- More fixes for beta5

This commit is contained in:
ccremers 2006-12-13 13:08:33 +00:00
parent 14b772a41f
commit 5a4fae93b3
6 changed files with 63 additions and 14 deletions

View File

@ -2,14 +2,14 @@
Scyther Scyther
1.0-beta4 1.0-beta5
a automatic verification tool for security protocols an automatic verification tool for security protocols
by Cas Cremers by Cas Cremers
Microsoft Windows binary Microsoft Windows binary
and and
Linux binary compiled for Linux i686 environments Linux binary (compiled for Linux i686 environments)
------------------------------------------------------------------------ ------------------------------------------------------------------------
@ -23,7 +23,7 @@ Note: This is a BETA release, and therefore the usual warnings apply.
For more information, see: For more information, see:
http://www.win.tue.nl/~ccremers/scyther http://people.inf.ethz.ch/cremersc/scyther/index.html
2. Starting out 2. Starting out
@ -41,14 +41,11 @@ SPORE directory.
3. Citing Scyther 3. Citing Scyther
=========================== ===========================
For now, there is no official journal paper to cite yet, but you can use @phdthesis{cremers06,
the following information: Author = "Cas Cremers",
Title = "Scyther - Semantics and Verification of Security Protocols",
@misc{wwwscyther, school = "Eindhoven University of Technology",
Author = "C.J.F. Cremers", publisher = "University Press Eindhoven",
Title = "The Scyther Tool : Automated Verification of Security Protocols", year = "2006",
Note = "\url{http://www.win.tue.nl/~ccremers/scyther}",
url = "http://www.win.tue.nl/~ccremers/scyther"
} }

Binary file not shown.

Binary file not shown.

View File

@ -129,7 +129,7 @@ if __name__ == '__main__':
Simple test case with a few protocols Simple test case with a few protocols
""" """
list = ['me.spdl','ns3.spdl','nsl3.spdl'] list = ['nsl3-broken.spdl','ns3.spdl','nsl3.spdl']
print "Performing multi-protocol analysis for the following protocols:", list print "Performing multi-protocol analysis for the following protocols:", list
print print
findAllMPA(list) findAllMPA(list)

52
gui/nsl3-broken.spdl Normal file
View File

@ -0,0 +1,52 @@
/*
* Needham-Schroeder-Lowe protocol,
* broken version (wrong role name in first message)
*/
// PKI infrastructure
const pk: Function;
secret sk: Function;
inversekeys (pk,sk);
// The protocol description
protocol nsl3-broken(I,R)
{
role I
{
const ni: Nonce;
var nr: Nonce;
send_1(I,R, {R,ni}pk(R) );
read_2(R,I, {ni,nr,R}pk(I) );
send_3(I,R, {nr}pk(R) );
claim_i1(I,Secret,ni);
claim_i2(I,Secret,nr);
claim_i3(I,Niagree);
claim_i4(I,Nisynch);
}
role R
{
var ni: Nonce;
const nr: Nonce;
read_1(I,R, {R,ni}pk(R) );
send_2(R,I, {ni,nr,R}pk(I) );
read_3(I,R, {nr}pk(R) );
claim_r1(R,Secret,ni);
claim_r2(R,Secret,nr);
claim_r3(R,Niagree);
claim_r4(R,Nisynch);
}
}
// An untrusted agent, with leaked information
const Eve: Agent;
untrusted Eve;
compromised sk(Eve);