Maude-NPA

Repository of protocol specifications in Maude-NPA

Home Choice Protocols Distance-Bounding Protocols Hash Functions Vulnerabilities Contact and links

Telecommunications Management Network Protocol

The Telecommunications Management Network is a protocol model defined by ITU-T for managing open systems in a communications network. It is part of the ITU-T Recommendation series M.3000 and is based on the OSI management specifications in ITU-T Recommendation series X.700. TMN provides a framework for achieving interconnectivity and communication across heterogeneous operations system and telecommunication networks. To achieve this, TMN defines a set of interface points for elements which perform the actual communications processing (such as a call processing switch) to be accessed by elements, such as management workstations, to monitor and control them. The standard interface allows elements from different manufacturers to be incorporated into a network under a single management control.

The protocol specification in "Alice-Bob" notation is as follows.

  1. (1) A -> S : B,{KA}PKS
  2. (2) S -> B : A
  3. (3) B -> S : A,{KB}PKS
  4. (3) S -> A : B, KB ⊕ KA

The attack:

  1. (1) A -> S : B,{KA}PKS
  2. (2) S -> I(B) : A
  3. (3) (I)B -> S : A,{KI}PKS
  4. (3) S -> I : B, KI ⊕ KA

In the first step, A starts a normal session with B. In the second step, I intercepts the message sent by S and then, in step 3, he impersonates B and sends his own symmetric key to the server. Finally, the intruder intercepts B and KI ⊕ KA and as he knows KI, he can find KA by computing (KI ⊕ KA) ⊕ KI . Finally, I can transmit B, KI ⊕ KA to A.

To download the complete protocol specification in Maude-NPA syntax and the outputs, click HERE