Not-quite-so-broken TLS in OCaml
This is an idea proposed in 2014 as a good starter project, and has been completed by
Transport Layer Security (TLS) implementations have a history of security flaws. The immediate causes of these are often programming errors, e.g. in memory manage- ment, but the root causes are more fundamental: the challenges of interpreting the ambiguous prose specification, the complexities inherent in large APIs and code bases, inherently unsafe programming choices, and the impossibility of directly testing conformance between implementations and the specification.
This internship was to work on nqsb-TLS, our re-engineered approach to security protocol specification and implementation that addresses the above root causes. The same source code serves two roles: it is both a specification of TLS, executable as a test oracle to check conformance of traces from arbitrary implementations, and a usable implementation of TLS; a modular and declarative programming style provides clean separation between its components. Many security flaws are thus excluded by construction.
nqsb-TLS can be used in standalone Unix applications, which we demonstrate with a messaging client, and can also be compiled into Xen unikernels (see
Links
Hannes Mehnert andDavid Kaloper-Mersinjak worked on this in an internship after discovering the MirageOS project online, and came over in the summer of 2014. The results have been hguely successful within the OCaml community, as the ocaml-tls is still widely used as the defacto TLS stack in many popular OCaml applications.- The paper was published in USENIX Security; see
Not-Quite-So-Broken TLS . - For other stuff that happened during that internship period, see
Reviewing the second year of OCaml Labs in 2014 .