Summary
Three medium-severity issues in arnika affecting the UDP key-rotation protocol, PQC key file handling, and KMS TLS client. All require specific preconditions to exploit and do not allow direct code execution or immediate key extraction. A self-contained PoC is attached.
Details
-
ACK timestamp not validated: udpserver.go:185
udpClient() verifies HMAC and packet type but never checks ackPkt.Timestamp. A MITM can capture one ACK, drop all subsequent DATA packets, and replay the stale ACK indefinitely. Primary advances PSK each rotation, backup stays on key 1, tunnel breaks. No PSK knowledge needed. The server side already has this check, the client does not.
Fix: mirror the timestamp check already present on the server side.
-
Empty PQC key file silently accepted: repositories/pqc.go:29
os.ReadFile follows symlinks. Empty file to base64.Decode("") = []byte{}, nil. HKDF runs on the QKD key alone while arnika logs [OK] HKDF derivation completed for QKD+PQC key. Requires write access to the directory containing PQC_PSK_FILE.
Fix: validate decoded key is non-empty before derivation; enforce parent directory permissions in SECURITY.md.
-
InsecureSkipVerify: true hardcoded: repositories/kms.go:61
KMS HTTP client unconditionally sets InsecureSkipVerify: true, overriding RootCAs. CA_CERTIFICATE is loaded but never consulted (dead code). Requires MITM between arnika and the KMS endpoint, which in typical deployments are co-located.
Fix: remove the flag; RootCAs already holds the correct pool when CA_CERTIFICATE is configured.
PoC
See arnika_exploit.tar.gz. PoC shows observable behavior for each attack; the third one (KMS MITM) needs no custom code, any HTTPS proxy with a self-signed cert is enough.
Impact
Issues require network MITM or local directory write access to exploit. No direct key extraction or code execution. Primary impact is tunnel desync and silent security downgrade in hybrid QKD+PQC mode.
Patch
This issue has been fixed by the 1.0.1 release: https://github.com/arnika-project/arnika/releases/tag/v1.0.1.
References
Summary
Three medium-severity issues in arnika affecting the UDP key-rotation protocol, PQC key file handling, and KMS TLS client. All require specific preconditions to exploit and do not allow direct code execution or immediate key extraction. A self-contained PoC is attached.
Details
ACK timestamp not validated:
udpserver.go:185udpClient()verifies HMAC and packet type but never checksackPkt.Timestamp. A MITM can capture one ACK, drop all subsequent DATA packets, and replay the stale ACK indefinitely. Primary advances PSK each rotation, backup stays on key 1, tunnel breaks. No PSK knowledge needed. The server side already has this check, the client does not.Fix: mirror the timestamp check already present on the server side.
Empty PQC key file silently accepted:
repositories/pqc.go:29os.ReadFilefollows symlinks. Empty file tobase64.Decode("") = []byte{}, nil. HKDF runs on the QKD key alone while arnika logs[OK] HKDF derivation completed for QKD+PQC key. Requires write access to the directory containingPQC_PSK_FILE.Fix: validate decoded key is non-empty before derivation; enforce parent directory permissions in
SECURITY.md.InsecureSkipVerify: truehardcoded:repositories/kms.go:61KMS HTTP client unconditionally sets
InsecureSkipVerify: true, overridingRootCAs.CA_CERTIFICATEis loaded but never consulted (dead code). Requires MITM between arnika and the KMS endpoint, which in typical deployments are co-located.Fix: remove the flag;
RootCAsalready holds the correct pool whenCA_CERTIFICATEis configured.PoC
See arnika_exploit.tar.gz. PoC shows observable behavior for each attack; the third one (KMS MITM) needs no custom code, any HTTPS proxy with a self-signed cert is enough.
Impact
Issues require network MITM or local directory write access to exploit. No direct key extraction or code execution. Primary impact is tunnel desync and silent security downgrade in hybrid QKD+PQC mode.
Patch
This issue has been fixed by the 1.0.1 release: https://github.com/arnika-project/arnika/releases/tag/v1.0.1.
References