width=0.8\textwidth]{pcb_back.png}
+% \caption{PCB back}
+% \end{subfigure}
+% \caption{PCB design 3D renderings}
+% \label{fig:pcb3d}
+%\end{figure}
+%
+%\begin{figure}[H]
+% \centering
+% \includegraphics[width=0.6\textwidth]{takachi_case.png}
+% \caption{Off-the-shelf enclosure the PCB is made to fit}
+% \label{fig:case}
+%\end{figure}
%\subsection{Attack surface in reasonably secure systems}
%\begin{figure}
@@ -556,4 +644,62 @@ all data is encapsulated in Noise messages after the handshake has ended.
\nocite{*}
\printbibliography
+\appendix
+\section{Project state}
+A working prototype has been completed.
+
+\subsection{Completed}
+\begin{itemize}
+ \item Rough protocol design
+ \item Protocol implementation based on \textcite{perrin01} using noise-c (microcontroller) and noiseprotocol (python/host)
+ \item SRAM-based key storage with SRAM wear levelling
+ \item host/device signature checking
+ \item host/device key generation
+ \item proper circuit design because I was bored last weekend (see appendix \ref{ch:renderings})
+\end{itemize}
+
+\subsection{Open issues}
+\begin{itemize}
+ \item Both noise-c and noiseprotocol have poor code and API quality. Since most noise functionality is not needed,
+ just implement the protocol in bare C/python based on cryptographic primitives and scrap higher-level protocol
+ implementations (though they've been useful so far during prototyping).
+ \item Implement HID mouse host support
+ \item Test USB hub support
+ \item Replace the serial link with a custom USB link using an STM32F103 instead of the CH340G USB/serial converter
+ \item Properly integrate prototype host client with qubes infrastructure
+ \item Implement photodiode/monitor-based pairing side-channel
+\end{itemize}
+
+\section{Possible directions}
+\begin{itemize}
+ \item Elaborate handshake security properties
+ \begin{itemize}
+ \item Possibly investigate other applications of this type of interactive handshake
+ \item Possibly contrast to carmera/other backchannel systems
+% \item IMHO the pairing scheme is the most interesting part of this project from a scientific point of view
+% \item Prove security
+ \end{itemize}
+ \item Elaborate overall security properties of QubesOS-based system
+ \item Elaborate possible DisplayPort/HDMI-based display encryption $\rightarrow$ Bunnie's NeTV2 w/ HDMI/eDP converter
+ \item Elaborate possible encrypted remote input (SSH) setups
+ \begin{itemize}
+ \item This might turn out to be really interesting
+ \item For this to be usable the host needs to tell the device at least which keyslot to use which could turn
+ out to be complex to implement securely
+ \item Considering complexity, this might turn into its own research project
+ \end{itemize}
+ \item Showcase secure hardware interface design, contrast with wireguard protocol design
+ \begin{itemize}
+ \item Formally derive handshake security properties
+ \item Formally derive host/device protocol security properties using noise spec
+ \item Formally verify and thouroughly unit-test the host/device protocol implementation on all layers
+ \item IMHO this is the most interesting part of this project from an engineering point of view
+ \end{itemize}
+% Waiting
+ \item Create custom hardware prototype
+ \item Benchmark cryptography routines (will likely turn out to be ``wayyy fast'' for HID, fast enough for full-speed
+ USB. High-speed cannot be done with the current architecture as we can't get data out the chip at high-speed
+ data rates. \textcite{srivaths01} raise the issue of running crypto on embedded systems, but in this case it
+ turns out with somewhat modern hardware and cryptography there is no problem at all.
+\end{itemize}
\end{document}