Vulnerability Note VU#306792
Bouncy Castle BKS-V1 keystore files vulnerable to trivial hash collisions
Original Release date: 19 Mar 2018 | Last revised: 04 Apr 2018

Overview
Bouncy Castle BKS version 1 keystore files use an HMAC that is only 16 bits long, which can allow an attacker to compromise the integrity of a BKS-V1 keystore.

Description
Bouncy Castle is a cryptographic library for C# and Java applications, including Android applications.

BKS is a keystore format, which is designed to function similarly to a Sun/Oracle JKS keystore.

BKS files can contain public keys, including certificates, as well as private keys.

BKS files rely on password-based encryption to provide confidentiality and integrity protections to the keystore contents.
The first version of a BKS file contains a design flaw in the determination of the key size used to protect the data inside of the keystore.

A SHA-1 hash function, which is 160 bits in length, is used in the BKS HMAC code.
In a RFC7292-compliant cryptographic algorithm, the MAC key size is the same size as the hash function being used.

This means that the MAC key size should be 160 bits long for BKS files. However, the Bouncy Castle code for version 1 BKS files uses only 16 bits for the MAC key size.

This means that regardless of password complexity, a BKS version 1 file can only have 65,536 different encryption keys.

A valid password for a keystore can be bruteforced by attempting each of these key values, which can take only seconds.

Update March 21, 2018:
Keystore-level passwords (and associated keys) are used for keystore integrity verification only. Like JKS files, BKS files do not employ container-level encryption.

This means that the metadata for BKS file contents is visible without needing to know a password at all.

The actual private keys in a BKS file are protected as expected with the password that the author has specified.

Starting with Bouncy Castle 1.47, which was released on March 30, 2012, the BKS keystore format was updated to version 2, which uses a 160-bit MAC.
Starting with Bouncy Castle 1.49, optional support for the original keystore format was reintroduced, as "BKS-V1."

Impact
A BKS file that was created with Bouncy Castle 1.46 or earlier, or 1.49 or later as the "BKS-V1quot; format will have insufficient protection against bruteforce cracking.

This may allow an attacker bypass BKS integrity checking.

Solution
Do not rely on version 1 BKS keystore files

BKS version 1 keystore files are not cryptographically sound.

A more robust keystore format should be used instead.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate UpdatedLegion of the Bouncy CastleAffected08 Mar 201802 Apr 2018If you are a vendor and your product is affected, let
us know.

CVSS Metrics (Learn More)

Group
Score
Vector

Base
2.1
AV:L/AC:L/Au:N/C:N/I:P/A:N

Temporal
1.7
E:F/RL:OF/RC:C

Environmental
1.7
CDP:ND/TD:H/CR:ND/IR:ND/AR:ND

References

https://insights.sei.cmu.edu/cert/2018/03/the-curious-case-of-the-bouncy-castle-bks-passwords.html

https://www.bouncycastle.org/releasenotes.html

BouncyCastle Keystore Security


https://tools.ietf.org/html/rfc7292#appendix-A

Credit

This vulnerability was reported by Will Dormann of the CERT/CC.
This document was written by Will Dormann.

Other Information

CVE IDs:
CVE-2018-5382

Date Public:
20 Mar 2012

Date First Published:
19 Mar 2018

Date Last Updated:
04 Apr 2018

Document Revision:
19

FeedbackIf you have feedback, comments, or additional information about this vulnerability, please send us email.

Leave a Reply