Software:RSA BSAFE

From HandWiki
RSA BSAFE
Developer(s)RSA Security
Initial release1996
Written inC, assembly, Java
Operating systemBSD, Linux, macOS, Microsoft Windows, Android, iOS, AIX, Solaris
TypeCryptography library, Commercial software
LicenseProprietary
Websitewww.rsa.com

RSA BSAFE is a FIPS 140-2 validated cryptography library, available in both C and Java, offered by RSA Security. It was one of the most common ones before the RSA patent expired in September 2000. It also contained implementations of the RCx ciphers, with the most common one being RC4. From 2004 to 2013 the default random number generator in the library was a NIST-approved RNG standard, widely known to be insecure from at least 2006, withdrawn in 2014, suspected to contain an alleged kleptographic backdoor from the American National Security Agency (NSA), as part of its secret Bullrun program.[1]

SSL-C

SSL-C
Final release
2.8.9 / March 13, 2014; 9 years ago (2014-03-13)
Written inC, assembly
Operating systemLinux and Microsoft Windows

The SSL-C library is an SSL toolkit in the BSAFE suite. It was originally written by Eric A. Young and Tim J. Hudson, as a fork of the open library SSLeay, that they developed prior to joining RSA.[2][3] Like SSLeay, SSL-C supported SSLv2, SSLv3, TLSv1; while it also supports X.509v1 and X.509v3.[4] SSL-C was first released in 1999.[5] The algorithm was one of several available in the libraries that users were able to choose from.[6]

SSL-C reached End Of Life in December 2016.

Cert-J

Cert-J
Stable release
6.2.4 / February 21, 2018; 5 years ago (2018-02-21)
Written inJava

Cert-J is a Public Key Infrastructure API software library, written in Java. It contains the cryptographic support necessary to generate certificate requests, create and sign digital certificates, and create and distribute certificate revocation lists. Cert-J is built on the RSA BSAFE Crypto-J cryptographic engine.

Cert-J supports multiple PKCS standards such as PKCS #7, #8, #11, #12 as well as X.509 and CMP.

As of Cert-J 6.2.4, the entire API has been deprecated in favor of similar functionality provided BSAFE Crypto-J JCE API.

Crypto-C Micro Edition

Crypto-C Micro Edition
Stable release
4.1.4 / September 11, 2019; 4 years ago (2019-09-11)
Written inC, assembly

RSA BSAFE Crypto-C Micro Edition (Crypto-C ME) was initially released in June 2001 under the name "RSA BSAFE Wireless Core 1.0". The initial release targeted Microsoft Windows, EPOC, Linux, Solaris and Palm OS.

The initial features provided RSA key generation, encryption and decryption, and signing and verification; MultiPrime technology for fast RSA decryption and signing operations; DSA key and parameter generation, signing and verification; Diffie-Hellman parameter generation and key exchange; Symmetric encryption and decryption in ECB, CBC, CFB and OFB modes for DES, 3DES-EDE, AES, RC2, RC5 and RC6; Encryption and decryption using the RC4 variable key length stream cipher; MD2, MD5, SHA-1 and SHA-2 message digest generation; Pseudo-random number generation; HMAC generation.

The toolkit was then renamed "RSA BSAFE Crypto-C Micro Edition" with the release of version 1.6 in February 2002.

In August 2005, with the release of Crypto-C ME 2.0, Elliptic-curve cryptography was added to the toolkit, along with other algorithms.

Micro Edition Suite

Micro Edition Suite
Stable release
4.5 / May 18, 2020; 3 years ago (2020-05-18)
Written inC

BSAFE Micro Edition Suite is an SDK in C that allows adding TLS, PKI, and cryptography capabilities such as CMS in applications, devices, and systems.

BSAFE Micro Edition Suite was initially announced in February 2002[7] as a combined offering of BSAFE SSL-C Micro Edition, BSAFE Cert-C Micro Edition and BSAFE Crypto-C Micro Edition.

Both SSL-C Micro Edition and Cert-C Micro Edition reached EOL in September 2014, while Micro Edition Suite remains supported with Crypto-C Micro Edition as its FIPS-validated cryptographic provider.


Crypto-J

Crypto-J
Stable release
7.0 (September 7, 2022; 17 months ago (2022-09-07)[8]) [±]

6.3 (April 4, 2023; 10 months ago (2023-04-04)[9]) [±]

Written inJava

In 1997, RSA Data Security licensed Baltimore Technologies' J/CRYPTO Java encryption library, with plans to integrate it as part of its new JSAFE encryption toolkit[10] and released the first version of JSAFE the same year.[11] JSAFE 1.0 was featured in the January 1998 edition of Byte magazine.[12] JSAFE 1.1 was then released in February 1998, being the first release to support native code by calling into BSAFE C cryptographic toolkit.[13] Crypto-J, providing both a proprietary (now deprecated) API as well as a JCE API, is now the cryptographic provider for BSAFE SSL-J.


SSL-J

SSL-J
Stable release
6.5.1 (July 10, 2023; 7 months ago (2023-07-10)[14]) [±]

SSL-J 7.2 (December 20, 2023; 57 days ago (2023-12-20)[15]) [±]

Written inJava

SSL-J is a Java toolkit providing both a proprietary and a JSSE API allowing Java applications to implement TLS. SSL-J was released as part of RSA JSAFE initial product offering in 1997.[16] In November 2001, SSL-J 4.0 added support for JSSE API. Since that version both the SSLJ (JSAFE) API and JSSE API have been available to use. Starting with SSL-J 6.2.4, the RSA-proprietary JSAFE API has been deprecated in favor of JSSE. Crypto-J is the default cryptographic provider of SSL-J.


Cryptography backdoors

Dual_EC_DRBG random number generator

From 2004 to 2013, the default cryptographically secure pseudorandom number generator (CSPRNG) in BSAFE was Dual EC DRBG, which contained an alleged backdoor from NSA, in addition to being a biased and slow CSPRNG.[17] The cryptographic community had been aware that Dual_EC_DRBG was a very poor CSPRNG since shortly after the specification was posted in 2005, and by 2007 it had become apparent that the CSPRNG seemed to be designed to contain a hidden backdoor for NSA, usable only by NSA via a secret key.[18] In 2007, Bruce Schneier described the backdoor as "too obvious to trick anyone to use it."[18] The backdoor was confirmed in the Snowden leaks in 2013, and it was insinuated that NSA had paid RSA Security US$10 million to use Dual_EC_DRBG by default in 2004,[1] though RSA Security denied that they knew about the backdoor in 2004. The Reuters article which revealed the secret $10 million contract to use Dual_EC_DRBG described the deal as "handled by business leaders rather than pure technologists".[1] RSA Security has largely declined to explain their choice to continue using Dual_EC_DRBG even after the defects and potential backdoor were discovered in 2006 and 2007, and has denied knowingly inserting the backdoor.[19]

So why would RSA pick Dual_EC as the default? You got me. Not only is Dual_EC hilariously slow – which has real performance implications – it was shown to be a just plain bad random number generator all the way back in 2006. By 2007, when Shumow and Ferguson raised the possibility of a backdoor in the specification, no sensible cryptographer would go near the thing. And the killer is that RSA employs a number of highly distinguished cryptographers! It's unlikely that they'd all miss the news about Dual_EC.

As a cryptographically secure random number generator is often the basis of cryptography, much data encrypted with BSAFE was not secure against NSA. Specifically it has been shown that the backdoor makes SSL/TLS completely breakable by the party having the private key to the backdoor (i.e. NSA).[18] Since the US government and US companies have also used the vulnerable BSAFE, NSA can potentially have made US data less safe, if NSA's secret key to the backdoor had been stolen. It is also possible to derive the secret key by solving a single instance of the algorithm's elliptic curve problem[18] (breaking an instance of elliptic curve cryptography is considered unlikely with current computers and algorithms, but a breakthrough may occur).

Extended Random TLS extension

"Extended Random" was a proposed extension for the Transport Layer Security (TLS) protocol, submitted for standardization to IETF by an NSA employee,[20] although it never became a standard. The extension would otherwise be harmless, but together with the Dual_EC_DRBG, it would make it easier to take advantage of the backdoor.[21][22]

The extension was previously not known to be enabled in any implementations, but in December 2017, it was found enabled on some Canon printer models, which use the RSA BSAFE library, because the extension number conflicted a part of TLS version 1.3.[22]

Support status

On November 25, 2015, RSA announced End of Life (EOL) dates for BSAFE.[23] The End of Primary Support (EOPS) was reached on January 31, 2017, and the End of Extended Support (EOXS) was originally January 31, 2019, but has now been extended for some versions until January 31, 2022.[24] During Extended Support, even though the support policy states that only the most severe problems will be patched, new versions were released containing bugfixes, security fixes and new algorithms.[25]

References

  1. 1.0 1.1 1.2 Menn, Joseph (December 20, 2013). "Exclusive: Secret contract tied NSA and security industry pioneer". Reuters. San Francisco. https://www.reuters.com/article/2013/12/20/us-usa-security-rsa-idUSBRE9BJ1C220131220. Retrieved December 20, 2013. 
  2. Simson Garfinkel, Gene Spafford (2002). Web Security, Privacy & Commerce. O'Reilly. p. 114. ISBN 0596000456. https://archive.org/details/websecuritypriva0000garf/page/114. 
  3. Ivan Ristic (2013). OpenSSL Cookbook: A Guide to the Most Frequently Used OpenSSL Features and Commands. Qualys. p. 1. ISBN 9781907117053. 
  4. RSA Data Security (1999). "RSA Introduces BSAFE SSL-C for Worldwide Markets". PR Newswire. http://www.prnewswire.co.uk/news-releases/rsa-introduces-bsafe-ssl-c-for-worldwide-markets-156031405.html. 
  5. RSA Australia (30 March 1999). "Check Point Software Licenses RSA BSAFE™ SSL-C for its Market-Leading VPN". Check Point Software. Archived from the original on 1 December 2010. https://web.archive.org/web/20101201173330/http://www.checkpoint.com/press/partners/1999/rsa033099.html. 
  6. RSA (2013). "RSA Response to Media Claims Regarding NSA Relationship". RSA. https://blogs.rsa.com/rsa-response. 
  7. "RSA unveils three new products at its show". IT World. February 20, 2002. https://www.itworld.com/article/2792505/rsa-unveils-three-new-products-at-its-show.html. 
  8. "Dell BSAFE Crypto-J 7.0 Release Advisory". https://www.dell.com/support/kbdoc/000203117/dell-bsafe-crypto-j-7-0-release-advisory. 
  9. "Dell BSAFE Crypto-J 6.3 Release Advisory". https://www.dell.com/support/kbdoc/000212037/dell-bsafe-crypto-j-6-3-release-advisory. 
  10. "RSA licenses Baltimore Technologies J/CRYPTO". https://www.itnews.com/article/2076999/news-and-new-product-briefs--7-15-97-.html?page=2. 
  11. "RSA's BSafe toolkit spawns new Java version". https://www.javaworld.com/article/2076942/-em-javaworld--em--news-briefs--5-1-97-.html?page=4. 
  12. "Making Java Development JSafe". https://vintageapple.org/byte/pdf/199801_Byte_Magazine_Vol_23-01_Next_Years_Top_Tech.pdf. 
  13. "RSA Releases JSAFE 1.1 Encryption for Java". http://www.internetnews.com/dev-news/article.php/52441/RSA+Releases+JSAFE+11+Encryption+for+Java.htm. 
  14. "Dell BSAFE SSL-J 6.5.1 Release Advisory". https://www.dell.com/support/kbdoc/000215682/dell-bsafe-ssl-j-6-5-1-release-advisory. 
  15. "Dell BSAFE SSL-J 7.2 Release Advisory". https://www.dell.com/support/kbdoc/000220635/dell-bsafe-ssl-j-7-2-release-advisory. 
  16. "Securing IT Resources with Digital Certificates and LDAP". https://www.educause.edu/ir/library/html/cnc9707/cnc9707.html. 
  17. Matthew Green (September 20, 2013). "RSA warns developers not to use RSA products". A Few Thoughts on Cryptographic Engineering. http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html. 
  18. 18.0 18.1 18.2 18.3 Bruce Schneier. "The Strange Story of Dual_EC_DRBG". https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html. 
  19. "We don’t enable backdoors in our crypto products, RSA tells customers". Ars Technica. https://arstechnica.com/security/2013/09/we-dont-enable-backdoors-in-our-crypto-products-rsa-tells-customers/. 
  20. Eric, Rescorla; Margaret, Salter (2 March 2009). "Extended Random Values for TLS" (in en). https://tools.ietf.org/html/draft-rescorla-tls-extended-random-02. 
  21. Menn, Joseph (31 March 2014). "Exclusive: NSA infiltrated RSA security more deeply than thought - stu" (in en-GB). Reuters. https://uk.reuters.com/article/us-usa-security-nsa-rsa/exclusive-nsa-infiltrated-rsa-security-more-deeply-than-thought-study-idUKBREA2U0TY20140331. 
  22. 22.0 22.1 Green, Matthew (19 December 2017). "The strange story of "Extended Random"" (in en-US). Cryptographic Engineering blog. https://blog.cryptographyengineering.com/2017/12/19/the-strange-story-of-extended-random/. 
  23. RSA (November 25, 2015). "RSA announces End of Life (EOL) dates for RSA BSAFE". RSA. https://community.rsa.com/docs/DOC-59312. Retrieved October 3, 2018. 
  24. RSA (June 20, 2018). "RSA announces support extension for some of the BSAFE® product suite". RSA. https://community.rsa.com/docs/DOC-93720. Retrieved October 3, 2018. 
  25. RSA (September 11, 2019). "RSA announces the release of RSA BSAFE® Micro Edition Suite 4.4". RSA. https://community.rsa.com/docs/DOC-107002. Retrieved September 11, 2019. 

External links