- More fixes for beta5
This commit is contained in:
parent
14b772a41f
commit
5a4fae93b3
@ -2,14 +2,14 @@
|
|||||||
|
|
||||||
Scyther
|
Scyther
|
||||||
|
|
||||||
1.0-beta4
|
1.0-beta5
|
||||||
|
|
||||||
a automatic verification tool for security protocols
|
an automatic verification tool for security protocols
|
||||||
by Cas Cremers
|
by Cas Cremers
|
||||||
|
|
||||||
Microsoft Windows binary
|
Microsoft Windows binary
|
||||||
and
|
and
|
||||||
Linux binary compiled for Linux i686 environments
|
Linux binary (compiled for Linux i686 environments)
|
||||||
|
|
||||||
------------------------------------------------------------------------
|
------------------------------------------------------------------------
|
||||||
|
|
||||||
@ -23,7 +23,7 @@ Note: This is a BETA release, and therefore the usual warnings apply.
|
|||||||
|
|
||||||
For more information, see:
|
For more information, see:
|
||||||
|
|
||||||
http://www.win.tue.nl/~ccremers/scyther
|
http://people.inf.ethz.ch/cremersc/scyther/index.html
|
||||||
|
|
||||||
|
|
||||||
2. Starting out
|
2. Starting out
|
||||||
@ -41,14 +41,11 @@ SPORE directory.
|
|||||||
3. Citing Scyther
|
3. Citing Scyther
|
||||||
===========================
|
===========================
|
||||||
|
|
||||||
For now, there is no official journal paper to cite yet, but you can use
|
@phdthesis{cremers06,
|
||||||
the following information:
|
Author = "Cas Cremers",
|
||||||
|
Title = "Scyther - Semantics and Verification of Security Protocols",
|
||||||
@misc{wwwscyther,
|
school = "Eindhoven University of Technology",
|
||||||
Author = "C.J.F. Cremers",
|
publisher = "University Press Eindhoven",
|
||||||
Title = "The Scyther Tool : Automated Verification of Security Protocols",
|
year = "2006",
|
||||||
Note = "\url{http://www.win.tue.nl/~ccremers/scyther}",
|
|
||||||
url = "http://www.win.tue.nl/~ccremers/scyther"
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
Binary file not shown.
Binary file not shown.
@ -129,7 +129,7 @@ if __name__ == '__main__':
|
|||||||
Simple test case with a few protocols
|
Simple test case with a few protocols
|
||||||
"""
|
"""
|
||||||
|
|
||||||
list = ['me.spdl','ns3.spdl','nsl3.spdl']
|
list = ['nsl3-broken.spdl','ns3.spdl','nsl3.spdl']
|
||||||
print "Performing multi-protocol analysis for the following protocols:", list
|
print "Performing multi-protocol analysis for the following protocols:", list
|
||||||
print
|
print
|
||||||
findAllMPA(list)
|
findAllMPA(list)
|
||||||
|
52
gui/nsl3-broken.spdl
Normal file
52
gui/nsl3-broken.spdl
Normal file
@ -0,0 +1,52 @@
|
|||||||
|
/*
|
||||||
|
* Needham-Schroeder-Lowe protocol,
|
||||||
|
* broken version (wrong role name in first message)
|
||||||
|
*/
|
||||||
|
|
||||||
|
// PKI infrastructure
|
||||||
|
|
||||||
|
const pk: Function;
|
||||||
|
secret sk: Function;
|
||||||
|
inversekeys (pk,sk);
|
||||||
|
|
||||||
|
// The protocol description
|
||||||
|
|
||||||
|
protocol nsl3-broken(I,R)
|
||||||
|
{
|
||||||
|
role I
|
||||||
|
{
|
||||||
|
const ni: Nonce;
|
||||||
|
var nr: Nonce;
|
||||||
|
|
||||||
|
send_1(I,R, {R,ni}pk(R) );
|
||||||
|
read_2(R,I, {ni,nr,R}pk(I) );
|
||||||
|
send_3(I,R, {nr}pk(R) );
|
||||||
|
|
||||||
|
claim_i1(I,Secret,ni);
|
||||||
|
claim_i2(I,Secret,nr);
|
||||||
|
claim_i3(I,Niagree);
|
||||||
|
claim_i4(I,Nisynch);
|
||||||
|
}
|
||||||
|
|
||||||
|
role R
|
||||||
|
{
|
||||||
|
var ni: Nonce;
|
||||||
|
const nr: Nonce;
|
||||||
|
|
||||||
|
read_1(I,R, {R,ni}pk(R) );
|
||||||
|
send_2(R,I, {ni,nr,R}pk(I) );
|
||||||
|
read_3(I,R, {nr}pk(R) );
|
||||||
|
|
||||||
|
claim_r1(R,Secret,ni);
|
||||||
|
claim_r2(R,Secret,nr);
|
||||||
|
claim_r3(R,Niagree);
|
||||||
|
claim_r4(R,Nisynch);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// An untrusted agent, with leaked information
|
||||||
|
|
||||||
|
const Eve: Agent;
|
||||||
|
untrusted Eve;
|
||||||
|
compromised sk(Eve);
|
||||||
|
|
Loading…
Reference in New Issue
Block a user