tion encrypted with them is secret, and the connection
is private.
But there are some attacks that we cannot con-
sider in Casper/FDR2. For instance, there are several
messages, such as ServerHelloDone and ChangeCi-
pherSpec, that are sent as clear text. A cryptanalyst
could easily detect these messages and, from that mo-
ment on, it could identify each encrypted message in
an SSL execution. We assume that an intruder can
not perform cryptanalysis so we do not include these
kinds of attacks in our analysis. This problem is de-
scribed in detail in (Wagner and Schneier, 1996).
Nevertheless, SSL v3.0 is compatible with SSL
v2.0, and, as we have seen above, this means that a
version rollback attack is possible, i.e., the intruder
may force both peers to use a weak security protocol,
and take advantage of the security “holes” we have
detected in SSL v2.0.
At this point, it is worth noting that we have fo-
cused on the verification of the SSL specification as
published in (Hickman, 1995; Freier et al., 1996).
In literature we may find several documented attacks
over SSL v3.0, but these attacks are performed over
real implementations of the protocol, not over the
SSL specification (Brumley and Boneh, 2003; Can-
vel et al., 2003).
Our future work is concerned with extending our
analysis of the SSL protocol to other security proto-
cols and e-commerce protocols. With respect to e-
commerce protocols, we are planning to deal with the
verification of the SET protocol.
REFERENCES
Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Com-
pagna, L., Cuellar, J., Hankes Drielsma, P., He´am,
P.-C., Mantovani, J., M¨odersheim, S., von Oheimb,
D., Rusinowitch, M., Santiago, J., Turuani, M., Vi-
gan`o, L., and Vigneron, L. (2005). The AVISPA Tool
for the Automated Validation of Internet Security Pro-
tocols and Applications. In Etessami, K. and Raja-
mani, S. K., editors, Proceedings of the 17th Inter-
national Conference on Computer Aided Verification
(CAV’05), volume 3576 of LNCS. Springer.
Blanchet, B., Abadi, M., and Fournet, C. (2005). Auto-
mated Verification of Selected Equivalences for Se-
curity Protocols. In 20th IEEE Symposium on Logic
in Computer Science (LICS 2005), pages 331–340,
Chicago, IL. IEEE Computer Society.
Bodei, C., Buchholtz, M., Degano, P., Nielson, F., and Niel-
son, H. R. (2003). Automatic validation of protocol
narration. In Proceedings of the 16th Computer Secu-
rity Foundations Workshop (CSFW 03)., pages 126–
140. IEEE Computer Society Press.
Brumley, D. and Boneh, D. (2003). Remote Timing Attacks
Are Practical. In Proc. of 12th USENIX Security Sym-
posium, pages 1–14. USENIX Press.
Canvel, B., Hiltgen, A., Vaudenay, S., and Vuagnoux, M.
(2003). Password Interception in a SSL/TLS Chan-
nel. In Proc. of Advances in Cryptology (CRYPT’03),
LNCS 2729, pages 583–599. Springer.
Clarke, E. M., Grumberg, O., and Peled, D. A. (1999).
Model Checking. The MIT Press.
Dierks, T. and Allen, C. (1999). The TLS Protocol Version
1.0. Internet Standards, RFC 2246.
http://www.ietf.org/rfc/rfc2222.txt
.
Dill, D. L. (1996). The Murφ Verification System. In Proc.
of 8th International Conference on Computer Aided
Verification (CAV’96), LNCS 1102, pages 390–393.
Springer.
Freier, O. A., Karlton, P., and Kocher, P. C. (1996). The SSL
Protocol Version 3.0. Netscape Communications.
http://wp.netscape.com/eng/ssl3/
ssl-toc.html
.
Hickman, K. E. B. (1995). SSL 2.0 Protocol Specification.
Netscape Communications.
http://wp.netscape.com/eng/security/
SSL_2.htm
.
Lowe, G. (1998). Casper: A Compiler for the Analysis
of Security Protocols. Journal of Computer Security,
6:53–84.
Mitchell, J. C., Mitchell, M., and Stern, U. (1997). Au-
tomated analysis of cryptographic protocols using
Murφ. In Proc. of IEEE Symposium on Security
and Privacy, pages 141–151. IEEE Computer Society
Press.
Mitchell, J. C., Shmatikov, V., and Stern, U. (1998). Finite-
State Analysis of SSL 3.0. In Proc. of 7th USENIX
Security Symposium, pages 201–216. USENIX Press.
Wagner, D. and Schneier, B. (1996). Analysis of the SSL
3.0 Protocol. In Proc. of 2nd USENIX Workshop on
Electronic Commerce, pages 29–40. USENIX Press.
ICEIS 2008 - International Conference on Enterprise Information Systems
252