# HG changeset patch # User paulson # Date 921750093 -3600 # Node ID 1f495d4d922b69fb29180c10afe19c21c801fb31 # Parent 4a9040b85e2ec40cfb27d1cf9a279607e2f610c3 added new theory Yahalom_Bad diff -r 4a9040b85e2e -r 1f495d4d922b src/HOL/Auth/README.html --- a/src/HOL/Auth/README.html Thu Mar 18 10:41:00 1999 +0100 +++ b/src/HOL/Auth/README.html Thu Mar 18 10:41:33 1999 +0100 @@ -14,7 +14,10 @@
  • the Needham-Schroeder protocol (public-key and shared-key versions) -
  • two versions of the Yahalom protocol +
  • the Kerberos protocol (the simplified form published in the BAN paper) + +
  • three versions of the Yahalom protocol, including a bad one that + illustrates the purpose of the Oops rule
  • a novel recursive authentication protocol diff -r 4a9040b85e2e -r 1f495d4d922b src/HOL/Auth/ROOT.ML --- a/src/HOL/Auth/ROOT.ML Thu Mar 18 10:41:00 1999 +0100 +++ b/src/HOL/Auth/ROOT.ML Thu Mar 18 10:41:33 1999 +0100 @@ -22,6 +22,7 @@ time_use_thy "Recur"; time_use_thy "Yahalom"; time_use_thy "Yahalom2"; +time_use_thy "Yahalom_Bad"; (*Public-key protocols*) time_use_thy "NS_Public_Bad"; diff -r 4a9040b85e2e -r 1f495d4d922b src/HOL/Auth/Yahalom_Bad.ML --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/src/HOL/Auth/Yahalom_Bad.ML Thu Mar 18 10:41:33 1999 +0100 @@ -0,0 +1,358 @@ +(* Title: HOL/Auth/Yahalom + ID: $Id$ + Author: Lawrence C Paulson, Cambridge University Computer Laboratory + Copyright 1996 University of Cambridge + +Inductive relation "yahalom" for the Yahalom protocol. + +From page 257 of + Burrows, Abadi and Needham. A Logic of Authentication. + Proc. Royal Soc. 426 (1989) +*) + +(*A "possibility property": there are traces that reach the end*) +Goal "A ~= Server \ +\ ==> EX X NB K. EX evs: yahalom. \ +\ Says A B {|X, Crypt K (Nonce NB)|} : set evs"; +by (REPEAT (resolve_tac [exI,bexI] 1)); +by (rtac (yahalom.Nil RS + yahalom.YM1 RS yahalom.Reception RS + yahalom.YM2 RS yahalom.Reception RS + yahalom.YM3 RS yahalom.Reception RS yahalom.YM4) 2); +by possibility_tac; +result(); + +Goal "[| Gets B X : set evs; evs : yahalom |] ==> EX A. Says A B X : set evs"; +by (etac rev_mp 1); +by (etac yahalom.induct 1); +by Auto_tac; +qed "Gets_imp_Says"; + +(*Must be proved separately for each protocol*) +Goal "[| Gets B X : set evs; evs : yahalom |] ==> X : knows Spy evs"; +by (blast_tac (claset() addSDs [Gets_imp_Says, Says_imp_knows_Spy]) 1); +qed"Gets_imp_knows_Spy"; +AddDs [Gets_imp_knows_Spy RS parts.Inj]; + +fun g_not_bad_tac s = + forward_tac [Gets_imp_Says] THEN' assume_tac THEN' not_bad_tac s; + + +(**** Inductive proofs about yahalom ****) + + +(** For reasoning about the encrypted portion of messages **) + +(*Lets us treat YM4 using a similar argument as for the Fake case.*) +Goal "[| Gets A {|Crypt (shrK A) Y, X|} : set evs; evs : yahalom |] \ +\ ==> X : analz (knows Spy evs)"; +by (blast_tac (claset() addSDs [Gets_imp_knows_Spy RS analz.Inj]) 1); +qed "YM4_analz_knows_Spy"; + +bind_thm ("YM4_parts_knows_Spy", + YM4_analz_knows_Spy RS (impOfSubs analz_subset_parts)); + +(*For proving the easier theorems about X ~: parts (knows Spy evs).*) +fun parts_knows_Spy_tac i = + EVERY + [forward_tac [YM4_parts_knows_Spy] (i+6), assume_tac (i+6), + prove_simple_subgoals_tac i]; + +(*Induction for regularity theorems. If induction formula has the form + X ~: analz (knows Spy evs) --> ... then it shortens the proof by discarding + needless information about analz (insert X (knows Spy evs)) *) +fun parts_induct_tac i = + etac yahalom.induct i + THEN + REPEAT (FIRSTGOAL analz_mono_contra_tac) + THEN parts_knows_Spy_tac i; + + +(** Theorems of the form X ~: parts (knows Spy evs) imply that NOBODY + sends messages containing X! **) + +(*Spy never sees another agent's shared key! (unless it's bad at start)*) +Goal "evs : yahalom ==> (Key (shrK A) : parts (knows Spy evs)) = (A : bad)"; +by (parts_induct_tac 1); +by (Fake_parts_insert_tac 1); +by (ALLGOALS Blast_tac); +qed "Spy_see_shrK"; +Addsimps [Spy_see_shrK]; + +Goal "evs : yahalom ==> (Key (shrK A) : analz (knows Spy evs)) = (A : bad)"; +by (auto_tac(claset() addDs [impOfSubs analz_subset_parts], simpset())); +qed "Spy_analz_shrK"; +Addsimps [Spy_analz_shrK]; + +AddSDs [Spy_see_shrK RSN (2, rev_iffD1), + Spy_analz_shrK RSN (2, rev_iffD1)]; + + +(*Nobody can have used non-existent keys! Needed to apply analz_insert_Key*) +Goal "evs : yahalom ==> \ +\ Key K ~: used evs --> K ~: keysFor (parts (knows Spy evs))"; +by (parts_induct_tac 1); +(*Fake*) +by (blast_tac (claset() addSDs [keysFor_parts_insert]) 1); +(*YM2-4: Because Key K is not fresh, etc.*) +by (REPEAT (blast_tac (claset() addSEs knows_Spy_partsEs) 1)); +qed_spec_mp "new_keys_not_used"; + +bind_thm ("new_keys_not_analzd", + [analz_subset_parts RS keysFor_mono, + new_keys_not_used] MRS contra_subsetD); + +Addsimps [new_keys_not_used, new_keys_not_analzd]; + + +(*For proofs involving analz.*) +val analz_knows_Spy_tac = + forward_tac [YM4_analz_knows_Spy] 7 THEN assume_tac 7; + +(**** + The following is to prove theorems of the form + + Key K : analz (insert (Key KAB) (knows Spy evs)) ==> + Key K : analz (knows Spy evs) + + A more general formula must be proved inductively. +****) + +(** Session keys are not used to encrypt other session keys **) + +Goal "evs : yahalom ==> \ +\ ALL K KK. KK <= - (range shrK) --> \ +\ (Key K : analz (Key``KK Un (knows Spy evs))) = \ +\ (K : KK | Key K : analz (knows Spy evs))"; +by (etac yahalom.induct 1); +by analz_knows_Spy_tac; +by (REPEAT_FIRST (resolve_tac [allI, impI])); +by (REPEAT_FIRST (rtac analz_image_freshK_lemma)); +by (ALLGOALS (asm_simp_tac analz_image_freshK_ss)); +(*Fake*) +by (spy_analz_tac 1); +qed_spec_mp "analz_image_freshK"; + +Goal "[| evs : yahalom; KAB ~: range shrK |] \ +\ ==> Key K : analz (insert (Key KAB) (knows Spy evs)) = \ +\ (K = KAB | Key K : analz (knows Spy evs))"; +by (asm_simp_tac (analz_image_freshK_ss addsimps [analz_image_freshK]) 1); +qed "analz_insert_freshK"; + + +(*** The Key K uniquely identifies the Server's message. **) + +Goal "evs : yahalom ==> \ +\ EX A' B' na' nb' X'. ALL A B na nb X. \ +\ Says Server A \ +\ {|Crypt (shrK A) {|Agent B, Key K, na, nb|}, X|} \ +\ : set evs --> A=A' & B=B' & na=na' & nb=nb' & X=X'"; +by (etac yahalom.induct 1); +by (ALLGOALS (asm_simp_tac (simpset() addsimps [all_conj_distrib]))); +by (ALLGOALS Clarify_tac); +by (ex_strip_tac 2); +by (Blast_tac 2); +(*Remaining case: YM3*) +by (expand_case_tac "K = ?y" 1); +by (REPEAT (ares_tac [refl,exI,impI,conjI] 2)); +(*...we assume X is a recent message and handle this case by contradiction*) +by (blast_tac (claset() addSEs knows_Spy_partsEs + delrules [conjI] (*no split-up to 4 subgoals*)) 1); +val lemma = result(); + +Goal "[| Says Server A \ +\ {|Crypt (shrK A) {|Agent B, Key K, na, nb|}, X|} : set evs; \ +\ Says Server A' \ +\ {|Crypt (shrK A') {|Agent B', Key K, na', nb'|}, X'|} : set evs; \ +\ evs : yahalom |] \ +\ ==> A=A' & B=B' & na=na' & nb=nb'"; +by (prove_unique_tac lemma 1); +qed "unique_session_keys"; + + +(** Crucial secrecy property: Spy does not see the keys sent in msg YM3 **) + +Goal "[| A ~: bad; B ~: bad; evs : yahalom |] \ +\ ==> Says Server A \ +\ {|Crypt (shrK A) {|Agent B, Key K, na, nb|}, \ +\ Crypt (shrK B) {|Agent A, Key K|}|} \ +\ : set evs --> \ +\ Key K ~: analz (knows Spy evs)"; +by (etac yahalom.induct 1); +by analz_knows_Spy_tac; +by (ALLGOALS + (asm_simp_tac + (simpset() addsimps split_ifs @ pushes @ + [analz_insert_eq, analz_insert_freshK]))); +(*YM3*) +by (blast_tac (claset() delrules [impCE] + addSEs knows_Spy_partsEs + addIs [impOfSubs analz_subset_parts]) 2); +(*Fake*) +by (spy_analz_tac 1); +val lemma = result() RS mp RSN(2,rev_notE); + + +(*Final version*) +Goal "[| Says Server A \ +\ {|Crypt (shrK A) {|Agent B, Key K, na, nb|}, \ +\ Crypt (shrK B) {|Agent A, Key K|}|} \ +\ : set evs; \ +\ A ~: bad; B ~: bad; evs : yahalom |] \ +\ ==> Key K ~: analz (knows Spy evs)"; +by (blast_tac (claset() addSEs [lemma]) 1); +qed "Spy_not_see_encrypted_key"; + + +(** Security Guarantee for A upon receiving YM3 **) + +(*If the encrypted message appears then it originated with the Server*) +Goal "[| Crypt (shrK A) {|Agent B, Key K, na, nb|} : parts (knows Spy evs); \ +\ A ~: bad; evs : yahalom |] \ +\ ==> Says Server A \ +\ {|Crypt (shrK A) {|Agent B, Key K, na, nb|}, \ +\ Crypt (shrK B) {|Agent A, Key K|}|} \ +\ : set evs"; +by (etac rev_mp 1); +by (parts_induct_tac 1); +by (Fake_parts_insert_tac 1); +qed "A_trusts_YM3"; + +(*The obvious combination of A_trusts_YM3 with Spy_not_see_encrypted_key*) +Goal "[| Crypt (shrK A) {|Agent B, Key K, na, nb|} : parts (knows Spy evs); \ +\ A ~: bad; B ~: bad; evs : yahalom |] \ +\ ==> Key K ~: analz (knows Spy evs)"; +by (blast_tac (claset() addSDs [A_trusts_YM3, Spy_not_see_encrypted_key]) 1); +qed "A_gets_good_key"; + +(** Security Guarantees for B upon receiving YM4 **) + +(*B knows, by the first part of A's message, that the Server distributed + the key for A and B. But this part says nothing about nonces.*) +Goal "[| Crypt (shrK B) {|Agent A, Key K|} : parts (knows Spy evs); \ +\ B ~: bad; evs : yahalom |] \ +\ ==> EX NA NB. Says Server A \ +\ {|Crypt (shrK A) {|Agent B, Key K, \ +\ Nonce NA, Nonce NB|}, \ +\ Crypt (shrK B) {|Agent A, Key K|}|} \ +\ : set evs"; +by (etac rev_mp 1); +by (parts_induct_tac 1); +by (Fake_parts_insert_tac 1); +(*YM3*) +by (Blast_tac 1); +qed "B_trusts_YM4_shrK"; + +(** Up to now, the reasoning is similar to standard Yahalom. Now the + doubtful reasoning occurs. We should not be assuming that an unknown + key is secure, but the model allows us to: there is no Oops rule to + let session keys go.*) + +(*B knows, by the second part of A's message, that the Server distributed + the key quoting nonce NB. This part says nothing about agent names. + Secrecy of K is assumed; the valid Yahalom proof uses (and later proves) + the secrecy of NB.*) +Goal "evs : yahalom \ +\ ==> Key K ~: analz (knows Spy evs) --> \ +\ Crypt K (Nonce NB) : parts (knows Spy evs) --> \ +\ (EX A B NA. Says Server A \ +\ {|Crypt (shrK A) {|Agent B, Key K, \ +\ Nonce NA, Nonce NB|}, \ +\ Crypt (shrK B) {|Agent A, Key K|}|} \ +\ : set evs)"; +by (parts_induct_tac 1); +by (ALLGOALS Clarify_tac); +(*YM3 & Fake*) +by (Blast_tac 2); +by (Fake_parts_insert_tac 1); +(*YM4*) +(*A is uncompromised because NB is secure*) +by (g_not_bad_tac "A" 1); +(*A's certificate guarantees the existence of the Server message*) +by (blast_tac (claset() addDs [Says_imp_knows_Spy RS parts.Inj RS parts.Fst RS + A_trusts_YM3]) 1); +bind_thm ("B_trusts_YM4_newK", result() RS mp RSN (2, rev_mp)); + + +(*B's session key guarantee from YM4. The two certificates contribute to a + single conclusion about the Server's message. *) +Goal "[| Gets B {|Crypt (shrK B) {|Agent A, Key K|}, \ +\ Crypt K (Nonce NB)|} : set evs; \ +\ Says B Server \ +\ {|Agent B, Nonce NB, Crypt (shrK B) {|Agent A, Nonce NA|}|} \ +\ : set evs; \ +\ A ~: bad; B ~: bad; evs : yahalom |] \ +\ ==> EX na nb. Says Server A \ +\ {|Crypt (shrK A) {|Agent B, Key K, na, nb|}, \ +\ Crypt (shrK B) {|Agent A, Key K|}|} \ +\ : set evs"; +by (etac (Gets_imp_knows_Spy RS parts.Inj RS MPair_parts) 1 THEN + assume_tac 1 THEN dtac B_trusts_YM4_shrK 1); +by (dtac B_trusts_YM4_newK 3); +by (REPEAT_FIRST (eresolve_tac [asm_rl, exE])); +by (etac Spy_not_see_encrypted_key 1 THEN REPEAT (assume_tac 1)); +by (forward_tac [unique_session_keys] 1 THEN REPEAT (assume_tac 1)); +by (blast_tac (claset() addDs []) 1); +qed "B_trusts_YM4"; + + +(*The obvious combination of B_trusts_YM4 with Spy_not_see_encrypted_key*) +Goal "[| Gets B {|Crypt (shrK B) {|Agent A, Key K|}, \ +\ Crypt K (Nonce NB)|} : set evs; \ +\ Says B Server \ +\ {|Agent B, Nonce NB, Crypt (shrK B) {|Agent A, Nonce NA|}|} \ +\ : set evs; \ +\ A ~: bad; B ~: bad; evs : yahalom |] \ +\ ==> Key K ~: analz (knows Spy evs)"; +by (blast_tac (claset() addSDs [B_trusts_YM4, Spy_not_see_encrypted_key]) 1); +qed "B_gets_good_key"; + + +(*** Authenticating B to A: these proofs are not considered. + They are irrelevant to showing the need for Oops. ***) + + +(*** Authenticating A to B using the certificate Crypt K (Nonce NB) ***) + +(*Assuming the session key is secure, if both certificates are present then + A has said NB. We can't be sure about the rest of A's message, but only + NB matters for freshness.*) +Goal "evs : yahalom \ +\ ==> Key K ~: analz (knows Spy evs) --> \ +\ Crypt K (Nonce NB) : parts (knows Spy evs) --> \ +\ Crypt (shrK B) {|Agent A, Key K|} : parts (knows Spy evs) --> \ +\ B ~: bad --> \ +\ (EX X. Says A B {|X, Crypt K (Nonce NB)|} : set evs)"; +by (parts_induct_tac 1); +(*Fake*) +by (Fake_parts_insert_tac 1); +(*YM3: by new_keys_not_used we note that Crypt K (Nonce NB) could not exist*) +by (fast_tac (claset() addSDs [Crypt_imp_keysFor] addss (simpset())) 1); +(*YM4: was Crypt K (Nonce NB) the very last message? If not, use ind. hyp.*) +by (asm_simp_tac (simpset() addsimps [ex_disj_distrib]) 1); +(*yes: apply unicity of session keys*) +by (g_not_bad_tac "Aa" 1); +by (blast_tac (claset() addSEs [MPair_parts] + addSDs [A_trusts_YM3, B_trusts_YM4_shrK] + addDs [Says_imp_knows_Spy RS parts.Inj, + unique_session_keys]) 1); +qed_spec_mp "A_Said_YM3_lemma"; + +(*If B receives YM4 then A has used nonce NB (and therefore is alive). + Moreover, A associates K with NB (thus is talking about the same run). + Other premises guarantee secrecy of K.*) +Goal "[| Gets B {|Crypt (shrK B) {|Agent A, Key K|}, \ +\ Crypt K (Nonce NB)|} : set evs; \ +\ Says B Server \ +\ {|Agent B, Nonce NB, Crypt (shrK B) {|Agent A, Nonce NA|}|} \ +\ : set evs; \ +\ A ~: bad; B ~: bad; evs : yahalom |] \ +\ ==> EX X. Says A B {|X, Crypt K (Nonce NB)|} : set evs"; +by (forward_tac [B_trusts_YM4] 1); +by (REPEAT_FIRST assume_tac); +by (etac (Gets_imp_knows_Spy RS parts.Inj RS MPair_parts) 1 THEN assume_tac 1); +by (Clarify_tac 1); +by (rtac A_Said_YM3_lemma 1); +by (rtac Spy_not_see_encrypted_key 2); +by (REPEAT_FIRST assume_tac); +qed_spec_mp "YM4_imp_A_Said_YM3"; diff -r 4a9040b85e2e -r 1f495d4d922b src/HOL/Auth/Yahalom_Bad.thy --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/src/HOL/Auth/Yahalom_Bad.thy Thu Mar 18 10:41:33 1999 +0100 @@ -0,0 +1,66 @@ +(* Title: HOL/Auth/Yahalom + ID: $Id$ + Author: Lawrence C Paulson, Cambridge University Computer Laboratory + Copyright 1996 University of Cambridge + +Inductive relation "yahalom" for the Yahalom protocol. + +Example of why Oops is necessary. This protocol can be attacked because it +doesn't keep NB secret, but without Oops it can be "verified" anyway. +*) + +Yahalom_Bad = Shared + + +consts yahalom :: event list set +inductive "yahalom" + intrs + (*Initial trace is empty*) + Nil "[]: yahalom" + + (*The spy MAY say anything he CAN say. We do not expect him to + invent new nonces here, but he can also use NS1. Common to + all similar protocols.*) + Fake "[| evs: yahalom; X: synth (analz (knows Spy evs)) |] + ==> Says Spy B X # evs : yahalom" + + (*A message that has been sent can be received by the + intended recipient.*) + Reception "[| evsr: yahalom; Says A B X : set evsr |] + ==> Gets B X # evsr : yahalom" + + (*Alice initiates a protocol run*) + YM1 "[| evs1: yahalom; Nonce NA ~: used evs1 |] + ==> Says A B {|Agent A, Nonce NA|} # evs1 : yahalom" + + (*Bob's response to Alice's message.*) + YM2 "[| evs2: yahalom; Nonce NB ~: used evs2; + Gets B {|Agent A, Nonce NA|} : set evs2 |] + ==> Says B Server + {|Agent B, Nonce NB, Crypt (shrK B) {|Agent A, Nonce NA|}|} + # evs2 : yahalom" + + (*The Server receives Bob's message. He responds by sending a + new session key to Alice, with a packet for forwarding to Bob.*) + YM3 "[| evs3: yahalom; Key KAB ~: used evs3; + Gets Server + {|Agent B, Nonce NB, Crypt (shrK B) {|Agent A, Nonce NA|}|} + : set evs3 |] + ==> Says Server A + {|Crypt (shrK A) {|Agent B, Key KAB, Nonce NA, Nonce NB|}, + Crypt (shrK B) {|Agent A, Key KAB|}|} + # evs3 : yahalom" + + (*Alice receives the Server's (?) message, checks her Nonce, and + uses the new session key to send Bob his Nonce. The premise + A ~= Server is needed to prove Says_Server_not_range.*) + YM4 "[| evs4: yahalom; A ~= Server; + Gets A {|Crypt(shrK A) {|Agent B, Key K, Nonce NA, Nonce NB|}, X|} + : set evs4; + Says A B {|Agent A, Nonce NA|} : set evs4 |] + ==> Says A B {|X, Crypt K (Nonce NB)|} # evs4 : yahalom" + + (*This message models possible leaks of session keys. The Nonces + identify the protocol run. Quoting Server here ensures they are + correct.*) + +end