sok : ssl and https:

25
SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements Presented by: Zhengyang Qu

Upload: renee-moreno

Post on 03-Jan-2016

98 views

Category:

Documents


1 download

DESCRIPTION

SoK : SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements. Presented by: Zhengyang Qu. Roadmap. Background Crypto Protocol Issues in HTTPS Trust Model Issues in HTTPS Security Enhancements to CA/B Model Discussion & On-going Research. Background. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: SoK : SSL and HTTPS:

SoK: SSL and HTTPS:Revisiting past challenges and evaluating certificate trust model enhancements

Presented by: Zhengyang Qu

Page 2: SoK : SSL and HTTPS:

Roadmap

Background Crypto Protocol Issues in HTTPS Trust Model Issues in HTTPS Security Enhancements to CA/B Model Discussion & On-going Research

Page 3: SoK : SSL and HTTPS:

Background

Objectives Confidentiality Server Authentication, Client Authentication

(Optional) Protocol Specification and Implementation

HTTPS: combination of HTTP with SSL/TLS Client-side (by OS or browser)

Firefox: Mozilla’s NSS, Chrome: underlying OS Windows, OS X, or NSS on Linux

Server-side Apache (OpenSSL), Windows Server (ISS), Solaris

(NSS)

Page 4: SoK : SSL and HTTPS:

Roadmap

Background Crypto Protocol Issues in HTTPS Trust Model Issues in HTTPS Security Enhancements to CA/B Model Discussion & On-going Research

Page 5: SoK : SSL and HTTPS:

Crypto Protocol Issues in HTTPS Weakness in Cryptographic Primitives

Weak Encryption & Signature Key Lengths Symmetric key encryption scheme with 40, 56,

or 64 bit keys is subject to a brute-force attack. Asymmetric encryption schemes like RSA are

subject to factoring attacks when used with a 512 bit modulus.

Weak Hash Functions Collision-resistance & Second Preimage

Resistance MD5, MD2

Page 6: SoK : SSL and HTTPS:

Crypto Protocol Issues in HTTPS Implementation Flaws & Related Attacks

Pseudorandom Generator (PRG) Seeding Remote Timing Attack

Oracle Attacks RSA Encoding Cipher Block Chaining (CBC) Initialization

Chosen Plaintext Attacks Compression CBC Padding

Page 7: SoK : SSL and HTTPS:

Crypto Protocol Issues in HTTPS Protocol-level Attacks

Ciphersuite Downgrade Attack Version Downgrade Attack Renegotiation Attack Cross-protocol Attack

Diffie-Hellmen or RSA Not state which key agreement algorithm is

used

Page 8: SoK : SSL and HTTPS:

Roadmap

Background Crypto Protocol Issues in HTTPS Trust Model Issues in HTTPS Security Enhancements to CA/B Model Discussion & On-going Research

Page 9: SoK : SSL and HTTPS:

Trust Model Issues in HTTPs

Certification Domain Validated (DV) & Extended

Validated (EV) Security Issues

Hostname Validation (CAs) E-mail validations: top-level domain

(admin@domain) WhoIS record

Hostname Validation (Clients) Parsing Attack (e.g. bank.com evil.com)

Mismatch between CA parsing and browser parsing

EV Downgrading

Page 10: SoK : SSL and HTTPS:

Trust Model Issues in HTTPs

Anchoring Trust Software Vendors Private Networks (e.g. corporate

environment) Security Issues

CA Compromise MITM attack (e.g. two compromised CAs

Comodo & DigiNotar) Compelled Certificates

Nation-states, government (e.g. connection to Facebook via ISPs in Syria)

Page 11: SoK : SSL and HTTPS:

Trust Model Issues in HTTPs

Transitivity of Trust Intermediate CA certificates Path Validation Algorithm

Constraints: (1) CA: TRUE (2) pathlen: n Lack of further chain discovery mechanism Intermediate CAs are invisible to client

before being encountered

Page 12: SoK : SSL and HTTPS:

Trust Model Issues in HTTPs

Maintenance of Trust Terminate the Validity of a certificate before

expiration Get Revocation Status: CRLs & OCSP

(updated on-demand) Responsive Revocation

Security Issues Blocking Revocation Ownership Transfer

Domain: fb.com

Page 13: SoK : SSL and HTTPS:

Trust Model Issues in HTTPs

Indication and Interpretation of Trust Browser Security Cues, Browser Security

Warnings, Mixed Content, Mobile Browsers, HTTP Form Submit

Security Issues Stripping SSL/TLS Spoofing Browser Chrome Conceding a Warning

Page 14: SoK : SSL and HTTPS:

Roadmap

Background Crypto Protocol Issues in HTTPS Trust Model Issues in HTTPS Security Enhancements to CA/B

Model Discussion & On-going Research

Page 15: SoK : SSL and HTTPS:

Security Enhancements to CA/B Model

Security Properties Offered by Primitives Detecting Certificate Substitution Detecting SSL/TLS Stripping PKI Improvements

Evaluation Criteria for Impact on HTTPS Security & Privacy Deployability Usability

Page 16: SoK : SSL and HTTPS:
Page 17: SoK : SSL and HTTPS:

Security Enhancements to CA/B Model

Evaluation of Proposed Primitives Certificate Pinning (Client History)

Detection of certificate substitution attacks Certificate Pinning (Server)

Better level of granularity Certificate Pinning (Browser Platform)

Avoid blind TOFU approach Certificate Pinning (DNS)

Who conduct the validation? DNSSEC, DANE

Page 18: SoK : SSL and HTTPS:

Multipath Probing Crowdsourcing

Objective information (time-based and space-based)

Subjective information (Omnibroker, Monkeysphere)

Convergence (Firefox), DoubleCheck, Certificate catalogue (Google)

Security Enhancements to CA/B Model

Page 19: SoK : SSL and HTTPS:

Channel-bound Credentials Modify the authentication value in cookies

Credential-bound Channels Key Continuity/Manifest

Server-side changes TACK, DANE, DVCert

Security Enhancements to CA/B Model

Page 20: SoK : SSL and HTTPS:

HTTPS-only Pinning Many primitives are never invoked unless an

HTTPS connection is requested Domain only supports HTTPS and

communicates that with client via a pin Request headers or TLS extensions Pre-established in browser DNS record of the site

Security Enhancements to CA/B Model

Page 21: SoK : SSL and HTTPS:

Security Enhancements to CA/B Model

Visual Cues for Secure POST (e.g. SSLight) Browser-stored CRL Certificate Status Stapling Short-lived Certificates List of Active Certificates, “Whitelist”

Page 22: SoK : SSL and HTTPS:

Roadmap

Background Crypto Protocol Issues in HTTPS Trust Model Issues in HTTPS Security Enhancements to CA/B Model Discussion & On-going Research

Page 23: SoK : SSL and HTTPS:

Discussion & On-going Research Protocol-level TLS-Analysis &

Modification Trust Model Infrastructure

Realistic reflection of trust in the digital world?

Human Element & the Security User Interface

Raising the Bar Combine the primitives into the

infrastructure Replace the functionality of CAs (e.g. DANE) Provide recognizable assurance to users

Page 24: SoK : SSL and HTTPS:

Thank you!

Page 25: SoK : SSL and HTTPS:

Discussion & On-going Research Important Orthogonal Problems

Gap between the user’s cognitive notion of what organization connected and the domain name in certificate

Condition for read/write access to cookies Compromised client-platform