Is CVE-2024-20666 Bitlocker vulnerability mitigated by disabling Windows RE or removing the recovery parition?

Taking Microsoft’s page on CVE-2024-20666 at face value, that Bitlocker vulnerability is darn serious in an "evil maid" attack:

A successful attacker could bypass the BitLocker Device Encryption feature on the system storage dev… Continue reading Is CVE-2024-20666 Bitlocker vulnerability mitigated by disabling Windows RE or removing the recovery parition?

Is CVE-2024-20666 Bitlocker vulnerability mitigated by disabling Windows RE or removing the recovery parition?

Taking Microsoft’s page on CVE-2024-20666 at face value, that Bitlocker vulnerability is darn serious in an "evil maid" attack:

A successful attacker could bypass the BitLocker Device Encryption feature on the system storage dev… Continue reading Is CVE-2024-20666 Bitlocker vulnerability mitigated by disabling Windows RE or removing the recovery parition?

Support for domain-specific root CAs in X.509 certificate format, OS and browsers

Chance is one gets an invalid certificate warning when one follows this link https://www.cnss.gov. As explained there (same warning) this is on purpose, and the solution is supposed to be to install1 extra root Certification Authority cert… Continue reading Support for domain-specific root CAs in X.509 certificate format, OS and browsers

Dealing with signature verifying against multiple certified public keys

I’m wondering if and how the current public key certificate infrastructure is dealing with the following scenario:

  • Honest Alice obtains Eve’s public key certificate Certe, made by honest CA Carol; checks it the usual way; and assumes she knows Eve’s public kev Pube.
  • Alice generates a message M mentioning obligation by Eve, sends it towards Eve, and receives apparently from Eve a signature S; Alice verifies that M, S, and Pube match.
  • Later, Eve denies having approved M or produced S; suggests that S must be by Frida; and as argument asserts that S also checks against Frida’s certified public key.
  • Alice obtain Frida’s public key certificate Certf, made by honest CA Carl; checks it the usual way; and assumes she knows Frida’s public key Pubf.
  • Alice verifies that indeed M, S, and Pubf match!
  • Pube and Pubf are different, and Alice finds them unremarkable, as well as Certe and Certf; these carry a certification date earlier than the generation of M by Alice; there was no certificate revocation.
  • Alice obtains other (M, S) pairs attributed to Eve and Frida; they verify against only one of Pube or Pubf, as intended.

This was previously asked here on security.SE, moderated out for confirmation (that we now have) that the method in the last section allows Eve to pull this trick (with the cooperation of Frida or by tricking her, when using RSA signature per PKCS#1v2 as practiced, and unless all CAs take more precautions than advertised in their Certification Practices Statements).

That fact leaves the rational part of a cryptographer unmoved: the theoretical security definition of a signature scheme is not broken, and the only mild surprise is that Pube and Pubf are different. This may work with other signature schemes (perhaps with slight relaxations: single signature S, allowing Frida’s certificate Certs to be generated after message M is sent to Eve, letting Eve alter a part of M that does not render to the naked eye..). And while the simple method in the end of the question is detectable if Alice or a judge understands the math of RSA and does a specific feasible check, there is no cryptographic insurance that an analog exists for all attacks and signature schemes.

Is this issue currently dealt with? If not, should that be, and how? Some ideas:

  • Have the problem dealt with in policies for dispute resolution in electronic signature, by explicitly stating that in the circumstance Alice can choose to hold either Eve of Frida responsible for having signed M, regardless of denegation of either.
  • Amend our definition of what’s a secure signature scheme in order to prevent this, and accordingly improve the existing schemes (in the case of PKCS#1v2, it appears that the problem is fixed by mandatorily setting the existing tag input of the signature scheme to the hash of the signer’s public key, and checking this as a necessary condition for signature validity).

Please consider that this is about policies, which is on-topic (if not currently a tag).


Update: the message being a random challenge as in TLS is no obstacle: Eve can authenticate as Eve to Alice and communicate with her, then deny being involved in the communication and assert Frida was, on the ground that logs of the TLS transaction produced by Alice verify against Frida’s public key certificate as well as they do for Eve’s, even though their public keys differ. Alice can’t tell if she was communicating with Eve, or Frida, or another party. The best Alice can hope demonstrate is that both Eve and Frida must have acted at least negligently if the CAs did their job as advertised and the signature scheme used is secure.


That scenario could happen with 2048-bit RSA, usual e=F4=65537, and RSASSA-PSS as signature, assuming Eve and Frida are crooks operating as follows:

  • Eve and Frida jointly choose two distinct small close primes, say re=101 and rf=103; and jointly generate their respective RSA modulus Ne and Nf with Ne=re⋅p⋅q, Nf=rf⋅p⋅q, 22047<Ne<Nf<22048, p and q large random primes with gcd(p-1,65537)=1=gcd(q-1,65537).
  • Eve computes her private exponent de=e-1 mod LCM(re-1,p-1,q-1) matching her public key Pube=(Ne,e) with e=65537. Frida does similarly for df matching her public key Pubf=(Nf,e).
  • Eve and Frida obtain their certificate the normal way; the only caveat is that they avoid CAs that check for small factors in public modulus.
  • When Eve generates a signature using RSASSA-PSS, she proceeds normally, except that she additionally checks the signature against Pubf: about one signature among rf pass this test! Eve iterates signing until finding a signature for M matching her intention to later attribute the signature to Frida, or not. Frida does similarly.

Continue reading Dealing with signature verifying against multiple certified public keys