ROCA: Infineon RSA vulnerability
ROCA detection tool
This tool is related to ACM CCS 2017 conference paper #124 Return of the Coppersmith’s Attack: Practical Factorization of Widely Used RSA Moduli.
It enables you to test public RSA keys for a presence of the described vulnerability.
Currently, the tool supports the following key formats:
- X509 Certificate, DER encoded, one per file, *.der, *.crt
- X509 Certificate, PEM encoded, more per file, *.pem
- RSA PEM encoded private key, public key, more per file, *.pem (has to have correct header —–BEGIN RSA…)
- SSH public key, *.pub, starting with “ssh-rsa”, one per line
- ASC encoded PGP key, *.pgp, *.asc. More per file has to have correct header —–BEGIN PGP…
- APK android application, *.apk
- one modulus per line text file *.txt, modulus can be a) base64 encoded number, b) hex coded number, c) decimal coded number
- JSON file with the module, one record per line, record with modulus has key “mod” (int, base64, hex, dec encoding supported) certificate(s) with key “cert” / array of certificates with key “certs” are supported, base64 encoded DER.
- LDIFF file – LDAP database dump. Any field ending with “; binary::” is attempted to decode as X509 certificate
- Java Key Store file (JKS). Tries empty password & some common, specify more with –jks-pass-file
- PKCS7 signature with user certificate
The detection tool is intentionally one-file implementation for easy integration/manipulation.
Pip install
Requirement
CentOS / RHEL:
sudo yum install python-devel python-pip gcc gcc-c++ make automake autoreconf libtool openssl-devel libffi-devel dialog
Ubuntu:
sudo apt-get install python-pip python-dev build-essential libssl-dev libffi-dev swig
Install with pip (installs all dependencies)
pip install roca-detect
Usage
To print the basic usage:
# If installed with pip / manually
roca-detect –help
# Without installation (can miss dependencies)
git clone https://github.com/crocs-muni/roca.git
python roca/detect.py
The testing tool accepts multiple file names/directories as the input argument. It returns the report showing how many files have been fingerprinted (and which are those).
Example (no vulnerabilities found):
Running recursively on all my SSH keys and known_hosts:
$> roca-detect ~/.ssh
2017-10-16 13:39:21 [51272] INFO ### SUMMARY ####################
2017-10-16 13:39:21 [51272] INFO Records tested: 92
2017-10-16 13:39:21 [51272] INFO .. PEM certs: . . . 0
2017-10-16 13:39:21 [51272] INFO .. DER certs: . . . 0
2017-10-16 13:39:21 [51272] INFO .. RSA key files: . 16
2017-10-16 13:39:21 [51272] INFO .. PGP master keys: 0
2017-10-16 13:39:21 [51272] INFO .. PGP total keys: 0
2017-10-16 13:39:21 [51272] INFO .. SSH keys: . . . 76
2017-10-16 13:39:21 [51272] INFO .. APK keys: . . . 0
2017-10-16 13:39:21 [51272] INFO .. JSON keys: . . . 0
2017-10-16 13:39:21 [51272] INFO .. LDIFF certs: . . 0
2017-10-16 13:39:21 [51272] INFO .. JKS certs: . . . 0
2017-10-16 13:39:21 [51272] INFO .. PKCS7: . . . . . 0
2017-10-16 13:39:21 [51272] INFO No fingerprinted keys found (OK)
2017-10-16 13:39:21 [51272] INFO ################################
Example (vulnerabilities found):
Running recursively on all my SSH keys and known_hosts:
$> roca-detect ~/.ssh
2017-10-16 13:39:21 [51272] WARNING Fingerprint found in the Certificate
…
2017-10-16 13:39:21 [51272] INFO ### SUMMARY ####################
2017-10-16 13:39:21 [51272] INFO Records tested: 92
2017-10-16 13:39:21 [51272] INFO .. PEM certs: . . . 0
2017-10-16 13:39:21 [51272] INFO .. DER certs: . . . 0
2017-10-16 13:39:21 [51272] INFO .. RSA key files: . 16
2017-10-16 13:39:21 [51272] INFO .. PGP master keys: 0
2017-10-16 13:39:21 [51272] INFO .. PGP total keys: 0
2017-10-16 13:39:21 [51272] INFO .. SSH keys: . . . 76
2017-10-16 13:39:21 [51272] INFO .. APK keys: . . . 0
2017-10-16 13:39:21 [51272] INFO .. JSON keys: . . . 0
2017-10-16 13:39:21 [51272] INFO .. LDIFF certs: . . 0
2017-10-16 13:39:21 [51272] INFO .. JKS certs: . . . 0
2017-10-16 13:39:21 [51272] INFO .. PKCS7: . . . . . 0
2017-10-16 13:39:21 [51272] INFO Fingerprinted keys found: 1
2017-10-16 13:39:21 [51272] INFO WARNING: Potential vulnerability
2017-10-16 13:39:21 [51272] INFO ################################
PGP key
In order to test your PGP key, you can export it from your email client or download it from the PGP key server such ashttps://pgp.mit.edu/
You can also use pgp command line utility to export your public key:
gpg –armor –export your@email.com > mykey.asc
Advanced use case
Detection tool extracts information about the key which can be displayed:
roca-detect.py –dump –flatten –indent ~/.ssh/