added new theory Yahalom_Bad
authorpaulson
Thu, 18 Mar 1999 10:41:33 +0100
changeset 6400 1f495d4d922b
parent 6399 4a9040b85e2e
child 6401 2462d0c077b5
added new theory Yahalom_Bad
src/HOL/Auth/README.html
src/HOL/Auth/ROOT.ML
src/HOL/Auth/Yahalom_Bad.ML
src/HOL/Auth/Yahalom_Bad.thy
--- a/src/HOL/Auth/README.html	Thu Mar 18 10:41:00 1999 +0100
+++ b/src/HOL/Auth/README.html	Thu Mar 18 10:41:33 1999 +0100
@@ -14,7 +14,10 @@
 
 <LI>the Needham-Schroeder protocol (public-key and shared-key versions)
 
-<LI>two versions of the Yahalom protocol
+<LI>the Kerberos protocol (the simplified form published in the BAN paper)
+
+<LI>three versions of the Yahalom protocol, including a bad one that 
+	illustrates the purpose of the Oops rule
 
 <LI>a novel recursive authentication protocol 
 
--- a/src/HOL/Auth/ROOT.ML	Thu Mar 18 10:41:00 1999 +0100
+++ b/src/HOL/Auth/ROOT.ML	Thu Mar 18 10:41:33 1999 +0100
@@ -22,6 +22,7 @@
 time_use_thy "Recur";
 time_use_thy "Yahalom";
 time_use_thy "Yahalom2";
+time_use_thy "Yahalom_Bad";
 
 (*Public-key protocols*)
 time_use_thy "NS_Public_Bad";
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/src/HOL/Auth/Yahalom_Bad.ML	Thu Mar 18 10:41:33 1999 +0100
@@ -0,0 +1,358 @@
+(*  Title:      HOL/Auth/Yahalom
+    ID:         $Id$
+    Author:     Lawrence C Paulson, Cambridge University Computer Laboratory
+    Copyright   1996  University of Cambridge
+
+Inductive relation "yahalom" for the Yahalom protocol.
+
+From page 257 of
+  Burrows, Abadi and Needham.  A Logic of Authentication.
+  Proc. Royal Soc. 426 (1989)
+*)
+
+(*A "possibility property": there are traces that reach the end*)
+Goal "A ~= Server \
+\     ==> EX X NB K. EX evs: yahalom.          \
+\            Says A B {|X, Crypt K (Nonce NB)|} : set evs";
+by (REPEAT (resolve_tac [exI,bexI] 1));
+by (rtac (yahalom.Nil RS 
+          yahalom.YM1 RS yahalom.Reception RS
+          yahalom.YM2 RS yahalom.Reception RS 
+          yahalom.YM3 RS yahalom.Reception RS yahalom.YM4) 2);
+by possibility_tac;
+result();
+
+Goal "[| Gets B X : set evs; evs : yahalom |] ==> EX A. Says A B X : set evs";
+by (etac rev_mp 1);
+by (etac yahalom.induct 1);
+by Auto_tac;
+qed "Gets_imp_Says";
+
+(*Must be proved separately for each protocol*)
+Goal "[| Gets B X : set evs; evs : yahalom |]  ==> X : knows Spy evs";
+by (blast_tac (claset() addSDs [Gets_imp_Says, Says_imp_knows_Spy]) 1);
+qed"Gets_imp_knows_Spy";
+AddDs [Gets_imp_knows_Spy RS parts.Inj];
+
+fun g_not_bad_tac s = 
+  forward_tac [Gets_imp_Says] THEN' assume_tac THEN' not_bad_tac s;
+
+
+(**** Inductive proofs about yahalom ****)
+
+
+(** For reasoning about the encrypted portion of messages **)
+
+(*Lets us treat YM4 using a similar argument as for the Fake case.*)
+Goal "[| Gets A {|Crypt (shrK A) Y, X|} : set evs;  evs : yahalom |]  \
+\     ==> X : analz (knows Spy evs)";
+by (blast_tac (claset() addSDs [Gets_imp_knows_Spy RS analz.Inj]) 1);
+qed "YM4_analz_knows_Spy";
+
+bind_thm ("YM4_parts_knows_Spy",
+          YM4_analz_knows_Spy RS (impOfSubs analz_subset_parts));
+
+(*For proving the easier theorems about X ~: parts (knows Spy evs).*)
+fun parts_knows_Spy_tac i = 
+  EVERY
+   [forward_tac [YM4_parts_knows_Spy] (i+6), assume_tac (i+6),
+    prove_simple_subgoals_tac i];
+
+(*Induction for regularity theorems.  If induction formula has the form
+   X ~: analz (knows Spy evs) --> ... then it shortens the proof by discarding
+   needless information about analz (insert X (knows Spy evs))  *)
+fun parts_induct_tac i = 
+    etac yahalom.induct i
+    THEN 
+    REPEAT (FIRSTGOAL analz_mono_contra_tac)
+    THEN  parts_knows_Spy_tac i;
+
+
+(** Theorems of the form X ~: parts (knows Spy evs) imply that NOBODY
+    sends messages containing X! **)
+
+(*Spy never sees another agent's shared key! (unless it's bad at start)*)
+Goal "evs : yahalom ==> (Key (shrK A) : parts (knows Spy evs)) = (A : bad)";
+by (parts_induct_tac 1);
+by (Fake_parts_insert_tac 1);
+by (ALLGOALS Blast_tac);
+qed "Spy_see_shrK";
+Addsimps [Spy_see_shrK];
+
+Goal "evs : yahalom ==> (Key (shrK A) : analz (knows Spy evs)) = (A : bad)";
+by (auto_tac(claset() addDs [impOfSubs analz_subset_parts], simpset()));
+qed "Spy_analz_shrK";
+Addsimps [Spy_analz_shrK];
+
+AddSDs [Spy_see_shrK RSN (2, rev_iffD1), 
+	Spy_analz_shrK RSN (2, rev_iffD1)];
+
+
+(*Nobody can have used non-existent keys!  Needed to apply analz_insert_Key*)
+Goal "evs : yahalom ==>          \
+\      Key K ~: used evs --> K ~: keysFor (parts (knows Spy evs))";
+by (parts_induct_tac 1);
+(*Fake*)
+by (blast_tac (claset() addSDs [keysFor_parts_insert]) 1);
+(*YM2-4: Because Key K is not fresh, etc.*)
+by (REPEAT (blast_tac (claset() addSEs knows_Spy_partsEs) 1));
+qed_spec_mp "new_keys_not_used";
+
+bind_thm ("new_keys_not_analzd",
+          [analz_subset_parts RS keysFor_mono,
+           new_keys_not_used] MRS contra_subsetD);
+
+Addsimps [new_keys_not_used, new_keys_not_analzd];
+
+
+(*For proofs involving analz.*)
+val analz_knows_Spy_tac = 
+    forward_tac [YM4_analz_knows_Spy] 7 THEN assume_tac 7;
+
+(****
+ The following is to prove theorems of the form
+
+  Key K : analz (insert (Key KAB) (knows Spy evs)) ==>
+  Key K : analz (knows Spy evs)
+
+ A more general formula must be proved inductively.
+****)
+
+(** Session keys are not used to encrypt other session keys **)
+
+Goal "evs : yahalom ==>                              \
+\  ALL K KK. KK <= - (range shrK) -->                \
+\         (Key K : analz (Key``KK Un (knows Spy evs))) = \
+\         (K : KK | Key K : analz (knows Spy evs))";
+by (etac yahalom.induct 1);
+by analz_knows_Spy_tac;
+by (REPEAT_FIRST (resolve_tac [allI, impI]));
+by (REPEAT_FIRST (rtac analz_image_freshK_lemma));
+by (ALLGOALS (asm_simp_tac analz_image_freshK_ss));
+(*Fake*) 
+by (spy_analz_tac 1);
+qed_spec_mp "analz_image_freshK";
+
+Goal "[| evs : yahalom;  KAB ~: range shrK |]                  \
+\      ==> Key K : analz (insert (Key KAB) (knows Spy evs)) =  \
+\          (K = KAB | Key K : analz (knows Spy evs))";
+by (asm_simp_tac (analz_image_freshK_ss addsimps [analz_image_freshK]) 1);
+qed "analz_insert_freshK";
+
+
+(*** The Key K uniquely identifies the Server's  message. **)
+
+Goal "evs : yahalom ==>                                     \
+\   EX A' B' na' nb' X'. ALL A B na nb X.                   \
+\       Says Server A                                       \
+\        {|Crypt (shrK A) {|Agent B, Key K, na, nb|}, X|}   \
+\       : set evs --> A=A' & B=B' & na=na' & nb=nb' & X=X'";
+by (etac yahalom.induct 1);
+by (ALLGOALS (asm_simp_tac (simpset() addsimps [all_conj_distrib])));
+by (ALLGOALS Clarify_tac);
+by (ex_strip_tac 2);
+by (Blast_tac 2);
+(*Remaining case: YM3*)
+by (expand_case_tac "K = ?y" 1);
+by (REPEAT (ares_tac [refl,exI,impI,conjI] 2));
+(*...we assume X is a recent message and handle this case by contradiction*)
+by (blast_tac (claset() addSEs knows_Spy_partsEs
+                        delrules [conjI]    (*no split-up to 4 subgoals*)) 1);
+val lemma = result();
+
+Goal "[| Says Server A                                                 \
+\         {|Crypt (shrK A) {|Agent B, Key K, na, nb|}, X|} : set evs;  \
+\       Says Server A'                                                 \
+\         {|Crypt (shrK A') {|Agent B', Key K, na', nb'|}, X'|} : set evs; \
+\       evs : yahalom |]                                    \
+\    ==> A=A' & B=B' & na=na' & nb=nb'";
+by (prove_unique_tac lemma 1);
+qed "unique_session_keys";
+
+
+(** Crucial secrecy property: Spy does not see the keys sent in msg YM3 **)
+
+Goal "[| A ~: bad;  B ~: bad;  evs : yahalom |]                \
+\     ==> Says Server A                                        \
+\           {|Crypt (shrK A) {|Agent B, Key K, na, nb|},       \
+\             Crypt (shrK B) {|Agent A, Key K|}|}              \
+\          : set evs -->                                       \
+\         Key K ~: analz (knows Spy evs)";
+by (etac yahalom.induct 1);
+by analz_knows_Spy_tac;
+by (ALLGOALS
+    (asm_simp_tac 
+     (simpset() addsimps split_ifs @ pushes @
+                         [analz_insert_eq, analz_insert_freshK])));
+(*YM3*)
+by (blast_tac (claset() delrules [impCE]
+                        addSEs knows_Spy_partsEs
+                        addIs [impOfSubs analz_subset_parts]) 2);
+(*Fake*) 
+by (spy_analz_tac 1);
+val lemma = result() RS mp RSN(2,rev_notE);
+
+
+(*Final version*)
+Goal "[| Says Server A                                         \
+\           {|Crypt (shrK A) {|Agent B, Key K, na, nb|},       \
+\             Crypt (shrK B) {|Agent A, Key K|}|}              \
+\          : set evs;                                          \
+\        A ~: bad;  B ~: bad;  evs : yahalom |]                \
+\     ==> Key K ~: analz (knows Spy evs)";
+by (blast_tac (claset() addSEs [lemma]) 1);
+qed "Spy_not_see_encrypted_key";
+
+
+(** Security Guarantee for A upon receiving YM3 **)
+
+(*If the encrypted message appears then it originated with the Server*)
+Goal "[| Crypt (shrK A) {|Agent B, Key K, na, nb|} : parts (knows Spy evs); \
+\        A ~: bad;  evs : yahalom |]                          \
+\      ==> Says Server A                                      \
+\           {|Crypt (shrK A) {|Agent B, Key K, na, nb|},      \
+\             Crypt (shrK B) {|Agent A, Key K|}|}             \
+\          : set evs";
+by (etac rev_mp 1);
+by (parts_induct_tac 1);
+by (Fake_parts_insert_tac 1);
+qed "A_trusts_YM3";
+
+(*The obvious combination of A_trusts_YM3 with Spy_not_see_encrypted_key*)
+Goal "[| Crypt (shrK A) {|Agent B, Key K, na, nb|} : parts (knows Spy evs); \
+\        A ~: bad;  B ~: bad;  evs : yahalom |]                \
+\     ==> Key K ~: analz (knows Spy evs)";
+by (blast_tac (claset() addSDs [A_trusts_YM3, Spy_not_see_encrypted_key]) 1);
+qed "A_gets_good_key";
+
+(** Security Guarantees for B upon receiving YM4 **)
+
+(*B knows, by the first part of A's message, that the Server distributed 
+  the key for A and B.  But this part says nothing about nonces.*)
+Goal "[| Crypt (shrK B) {|Agent A, Key K|} : parts (knows Spy evs);  \
+\        B ~: bad;  evs : yahalom |]                                 \
+\     ==> EX NA NB. Says Server A                                    \
+\                     {|Crypt (shrK A) {|Agent B, Key K,             \
+\                                        Nonce NA, Nonce NB|},       \
+\                       Crypt (shrK B) {|Agent A, Key K|}|}          \
+\                    : set evs";
+by (etac rev_mp 1);
+by (parts_induct_tac 1);
+by (Fake_parts_insert_tac 1);
+(*YM3*)
+by (Blast_tac 1);
+qed "B_trusts_YM4_shrK";
+
+(** Up to now, the reasoning is similar to standard Yahalom.  Now the
+    doubtful reasoning occurs.  We should not be assuming that an unknown
+    key is secure, but the model allows us to: there is no Oops rule to
+    let session keys go.*)
+
+(*B knows, by the second part of A's message, that the Server distributed 
+  the key quoting nonce NB.  This part says nothing about agent names. 
+  Secrecy of K is assumed; the valid Yahalom proof uses (and later proves)
+  the secrecy of NB.*)
+Goal "evs : yahalom                                          \
+\     ==> Key K ~: analz (knows Spy evs) -->                 \
+\         Crypt K (Nonce NB) : parts (knows Spy evs) -->     \
+\         (EX A B NA. Says Server A                          \
+\                     {|Crypt (shrK A) {|Agent B, Key K,     \
+\                               Nonce NA, Nonce NB|},        \
+\                       Crypt (shrK B) {|Agent A, Key K|}|}  \
+\                    : set evs)";
+by (parts_induct_tac 1);
+by (ALLGOALS Clarify_tac);
+(*YM3 & Fake*)
+by (Blast_tac 2);
+by (Fake_parts_insert_tac 1);
+(*YM4*)
+(*A is uncompromised because NB is secure*)
+by (g_not_bad_tac "A" 1);
+(*A's certificate guarantees the existence of the Server message*)
+by (blast_tac (claset() addDs [Says_imp_knows_Spy RS parts.Inj RS parts.Fst RS
+			       A_trusts_YM3]) 1);
+bind_thm ("B_trusts_YM4_newK", result() RS mp RSN (2, rev_mp));
+
+
+(*B's session key guarantee from YM4.  The two certificates contribute to a
+  single conclusion about the Server's message. *)
+Goal "[| Gets B {|Crypt (shrK B) {|Agent A, Key K|},                    \
+\                 Crypt K (Nonce NB)|} : set evs;                       \
+\        Says B Server                                                  \
+\          {|Agent B, Nonce NB, Crypt (shrK B) {|Agent A, Nonce NA|}|}  \
+\          : set evs;                                                   \
+\        A ~: bad;  B ~: bad;  evs : yahalom |]                         \
+\      ==> EX na nb. Says Server A                                      \
+\                  {|Crypt (shrK A) {|Agent B, Key K, na, nb|},         \
+\                    Crypt (shrK B) {|Agent A, Key K|}|}                \
+\            : set evs";
+by (etac (Gets_imp_knows_Spy RS parts.Inj RS MPair_parts) 1 THEN
+    assume_tac 1 THEN dtac B_trusts_YM4_shrK 1);
+by (dtac B_trusts_YM4_newK 3);
+by (REPEAT_FIRST (eresolve_tac [asm_rl, exE]));
+by (etac Spy_not_see_encrypted_key 1 THEN REPEAT (assume_tac 1));
+by (forward_tac [unique_session_keys] 1 THEN REPEAT (assume_tac 1));
+by (blast_tac (claset() addDs []) 1);
+qed "B_trusts_YM4";
+
+
+(*The obvious combination of B_trusts_YM4 with Spy_not_see_encrypted_key*)
+Goal "[| Gets B {|Crypt (shrK B) {|Agent A, Key K|},                   \
+\                    Crypt K (Nonce NB)|} : set evs;                   \
+\        Says B Server                                                 \
+\          {|Agent B, Nonce NB, Crypt (shrK B) {|Agent A, Nonce NA|}|} \
+\          : set evs;                                                  \
+\        A ~: bad;  B ~: bad;  evs : yahalom |]                \
+\     ==> Key K ~: analz (knows Spy evs)";
+by (blast_tac (claset() addSDs [B_trusts_YM4, Spy_not_see_encrypted_key]) 1);
+qed "B_gets_good_key";
+
+
+(*** Authenticating B to A: these proofs are not considered.
+     They are irrelevant to showing the need for Oops. ***)
+
+
+(*** Authenticating A to B using the certificate Crypt K (Nonce NB) ***)
+
+(*Assuming the session key is secure, if both certificates are present then
+  A has said NB.  We can't be sure about the rest of A's message, but only
+  NB matters for freshness.*)  
+Goal "evs : yahalom                                              \
+\     ==> Key K ~: analz (knows Spy evs) -->                     \
+\         Crypt K (Nonce NB) : parts (knows Spy evs) -->         \
+\         Crypt (shrK B) {|Agent A, Key K|} : parts (knows Spy evs) --> \
+\         B ~: bad -->                                           \
+\         (EX X. Says A B {|X, Crypt K (Nonce NB)|} : set evs)";
+by (parts_induct_tac 1);
+(*Fake*)
+by (Fake_parts_insert_tac 1);
+(*YM3: by new_keys_not_used we note that Crypt K (Nonce NB) could not exist*)
+by (fast_tac (claset() addSDs [Crypt_imp_keysFor] addss (simpset())) 1); 
+(*YM4: was Crypt K (Nonce NB) the very last message?  If not, use ind. hyp.*)
+by (asm_simp_tac (simpset() addsimps [ex_disj_distrib]) 1);
+(*yes: apply unicity of session keys*)
+by (g_not_bad_tac "Aa" 1);
+by (blast_tac (claset() addSEs [MPair_parts]
+                        addSDs [A_trusts_YM3, B_trusts_YM4_shrK]
+		        addDs  [Says_imp_knows_Spy RS parts.Inj,
+				unique_session_keys]) 1);
+qed_spec_mp "A_Said_YM3_lemma";
+
+(*If B receives YM4 then A has used nonce NB (and therefore is alive).
+  Moreover, A associates K with NB (thus is talking about the same run).
+  Other premises guarantee secrecy of K.*)
+Goal "[| Gets B {|Crypt (shrK B) {|Agent A, Key K|},                   \
+\                 Crypt K (Nonce NB)|} : set evs;                      \
+\        Says B Server                                                 \
+\          {|Agent B, Nonce NB, Crypt (shrK B) {|Agent A, Nonce NA|}|} \
+\          : set evs;                                                  \
+\        A ~: bad;  B ~: bad;  evs : yahalom |]       \
+\     ==> EX X. Says A B {|X, Crypt K (Nonce NB)|} : set evs";
+by (forward_tac [B_trusts_YM4] 1);
+by (REPEAT_FIRST assume_tac);
+by (etac (Gets_imp_knows_Spy RS parts.Inj RS MPair_parts) 1 THEN assume_tac 1);
+by (Clarify_tac 1);
+by (rtac A_Said_YM3_lemma 1);
+by (rtac Spy_not_see_encrypted_key 2);
+by (REPEAT_FIRST assume_tac);
+qed_spec_mp "YM4_imp_A_Said_YM3";
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/src/HOL/Auth/Yahalom_Bad.thy	Thu Mar 18 10:41:33 1999 +0100
@@ -0,0 +1,66 @@
+(*  Title:      HOL/Auth/Yahalom
+    ID:         $Id$
+    Author:     Lawrence C Paulson, Cambridge University Computer Laboratory
+    Copyright   1996  University of Cambridge
+
+Inductive relation "yahalom" for the Yahalom protocol.
+
+Example of why Oops is necessary.  This protocol can be attacked because it
+doesn't keep NB secret, but without Oops it can be "verified" anyway.
+*)
+
+Yahalom_Bad = Shared + 
+
+consts  yahalom   :: event list set
+inductive "yahalom"
+  intrs 
+         (*Initial trace is empty*)
+    Nil  "[]: yahalom"
+
+         (*The spy MAY say anything he CAN say.  We do not expect him to
+           invent new nonces here, but he can also use NS1.  Common to
+           all similar protocols.*)
+    Fake "[| evs: yahalom;  X: synth (analz (knows Spy evs)) |]
+          ==> Says Spy B X  # evs : yahalom"
+
+         (*A message that has been sent can be received by the
+           intended recipient.*)
+    Reception "[| evsr: yahalom;  Says A B X : set evsr |]
+               ==> Gets B X # evsr : yahalom"
+
+         (*Alice initiates a protocol run*)
+    YM1  "[| evs1: yahalom;  Nonce NA ~: used evs1 |]
+          ==> Says A B {|Agent A, Nonce NA|} # evs1 : yahalom"
+
+         (*Bob's response to Alice's message.*)
+    YM2  "[| evs2: yahalom;  Nonce NB ~: used evs2;
+             Gets B {|Agent A, Nonce NA|} : set evs2 |]
+          ==> Says B Server 
+                  {|Agent B, Nonce NB, Crypt (shrK B) {|Agent A, Nonce NA|}|}
+                # evs2 : yahalom"
+
+         (*The Server receives Bob's message.  He responds by sending a
+            new session key to Alice, with a packet for forwarding to Bob.*)
+    YM3  "[| evs3: yahalom;  Key KAB ~: used evs3;
+             Gets Server 
+                  {|Agent B, Nonce NB, Crypt (shrK B) {|Agent A, Nonce NA|}|}
+               : set evs3 |]
+          ==> Says Server A
+                   {|Crypt (shrK A) {|Agent B, Key KAB, Nonce NA, Nonce NB|},
+                     Crypt (shrK B) {|Agent A, Key KAB|}|}
+                # evs3 : yahalom"
+
+         (*Alice receives the Server's (?) message, checks her Nonce, and
+           uses the new session key to send Bob his Nonce.  The premise
+           A ~= Server is needed to prove Says_Server_not_range.*)
+    YM4  "[| evs4: yahalom;  A ~= Server;
+             Gets A {|Crypt(shrK A) {|Agent B, Key K, Nonce NA, Nonce NB|}, X|}
+                : set evs4;
+             Says A B {|Agent A, Nonce NA|} : set evs4 |]
+          ==> Says A B {|X, Crypt K (Nonce NB)|} # evs4 : yahalom"
+
+         (*This message models possible leaks of session keys.  The Nonces
+           identify the protocol run.  Quoting Server here ensures they are
+           correct.*)
+
+end