/** * *@file arachne.c * * Introduces a method for proofs akin to the Athena modelchecker * http://www.ece.cmu.edu/~dawnsong/athena/ * */ #include #include "term.h" #include "termlist.h" #include "role.h" #include "system.h" #include "knowledge.h" #include "compiler.h" #include "states.h" #include "mgu.h" #include "arachne.h" #include "error.h" #include "claim.h" #include "debug.h" #include "binding.h" #include "warshall.h" extern Term CLAIM_Secret; extern Term CLAIM_Nisynch; extern Term CLAIM_Niagree; extern Term TERM_Agent; extern Term TERM_Hidden; extern Term TERM_Function; extern int *graph; extern int nodes; static System sys; static Claimlist current_claim; static int attack_length; Protocol INTRUDER; // Pointers, to be set by the Init Role I_M; // Same here. Role I_F; Role I_T; Role I_V; Role I_R; Role I_E; Role I_D; Role I_RRS; static int indentDepth; static int max_encryption_level; static int num_regular_runs; static int num_intruder_runs; struct goalstruct { int run; int index; Roledef rd; }; typedef struct goalstruct Goal; /** * Forward declarations */ int iterate (); /** * Program code */ //! Init Arachne engine void arachneInit (const System mysys) { Term GVT; Roledef rd = NULL; Termlist tl, know0; void add_event (int event, Term message) { rd = roledefAdd (rd, event, NULL, NULL, NULL, message, NULL); } Role add_role (const char *rolenamestring) { Role r; Term rolename; rolename = makeGlobalConstant (rolenamestring); r = roleCreate (rolename); r->roledef = rd; rd = NULL; r->next = INTRUDER->roles; INTRUDER->roles = r; // compute_role_variables (sys, INTRUDER, r); return r; } sys = mysys; // make sys available for this module as a global /** * Very important: turn role terms that are local to a run, into variables. */ term_rolelocals_are_variables (); /* * Add intruder protocol roles */ INTRUDER = protocolCreate (makeGlobalConstant (" INTRUDER ")); GVT = makeGlobalVariable ("GlobalVariable"); add_event (SEND, GVT); I_M = add_role ("I_M: Atomic message"); add_event (READ, NULL); add_event (READ, NULL); add_event (SEND, NULL); I_RRS = add_role ("I_E: Encrypt"); return; } //! Close Arachne engine void arachneDone () { return; } //------------------------------------------------------------------------ // Detail //------------------------------------------------------------------------ /* * runs[rid].step is now the number of 'valid' events within the run, but we * call it 'length' here. */ #define INVALID -1 #define isGoal(rd) (rd->type == READ && !rd->internal) #define isBound(rd) (rd->bound) #define length step //! Indent print void indentPrint () { int i; for (i = 0; i < indentDepth; i++) { if (i % 3 == 0) eprintf ("|"); else eprintf (" "); eprintf (" "); } } //! Print indented binding void binding_indent_print (const Binding b, const int flag) { indentPrint (); if (flag) eprintf ("!! "); binding_print (b); eprintf ("\n"); } //! Determine whether a term is a functor int isTermFunctionName (Term t) { t = deVar (t); if (t != NULL && isTermLeaf(t) && t->stype != NULL && inTermlist (t->stype, TERM_Function)) return 1; return 0; } //! Determine whether a term is a function application. Returns the function term. Term getTermFunction (Term t) { t = deVar (t); if (t != NULL) { if (realTermEncrypt (t) && isTermFunctionName (t->right.key)) { return t->right.key; } } return NULL; } //! Wrapper for roleInstance /** *@return Returns the run number */ int semiRunCreate (const Protocol p, const Role r) { int run; if (p == INTRUDER) num_intruder_runs++; else num_regular_runs++; roleInstance (sys, p, r, NULL, NULL); run = sys->maxruns - 1; sys->runs[run].length = 0; return run; } //! Wrapper for roleDestroy void semiRunDestroy () { if (sys->maxruns > 0) { Protocol p; p = sys->runs[sys->maxruns - 1].protocol; roleInstanceDestroy (sys); if (p == INTRUDER) num_intruder_runs--; else num_regular_runs--; } } //! After a role instance, or an extension of a run, we might need to add some goals /** * From old to new. Sets the new length to new. *@returns The number of goals added (for destructions) */ int add_read_goals (const int run, const int old, const int new) { int count; int i; Roledef rd; sys->runs[run].length = new; i = old; rd = roledef_shift (sys->runs[run].start, i); count = 0; while (i < new && rd != NULL) { if (rd->type == READ) { if (sys->output == PROOF) { if (count == 0) { indentPrint (); eprintf ("Thus, we must also produce "); } else { eprintf (", "); } termPrint (rd->message); } goal_add (rd->message, run, i, 0); count++; } rd = rd->next; i++; } if ((count > 0) && sys->output == PROOF) { eprintf ("\n"); } return count; } //! Remove n goals void remove_read_goals (int n) { while (n > 0) { goal_remove_last (); n--; } } //! Determine the run that follows from a substitution. /** * After an Arachne unification, stuff might go wrong w.r.t. nonce instantiation. * This function determines the run that is implied by a substitution list. * @returns >= 0: a run, -1 for invalid, -2 for any run. */ int determine_unification_run (Termlist tl) { int run; run = -2; while (tl != NULL) { //! Again, hardcoded reference to compiler.c. Level -3 means a local constant for a role. if (tl->term->type != VARIABLE && tl->term->right.runid == -3) { Term t; t = tl->term->subst; // It is required that it is actually a leaf, because we construct it. if (!realTermLeaf (t)) { return -1; } else { if (run == -2) { // Any run run = t->right.runid; } else { // Specific run: compare if (run != t->right.runid) { return -1; } } } } tl = tl->next; } return run; } //! Determine trace length int get_trace_length () { int run; int length; run = 0; length = 0; while (run < sys->maxruns) { if (sys->runs[run].protocol != INTRUDER) { // Non-intruder run: count length // Subtract 'firstReal' to ignore chooses. length = length + sys->runs[run].length - sys->runs[run].firstReal; } run++; } return length; } //------------------------------------------------------------------------ // Proof reporting //------------------------------------------------------------------------ //! Protocol/role name of a run void role_name_print (const int run) { eprintf ("protocol "); termPrint (sys->runs[run].protocol->nameterm); eprintf (", role "); termPrint (sys->runs[run].role->nameterm); } //! Adding a run/extending a run void proof_suppose_run (const int run, const int oldlength, const int newlength) { if (sys->output == PROOF) { int reallength; indentPrint (); eprintf ("Suppose "); if (oldlength == 0) eprintf ("there is a "); else eprintf ("we extend "); reallength = roledef_length (sys->runs[run].start); if (reallength > newlength) eprintf ("semi-"); eprintf ("run #%i of ", run); role_name_print (run); if (reallength > newlength) { if (oldlength == 0) eprintf (" of"); else eprintf (" to"); eprintf (" length %i", newlength); } eprintf ("\n"); } } //! Select a goal void proof_select_goal (Binding b) { if (sys->output == PROOF) { Roledef rd; rd = roledef_shift (sys->runs[b->run_to].start, b->ev_to); indentPrint (); eprintf ("Selected goal: Where does term "); termPrint (b->term); eprintf (" occur first as an interm?\n"); indentPrint (); eprintf ("* It is required for "); roledefPrint (rd); eprintf (" at index %i in run %i\n", b->ev_to, b->run_to); } } //! Cannot bind because of cycle void proof_cannot_bind (const Binding b, const int run, const int index) { if (sys->output == PROOF) { indentPrint (); eprintf ("Cannot bind this to run %i, index %i because that introduces a cycle.\n", run, index); } } //! Test a binding void proof_suppose_binding (Binding b) { if (sys->output == PROOF) { Roledef rd; indentPrint (); rd = roledef_shift (sys->runs[b->run_from].start, b->ev_from); eprintf ("Suppose it originates in run %i, at index %i\n", b->run_from, b->ev_from); indentPrint (); eprintf ("* I.e. event "); roledefPrint (rd); eprintf ("\n"); indentPrint (); eprintf ("* from "); role_name_print (b->run_from); eprintf ("\n"); } } //------------------------------------------------------------------------ // Sub //------------------------------------------------------------------------ //! Iterate over all send types in the roles (including the intruder ones) /** * Function is called with (protocol pointer, role pointer, roledef pointer, index) * and returns an integer. If it is false, iteration aborts. */ int iterate_role_sends (int (*func) ()) { Protocol p; p = sys->protocols; while (p != NULL) { Role r; r = p->roles; while (r != NULL) { Roledef rd; int index; rd = r->roledef; index = 0; while (rd != NULL) { if (rd->type == SEND) { if (!func (p, r, rd, index)) return 0; } index++; rd = rd->next; } r = r->next; } p = p->next; } return 1; } //! Try to bind a specific existing run to a goal. /** * The key goals are bound to the goal. *@param subterm determines whether it is a subterm unification or not. */ int bind_existing_to_goal (const Binding b, const int run, const int index) { Roledef rd; int flag; int old_length; int newgoals; int found; int subterm_iterate (Termlist substlist, Termlist keylist) { int flag; found++; flag = 1; /** * Now create the new bindings */ if (goal_bind (b, run, index)) { int keycount; Termlist tl; proof_suppose_binding (b); if (keylist != NULL && sys->output == PROOF) { indentPrint (); eprintf ("This introduces the obligation to produce the following keys: "); termlistPrint (keylist); eprintf ("\n"); } keycount = 0; tl = keylist; while (tl != NULL) { int keyrun; goal_add (tl->term, b->run_to, b->ev_to, 1); tl = tl->next; keycount++; } indentDepth++; flag = flag && iterate (); indentDepth--; while (keycount > 0) { goal_remove_last (); keycount--; } } else { proof_cannot_bind (b, run, index); } goal_unbind (b); return flag; } //---------------------------- // Roledef entry rd = roledef_shift (sys->runs[run].start, index); // Fix length old_length = sys->runs[run].length; if ((index + 1) > old_length) newgoals = add_read_goals (run, old_length, index + 1); else newgoals = 0; // Bind to existing run found = 0; flag = termMguSubTerm (b->term, rd->message, subterm_iterate, sys->know->inverses, NULL); // Did it work? if (found == 0 && sys->output == PROOF) { indentPrint (); eprintf ("Cannot bind "); termPrint (b->term); eprintf (" to run %i, index %i because it does not subterm-unify.\n", run, index); } // Reset length remove_read_goals (newgoals); sys->runs[run].length = old_length; return flag; } //! Bind a goal to an existing regular run, if possible int bind_existing_run (const Binding b, const Protocol p, const Role r, const int index) { int run, flag; int found; flag = 1; found = 0; for (run = 0; run < sys->maxruns; run++) { if (sys->runs[run].protocol == p && sys->runs[run].role == r) { found++; if (sys->output == PROOF) { if (found == 1) { indentPrint (); eprintf ("Can we bind it to an existing regular run of "); termPrint (p->nameterm); eprintf (", "); termPrint (r->nameterm); eprintf ("?\n"); } indentPrint (); eprintf ("%i. Can we bind it to run %i?\n", found, run); } indentDepth++; flag = flag && bind_existing_to_goal (b, run, index); indentDepth--; } } if (sys->output == PROOF && found == 0) { indentPrint (); eprintf ("There is no existing run for "); termPrint (p->nameterm); eprintf (", "); termPrint (r->nameterm); eprintf ("\n"); } return flag; } //! Bind a goal to a new run int bind_new_run (const Binding b, const Protocol p, const Role r, const int index) { int run; int flag; int newgoals; run = semiRunCreate (p, r); proof_suppose_run (run, 0, index + 1); newgoals = add_read_goals (run, 0, index + 1); indentDepth++; flag = bind_existing_to_goal (b, run, index); indentDepth--; remove_read_goals (newgoals); semiRunDestroy (); return flag; } //! Display the current semistate using dot output format. void dotSemiState () { static int attack_number = 0; int run; Protocol p; void node (const int run, const int index) { if (sys->runs[run].protocol == INTRUDER) { if (sys->runs[run].role == I_M) { eprintf ("m0"); } else { eprintf ("i%i", run); } } else { eprintf ("r%ii%i", run, index); } } // Open graph attack_number++; eprintf ("digraph semiState%i {\n", attack_number); eprintf ("\tlabel = \"Protocol "); p = (Protocol) current_claim->protocol; termPrint (p->nameterm); eprintf (", role "); termPrint (current_claim->rolename); eprintf (", claim type "); termPrint (current_claim->type); eprintf ("\";\n"); // Draw graph // First, all simple runs run = 0; while (run < sys->maxruns) { Roledef rd; int index; index = 0; rd = sys->runs[run].start; if (sys->runs[run].protocol != INTRUDER) { // Regular run eprintf ("\tsubgraph cluster_run%i {\n", run); eprintf ("\t\tlabel = \""); eprintf ("#%i: ", run); termPrint (sys->runs[run].protocol->nameterm); eprintf (", "); agentsOfRunPrint (sys, run); eprintf ("\";\n", run); if (run == 0) { eprintf ("\t\tcolor = red;\n"); } else { eprintf ("\t\tcolor = blue;\n"); } while (index < sys->runs[run].length) { // Print node itself eprintf ("\t\t"); node (run, index); eprintf (" ["); if (run == 0 && index == current_claim->ev) { eprintf ("style=filled,fillcolor=mistyrose,color=salmon,shape=doubleoctagon,"); } else { eprintf ("shape=box,"); } eprintf ("label=\""); roledefPrint (rd); eprintf ("\"]"); eprintf (";\n"); // Print binding to previous node if (index > sys->runs[run].firstReal) { // index > 0 eprintf ("\t\t"); node (run, index - 1); eprintf (" -> "); node (run, index); eprintf (" [style=\"bold\", weight=\"2.0\"]"); eprintf (";\n"); } else { // index <= firstReal if (index == sys->runs[run].firstReal) { // index == firstReal Roledef rd; int send_before_read; int done; // Determine if it is an active role or note /** *@todo note that this will probably become a standard function call for role.h */ rd = roledef_shift (sys->runs[run].start, sys->runs[run].firstReal); done = 0; send_before_read = 0; while (!done && rd != NULL) { if (rd->type == READ) { done = 1; } if (rd->type == SEND) { done = 1; send_before_read = 1; } rd = rd->next; } if (done) { // Activity other than claims... if (send_before_read) { // Sends first. // Show this explicitly in the graph by adding a prefix start node eprintf ("\t\ts%i [label=\"Start ", run); agentsOfRunPrint (sys, run); eprintf ("\", shape=diamond];\n"); eprintf ("\t\ts%i -> ", run); node (run, index); eprintf (";\n"); } } } } index++; rd = rd->next; } eprintf ("\t}\n"); } run++; } // Second, all bindings. // We now determine them ourselves between existing runs goal_graph_create (); // create graph warshall (graph, nodes); // determine closure run = 0; while (run < sys->maxruns) { if (sys->runs[run].protocol != INTRUDER) { int ev; ev = 0; while (ev < sys->runs[run].length) { /** * Determine wheter to draw an incoming arrow to this event. * We check all other runs, to see if they are ordered. */ int run2; run2 = 0; while (run2 < sys->maxruns) { if (run2 != run && sys->runs[run2].protocol != INTRUDER) { // Is this run before the event? int ev2; int ev2_found; int found; found = 0; ev2 = 0; ev2_found = 0; while (ev2 < sys->runs[run2].length) { if (graph[graph_nodes (nodes, run2, ev2, run, ev)] != 0) { found = 1; ev2_found = ev2; } ev2++; } ev2 = ev2_found; if (found == 1) { // It is before the event, and thus we would like to draw it. // However, if there is another path along which we can get here, forget it /** * Note that this algorithm is similar to Floyd's algorithm for all shortest paths. * The goal here is to select only the path with distance 1 (as viewed from the regular runs), * so we can simplify stuff a bit. * Nevertheless, using Floyd first would probably be faster. */ int run3; int other_route; other_route = 0; run3 = 0; while (other_route == 0 && run3 < sys->maxruns) { if (sys->runs[run3].protocol != INTRUDER) { int ev3; ev3 = 0; while (other_route == 0 && ev3 < sys->runs[run3].length) { if (graph [graph_nodes (nodes, run2, ev2, run3, ev3)] != 0 && graph[graph_nodes (nodes, run3, ev3, run, ev)] != 0) { // other route found other_route = 1; } ev3++; } } run3++; } if (other_route == 0) { eprintf ("\t"); node (run2, ev2); eprintf (" -> "); node (run, ev); eprintf (";\n"); } } } run2++; } ev++; } } run++; } // close graph eprintf ("};\n\n"); } //! Print the current semistate void printSemiState () { int run; int open; List bl; int binding_state_print (void *dt) { binding_indent_print ((Binding) dt, 1); return 1; } indentPrint (); eprintf ("!! --=[ Semistate ]=--\n"); indentPrint (); eprintf ("!!\n"); indentPrint (); eprintf ("!! Trace length: %i\n", get_trace_length ()); open = 0; for (run = 0; run < sys->maxruns; run++) { int index; Role r; Roledef rd; Term oldagent; indentPrint (); eprintf ("!!\n"); indentPrint (); eprintf ("!! [ Run %i, ", run); termPrint (sys->runs[run].protocol->nameterm); eprintf (", "); r = sys->runs[run].role; oldagent = r->nameterm->subst; r->nameterm->subst = NULL; termPrint (r->nameterm); r->nameterm->subst = oldagent; if (oldagent != NULL) { eprintf (": "); termPrint (oldagent); } eprintf (" ]\n"); index = 0; rd = sys->runs[run].start; while (index < sys->runs[run].length) { indentPrint (); eprintf ("!! %i ", index); roledefPrint (rd); eprintf ("\n"); if (isGoal (rd) && !isBound (rd)) open++; index++; rd = rd->next; } } if (sys->bindings != NULL) { indentPrint (); eprintf ("!!\n"); list_iterate (sys->bindings, binding_state_print); } indentPrint (); eprintf ("!!\n"); indentPrint (); eprintf ("!! - open: %i -\n", open); } //------------------------------------------------------------------------ // Larger logical componentents //------------------------------------------------------------------------ //! Goal selection /** * Selects the most constrained goal. * * First selection is on level; thus, keys are selected first. * * Because the list starts with the newest terms, and we use <= (as opposed to <), we * ensure that for goals with equal constraint levels, we select the oldest one. */ Binding select_goal () { List bl; Binding best; float min_constrain; int max_level; // Find the most constrained goal if (sys->output == PROOF) { indentPrint (); eprintf ("Listing open goals that might be chosen: "); } max_level = -1; // 0 is the minimum level best = NULL; bl = sys->bindings; while (bl != NULL) { Binding b; b = (Binding) bl->data; // Ignore singular variables if (!b->done && !realTermVariable (deVar(b->term)) ) //if (!b->done) { float cons; if (sys->output == PROOF && best != NULL) eprintf (", "); if (b->level >= max_level) { if (b->level > max_level) { max_level = b->level; min_constrain = 1; // 1 is the maximum } cons = term_constrain_level (b->term); if (cons <= min_constrain) { min_constrain = cons; best = b; if (sys->output == PROOF) eprintf ("*"); } } if (sys->output == PROOF) { termPrint (b->term); eprintf ("[%i]", b->level); } } bl = bl->next; } if (sys->output == PROOF) { if (best == NULL) eprintf ("none"); eprintf ("\n"); } return best; } //! Create a new intruder run to generate knowledge from m0 int bind_goal_new_m0 (const Binding b) { Termlist m0tl; int flag; int found; flag = 1; found = 0; m0tl = knowledgeSet (sys->know); while (flag && m0tl != NULL) { Term m0t; Termlist subst; m0t = m0tl->term; subst = termMguTerm (b->term, m0t); if (subst != MGUFAIL) { int run; run = semiRunCreate (INTRUDER, I_M); proof_suppose_run (run, 0, 1); sys->runs[run].start->message = termDuplicate (b->term); sys->runs[run].length = 1; indentDepth++; if (goal_bind (b, run, 0)) { found++; proof_suppose_binding (b); if (sys->output == PROOF) { indentPrint (); eprintf ("* I.e. retrieving "); termPrint (b->term); eprintf (" from the initial knowledge.\n"); } flag = flag && iterate (); } else { proof_cannot_bind (b, run, 0); } goal_unbind (b); indentDepth--; semiRunDestroy (); termlistSubstReset (subst); termlistDelete (subst); } m0tl = m0tl->next; } if (found == 0 && sys->output == PROOF) { indentPrint (); eprintf ("Term "); termPrint (b->term); eprintf (" cannot be constructed from the initial knowledge.\n"); } termlistDelete (m0tl); return flag; } //! Bind an intruder goal by intruder composition construction /** * Handles the case where the intruder constructs a composed term himself. */ int bind_goal_new_encrypt (const Binding b) { Term term; int flag; int can_be_encrypted; flag = 1; term = deVar (b->term); can_be_encrypted = 0; if (!realTermLeaf (term)) { int run; int index; int newgoals; Roledef rd; Term t1, t2; if (!realTermEncrypt (term)) { // tuple construction error ("Goal that is a tuple should not occur!"); } // must be encryption t1 = term->left.op; t2 = term->right.key; if (t2 != TERM_Hidden) { can_be_encrypted = 1; run = semiRunCreate (INTRUDER, I_RRS); rd = sys->runs[run].start; rd->message = termDuplicateUV (t1); rd->next->message = termDuplicateUV (t2); rd->next->next->message = termDuplicateUV (term); index = 2; proof_suppose_run (run, 0, index + 1); if (sys->output == PROOF) { indentPrint (); eprintf ("* Encrypting "); termPrint (term); eprintf (" using term "); termPrint (t1); eprintf (" and key "); termPrint (t2); eprintf ("\n"); } newgoals = add_read_goals (run, 0, index + 1); indentDepth++; if (goal_bind (b, run, index)) { proof_suppose_binding (b); flag = flag && iterate (); } else { proof_cannot_bind (b, run, index); } goal_unbind (b); indentDepth--; remove_read_goals (newgoals); semiRunDestroy (); } } if (!can_be_encrypted) { if (sys->output == PROOF) { indentPrint (); eprintf ("Term "); termPrint (b->term); eprintf (" cannot be constructed by encryption.\n"); } } return flag; } //! Bind an intruder goal by intruder construction /** * Handles the case where the intruder constructs a composed term himself. */ int bind_goal_new_intruder_run (const Binding b) { int flag; if (sys->output == PROOF) { indentPrint (); eprintf ("Can we bind "); termPrint (b->term); eprintf (" from a new intruder run?\n"); } indentDepth++; flag = bind_goal_new_m0 (b); flag = flag && bind_goal_new_encrypt (b); indentDepth--; return flag; } //! Bind a regular goal /** * Problem child. Valgrind does not like it. */ int bind_goal_regular_run (const Binding b) { int flag; int found; int test_sub_unification (Termlist substlist, Termlist keylist) { // A unification exists; return the signal return 0; } /* * This is a local function so we have access to goal */ int bind_this_role_send (Protocol p, Role r, Roledef rd, int index) { if (p == INTRUDER) { // No intruder roles here return 1; } // Test for interm unification #ifdef DEBUG if (DEBUGL (5)) { indentPrint (); eprintf ("Checking send candidate with message "); termPrint (rd->message); eprintf (" from "); termPrint (p->nameterm); eprintf (", "); termPrint (r->nameterm); eprintf (", index %i\n", index); } #endif if (!termMguSubTerm (b->term, rd->message, test_sub_unification, sys->know->inverses, NULL)) { int sflag; // A good candidate found++; if (sys->output == PROOF && found == 1) { indentPrint (); eprintf ("The term ", found); termPrint (b->term); eprintf (" matches patterns from the role definitions. Investigate.\n"); } if (sys->output == PROOF) { indentPrint (); eprintf ("%i. It matches the pattern ", found); termPrint (rd->message); eprintf (" from "); termPrint (p->nameterm); eprintf (", "); termPrint (r->nameterm); eprintf (", at %i\n", index); } indentDepth++; // Bind to existing run sflag = bind_existing_run (b, p, r, index); // bind to new run sflag = sflag && bind_new_run (b, p, r, index); indentDepth--; return sflag; } else { return 1; } } // Bind to all possible sends of regular runs found = 0; flag = iterate_role_sends (bind_this_role_send); if (sys->output == PROOF && found == 0) { indentPrint (); eprintf ("The term "); termPrint (b->term); eprintf (" does not match any pattern from the role definitions.\n"); } return flag; } // Bind to all possible sends of intruder runs int bind_goal_old_intruder_run (Binding b) { int run; int flag; int found; found = 0; flag = 1; for (run = 0; run < sys->maxruns; run++) { if (sys->runs[run].protocol == INTRUDER) { int ev; Roledef rd; rd = sys->runs[run].start; ev = 0; while (ev < sys->runs[run].length) { if (rd->type == SEND) { found++; if (sys->output == PROOF && found == 1) { indentPrint (); eprintf ("Suppose it is from an existing intruder run.\n"); } indentDepth++; flag = flag && bind_existing_to_goal (b, run, ev); indentDepth--; } rd = rd->next; ev++; } } } if (sys->output == PROOF && found == 0) { indentPrint (); eprintf ("No existing intruder runs to match to.\n"); } return flag; } //! Bind a goal in all possible ways int bind_goal (const Binding b) { if (!b->done) { int flag; int know_only; Term function; proof_select_goal (b); indentDepth++; // Prune: if it is an SK type construct, ready // No regular run will apply SK for you. //!@todo This still needs a lemma, and a more generic (correct) algorithm!! know_only = 0; function = getTermFunction (b->term); if (function != NULL) { if (!inKnowledge (sys->know, function)) { // Prune because we didn't know it before, and it is never subterm-sent if (sys->output == PROOF) { indentPrint (); eprintf ("* Because "); termPrint (b->term); eprintf (" is never sent from a regular run (STILL NEEDS LEMMA!), we only intruder construct it.\n"); } know_only = 1; } } if (know_only) { // Special case: only from intruder flag = flag && bind_goal_old_intruder_run (b); flag = flag && bind_goal_new_intruder_run (b); } else { // Normal case flag = bind_goal_regular_run (b); flag = flag && bind_goal_old_intruder_run (b); flag = flag && bind_goal_new_intruder_run (b); } indentDepth--; return flag; } else { return 1; } } //! Prune determination because of theorems /** *@returns true iff this state is invalid because of a theorem */ int prune_theorems () { Termlist tl; List bl; int run; // Check if all agents are agents (!) run = 0; while (run < sys->maxruns) { Termlist agl; agl = sys->runs[run].agents; while (agl != NULL) { Term agent; agent = deVar(agl->term); if (agent == NULL) { error ("Agent of run %i is NULL", run); } if (!realTermLeaf (agent) || (agent->stype != NULL && !inTermlist (agent->stype, TERM_Agent))) { if (sys->output == PROOF) { indentPrint (); eprintf ("Pruned because the agent "); termPrint (agent); eprintf (" of run %i is not of a compatible type.\n", run); } return 1; } agl = agl->next; } run++; } // Check if all agents of the main run are valid tl = sys->runs[0].agents; while (tl != NULL) { Term agent; agent = deVar (tl->term); if (!realTermVariable (agent) && inTermlist (sys->untrusted, agent)) { if (sys->output == PROOF) { indentPrint (); eprintf ("Pruned because all agents of the claim run must be trusted.\n"); } return 1; } tl = tl->next; } // Check if the actors of all other runs are not untrusted if (sys->untrusted != NULL) { int run; run = 1; while (run < sys->maxruns) { if (sys->runs[run].protocol != INTRUDER) { if (sys->runs[run].agents != NULL) { Term actor; actor = agentOfRun(sys, run); if (actor == NULL) { error ("Agent of run %i is NULL", run); } if (inTermlist (sys->untrusted, actor)) { if (sys->output == PROOF) { indentPrint (); eprintf ("Pruned because the actor of run %i is untrusted.\n", run); } } } else { Protocol p; globalError++; eprintf ("Run %i: ", run); role_name_print (run); eprintf (" has an empty agents list.\n"); eprintf ("protocol->rolenames: "); p = (Protocol) sys->runs[run].protocol; termlistPrint (p->rolenames); eprintf ("\n"); error ("Aborting."); globalError--; } } run++; } } // Check for c-minimality if (!bindings_c_minimal ()) { if (sys->output == PROOF) { indentPrint (); eprintf ("Pruned because this is not <=c-minimal.\n"); } return 1; } /** * Check whether the bindings are valid */ bl = sys->bindings; while (bl != NULL) { Binding b; b = bl->data; // Check for "Hidden" interm goals if (termInTerm (b->term, TERM_Hidden)) { // Prune the state: we can never meet this if (sys->output == PROOF) { indentPrint (); eprintf ("Pruned because intruder can never construnct "); termPrint (b->term); eprintf ("\n"); } return 1; } // Check for encryption levels if (sys->match < 2 && (term_encryption_level (b->term) > max_encryption_level)) { // Prune: we do not need to construct such terms if (sys->output == PROOF) { indentPrint (); eprintf ("Pruned because the encryption level of "); termPrint (b->term); eprintf (" is too high.\n"); } return 1; } // Check for SK-type function occurrences //!@todo Needs a LEMMA, although this seems to be quite straightforward to prove. // The idea is that functions are never sent as a whole, but only used in applications. if (isTermFunctionName (b->term)) { if (!inKnowledge (sys->know, b->term)) { // Not in initial knowledge of the intruder if (sys->output == PROOF) { indentPrint (); eprintf ("Pruned because the function "); termPrint (b->term); eprintf (" is not known initially to the intruder.\n"); } return 1; } } bl = bl->next; } return 0; } //! Prune determination for bounds /** *@returns true iff this state is invalid for some reason */ int prune_bounds () { Termlist tl; List bl; if (num_regular_runs > sys->switchRuns) { // Hardcoded limit on runs if (sys->output == PROOF) { indentPrint (); eprintf ("Pruned: too many regular runs (%i).\n", num_regular_runs); } return 1; } // This needs some foundation. Probably * 2^max_encryption_level //!@todo Fix this bound if ((sys->match < 2) && (num_intruder_runs > ((double) sys->switchRuns * max_encryption_level * 8))) { // Hardcoded limit on iterations if (sys->output == PROOF) { indentPrint (); eprintf ("Pruned: %i intruder runs is too much. (max encr. level %i)\n", num_intruder_runs, max_encryption_level); } return 1; } // Limit on exceeding any attack length if (sys->prune == 2 && get_trace_length () >= attack_length) { if (sys->output == PROOF) { indentPrint (); eprintf ("Pruned: we already know an attack of length %i.\n", attack_length); } return 1; } // No pruning because of bounds return 0; } //! Prune determination for specific properties /** * Sometimes, a property holds in part of the tree. Thus, we don't need to explore that part further if we want to find an attack. * *@returns true iff this state is invalid for some reason */ int prune_claim_specifics () { if (current_claim->type == CLAIM_Niagree) { if (arachne_claim_niagree (sys, 0, current_claim->ev)) { current_claim->count = statesIncrease (current_claim->count); if (sys->output == PROOF) { indentPrint (); eprintf ("Pruned: niagree holds in this part of the proof tree.\n"); } return 1; } } if (current_claim->type == CLAIM_Nisynch) { if (arachne_claim_nisynch (sys, 0, current_claim->ev)) { current_claim->count = statesIncrease (current_claim->count); if (sys->output == PROOF) { indentPrint (); eprintf ("Pruned: nisynch holds in this part of the proof tree.\n"); } return 1; } } return 0; } //! Setup system for specific claim test add_claim_specifics (const Claimlist cl, const Roledef rd) { if (cl->type == CLAIM_Secret) { /** * Secrecy claim */ if (sys->output == PROOF) { indentPrint (); eprintf ("* To verify the secrecy claim, we add the term "); termPrint (rd->message); eprintf (" as a goal.\n"); indentPrint (); eprintf ("* If all goals can be bound, this constitutes an attack.\n"); } /** * We say that a state exists for secrecy, but we don't really test wheter the claim can * be reached (without reaching the attack). */ cl->count = statesIncrease (cl->count); goal_add (rd->message, 0, cl->ev, 0); // Assumption that all claims are in run 0 } } //! Count a false claim void count_false () { current_claim->failed = statesIncrease (current_claim->failed); } //------------------------------------------------------------------------ // Main logic core //------------------------------------------------------------------------ //! Check properties int property_check () { int flag; int attack_this; flag = 1; /** * By the way the claim is handled, this automatically means a flaw. */ count_false (); if (sys->output == ATTACK) dotSemiState (); // Store attack length if shorter attack_this = get_trace_length (); if (attack_this < attack_length) { // Shortest attack attack_length = attack_this; if (sys->output == PROOF) { indentPrint (); eprintf ("New shortest attack found with trace length %i.\n", attack_length); } } return flag; } //! Main recursive procedure for Arachne int iterate () { int flag; flag = 1; if (!prune_theorems ()) { if (!prune_claim_specifics ()) { if (!prune_bounds ()) { Binding b; /** * Not pruned: count */ sys->states = statesIncrease (sys->states); /** * Check whether its a final state (i.e. all goals bound) */ b = select_goal (); if (b == NULL) { /* * all goals bound, check for property */ if (sys->output == PROOF) { indentPrint (); eprintf ("All goals are now bound.\n"); } sys->claims = statesIncrease (sys->claims); current_claim->count = statesIncrease (current_claim->count); flag = property_check (); } else { /* * bind this goal in all possible ways and iterate */ flag = bind_goal (b); } } else { // Pruned because of bound! current_claim->complete = 0; } } } #ifdef DEBUG if (DEBUGL (5) && !flag) { warning ("Flag has turned 0!"); } #endif return flag; } //! Main code for Arachne /** * For this test, we manually set up some stuff. * * But later, this will just iterate over all claims. */ int arachne () { Claimlist cl; int print_send (Protocol p, Role r, Roledef rd, int index) { eprintf ("IRS: "); termPrint (p->nameterm); eprintf (", "); termPrint (r->nameterm); eprintf (", %i, ", index); roledefPrint (rd); eprintf ("\n"); return 1; } int determine_encrypt_max (Protocol p, Role r, Roledef rd, int index) { int tlevel; tlevel = term_encryption_level (rd->message); if (tlevel > max_encryption_level) max_encryption_level = tlevel; return 1; } /* * set up claim role(s) */ if (sys->switchRuns == 0) { // No real checking. return; } if (sys->maxruns > 0) { error ("Something is wrong, number of runs >0."); } num_regular_runs = 0; num_intruder_runs = 0; max_encryption_level = 0; iterate_role_sends (determine_encrypt_max); #ifdef DEBUG if (DEBUGL (1)) { eprintf ("Maximum encryption level: %i\n", max_encryption_level); iterate_role_sends (print_send); } #endif indentDepth = 0; cl = sys->claimlist; while (cl != NULL) { /** * Check each claim */ Protocol p; Role r; if (sys->switchClaimToCheck == NULL || sys->switchClaimToCheck == cl->type) { int run; current_claim = cl; attack_length = INT_MAX; cl->complete = 1; p = (Protocol) cl->protocol; r = (Role) cl->role; if (sys->output == PROOF) { indentPrint (); eprintf ("Testing Claim "); termPrint (cl->type); eprintf (" from "); termPrint (p->nameterm); eprintf (", "); termPrint (r->nameterm); eprintf (" at index %i.\n", cl->ev); } indentDepth++; run = semiRunCreate (p, r); proof_suppose_run (run, 0, cl->ev + 1); add_read_goals (run, 0, cl->ev + 1); /** * Add specific goal info */ add_claim_specifics (cl, roledef_shift (sys->runs[run].start, cl->ev)); #ifdef DEBUG if (DEBUGL (5)) { printSemiState (); } #endif // Iterate iterate (); //! Destroy while (sys->bindings != NULL) { remove_read_goals (1); } while (sys->maxruns > 0) { semiRunDestroy (); } indentDepth--; } // next cl = cl->next; } }