PKI Layer Cake: New Collision Attacks Against the Global X.509 Infrastructure

Reference: Dan Kaminsky, Meredith L. Patterson, and Len Sassaman (2009). Black Hat USA / IOActive technical report. Source file: 1299769.pdf. URL

Summary

Presents several new classes of attacks against the X.509 certificate infrastructure: MD2 preimage exploitation of VeriSign’s still-trusted root, PKCS#10 Subject Name confusion attacks exploiting inconsistent ASN.1 BER parsing between CAs and browsers (multiple CNs, OID leading-zero padding, integer overflow, early null terminators), SQL injection through PKCS#10 subject names, generic SSL client-authentication bypasses, and EV-certificate hijacking via mixed script content.

The paper is largely a case study in how ambiguity at the interface between components — in parsers, in semantics of fields like Common Name, in trust-store EKU handling — turns into exploitable security pathologies. It is of interest to agent-communication research as a cautionary tale about shared-format ambiguity between senders and receivers.

Key Ideas

  • ASN.1 BER is context-sensitive and handwritten parsers disagree subtly
  • Subject Name parsing varies across OpenSSL, NSS, CryptoAPI — attacker exploits the gap
  • MD2 preimage attack enables signature transfer to forged intermediate CA
  • “Sender-receiver parsing disagreement” as a general attack pattern
  • Postel’s robustness principle considered harmful for security-critical parsing

Connections

Conceptual Contribution

Tags

#security #pki #parsing #protocol-ambiguity

Backlinks