The Inconvenient Truth about Web Certificates Nevena Vratonjic Julien Freudiger Vincent Bindschaedler Jean-Pierre Hubaux June 2011, WEIS’11.

Slides:



Advertisements
Similar presentations
Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
Advertisements

Why Eve & Mallory Love Android
Browser Security Modes Alex Crowell and James Kasten.
Chapter 14 – Authentication Applications
ForceHTTPS: Protecting High-Security Web Sites from Network Attacks Collin Jackson and Adam Barth.
HTTPS and the Lock Icon Dan Boneh. Goals for this lecture Brief overview of HTTPS: How the SSL/TLS protocol works (very briefly) How to use HTTPS Integrating.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CP3397 ECommerce.
Building web applications on top of encrypted data using Mylar Presented by Tenglu Liang Tai Liu.
Integrity of the Web Content: The Case of Online Advertising Nevena Vratonjic Julien Freudiger Jean-Pierre Hubaux August 2010, Usenix CollSec’10.
Kerberized Credential Translation Olga Kornievskaia Peter Honeyman Bill Doster Kevin Coffman Center for Information Technology Integration University of.
By: Hassan Waqar.  A PROTOCOL for securely transmitting data via the internet.  NETWORK LAYER application.  Developed by NETSCAPE.
Session Hijacking Why web security depends on communications security and how TLS everywhere is the only solution. Scott Helme - 6th Aug scotthel.me.
Certificates Last Updated: Aug 29, A certificate was originally created to bind a subject to the subject’s public key Intended to solve the key.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
SSL & SharePoint IT:Network:Applications. Agenda Secure Socket Layer Encryption 101 SharePoint Customization SharePoint Integration.
DNS and HTTPs ACN Presentation. Domain Names We refer to computers on the Internet (Internet hosts), by names like: sharda.ac.in These are called domain.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Cross Platform Single Sign On using client certificates Emmanuel Ormancey, Alberto Pace Internet Services group CERN, Information Technology department.
Key Provisioning Use Cases and Requirements 67 th IETF KeyProv BOF – San Diego Mingliang Pei 11/09/2006.
DICOM INTERNATIONAL DICOM INTERNATIONAL CONFERENCE & SEMINAR April 8-10, 2008 Chengdu, China DICOM Security Eric Pan Agfa HealthCare.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
E-Procurement: Digital Signatures and Role of Certifying Authorities Jagdeep S. Kochar CEO, (n)Code Solutions.
CMSC 414 Computer and Network Security Lecture 21 Jonathan Katz.
The Inconvenient Truth about Web Certificates Jean-Pierre Hubaux Joint work with N. Vratonjic, J. Freudiger and V. Bindschaedler Work presented at WEIS.
Use of Kerberos-Issued Certificates at Fermilab Kerberos  PKI Translation Matt Crawford & Dane Skow Fermilab.
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
SSL By: Anthony Harris & Adam Shkoler. What is SSL? SSL stands for Secure Sockets Layer SSL is a cryptographic protocol which provides secure communications.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
Topic 11: Key Distribution and Agreement 1 Information Security CS 526 Topic 11: Key Distribution & Agreement, Secure Communication.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
TLS/SSL Review. Transport Layer Security A 30-second history Secure Sockets Layer was developed by Netscape in 1994 as a protocol which permitted persistent.
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
Cisco Confidential © 2010 Cisco and/or its affiliates. All rights reserved. 1 SAN Certificate in Unity Connection Presenter Name: Bhawna Goel.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Digital Certificates Made Easy Sam Lutgring Director of Informational Technology Services Calhoun Intermediate School District.
© GlobalSign. A GMO Internet Inc group company. Authentication. Security. Trust. Code Signing Distributing trustworthy software over the Internet.
Secure Socket Layer (SSL)
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
March 27, 2006TAGPMA - Rio de Janeiro1 Short Lived Credential Services Profile Tony J. Genovese The Americas Grid PMA DOEGridsATF/ESnet/LBNL.
Digital Signatures A Brief Overview by Tim Sigmon April, 2001.
Module 9: Fundamentals of Securing Network Communication.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
1 DCS 835 – Computer Networking and the Internet Digital Certificate and SSL (rev ) Team 1 Rasal Mowla (project leader) Alvaro Restrepo, Carlos.
Building Security into Your System Bill Major Gregory Ponto.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Apache Web Server Quick and Dirty for AfNOG 2015 (Originally by Joel Jaeggli for AfNOG 2007) ‏
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
Apache Web Server Quick and Dirty Evelyn NAMARA for AfNOG 2014 (Originally by Joel Jaeggli for AfNOG 2007) ‏
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
Topic 14: Secure Communication1 Information Security CS 526 Topic 14: Key Distribution & Agreement, Secure Communication.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Pertemuan #10 Secure HTTP (HTTPS) Kuliah Pengaman Jaringan.
Creating and Managing Digital Certificates Chapter Eleven.
Using Public Key Cryptography Key management and public key infrastructures.
Bridge Certification Architecture A Brief Overview by Tim Sigmon May, 2000.
Web Services Security Patterns Alex Mackman CM Group Ltd
Measures to prevent MITM attack and their effectiveness CSCI 5931 Web Security Submitted By Pradeep Rath Date : 23 rd March 2004.
Principles of Policy in Secure Groups Hugh Harney SPARTA, Inc. Andrea Colegrove SPARTA, Inc. Patrick McDaniel University of Michigan.
Digital Signatures and Digital Certificates Monil Adhikari.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
CMSC 414 Computer and Network Security Lecture 18 Jonathan Katz.
Presentation By :- Krishna Sai Mulpuri
Setting and Upload Products
Presentation transcript:

The Inconvenient Truth about Web Certificates Nevena Vratonjic Julien Freudiger Vincent Bindschaedler Jean-Pierre Hubaux June 2011, WEIS’11

2 Impersonation Eavesdropping Modifications Authentication Confidentiality Integrity HTTPS Secure communication e-banking, e-commerce, Web , etc. Authentication, HTTPS Confidentialityand Integrity

HTTPS in practice HTTPS is at the core of online businesses Provided security is dubious Notably due to obscure certificate management 3

Research Questions Q1: At which scale is HTTPS currently deployed? Q2: What are the problems with current HTTPS deployment? Q3: What are the underlying reasons that led to these problems? 4 Large-scale empirical analysis of the current deployment of HTTPS on the top 1 million websites

Methodology 1 million most popular websites (Alexa’s ranking) Connect to each website with HTTP and HTTPS Store: URLs Content of Web pages Certificates 5

Q1: At which scale is HTTPS deployed?  1/3 of websites can be browsed via HTTPS 6 Is this too much or too little?

Login Pages: HTTP vs. HTTPS  77.4% of websites may compromise users’ credentials! 7  More Web pages should be served via HTTPS!

Q2: What are the problems with current HTTPS deployment? HTTPS may fail due to: Server certificate-based authentication Cipher suites  The majority ( 70%) of websites use DHE-RSA-AES256- SHA cipher suite 8

X.509 Certificates: Bind a public key with an identity Certificates issued by trusted Certification Authorities (CAs) To issue a certificate, CAs should validate: 1. The applicant owns the domain name 2. The applicant is a legitimate and legally accountable entity 9 Two-step validation BoA’s identifying information & domain name CA XYZ BoA’s public key K BoA Certificates  Organization Validated (OV) certificates

10 Authentication Chain of trust Public keys of trusted CAs pre-installed in Web browsers Certificate-based Authentication Browser: K CA HTTPS

11 Authentication Chain of trust cannot be verified by Web browsers Self-signed Certificates Browser: K EPFL ?

Self-signed Certificates 12

Trusted CA Not expired Domain match Successful authentication Verifying X.509 Certificates

Authentication Success 14 Total of 300’582 certificates

Authentication Failures 15 Total of 300’582 certificates

Certificate Reuse Across Multiple Domains Mostly due to Internet virtual hosting 16 Certificate Validity DomainNumber of virtual hosts *.bluehost.com10’075 *.hostgator.com9’148 *hostmonster.com4’954 Serving providers’ certs results in Domain Mismatch Solution: Server Name Indication (SNI) – TLS extension  47.6% of collected certificates are unique

Domain Mismatch: Unique Trusted Certificates  45.24% of unique trusted certs cause Domain Mismatch 17 Subdomain mismatch: cert valid for subdomain.host deployed on host and vice versa

Authentication Success 18 Total of 300’582 certificates

Domain-validated only (DVO) certificates 1. The applicant owns the domain name 2. The applicant is a legitimate and legally accountable entity Based on Domain Name Registrars and verification  Problem: Domain Name Registrars are untrustworthy Trusted DVO Certificates  Legitimacy of the certificate owner cannot be trusted!

Domain-validated Only (DVO) 20 Trusted Organization NOT Validated Organization Validated Trusted Organization Validated (OV)

Extended Validation (EV) Rigorous extended validation of the applicant [ref] Special browser interface Trusted EV Certificates 21

DVO vs. OV vs. EV Certificates  61% of certs trusted by browsers are DVO 22 Certs with successful authentication (48’158 certs)  5.7% of certs (OV+EV) provide organization validation 22

Research Questions Q1: How is HTTPS currently deployed?  1/3 of websites can be browsed via HTTPS  77.4% of login pages may compromise users’ credentials Q2: What are the problems with current HTTPS deployment?  Authentication failures mostly due to domain mismatch  Weak authentication with DVO certificates 23

Q3: What are the underlying reasons that led to these problems? Economics Misaligned incentives Most website operators have an incentive to obtain cheap certs CAs have an incentive to distribute as many certs as possible Consequence: cheap certs for cheap security Liability No or limited liability of involved stakeholders Reputation Rely on subsidiaries to issue certs less rigorously Usability More interruptions users experience, more they learn to ignore security warnings Web browsers have little incentive to limit access to websites 24

New Third-Parties: Open websites managed by users, CAs or browser vendors Introduce information related to performances of CAs and websites New Policies: Legal aspects CAs responsible for cert-based auth. Websites responsible for cert deployment Web browser vendors limiting the number of root CAs Selection based on quality of certs Authentication Success Rate wrt. CAs Countermeasures 25

Conclusion Large-scale empirical study of HTTPS and certificate- based authentication on 1 million websites  5.7% (18’785) implement cert-based authentication properly  No browser warnings  Legitimacy of the certificate owner verified Market for lemons Information asymmetry between CAs and website operators Most websites acquire cheap certs leading to cheap security Change policies to align incentives 26

Data available at: 27