measurement and analysis of private key sharing in the...

119
Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem Frank Cangialosi, Taejoong Chung, David Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson

Upload: others

Post on 05-Jun-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Measurement and Analysis of Private Key Sharing in

the HTTPS Ecosystem

Frank Cangialosi, Taejoong Chung, David Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson

Page 2: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

How do we know with whom we are communicating?

Page 3: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

How do we know with whom we are communicating?

Page 4: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Certificate

Page 5: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Public

Private

Certificate

Page 6: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

CertificateAuthorities

Public

Private

Certificate

Page 7: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

CertificateAuthorities

Public

Private

Certificate

Page 8: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Certificate

How do we know with whom we are communicating?

Page 9: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

CertificateCertificate

How do we know with whom we are communicating?

Page 10: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

CertificateCertificate

How do we know with whom we are communicating?

Page 11: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

CertificateCertificate

TLS Handshake

How do we know with whom we are communicating?

Page 12: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

CertificateCertificate

How do we know with whom we are communicating?

Page 13: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

CertificateCertificate

How do we know with whom we are communicating?

Page 14: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

CertificateCertificate

Authentication fundamentally assumes:

Only knows

How do we know with whom we are communicating?

Page 15: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

The PKI in today’s web

Page 16: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Rare!

The PKI in today’s web

Page 17: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

The PKI in today’s web

Page 18: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

The PKI in today’s web

Page 19: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

The PKI in today’s web

Page 20: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

The PKI in today’s web

Page 21: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Third-party Hosting Providers

• Content delivery networks

• Web hosting services

• Cloud providers

Varying levels of involvement

But all trusted to deliver content

Page 22: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

The PKI in today’s web

Page 23: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Certificate

The PKI in today’s web

Page 24: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Certificate

The PKI in today’s web

Page 25: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Certificate

The PKI in today’s web

Page 26: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Certificate

The PKI in today’s web

Page 27: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Certificate

The PKI in today’s web

Page 28: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Certificate

The PKI in today’s web

Page 29: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Third-party hosting providers know their customers’ private keys

Page 30: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Third-party hosting providers know their customers’ private keys

Authentication fundamentally assumes:Only knows

Page 31: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Example of key sharing

Page 32: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

What’s wrong with sharing?

1. Complicates the trust model,users don’t know who they’re really trusting

2. Potential to create centralization of trust

3. Potential to create single point of failure (in terms of management)

Page 33: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

This study

Page 34: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

This study

How many websites share their private keys?

Page 35: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

This study

How many keys have 3rd parties obtained?

How many websites share their private keys?

Page 36: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

This study

How has this affected key management?

How many keys have 3rd parties obtained?

How many websites share their private keys?

Page 37: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

How do we detect sharing at scale?Rapid7 weekly port 443 scans 2013-2015DATA

DomainDomainDomainDomainCertificateIP Addr

DomainDomainDomainDomainCertificateIP Addr

Page 38: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

How do we detect sharing at scale?Rapid7 weekly port 443 scans 2013-2015DATA

IPv4 Scan DomainDomainDomainDomainCertificateIP Addr

DomainDomainDomainDomainCertificateIP Addr

Page 39: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

How do we detect sharing at scale?Rapid7 weekly port 443 scans 2013-2015DATA

DomainDomainDomainDomainCertificateIP Addr

DomainDomainDomainDomainCertificateIP Addr

Page 40: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

How do we detect sharing at scale?Rapid7 weekly port 443 scans 2013-2015DATA

DomainDomainDomainDomainCertificate

DomainDomainDomainDomainCertificateIP Addr

IP Addr

Page 41: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

How do we detect sharing at scale?Rapid7 weekly port 443 scans 2013-2015DATA

IPv4 Scan

DomainDomainDomainDomainCertificate

DomainDomainDomainDomainCertificateIP Addr

IP Addr

Page 42: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

How do we detect sharing at scale?Rapid7 weekly port 443 scans 2013-2015DATA

DomainDomainDomainDomainCertificate

DomainDomainDomainDomainCertificateIP Addr

IP Addr

Page 43: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

How do we detect sharing at scale?

DomainDomainDomainDomainCertificate

DomainDomainDomainDomainCertificate IP Addr

IP Addr

Rapid7 weekly port 443 scans 2013-2015DATA

Page 44: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

How do we detect sharing at scale?

DomainDomainDomainDomainCertificate

DomainDomainDomainDomainCertificate IP Addr

IP Addr

5.1 million valid leaf certificatesRapid7 weekly port 443 scans 2013-2015DATA

Page 45: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

How do we detect sharing at scale?Rapid7 weekly port 443 scans 2013-2015DATA

Domain

Domain

Domain

Domain

Domain

IP Addr

IP Addr

5.1 million valid leaf certificates

Page 46: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

How do we detect sharing at scale?

Domain

Domain

Domain

Domain

Domain

IP Addr

IP Addr

Does the same entity that owns the domain own and operate the server at that IP address?

Page 47: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

How do we detect sharing at scale?

Domain

Domain

Domain

Domain

Domain

IP Addr

IP Addr

Reverse DNS

Does the same entity that owns the domain own and operate the server at that IP address?

Page 48: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Domain equivalence?

google.com google.co.uk

google.com youtube.com

nestle.com friskies.com

whitehouse.gov whitehouse.com

Domain names alone are not enough

Page 49: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Incorporating whois

Emails in whois records reflect administrative domain

Page 50: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

google.com

google.co.uk

google.de

zagat.com

golang.org

Incorporating whois

Emails in whois records reflect administrative domain

Page 51: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

google.com

google.co.uk

google.de

zagat.com

golang.org

whois RegistrantEmail:

AdminEmail:

TechEmail:

[email protected]

[email protected]

[email protected]

Incorporating whois

Emails in whois records reflect administrative domain

Page 52: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

google.com

google.co.uk

google.de

zagat.com

golang.org

[email protected]@[email protected]

Incorporating whois

Emails in whois records reflect administrative domain

Page 53: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

google.com

google.co.uk

google.de

zagat.com

golang.org

[email protected]@[email protected]

Incorporating whois

Emails in whois records reflect administrative domain

Page 54: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

google.com

google.co.uk

google.de

zagat.com

golang.org

RegistrantEmail:

AdminEmail:

TechEmail:

[email protected]

[email protected]

[email protected]

whois

whois

[email protected]@[email protected]

Incorporating whois

Emails in whois records reflect administrative domain

Page 55: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

google.com

google.co.uk

google.de

zagat.com

golang.org

Emails in whois records reflect administrative domain

[email protected]@[email protected]

Incorporating whois

Page 56: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

google.com

google.co.uk

google.de

zagat.com

golang.org

Emails in whois records reflect administrative domain

whois

whois

[email protected]@[email protected]

Incorporating whois

Page 57: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

google.com

google.co.uk

google.de

zagat.com

golang.org

Emails in whois records reflect administrative domain

RegistrantEmail:

AdminEmail:

TechEmail:

[email protected]

[email protected]

[email protected]

whois

whois

[email protected]@[email protected]

Incorporating whois

Page 58: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

google.com

google.co.uk

google.de

zagat.com

golang.org

[email protected]@[email protected]

Incorporating whois

Emails in whois records reflect administrative domain

Page 59: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

google.com

google.co.uk

google.de

zagat.com

golang.org

Incorporating whois

Domain Organization

Emails in whois records reflect administrative domain

Page 60: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

How do we detect sharing at scale?

Domain

Domain

Domain

Domain

Domain

IP Addr

IP Addr

Does the same entity that owns the domain own and operate the server at that IP address?

Page 61: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Domain

Domain

Domain

How do we detect sharing at scale?

Domain

Domain Org

Domain Org

DomainDomain Org IP Addr

IP Addr

Does the same entity that owns the domain own and operate the server at that IP address?

Page 62: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Domain

Domain

Domain

How do we detect sharing at scale?

Domain

Domain Org

Domain Org

DomainDomain Org Host

Host

Does the same entity that owns the domain own and operate the server at that IP address?

Key sharing: domain org ≠ host org

Page 63: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Domain

Domain

Domain

How do we detect sharing at scale?

Domain

Domain Org

Domain Org

DomainDomain Org Host

HostHostOrg

HostOrg

Does the same entity that owns the domain own and operate the server at that IP address?

Key sharing: domain org ≠ host org

Page 64: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Outline

How many keys have providers aggregated?

How does sharing impact key management?

How prevalent is key sharing?

Page 65: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

How prevalent is key sharing?

Domain

Domain

Domain

Domain

Domain Org

Domain Org

DomainDomain Org Host

HostHostOrg

HostOrg

Page 66: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

How prevalent is key sharing?

Domain

Domain

Domain

Domain

Domain Org

Domain Org

DomainDomain Org Host

HostHostOrg

HostOrg

HostOrg

Domain Org

Page 67: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

How prevalent is key sharing?

Domain

Domain

Domain

Domain

Domain Org

Domain Org

DomainDomain Org Host

HostHostOrg

HostOrg

HostOrg

Domain Org

Self-hosted

Key sharing

Page 68: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

How prevalent is key sharing?

Domain

Domain

Domain

Domain

Domain Org

Domain Org

DomainDomain Org Host

HostHostOrg

HostOrg

HostOrg

Domain Org

Self-hosted

Key sharing

Page 69: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

How prevalent is key sharing?

Domain

Domain

Domain

Domain

Domain Org

Domain Org

DomainDomain Org Host

HostHostOrg

HostOrg

HostOrg

Domain Org

Self-hosted

Key sharing

Page 70: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

How prevalent is key sharing?

0

0.2

0.4

0.6

0.8

1

0 1 10 102 103 104 105

CD

F

Number of Third-Party Hosting Providers Used

Organizations

Page 71: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

How prevalent is key sharing?

0

0.2

0.4

0.6

0.8

1

0 1 10 102 103 104 105

CD

F

Number of Third-Party Hosting Providers Used

Organizations

Page 72: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

How prevalent is key sharing?

0

0.2

0.4

0.6

0.8

1

0 1 10 102 103 104 105

CD

F

Number of Third-Party Hosting Providers Used

Organizations23.5% Self-hosted

Page 73: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

How prevalent is key sharing?

0

0.2

0.4

0.6

0.8

1

0 1 10 102 103 104 105

CD

F

Number of Third-Party Hosting Providers Used

Organizations23.5% Self-hosted

76.5%share

at least1 key

Page 74: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

How prevalent is key sharing?

0

0.2

0.4

0.6

0.8

1

0 1 10 102 103 104 105

CD

F

Number of Third-Party Hosting Providers Used

Organizations23.5% Self-hosted

76.5%share

at least1 key

Who?

Page 75: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Who shares?

0

0.2

0.4

0.6

0.8

1

0 200k 400k 600k 800k 1M

Fra

cti

on

of

Do

ma

ins

Ho

ste

do

n T

hir

d-p

art

y P

rov

ide

rs

Alexa Site Rank (bins of 10,000)

At least one key sharedAll keys shared

Page 76: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Who shares?

0

0.2

0.4

0.6

0.8

1

0 200k 400k 600k 800k 1M

Fra

cti

on

of

Do

ma

ins

Ho

ste

do

n T

hir

d-p

art

y P

rov

ide

rs

Alexa Site Rank (bins of 10,000)

At least one key sharedAll keys shared

Page 77: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Who shares?

0

0.2

0.4

0.6

0.8

1

0 200k 400k 600k 800k 1M

Fra

cti

on

of

Do

ma

ins

Ho

ste

do

n T

hir

d-p

art

y P

rov

ide

rs

Alexa Site Rank (bins of 10,000)

At least one key sharedAll keys shared43.2% (of Top 10k)

share at least one

Page 78: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Who shares?

0

0.2

0.4

0.6

0.8

1

0 200k 400k 600k 800k 1M

Fra

cti

on

of

Do

ma

ins

Ho

ste

do

n T

hir

d-p

art

y P

rov

ide

rs

Alexa Site Rank (bins of 10,000)

At least one key sharedAll keys shared43.2% (of Top 10k)

share at least one

22.4% share all

Page 79: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Who shares?

Key sharing is common across the Internet

0

0.2

0.4

0.6

0.8

1

0 200k 400k 600k 800k 1M

Fra

cti

on

of

Do

ma

ins

Ho

ste

do

n T

hir

d-p

art

y P

rov

ide

rs

Alexa Site Rank (bins of 10,000)

At least one key sharedAll keys shared43.2% (of Top 10k)

share at least one

22.4% share all

Page 80: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Outline

How many keys have providers aggregated?

How does sharing impact key management?

How prevalent is key sharing?

Page 81: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Outline

How many keys have providers aggregated?

How does sharing impact key management?

How prevalent is key sharing?

• 76.5% share with ≥ 1 provider • Common even among most popular websites

Page 82: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Domain

Domain

Domain

Domain

Domain Org

Domain Org

DomainDomain Org Host

HostHostOrg

HostOrg

HostOrg

Domain Org

How many keys have providers aggregated?

Page 83: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Domain

Domain

Domain

Domain

Domain Org

Domain Org

DomainDomain Org Host

HostHostOrg

HostOrg

HostOrg

Domain Org

How many keys have providers aggregated?

Page 84: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

100

101

102

103

104

105

106

100

101

102

103

104

105

106

Nu

mb

er

of

Dis

tin

ct

Cu

sto

mers

Serv

ed

Rank-Order Third-Party Hosting Providers

How have keys been aggregated?

Page 85: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

100

101

102

103

104

105

106

100

101

102

103

104

105

106

Nu

mb

er

of

Dis

tin

ct

Cu

sto

mers

Serv

ed

Rank-Order Third-Party Hosting Providers

How have keys been aggregated?

Page 86: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

100

101

102

103

104

105

106

100

101

102

103

104

105

106

Nu

mb

er

of

Dis

tin

ct

Cu

sto

mers

Serv

ed

Rank-Order Third-Party Hosting Providers

How have keys been aggregated?

secureserver.net

unifiedlayer.comamazonaws.com

Cloud Flare Inc.Rackspace Hosting

akamaitechnologies.com

266,110151,628117.22978,36954,158

15,440… …

#Organizations Hosting provider277,891175,089122,158

87,07763,418

22,671…

#Domains

Page 87: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

100

101

102

103

104

105

106

100

101

102

103

104

105

106

Nu

mb

er

of

Dis

tin

ct

Cu

sto

mers

Serv

ed

Rank-Order Third-Party Hosting Providers

How have keys been aggregated?

secureserver.net

unifiedlayer.comamazonaws.com

Cloud Flare Inc.Rackspace Hosting

akamaitechnologies.com

266,110151,628117.22978,36954,158

15,440… …

#Organizations Hosting provider277,891175,089122,158

87,07763,418

22,671…

#Domains

Page 88: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

100

101

102

103

104

105

106

100

101

102

103

104

105

106

Nu

mb

er

of

Dis

tin

ct

Cu

sto

mers

Serv

ed

Rank-Order Third-Party Hosting Providers

How have keys been aggregated?

secureserver.net

unifiedlayer.comamazonaws.com

Cloud Flare Inc.Rackspace Hosting

akamaitechnologies.com

266,110151,628117.22978,36954,158

15,440… …

#Organizations Hosting provider277,891175,089122,158

87,07763,418

22,671…

#Domains

Top 1% of providers hold keysfor 86% of all organizations

Page 89: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Domain

Domain

Domain

Domain

Domain Org

Domain Org

DomainDomain Org Host

HostHostOrg

HostOrg

HostOrg

Domain Org

Does key sharing make enticing attack targets?

Page 90: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Domain

Domain

Domain

Domain

Domain Org

Domain Org

DomainDomain Org Host

HostHostOrg

HostOrg

HostOrg

Domain Org

Does key sharing make enticing attack targets?

Page 91: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Domain

Domain

Domain

Domain

Domain Org

Domain Org

DomainDomain Org Host

HostHostOrg

HostOrg

HostOrg

Domain Org

Does key sharing make enticing attack targets?

Page 92: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Does key sharing make enticing attack targets?

0

0.2

0.4

0.6

0.8

1

100 101 102 103 104 105 106

Cu

mu

lati

ve

Fra

cti

on

of

Do

ma

ins

’ K

ey

s A

cq

uir

ed

Number of Hosting Providers Compromised

Alexa Top 1kAlexa Top 1m

All Domains

Page 93: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Does key sharing make enticing attack targets?

0

0.2

0.4

0.6

0.8

1

100 101 102 103 104 105 106

Cu

mu

lati

ve

Fra

cti

on

of

Do

ma

ins

’ K

ey

s A

cq

uir

ed

Number of Hosting Providers Compromised

Alexa Top 1kAlexa Top 1m

All Domains

Page 94: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Does key sharing make enticing attack targets?

0

0.2

0.4

0.6

0.8

1

100 101 102 103 104 105 106

Cu

mu

lati

ve

Fra

cti

on

of

Do

ma

ins

’ K

ey

s A

cq

uir

ed

Number of Hosting Providers Compromised

Alexa Top 1kAlexa Top 1m

All Domains

60% of Top 1K, same provider

Page 95: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Does key sharing make enticing attack targets?

0

0.2

0.4

0.6

0.8

1

100 101 102 103 104 105 106

Cu

mu

lati

ve

Fra

cti

on

of

Do

ma

ins

’ K

ey

s A

cq

uir

ed

Number of Hosting Providers Compromised

Alexa Top 1kAlexa Top 1m

All Domains

60% of Top 1K, same provider

Page 96: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Does key sharing make enticing attack targets?

0

0.2

0.4

0.6

0.8

1

100 101 102 103 104 105 106

Cu

mu

lati

ve

Fra

cti

on

of

Do

ma

ins

’ K

ey

s A

cq

uir

ed

Number of Hosting Providers Compromised

Alexa Top 1kAlexa Top 1m

All Domains

>40% of all sites, 10 providers

60% of Top 1K, same provider

Page 97: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Does key sharing make enticing attack targets?

0

0.2

0.4

0.6

0.8

1

100 101 102 103 104 105 106

Cu

mu

lati

ve

Fra

cti

on

of

Do

ma

ins

’ K

ey

s A

cq

uir

ed

Number of Hosting Providers Compromised

Alexa Top 1kAlexa Top 1m

All Domains

Popular hosting services are prime targets for attack

>40% of all sites, 10 providers

60% of Top 1K, same provider

Page 98: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Outline

How many keys have providers aggregated?

How does sharing impact key management?

How prevalent is key sharing?

• Top 1% of providers hold keys for 86% of orgs

• Attractive targets for attack

• 76.5% share with ≥ 1 provider • Common even among most popular websites

Page 99: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Key Management

Request certificates

Renew expiring certificates

Revoke and reissue compromised certificates

Page 100: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Who manages private keys?

CAsWebsite acquires Third-party acquires

Page 101: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Who manages private keys?

CAsWebsite acquires Third-party acquires

Page 102: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Who manages private keys?

CAsWebsite acquires Third-party acquires

Page 103: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Who manages private keys?

Website acquires Third-party acquires

Page 104: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Who manages private keys?

Website acquires Third-party acquires

Diverse

“Self-managed”

Page 105: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Who manages private keys?

Website acquires Third-party acquires

Diverse Heavily skewed

“Self-managed” “Outsourced”

Page 106: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Who manages private keys?

Website acquires Third-party acquires

Diverse Heavily skewed

“Self-managed” “Outsourced”58.4% of Alexa Top 10K 33.0% of all domains

Page 107: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

How does sharing impact key management?

0.75

0.8

0.85

0.9

0.95

1

04/07 04/11 04/15 04/19 04/23 04/27 05/01 05/05

Fra

cti

on

of

Cert

ific

ate

s

No

t R

evo

ked

Date

Self-managedOutsourced

Natural experiment: Heartbleed (4/7/2014)

Page 108: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

How does sharing impact key management?

0.75

0.8

0.85

0.9

0.95

1

04/07 04/11 04/15 04/19 04/23 04/27 05/01 05/05

Fra

cti

on

of

Cert

ific

ate

s

No

t R

evo

ked

Date

Self-managedOutsourced

Natural experiment: Heartbleed (4/7/2014)

Page 109: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

How does sharing impact key management?

0.75

0.8

0.85

0.9

0.95

1

04/07 04/11 04/15 04/19 04/23 04/27 05/01 05/05

Fra

cti

on

of

Cert

ific

ate

s

No

t R

evo

ked

Date

Self-managedOutsourced

CloudFlarerevocations

Natural experiment: Heartbleed (4/7/2014)

Page 110: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

How does sharing impact key management?

0.75

0.8

0.85

0.9

0.95

1

04/07 04/11 04/15 04/19 04/23 04/27 05/01 05/05

Fra

cti

on

of

Cert

ific

ate

s

No

t R

evo

ked

Date

Self-managedOutsourced

0.75

0.8

0.85

0.9

0.95

1

04/07 04/11 04/15 04/19 04/23 04/27 05/01 05/05

Fra

cti

on

of

Cert

ific

ate

s

No

t R

evo

ked

Date

Self-managedOutsourced

Outsourced (w/o CF)

CloudFlarerevocations

Natural experiment: Heartbleed (4/7/2014)

Page 111: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

How does sharing impact key management?

0.75

0.8

0.85

0.9

0.95

1

04/07 04/11 04/15 04/19 04/23 04/27 05/01 05/05

Fra

cti

on

of

Cert

ific

ate

s

No

t R

evo

ked

Date

Self-managedOutsourced

0.75

0.8

0.85

0.9

0.95

1

04/07 04/11 04/15 04/19 04/23 04/27 05/01 05/05

Fra

cti

on

of

Cert

ific

ate

s

No

t R

evo

ked

Date

Self-managedOutsourced

Outsourced (w/o CF)

CloudFlarerevocations

Slightly more thorough

Natural experiment: Heartbleed (4/7/2014)

Page 112: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

How does sharing impact key management?

0.75

0.8

0.85

0.9

0.95

1

04/07 04/11 04/15 04/19 04/23 04/27 05/01 05/05

Fra

cti

on

of

Cert

ific

ate

s

No

t R

evo

ked

Date

Self-managedOutsourced

0.75

0.8

0.85

0.9

0.95

1

04/07 04/11 04/15 04/19 04/23 04/27 05/01 05/05

Fra

cti

on

of

Cert

ific

ate

s

No

t R

evo

ked

Date

Self-managedOutsourced

Outsourced (w/o CF)

CloudFlarerevocations

10 days to react!

Slightly more thorough

Natural experiment: Heartbleed (4/7/2014)

Page 113: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

How does sharing impact key management?

0.75

0.8

0.85

0.9

0.95

1

04/07 04/11 04/15 04/19 04/23 04/27 05/01 05/05

Fra

cti

on

of

Cert

ific

ate

s

No

t R

evo

ked

Date

Self-managedOutsourced

0.75

0.8

0.85

0.9

0.95

1

04/07 04/11 04/15 04/19 04/23 04/27 05/01 05/05

Fra

cti

on

of

Cert

ific

ate

s

No

t R

evo

ked

Date

Self-managedOutsourced

Outsourced (w/o CF)

CloudFlarerevocations

10 days to react!

Slightly more thorough

Natural experiment: Heartbleed (4/7/2014)

A few revoked thoroughly, but many did not!

Page 114: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

How does sharing impact key management?

0

0.2

0.4

0.6

0.8

1

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

CD

F o

f H

os

tin

g P

rov

ide

rs

Fraction of Heartbleed-vulnerable Certificates Revoked

Self-managedOutsourced

Natural experiment: Heartbleed (4/7/2014)

(One year after Heartbleed)

Page 115: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

How does sharing impact key management?

0

0.2

0.4

0.6

0.8

1

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

CD

F o

f H

os

tin

g P

rov

ide

rs

Fraction of Heartbleed-vulnerable Certificates Revoked

Self-managedOutsourced

Natural experiment: Heartbleed (4/7/2014)

(One year after Heartbleed)

Page 116: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

How does sharing impact key management?

0

0.2

0.4

0.6

0.8

1

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

CD

F o

f H

os

tin

g P

rov

ide

rs

Fraction of Heartbleed-vulnerable Certificates Revoked

Self-managedOutsourced

66% of providers did not revoke a single vulnerable certificate!

Natural experiment: Heartbleed (4/7/2014)

(One year after Heartbleed)

Page 117: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

How does sharing impact key management?

0

0.2

0.4

0.6

0.8

1

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

CD

F o

f H

os

tin

g P

rov

ide

rs

Fraction of Heartbleed-vulnerable Certificates Revoked

Self-managedOutsourced

66% of providers did not revoke a single vulnerable certificate!

A small minority of providers revoked most of their vulnerable certificates, but none revoked all

Natural experiment: Heartbleed (4/7/2014)

(One year after Heartbleed)

Page 118: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Outline

How many keys have providers aggregated?

How does sharing impact key management?

How prevalent is key sharing?

• Creates single point of failure • Most third-parties did poor job of revoking

• Top 1% of providers hold keys for 86% of orgs

• Attractive targets for attack

• 76.5% share with ≥ 1 provider • Common even among most popular websites

Page 119: Measurement and Analysis of Private Key Sharing in the ...people.csail.mit.edu/frankc/slides/ccs16-slides.pdf · Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem

Due to economic incentives, key sharing is prevalent in today’s web

Future work on the PKI should take economics and hosting providers into account, ideally:

hosting should not require key sharing

Most providers are not managing keys responsibly

[email protected]

securepki.orgCode and data available at: