Files
rosenpass/papers/whitepaper.md
2023-11-19 11:30:12 +05:30

27 KiB
Raw Blame History

template, title, author, abstract
template title author abstract
rosenpass Rosenpass
Karolin Varner = Independent Researcher
Benjamin Lipp = Max Planck Institute for Security and Privacy (MPI-SP)
Wanja Zaeske
Lisa Schmidt = {Scientific Illustrator \url{mullana.de}}
Rosenpass is used to create post-quantum-secure VPNs. Rosenpass computes a shared key, WireGuard (WG) [@wg] uses the shared key to establish a secure connection. Rosenpass can also be used without WireGuard, deriving post-quantum-secure symmetric keys for another application. The Rosenpass protocol builds on “Post-quantum WireGuard” (PQWG) [@pqwg] and improves it by using a cookie mechanism to provide security against state disruption attacks. The WireGuard implementation enjoys great trust from the cryptography community and has excellent performance characteristics. To preserve these features, the Rosenpass application runs side-by-side with WireGuard and supplies a new post-quantum-secure pre-shared key (PSK) every two minutes. WireGuard itself still performs the pre-quantum-secure key exchange and transfers any transport data with no involvement from Rosenpass at all. The Rosenpass project consists of a protocol description, an implementation written in Rust, and a symbolic analysis of the protocols security using ProVerif [@proverif]. We are working on a cryptographic security proof using CryptoVerif [@cryptoverif]. This document is a guide for engineers and researchers implementing the protocol; a scientific paper discussing the security properties of Rosenpass is work in progress.

\enlargethispage{5mm} \setupimage{label=img:KeyExchangeProt,width=.9\linewidth} Rosenpass Key Exchange Protocol

\setupimage{label=img:MessageTypes} Rosenpass Message Types

\clearpage

\addtocontents{toc}{\string\setcounter{tocdepth}{\string\sectionnumdepth}} \setcounter{secnumdepth}{\sectionnumdepth}

Security

Rosenpass inherits most security properties from Post-Quantum WireGuard (PQWG). The security properties mentioned here are covered by the symbolic analysis in the Rosenpass repository.

Secrecy

Three key encapsulations using the keypairs sski/spki, sskr/spkr, and eski/epki provide secrecy (see Section \ref{variables} for an introduction of the variables). Their respective ciphertexts are called scti, sctr, and ectr and the resulting keys are called spti, sptr, epti. A single secure encapsulation is sufficient to provide secrecy. We use two different KEMs (Key Encapsulation Mechanisms; see section \ref{skem}): Kyber and Classic McEliece.

Authenticity

The key encapsulation using the keypair sskr/spkr authenticates the responder from the perspective of the initiator. The KEM encapsulation sski/spki authenticates the initiator from the perspective of the responder. Authenticity is based on the security of Classic McEliece alone.

Secrecy and Authenticity based on a Pre-Shared Symmetric Key

We allow the use of a pre-shared key (psk) as protocol input. Even if all asymmetric security primitives turn out to be insecure, providing a secure psk will have Rosenpass authenticate both peers, and output a secure shared key.

Forward Secrecy

Forward secrecy refers to secrecy of past sessions in case all static keys are leaked. Imagine an attacker recording the network messages sent between two devices, developing an interest in some particular exchange, and stealing both computers in an attempt to decrypt that conversation. By stealing the hardware, the attacker gains access to sski, sskr, and the symmetric secret psk. Since the ephemeral keypair eski/epki is generated on the fly and deleted after the execution of the protocol, it cannot be recovered by stealing the devices, and thus, Rosenpass provides forward secrecy. Forward secrecy relies on the security of Kyber and on proper zeroization, i.e., the implementation must erase all temporary variables.

Security against State Disruption Attacks

Both WG and PQWG are vulnerable to state disruption attacks; they rely on a timestamp to protect against replay of the first protocol message. An attacker who can tamper with the local time of the protocol initiator can inhibit future handshakes [@statedis], rendering the initiators static keypair practically useless. Due to the use of the insecure NTP protocol, real-world deployments are vulnerable to this attack [@statedis_cve]. Lacking a reliable way to detect retransmission, we remove the replay protection mechanism and store the responder state in an encrypted cookie called “the biscuit” instead. Since the responder does not store any session-dependent state until the initiator is interactively authenticated, there is no state to disrupt in an attack.

Note that while Rosenpass is secure against state disruption, using it does not protect WireGuard against the attack. Therefore, the hybrid Rosenpass/WireGuard setup recommended for deployment is still vulnerable.

\addtocontents{toc}{\string\setcounter{tocdepth}{\string\subsectionnumdepth}} \setcounter{secnumdepth}{\subsubsectionnumdepth}

Protocol Description

Cryptographic Building Blocks

All symmetric keys and hash values used in Rosenpass are 32 bytes long.

Hash

A keyed hash function with one 32-byte input, one variable-size input, and one 32-byte output. As keyed hash function we use the HMAC construction [@rfc_hmac] with BLAKE2s [@rfc_blake2] as the inner hash function.

hash(key, data) -> key

AEAD

Authenticated encryption with additional data for use with sequential nonces. We use ChaCha20Poly1305 [@rfc_chachapoly] in the implementation.

AEAD::enc(key, nonce, plaintext, additional_data) -> ciphertext
AEAD::dec(key, nonce, ciphertext, additional_data) -> plaintext

XAEAD

Authenticated encryption with additional data for use with random nonces. We use XChaCha20Poly1305 [@draft_xchachapoly] in the implementation, a construction also used by WireGuard.

XAEAD::enc(key, nonce, plaintext, additional_data) -> ciphertext
XAEAD::dec(key, nonce, ciphertext, additional_data) -> plaintext

SKEM

“Key Encapsulation Mechanism” (KEM) is the name of an interface widely used in post-quantum-secure protocols. KEMs can be seen as asymmetric encryption specifically for symmetric keys. Rosenpass uses two different KEMs. SKEM is the key encapsulation mechanism used with the static keypairs in Rosenpass. The public keys of these keypairs are not transmitted over the wire during the protocol. We use Classic McEliece 460896 [@mceliece] which claims to be as hard to break as 192-bit AES. As one of the oldest post-quantum-secure KEMs, it enjoys wide trust among cryptographers, but it has not been chosen for standardization by NIST. Its ciphertexts and private keys are small (188 bytes and 13568 bytes), and its public keys are large (524160 bytes). This fits our use case: public keys are exchanged out-of-band, and only the small ciphertexts have to be transmitted during the handshake.

SKEM::enc(public_key) -> (ciphertext, shared_key)
SKEM::dec(secret_key, ciphertext) -> shared_key

EKEM

Key encapsulation mechanism used with the ephemeral KEM keypairs in Rosenpass. The public keys of these keypairs need to be transmitted over the wire during the protocol. We use Kyber-512 [@kyber], which has been selected in the NIST post-quantum cryptography competition and claims to be as hard to break as 128-bit AES. Its ciphertexts, public keys, and private keys are 768, 800, and 1632 bytes long, respectively, providing a good balance for our use case as both a public key and a ciphertext have to be transmitted during the handshake.

EKEM::enc(public_key) -> (ciphertext, shared_key)
EKEM::dec(secret_key, ciphertext) -> shared_key

Using a combination of two KEMs Classic McEliece for static keys and Kyber for ephemeral keys results in large static public keys, but allows us to fit all network messages into a single IPv6 frame.

Rosenpass uses libsodium [@libsodium] as cryptographic backend for hash, AEAD, and XAEAD, and liboqs [@liboqs] for the post-quantum-secure KEMs.

Variables

KEM Keypairs and Ciphertexts

Rosenpass uses multiple keypairs, ciphertexts, and plaintexts for key encapsulation: a static keypair for each peer, and an ephemeral keypair on the initiator's side. We use a common naming scheme to refer to these variables:

\begin{namepartpicture} \namepart{s=Static,e=Ephemeral} \namepart[3.5cm]{sk=Secret Key,pk=Public Key,pt=Plaintext,ct=Ciphertext} \namepart[7cm]{i=Initiator,r=Responder,m=Mine,t=Theirs} \begin{scope}[decoration={brace,amplitude=5mm},thick] \namebraceright{s}{e} \namebraceleft{sk}{ct} \namebraceright{sk}{ct} \namebraceleft{i}{t} \end{scope} \end{namepartpicture}

These values use a naming scheme consisting of four lower-case characters. The first character indicates whether the key is static s or ephemeral e. The second character is an s or a p for secret or public. The third character is always a k. The fourth and final character is an i, r, m, or t, for initiator, responder, mine, or theirs. The initiator's static public key for instance is spki. During execution of the protocol, three KEM ciphertexts are produced: scti, sctr, and ecti.

Besides the initiator and responder roles, we define the roles mine and theirs (m/t). These are sometimes used in the code when the assignment to initiator or responder roles is flexible. As an example, “this server's” static secret key is sskm, and the peer's public key is spkt.

IDs

Rosenpass uses two types of ID variables. See Figure \ref{img:HashingTree} for how the IDs are calculated.

\begin{namepartpicture} \namepart{sid=Session ID, pid=Peer ID} \namepart[3.5cm]{i=Initiator,r=Responder,m=Mine,t=Theirs} \begin{scope}[decoration={brace,amplitude=5mm},thick] \namebraceright{sid}{pid} \namebraceleft{i}{t} \end{scope} \end{namepartpicture}

The first lower-case character indicates whether the variable is a session ID (sid) or a peer ID (pid). The final character indicates the role using the characters i, r, m, or t, for initiator, responder, mine, or theirs respectively.

Symmetric Keys

Rosenpass uses two symmetric key variables psk and osk in its interface, and maintains the entire handshake state in a variable called the chaining key.

  • psk: A pre-shared key that can be optionally supplied as input to Rosenpass.
  • osk: The output shared key, generated by Rosenpass and supplied to WireGuard for use as its pre-shared key.
  • ck: The chaining key.

We mix all key material (e.g. psk) into the chaining key, and derive symmetric keys such as osk from it. We authenticate public values by mixing them into the chaining key; in particular, we include the entire protocol transcript in the chaining key, i.e., all values transmitted over the network.

Hashes

Rosenpass uses a cryptographic hash function for multiple purposes:

  • Computing the message authentication code in the message envelope as in WireGuard
  • Computing the cookie to guard against denial of service attacks. This is a feature adopted from WireGuard, but not yet included in the implementation of Rosenpass.
  • Computing the peer ID
  • Key derivation during and after the handshake
  • Computing the additional data for the biscuit encryption, to provide some privacy for its contents

Using one hash function for multiple purposes can cause real-world security issues and even key recovery attacks [@oraclecloning]. We choose a tree-based domain separation scheme based on a keyed hash function the previously introduced primitive hash to make sure all our hash function calls can be seen as distinct.

\setupimage{landscape,fullpage,label=img:HashingTree} Rosenpass Hashing Tree

Each tree node \circ{} in Figure 3 represents the application of the keyed hash function, using the previous chaining key value as first parameter. The root of the tree is the zero key. In level one, the PROTOCOL identifier is applied to the zero key to generate a label unique across cryptographic protocols (unless the same label is deliberately used elsewhere). In level two, purpose identifiers are applied to the protocol label to generate labels to use with each separate hash function application within the Rosenpass protocol. The following layers contain the inputs used in each separate usage of the hash function: Beneath the identifiers "mac", "cookie", "peer id", and "biscuit additional data" are hash functions or message authentication codes with a small number of inputs. The second, third, and fourth column in Figure 3 cover the long sequential branch beneath the identifier "chaining key init" representing the entire protocol execution, one column for each message processed during the handshake. The leaves beneath "chaining key extract" in the left column represent pseudo-random labels for use when extracting values from the chaining key during the protocol execution. These values such as mix > appear as outputs in the left column, and then as inputs < mix in the other three columns.

The protocol identifier is defined as follows:

PROTOCOL = "rosenpass 1 rosenpass.eu aead=chachapoly1305 hash=blake2s ekem=kyber512 skem=mceliece460896 xaead=xchachapoly1305"

Since every tree node represents a sequence of hash calls, the node beneath "handshake encryption" called hs_enc can be written as follows:

hs_enc = hash(hash(hash(0, PROTOCOL), "chaining key extract"), "handshake encryption")

First, the protocol identifier PROTOCOL is applied, then the purpose identifier "chaining key extract" is applied to the protocol label, and finally "handshake encryption" is applied to the purpose label.

To simplify notation of these long nested calls to hash, we allow use of the hash function with variadic parameters and introduce the shorthand lhash to wrap the usage of the hash(0, PROTOCOL) value:

hash(a, b, c…) = hash(hash(a, b), c…)
lhash(a…) = hash(hash(0, PROTOCOL), a…)

The notation x… denotes expansion of one or more parameters. This gives us two alternative ways to denote the value of the hs_enc node:

hs_enc = hash(hash(hash(0, PROTOCOL), "chaining key extract"), "handshake encryption")
       = hash(0, PROTOCOL, "chaining key extract", "handshake encryption")
       = lhash("chaining key extract", "handshake encryption")

Server State

Global

The server needs to store the following variables:

  • sskm
  • spkm
  • biscuit_key Randomly chosen key used to encrypt biscuits
  • biscuit_ctr Retransmission protection for biscuits

Not mandated per se, but required in practice:

  • peers A lookup table mapping the peer ID to the internal peer structure
  • index A lookup table mapping the session ID to the ongoing initiator handshake or live session

Peer

For each peer, the server stores:

  • psk The pre-shared key used with the peer
  • spkt The peer's public key
  • biscuit_used The biscuit_no from the last biscuit accepted for the peer as part of InitConf processing

Handshake State and Biscuits

The initiator stores the following local state for each ongoing handshake:

  • A reference to the peer structure
  • A state indicator to keep track of the next message expected from the responder
  • sidi Initiator session ID
  • sidr Responder session ID
  • ck The chaining key
  • eski The initiator's ephemeral secret key
  • epki The initiator's ephemeral public key

The responder stores no state. While the responder has access to all of the above variables except for eski, the responder discards them after generating the RespHello message. Instead, the responder state is contained inside a cookie called a biscuit. This value is returned to the responder inside the InitConf packet. The biscuit consists of:

  • pidi The initiator's peer ID
  • biscuit_no The biscuit number, derived from the server's biscuit_ctr; used for retransmission detection of biscuits
  • ck The chaining key

The biscuit is encrypted with the XAEAD primitive and a randomly chosen nonce. The values sidi and sidr are transmitted publicly as part of InitConf, so they do not need to be present in the biscuit, but they are added to the biscuit's additional data to make sure the correct values are transmitted as part of InitConf.

The biscuit_key used to encrypt biscuits should be rotated every two minutes. Implementations should keep two biscuit keys in memory at any given time to avoid having to drop packages when biscuit_key is rotated.

Live Session State

  • ck The chaining key
  • sidm Our session ID (“mine”)
  • txkm Our transmission key
  • txnm Our transmission nonce
  • sidt Peer's session ID (“theirs”)
  • txkt Peer's transmission key
  • txnt Peer's transmission nonce

Helper Functions

Given the peer ID, look up the peer and load the peer's variables.

fn lookup_peer(pid);

Given the session ID, look up the handshake or live session and load the peer's variables.

fn lookup_session(sid);

The protocol framework used by Rosenpass allows arbitrarily many different keys to be extracted using labels for each key. The extract_key function is used to derive protocol-internal keys, its labels are under the “chaining key extract” node in Figure \ref{img:HashingTree}. The export key function is used to export application keys.

Third-party applications using the protocol are supposed to choose a unique label (e.g., their domain name) and use that as their own namespace for custom labels. The Rosenpass project itself uses the “rosenpass.eu” namespace.

Applications can cache or statically compile the pseudo-random label values into their binary to improve performance.

fn extract_key(l…) {
    hash(ck, lhash("chaining key extract", l…))
}

fn export_key(l…) {
    extract_key("user", l…)
}

A helper function is used to mix secrets and public values into the handshake state. A variadic variant can be used as a short hand for multiple calls mix(a, b, c) = mix(a); mix(b); mix(c).

fn mix(d) {
    ck ← hash(extract_key("mix"), d)
}

fn mix(d, rest…) {
    mix(d)
    mix(rest…)
}

A helper function provides encrypted transmission of data based on the current chaining key during the handshake. The function is also used to create an authentication tag to certify that both peers share the same chaining key value.

fn encrypt_and_mix(pt) {
    let k = extract_key("handshake encryption");
    let n = 0;
    let ad = empty();
    let ct = AEAD::enc(k, n, pt, ad)
    mix(ct);
    ct
}

fn decrypt_and_mix(ct) {
    let k = extract_key("handshake encryption");
    let n = 0;
    let ad = empty();
    let pt = AEAD::dec(k, n, ct, ad)
    mix(ct);
    pt
}

Rosenpass is built with KEMs, not with NIKEs (Diffie-Hellman-style operations); the encaps/decaps helpers can be used both with the SKEM as well as with the EKEM.

fn encaps_and_mix<T: KEM>(pk) {
    let (ct, shk) = T::enc(pk);
    mix(pk, ct, shk);
    ct
}

fn decaps_and_mix<T: KEM>(sk, pk, ct) {
    let shk = T::dec(sk, ct);
    mix(pk, ct, shk);
}

The biscuit store/load functions have to deal with the biscuit_ctr\slashbiscuit_used\slashbiscuit_no variables as a means to enable replay protection for biscuits. The peer ID pidi is added to the biscuit and used while loading the biscuit to find the peer data. The values sidi and sidr are added to the additional data to make sure they are not tampered with. \enlargethispage{.5\baselineskip}

fn store_biscuit() {
    biscuit_ctr ← biscuit_ctr + 1;

    let k = biscuit_key;
    let n = random_nonce();
    let pt = Biscuit {
      pidi: lhash("peer id", spki),
      biscuit_no: biscuit_ctr,
      ck: ck,
    };
    let ad = lhash(
      "biscuit additional data",
      spkr, sidi, sidr);
    let ct = XAEAD::enc(k, n, pt, ad);
    let nct = concat(n, ct);

    mix(nct)
    nct
}

Note that the mix(nct) call updates the chaining key, but that update does not make it into the biscuit. Therefore, mix(nct) is reapplied in load_biscuit. The responder handshake code also needs to reapply any other operations modifying ck after calling store_biscuit. The handshake code on the initiator's side also needs to call mix(nct).

fn load_biscuit(nct) {
    // Decrypt the biscuit
    let k = biscuit_key;
    let (n, ct) = nct;
    let ad = lhash(
      "biscuit additional data",
      spkr, sidi, sidr);
    let pt : Biscuit = XAEAD::dec(k, n, ct, ad);
    // Find the peer and apply retransmission protection
    lookup_peer(pt.peerid);
    assert(pt.biscuit_no <= peer.biscuit_used);

    // Restore the chaining key
    ck ← pt.ck;
    mix(nct);

    // Expose the biscuit no,
    // so the handshake code can differentiate
    // retransmission requests and first time handshake completion
    pt.biscuit_no
}

Entering the live session is very simple in Rosenpass we just use extract_key with dedicated identifiers to derive initiator and responder keys.

fn enter_live() {
    txki ← extract_key("initiator payload encryption");
    txkr ← extract_key("responder payload encryption");
    txnm ← 0;
    txnt ← 0;
}

Message Encoding and Decoding

The steps to actually execute the handshake are given in Figure \ref{img:HandlingCode}. This figure contains the initiator code and the responder code; instructions corresponding to each other are shown side by side. We use the following numbering scheme for instructions:

\begin{namepartpicture} \namepart{IH=InitHello,RH=RespHello,IC=InitConf} \namepart[3.5cm]{I=Initiator,R=Responder} \SingleNamePart[7cm]{N}{[0-9]}{Number} \begin{scope}[decoration={brace,amplitude=5mm},thick] \namebraceright{IH}{IC} \namebraceleft{I}{R} \namebraceright{I}{R} \draw[decorate,decoration={amplitude=3mm}]([xshift=-7mm]N.south west)--([xshift=-7mm]N.north west) ; \end{scope} \end{namepartpicture}

All steps have side effects (as specified in the function definitions). In general, they perform some cryptographic operation and mix the parameters and the result into the chaining key.

The responder code handling InitConf needs to deal with the biscuits and package retransmission. Steps ICR1 and ICR2 are both concerned with restoring the responder chaining key from a biscuit, corresponding to the steps RHR6 and RHR7, respectively.

ICR5 and ICR6 perform biscuit replay protection using the biscuit number. This is not handled in load_biscuit() itself because there is the case that biscuit_no = biscuit_used which needs to be dealt with for retransmission handling.

Denial of Service Mitigation and Cookies

Rosenpass derives its cookie-based DoS mitigation technique from Wireguard [INSERT REFERENCE HERE]. When the client is under load, it may choose to not process further handshake messages, but instead to respond with a cookie reply message (see Fig. 2- Rosenpass Message Types).

The sender of the exchange then uses this cookie in order to resend the message and have it accepted the following time by the reciever.

The cookie reply message consists of the sid of the client under load, a random 24-byte bitstring nonce and an encrypted cookie reply field which consists of the following (from the perspective of the cookie reply sender):

tau = lhash("cookie-tau",r_m, a_m)[0..16]
cookie = XAEAD(lhash("cookie-key", spkm), nonce, tau , mac_peer)

where r_m is a secret variable that changes every two minutes to a random value. a_m is a concatenation of the source IP address and UDP source port of the client's peer. mac_peer is the mac field of the peer's handshake message to which this is the reply.

Envelope mac Field

Similar to mac.1 in Wireguard handshake messages, the mac field of a Rosenpass envelope from a handshake packet sender's point of view consists of the following:

mac = lhash("mac", spkt, MAC_WIRE_DATA)

where MAC_WIRE_DATA represents all bytes of msg prior to mac field in the envelope.

If a client receives an invalid mac value for any message, it will discard the message.

The cookie content sent in the cookie reply message is used by the sender derive a cookie field in the sender's message envelope to retransmit the handshake message. This is the equivalent of Wireguard's mac.2 field and is determined as follows:


if (is_zero_length_bitstring(last_recvd_cookie)  ||  last_cookie_time_ellapsed >= 120) {
    cookie = 0^16; //zeroed out 16 bytes bitstring
}
else {
    cookie = lhash("cookie",last_recvd_cookie,COOKIE_WIRE_DATA)
}

where last_recvd_cookie is the last received cookie field from a cookie reply message by a hanshake message sender, last_cookie_time_ellapsed is the amount of time in seconds ellapsed since last cookie was received, and COOKIE_WIRE_DATA are the message contents of all bytes of this message prior to the cookie field.

The sender can use an invalid value for the cookie value, when the receiver is not under load, and the receiver must ignore this value. However, when the receiver is under load, it may reject messages with the invalid cookie value, and issue a cookie reply message.

Conditions to trigger DoS Mechanism

Rosenpass implementations are expected to detect conditions in which they are under computational load to trigger the cookie based DoS mitigation mechanism by replying with a cookie reply message.

For the reference implemenation,

TDB- add mechanism

Dealing with Packet Loss

The initiator deals with packet loss by storing the messages it sends to the responder and retransmitting them in randomized, exponentially increasing intervals until they get a response. Receiving RespHello terminates retransmission of InitHello. A Data or EmptyData message serves as acknowledgement of receiving InitConf and terminates its retransmission.

The responder does not need to do anything special to handle RespHello retransmission if the RespHello package is lost, the initiator retransmits InitHello and the responder can generate another RespHello package from that. InitConf retransmission needs to be handled specifically in the responder code because accepting an InitConf retransmission would reset the live session including the nonce counter, which would cause nonce reuse. Implementations must detect the case that biscuit_no = biscuit_used in ICR5, skip execution of ICR6 and ICR7, and just transmit another EmptyData package to confirm that the initiator can stop transmitting InitConf.

When a peer is under load, a handshake message (be it from the initiator and the responder) may be discarded and a cookie reply message sent.

Initiator

On reciept of the cookie reply message, which will enable the peer to send a retransmitted InitHello or InitConf message with a valid cookie value that will not be discarded, the peer will resend the message as per retransmission logic listed above.

Responder

On a reciept of a cookie reply message, the responder should wait for a retranmission of InitHello or InitConf messages and respond with the above retranmission logic with the cookie value appended.

\printbibliography

\setupimage{landscape,fullpage,label=img:HandlingCode} Rosenpass Message Handling Code