Home > Research > Publications & Outputs > An In-Depth Symbolic Security Analysis of the A...

Links

Text available via DOI:

View graph of relations

An In-Depth Symbolic Security Analysis of the ACME Standard

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

An In-Depth Symbolic Security Analysis of the ACME Standard. / Bhargavan, Karthikeyan; Bichhawat, Abhishek; Do, Quoc Huy et al.
CCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2021. p. 2601-2617.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Bhargavan, K, Bichhawat, A, Do, QH, Hosseyni, P, Küsters, R, Schmitz, G & Würtele, T 2021, An In-Depth Symbolic Security Analysis of the ACME Standard. in CCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. ACM, New York, pp. 2601-2617. https://doi.org/10.1145/3460120.3484588

APA

Bhargavan, K., Bichhawat, A., Do, Q. H., Hosseyni, P., Küsters, R., Schmitz, G., & Würtele, T. (2021). An In-Depth Symbolic Security Analysis of the ACME Standard. In CCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (pp. 2601-2617). ACM. https://doi.org/10.1145/3460120.3484588

Vancouver

Bhargavan K, Bichhawat A, Do QH, Hosseyni P, Küsters R, Schmitz G et al. An In-Depth Symbolic Security Analysis of the ACME Standard. In CCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM. 2021. p. 2601-2617 doi: 10.1145/3460120.3484588

Author

Bhargavan, Karthikeyan ; Bichhawat, Abhishek ; Do, Quoc Huy et al. / An In-Depth Symbolic Security Analysis of the ACME Standard. CCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. New York : ACM, 2021. pp. 2601-2617

Bibtex

@inproceedings{0bde1cbdb102462e943b8de63e9aeab5,
title = "An In-Depth Symbolic Security Analysis of the ACME Standard",
abstract = "The ACME certificate issuance and management protocol, standardized as IETF RFC 8555, is an essential element of the web public key infrastructure (PKI). It has been used by Let's Encrypt and other certification authorities to issue over a billion certificates, and a majority of HTTPS connections are now secured with certificates issued through ACME. Despite its importance, however, the security of ACME has not been studied at the same level of depth as other protocol standards like TLS 1.3 or OAuth. Prior formal analyses of ACME only considered the cryptographic core of early draft versions of ACME, ignoring many security-critical low-level details that play a major role in the 100 page RFC, such as recursive data structures, long-running sessions with asynchronous sub-protocols, and the issuance for certificates that cover multiple domains. We present the first in-depth formal security analysis of the ACME standard. Our model of ACME is executable and comprehensive, with a level of detail that lets our ACME client interoperate with other ACME servers. We prove the security of this model using a recent symbolic protocol analysis framework called DYg, which in turn is based on the Fg programming language. Our analysis accounts for all prior attacks on ACME in the literature, including both cryptographic attacks and low-level attacks on stateful protocol execution. To analyze ACME, we extend DYĝ with authenticated channels, key substitution attacks, and a concrete execution framework, which are of independent interest. Our security analysis of ACME totaling over 16,000 lines of code is one of the largest proof developments for a cryptographic protocol standard in the literature, and it serves to provide formal security assurances for a crucial component of web security.",
author = "Karthikeyan Bhargavan and Abhishek Bichhawat and Do, {Quoc Huy} and Pedram Hosseyni and Ralf K{\"u}sters and Guido Schmitz and Tim W{\"u}rtele",
year = "2021",
month = nov,
day = "13",
doi = "10.1145/3460120.3484588",
language = "English",
pages = "2601--2617",
booktitle = "CCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security",
publisher = "ACM",

}

RIS

TY - GEN

T1 - An In-Depth Symbolic Security Analysis of the ACME Standard

AU - Bhargavan, Karthikeyan

AU - Bichhawat, Abhishek

AU - Do, Quoc Huy

AU - Hosseyni, Pedram

AU - Küsters, Ralf

AU - Schmitz, Guido

AU - Würtele, Tim

PY - 2021/11/13

Y1 - 2021/11/13

N2 - The ACME certificate issuance and management protocol, standardized as IETF RFC 8555, is an essential element of the web public key infrastructure (PKI). It has been used by Let's Encrypt and other certification authorities to issue over a billion certificates, and a majority of HTTPS connections are now secured with certificates issued through ACME. Despite its importance, however, the security of ACME has not been studied at the same level of depth as other protocol standards like TLS 1.3 or OAuth. Prior formal analyses of ACME only considered the cryptographic core of early draft versions of ACME, ignoring many security-critical low-level details that play a major role in the 100 page RFC, such as recursive data structures, long-running sessions with asynchronous sub-protocols, and the issuance for certificates that cover multiple domains. We present the first in-depth formal security analysis of the ACME standard. Our model of ACME is executable and comprehensive, with a level of detail that lets our ACME client interoperate with other ACME servers. We prove the security of this model using a recent symbolic protocol analysis framework called DYg, which in turn is based on the Fg programming language. Our analysis accounts for all prior attacks on ACME in the literature, including both cryptographic attacks and low-level attacks on stateful protocol execution. To analyze ACME, we extend DYĝ with authenticated channels, key substitution attacks, and a concrete execution framework, which are of independent interest. Our security analysis of ACME totaling over 16,000 lines of code is one of the largest proof developments for a cryptographic protocol standard in the literature, and it serves to provide formal security assurances for a crucial component of web security.

AB - The ACME certificate issuance and management protocol, standardized as IETF RFC 8555, is an essential element of the web public key infrastructure (PKI). It has been used by Let's Encrypt and other certification authorities to issue over a billion certificates, and a majority of HTTPS connections are now secured with certificates issued through ACME. Despite its importance, however, the security of ACME has not been studied at the same level of depth as other protocol standards like TLS 1.3 or OAuth. Prior formal analyses of ACME only considered the cryptographic core of early draft versions of ACME, ignoring many security-critical low-level details that play a major role in the 100 page RFC, such as recursive data structures, long-running sessions with asynchronous sub-protocols, and the issuance for certificates that cover multiple domains. We present the first in-depth formal security analysis of the ACME standard. Our model of ACME is executable and comprehensive, with a level of detail that lets our ACME client interoperate with other ACME servers. We prove the security of this model using a recent symbolic protocol analysis framework called DYg, which in turn is based on the Fg programming language. Our analysis accounts for all prior attacks on ACME in the literature, including both cryptographic attacks and low-level attacks on stateful protocol execution. To analyze ACME, we extend DYĝ with authenticated channels, key substitution attacks, and a concrete execution framework, which are of independent interest. Our security analysis of ACME totaling over 16,000 lines of code is one of the largest proof developments for a cryptographic protocol standard in the literature, and it serves to provide formal security assurances for a crucial component of web security.

U2 - 10.1145/3460120.3484588

DO - 10.1145/3460120.3484588

M3 - Conference contribution/Paper

SP - 2601

EP - 2617

BT - CCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security

PB - ACM

CY - New York

ER -