Update 6/7: Yes, it's officially a novel MD5 collision attack, with the implication that top cryptographers were involved in Flame's creation. We truly are living in the future.
See detailed updates (and a timeline) at the bottom of this post.
If you pay attention to these things, you've heard that there's a new piece of government-issued malware making the rounds. It's called Flame (or sometimes Skywiper), and it's basically the most sophisticated -- or most bloated -- piece of malicious software ever devised. Kaspersky gets the credit for identifying Flame, but the task of tearing it to pieces has fallen to a whole bunch of different people.
Normally I don't get too excited about malware, cause, well, that kind of thing is somebody else's problem. But Flame is special: if reports are correct, this is the first piece of malware ever to take advantage of an MD5 certificate collision to enable code signing. Actually, it may be the first real anything to use MD5 certificate collisions. Neat stuff.
What we know is pretty sketchy, and is based entirely on the information-sparse updates coming from Microsoft's security team. Here's the story so far:
Sometime yesterday (June 3), Microsoft released an urgent security advisory warning administrators to revoke two Intermediate certificates hanging off of the Microsoft root cert. These belong to the Terminal Services Licensing service. Note that while these are real certificates -- with keys and everything -- they actually have nothing to do with security: their sole purpose was to authorize, say, 20 seats on your Terminal Services machine.
Despite the fact that these certs don't serve any real security purpose, and shouldn't be confused with anything that matters, Microsoft hung them off of the same root as the real certificates it uses for, well, important stuff. Stuff like signing Windows Update packages. You see where this is going?
Actually, this shouldn't have been a real problem, because these licensing certs (and any new certificates beneath them) should have been recognizably different from code-signing certificates. Unfortunately, someone in Product Licensing appears to have really screwed the pooch. These certificates were used to generate Licensing certificates for customers. And each of those certificates had the code signing bit set.
The result? Anyone who paid for a Terminal Services license could (apparently) sign code as if they were Microsoft. If you're wondering what that looks like, it looks like this.
This is obviously a bad thing. For many reasons. Mikko Hypponen points out that many organizations whitelist software signing by Microsoft, so even if institutions were being paranoid, this malware basically had carte blanche.
Ok, so far this is really bad, but just a garden-variety screwup. I mean, a huge one, to be sure. But nothing really interesting.
Here's where that changes. Just today, Microsoft released a new update. This is the new piece:
The Flame malware used a cryptographic collision attack in combination with the terminal server licensing service certificates to sign code as if it came from Microsoft. However, code-signing without performing a collision is also possible.Now, I'm not sure why the 'collision attack' is necessary if code-signing is possible without a collision. But who cares! A collision attack! In the wild! On top-secret government-issued Malware! Dan Brown couldn't hold a candle to this.
If we look at the Licensing certificates in question, we do indeed see that at least one -- created in 2009 -- uses the MD5 hash function, something everyone knows is a bad idea:
Certificate: Data: Version: 3 (0x2) Serial Number: 3a:ab:11:de:e5:2f:1b:19:d0:56 Signature Algorithm: md5WithRSAEncryption Issuer: OU=Copyright (c) 1997 Microsoft Corp., OU=Microsoft Corporation, CN=Microsoft Root Authority Validity Not Before: Dec 10 01:55:35 2009 GMT Not After : Oct 23 08:00:00 2016 GMT Subject: C=US, ST=Washington, L=Redmond, O=Microsoft Corporation, OU=Copyright (c) 1999 Microsoft Corp., CN=Microsoft Enforced Licensing Intermediate PCA Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (2048 bit)And so... Well, I don't really know. That's where we run out of information. And end up with a lot of questions.
For one thing, why did the Flame authors need a collision? What extra capabilities did it get them? (Update:
More importantly, what kind of resources would it take to find the necessary MD5 collision? That would tell us a lot about the capabilities of
And just out of curiosity, what in the world was Microsoft doing issuing MD5-based certificates in 2009? I mean, the code signing bit is disastrous, but at least that's a relatively subtle issue -- I can understand how someone might have missed it. But making MD5 certificates one year after they were definitively shown to be insecure, that's hard to excuse. Lastly, why do licensing certificates even need to involve a Certificate Signing Request at all, which is the vector you'd use for a collision attack?
I hope that we'll learn the answers to these questions over the next couple of days. In the mean time, it's a fascinating time to be in security. If not, unfortunately, a very good time for anyone else.
Update 6/5: For those who aren't familiar with certificate collision attacks, I should clear up the basic premise. Most Certificate Authorities sign a Certificate Signing Request (CSR) issued by a possibly untrustworthy customer. The idea of an MD5 collision-finding attack is to come up with two different CSRs that hash to the same thing. One would be legitimate and might contain your Terminal Services licensing number. The other would contain... something else. By signing the first CSR, Microsoft would be implicitly creating a certificate on the second batch of information.
Finding collisions is a tricky process, since it requires you to muck with the bits of the public key embedded in the certificate (see this paper for more details). Also, some CAs embed a random serial number into the certificate, which really messes with the attack. Microsoft did not.
Finally, some have noticed that Microsoft is still using a root certificate based on MD5, one that doesn't expire until 2020, and hasn't been revoked. What makes this ok? The simple answer is that it's not ok. However, Microsoft probably does not sign arbitrary CSRs with that root certificate, meaning that collision attacks are not viable against it. It's only the Intermediate certs, the ones that actually sign untrusted CSRs you need to worry about -- today.
Update 6/6: Microsoft has finally given us some red meat. Short summary: the Terminal Services Licensing certs do work to sign code on versions of Windows prior to Vista, with no collision attack needed. All in all, that's a heck of a bad thing. But it seems that more recent versions of Windows objected to the particular X.509 extensions that were in the TS licensing certs. The government (or their contractors) therefore used a collision attack to make a certificate that did not have these extensions. From what I'm reading on mailing lists, the collision appears to be "new, and of scientific interest".
If this pans out, it's a big deal. Normally the government doesn't blow a truly sophisticated cryptanalytic attack on some minor spying effort. Getting MD5 collisions up and running is a big effort; it's not something you can do from a cookbook. But developing novel collision techniques is a step beyond that. I take this to mean that Flame's authors were breaking out the big guns, which tells us something about its importance to our government. It also tells us that the creation of Flame may have involved some of the top mathematicians and cryptographers in (our?) intelligence services. This is an important datapoint.
Update 6/7: It looks like it does pan out. Marc Stevens -- one of the authors of the earlier MD5 certificate collision papers -- confirms that Flame's certificate uses a novel collision-finding technique.
"Flame uses a completely new variant of a ‘chosen prefix collision attack’ to impersonate a legitimate security update from Microsoft. The design of this new variant required world-class cryptanalysis"We can only speculate about why this would be necessary, but a good guess is that Flame is old (or, at very least, the crypto techniques are). If the collision technique was in the works prior to 2009 (and why wouldn't it be?), Stevens et al. wouldn't have had much relevance. For those who like details, a (very incomplete) timeline looks something like this:
- Mid-1990s: MD5 is effectively obsolete. Switch to a better hash function!
- August 2004: Wang and Yu present first ('random'), manually-found collision on MD5.
- 2004-2007: Collisions extended to 'meaningful' documents. Lots of stuff omitted here.
- May 2007: (CWI) Stevens et al. publish a first impractical technique for colliding certificates.
- Late 2008: (CWI) Stevens et al. develop a practical certificate collision.
- December 2008: Vendors notified.
- Feburary 2009: Paper submitted to CRYPTO.
- Summer 2009: Source code released.
The really interesting question is: when did secret collision research get ahead of the public, academic stuff? Post-2007? Post-2004? Pre-2004? I doubt we'll ever know the answer to this question. I sure would love to.
Update 6/12: Alex Sotirov has a great Summercon presentation with many of the details. The word from those who know is: don't take his $20,000 figure too literally. We know nothing about the techniques used to find this collision.