Affordable Access

Analysis of DTLS Implementations Using Protocol State Fuzzing

Authors
  • Fiterau-Brostean, Paul
  • Jonsson, Bengt
  • Merget, Robert
  • de Ruiter, Joeri
  • Sagonas, Konstantinos
  • Somorovsky, Juraj
Publication Date
Jan 01, 2020
Source
DiVA - Academic Archive On-line
Keywords
Language
English
License
Green
External links

Abstract

Recent years have witnessed an increasing number of protocols relying on UDP. Compared to TCP, UDP offers performance advantages such as simplicity and lower latency. This has motivated its adoption in Voice over IP, tunneling technologies, IoT, and novel Web protocols. To protect sensitive data exchange in these scenarios, the DTLS protocol has been developed as a cryptographic variation of TLS. DTLS’s main challenge is to support the stateless and unreliable transport of UDP. This has forced protocol designers to make choices that affect the complexity of DTLS, and to incorporate features that need not be addressed in the numerous TLS analyses. We present the first comprehensive analysis of DTLS implementations using protocol state fuzzing. To that end, we extend TLS-Attacker, an open source framework for analyzing TLS implementations, with support for DTLS tailored to the stateless and unreliable nature of the underlying UDP layer. We build a framework for applying protocol state fuzzing on DTLS servers, and use it to learn state machine models for thirteen DTLS implementations. Analysis of the learned state models reveals four serious security vulnerabilities, including a full client authentication bypass in the latest JSSE version, as well as several functional bugs and non-conformance issues. It also uncovers considerable differences between the models, confirming the complexity of DTLS state machines. / aSSIsT

Report this publication

Statistics

Seen <100 times