The Need for a Usable TLS PKI
|
|
|
- Ellen Goodwin
- 10 years ago
- Views:
Transcription
1 The Need for a Usable TLS PKI Matthew Smith Usable Security and Privacy Lab, Universität Bonn
2 SSL / TLS / HTTPS / CA PKIs The TLS protocol family is a set of cryptographic protocols used to secure Internet traffic They are mainly used in combination with Certificate Authorities based PKIs to validate the public keys of entities Seite 2
3 CAs in the news Prof. Dr. Matthew Smith Seite 3
4 CAs in the news Trustwave to escape 'death penalty' for SSL skeleton key Moz likely to spare certificate-confession biz same fate as DigiNotar 14th February 2012 Firefox 'death sentence' threat to TeliaSonera over government spy claims Mozilla may snub telecom giant's new SSL certs 16th April 2013 Seite 4
5 Heartbleed XKCD Comic Seite 5
6 SSL CCS Injection Vulnerability Masashi Kikuchi of Lepidum CVE OpenSSL s ChangeCipherSpec processing has a serious vulnerability OpenSSL through 1.0.1g OpenSSL through 1.0.0l all versions before OpenSSL 0.9.8y Attackers can eavesdrop and modify communication Attackers can hijack a authenticated session Usable Security and Privacy Lab Universität Bonn Seite 6
7 Complexity is the worst enemy of security The SSL Family SSL 1.0, 2.0 and 3.0 TLS 1.0 TLS 1.1 TLS 1.2 TLS 1.3 (draft) See the Oakland Paper by Beurdouche et al. A Messy State of the Union: Taming the Composite State Machines of TLS Seite 7
8 Other PKIs are also in trouble Seite 8
9 Problems with CAs (whom do we trust?) Approximately trusted root CAs in Firefox, Chrome, IE Explorer, Windows, Mac OS, Linux Extended to ~400 via CA hierarchies 34% never used! 14) HTTPS only as strong as the weakest link Targeted attacks against CAs - a real world threat as Comodo and Diginotar have shown No scopes NSA/China/BND can sign certificates for any domain they wants For more details see our FC paper: You Won't Be Needing These Any More Seite 9
10 Seite 10
11 HTTPS Indicators Seite 11
12 Would you trust? Usable Security and Privacy Lab Universität Bonn Seite 12
13 Would you trust? Usable Security and Privacy Lab Universität Bonn Seite 13
14 Firefox 2 Warning FF2 Warning CyLab Usable Privacy and Security Laboratory 3 Seite 14
15 FF2 Warning What users actually see Adapted from Jonathan Nightingale CyLab Usable Privacy and Security Laboratory 4 Seite 15
16 Seite 16
17 Usable Security Three seminal papers are seen as the origin of Usable Security and Privacy research* Zurko and Simon s: User-Centered Security Adams and Sasse s: Users Are Not the Enemy Whitten and Tygar s Why Johnny Can t Encrypt: A Usability Evaluation of PGP 5.0 All argued that users should not be seen as a problem to be dealt with, but that security experts need to communicate more with users, and adopt user-centered design approaches. * Garfinkel et al. Usable Security, History, Themes, and Challenges, 2014 Seite 17
18 USEC Evaluation Techniques Evaluating Without Users Literature Review Cognitive Walkthrough Heuristic Evaluation Model-Based Evaluation Evaluating With Users Qualitative Conceptual Model Extraction Silent Observation Think Aloud Constructive Interaction Retrospective Testing Interviews Quantitative Controlled Experiments Questionnaires Prof. Smith - Fraunhofer FKIE Seite 18
19 Chapter 1: End-users Seite 19
20 HTTPS Part 1: Security Indicators Seite 20
21 Microsoft IE HTTPS Indicators (old) Mozilla Firefox Safari Seite 21
22 The Emperor s New Security Indicators An evaluation of website authentication and the effect of role playing on usability studies (2007) Seite 22
23 Study Results All participants entered their passwords after HTTPS indicators were removed, including all 27 who were using their own account credentials. Seite 23
24 HTTPS Indicators (newer) Made more visible Security signals Green = all is well But things s<ll change on a regular basis Effec<veness s<ll isn t great Seite 24
25 Android HTTPS Security Indicators Mobile browsers validate TLS cer<ficates correctly display security indicators...and warn the user if something goes wrong Usable Security and Privacy Lab Universität Bonn Seite 25
26 Online Survey To see if users know whether they are surfing on an HTTPS protected website half of the par<cipants got the survey via HTTP the other half via HTTPS exit survey asked whether their connec<on was protected or not To find out if users understood the Browser s warning messages and warn the user if something goes wrong. presented an SSL warning message Usable Security and Privacy Lab Universität Bonn Seite 26
27 ~50% had not seen an SSL warning message on their phone before. Online Survey - Results 745 par<cipants 47.5% of non- IT experts believed they were using a secure Internet connec<on although it was plain HTTP even 34.7% of par<cipants with prior IT educa<on thought this The risk users were warned against was rated with 2.86 (sd=.94) on a scale between 1 and 5 Many par<cipants stated they did not care about warning messages at all. Usable Security and Privacy Lab Universität Bonn Seite 27
28 HTTPS Part 2: Security Warnings Seite 28
29 Crying Wolf: An Empirical Study of SSL Warning Effectiveness (2009) Seite 29
30 Lab Study All recruits were given an online screening survey, and only online banking customers of the one specific bank were allowed to participate. 100 participants CMU students Recruited by fliers, s, and participant list 5 Randomly-assigned conditions: FF2, FF3, IE7, Single page custom warning multi-page custom warning Seite 30
31 Library vs. Bank Library vs Bank Results Ignored Warning 100% 80% 60% 40% 20% Bank Library 0% FF2 FF3 IE7 1-page Multipage In native warning conditions, no significant difference in In native warning conditions, no significant difference in reactions reactions at at library and bank bank In new warning conditions, users more likely to heed warnings at bank than at library In new warning conditions, users more likely to heed warnings at bank than at library Seite 31
32 Newer HTTPS Warnings Seite 32
33 Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness (2013) Seite 33
34 Real World Analysis Studied the click-through rate for malware and HTTPS warnings Malware Firefox 7.2% Chrome 23.2% Phishing Firefox 9.1% Chrome 18.0% HTTPS Firefox 33.0% Chrome 70.2% Seite 34
35 Participatory Design for Security-Related User Interfaces (2015) Seite 35
36 Participatory Design Small groups: Analysing existing HTTPS warnings and problems to find alternative representation 15 participants (aged 22-35, 8 female) in five workshops 1. IT(male) (pilot), 2. IT (female), 3. IT (mixed), 4. Lawyers 5. Mixed (Physicist, Musician,...) Designer as neutral supporter 1. Explanation on technical background (Shared Language) and Brainstorming 2. Creating new designs (Mock-Ups) 3. Ending (Feedback) Seite 36
37 Brainstorming Results All groups mentioned quite similar usability aspects: Text too long and unclear Technical details unnecessary for non-experts Use of colours for recommendations and graphics for explanations helpful Capability to take action should be provided Quotes: This is censorship! A reaction to hard-fail warnings/errors I feel like a slave Security measures mostly protect the device instead of the user Task: Design a better warning! Seite 37
38 IT(male), IT (female), IT (mixed), Lawyers, Mixed Seite 38
39 Quote of the day Guys, look, we are actually doing what we criticized before! Seite 39
40 Here's My Cert, So Trust Me, Maybe? Understanding TLS Errors on the Web (2013) Seite 40
41 Real World Analysis Studied TLS activity of more than 300,000 users collected certificates passively at egress points of ten network sites over a nine-month period validated certificate chains using browser logic locally 98,46% of the filtered connections validate correctly, implying a false warning rate of 1,54% In a scenario with a hypothetical MITMA chance of 1 in connections would produce warnings out of which would be false warnings Seite 41
42 Conclusion By measuring the prevalence of different types of false warnings, we provide a framework for browsers to re-evaluate their current warning mechanisms and conserve user attention. Akhawe et al. Seite 42
43 to 1 We found the attack! Image adapted from Bob Englehart Seite 43
44 PKI problems go deeper than the end-user End-users are only a small part of the TLS ecosystem Administrators are responsible for (mis)configuration webservers Developers are responsible for (mis)using TLS in their applications System architects and developers are responsible for designing error-prone systems Seite 44
45 Chapter 2: Administrators Seite 45
46 Scope of the problem We used HTTPS certificates collected by Google's web-crawler Period of 12 months ~55.7 million different hosts ~4,49 million different X.509 certificates We extracted all certificates that did not validate correctly based on the Firefox browser logic Seite 46
47 Common: Blaming Administrators It s all the administrators fault! Seite 47
48 Administrators are not the enemy! Seite 48
49 Find out where the problems lie ~4,49 million bad certificates We picked a random sample of 50,000 Pruned non-current certs down to 46,145 And contacted the administrators We sent 40,473 s to [email protected] and 5,672 to addresses embedded in the certs. Of the 46,145 s we sent 37,596 could not be delivered to the intended recipient, leaving us with 8,549 successfully delivered surveys 755 complete responses to our survey (~8%) Seite 49
50 Find out where the problems lie Reasons given in survey ~21% sub-domains/virtual hosts/ redirects ~16% to difficult ~16% for a small group of users ~7% NSA, PRISM & co. ~5% untrusted CA ~3% default configuration ~2% mistake Risk perception ~70% very small ~3% very high ~11% didn t know there were warnings Seite 50
51 Administrators wish list Lower Price for CA-signed certificates Price is perceived too high for little effort on the CA s side Free CA-signed certificates Cheaper wildcard certificates Allow CACert More trust in CACert s web of trust model Better Support for Non-Validating Certificates Support for trust-on-first-use, Pinning, TACK Better Tool Support OpenSSL command line tool too complicated Server configuration cumbersome, especially for v-hosts Auto-Update Reminder Notification of problems More details can be found in our ASIA CCS 14 paper: Why eve and mallory (also) love webmasters Seite 51
52 CA Financial Estimates 2013 VeriSign Class 3 Secure Server CA - G $1, EV-SSL Pro $33,258, VeriSign Class 3 International Server CA - G $1, EV-SSL Pro $20,833, VeriSign Class 3 Extended Validation SSL SGC CA $ EV-SSL $9,085, VeriSign Class 3 Secure Server CA - G $1, EV-SSL Pro $2,510, VeriSign International Server CA - Class $1, EV-SSL Pro $2,157, VeriSign Class 3 Extended Validation SSL CA 4681 $ EV-SSL $4,189, VeriSign Class 3 Secure Server 1024-bit CA - G2 628 $1, EV-SSL Pro $815, VeriSign Class 3 Secure Server CA - T1 82 $1, EV-SSL Pro $106, VeriSign Class 3 Extended Validation CA - T1 33 $ EV-SSL $29, $72,986, COMODO High-Assurance Secure Server CA $99.95 SSL $1,687, PositiveSSL CA $99.95 SSL $1,550, COMODO Extended Validation Secure Server CA 2774 $ EV-SSL $1,245, COMODO SSL CA 2248 $99.95 SSL $224, COMODO High Assurance Secure Server CA 880 $99.95 SSL $87, COMODO Extended Validation Secure Server CA $ EV-SSL $79, $4,876, Trustwave Organization Validation CA, Level $ SSL $126, Trustwave Domain Validation CA, Level $ SSL $29, $155, Prof. Dr. Matthew Smith Seite 52
53 Chapter 3: Developers Seite 53
54 Trust me I m an Engineer Seite 54
55 HTTPS Usage on Android The default Android HTTPS API implements correct cer<ficate valida<on. What could possibly go wrong? Seite 55
56 HTTPS Usage on Android and ios A server needs a certificate that was signed by a trusted Certificate Authority (~130 pre-installed CAs) For non-trusted certificates a custom workaround is needed Error handling requires custom code Additional security measures such as pinning or Certificate Transparency require custom code Seite 56
57 It does go wrong... Q: I am getting an error of javax.net.ssl.sslexception: Not trusted server certificate. [...] I have spent 40 hours researching and trying to figure out a workaround for this issue. A: Look at this tutorial stackoverflow.com Seite 57
58 SSL Sta<c Code Analysis Analysis of 13,500 popular, free apps from Google s Play Market 92.8 % of the apps use the Internet permission 91.7 % of networking API calls are HTTP(S) related 0.8 % exclusively HTTPS URLs 46.2 % mix HTTP and HTTPS % of all apps that use HTTPS include code that fails in SSL cer<ficate valida<on 1070 include cri<cal code 790 accept all cer<ficates 284 accept all hostnames Seite 58
59 Manual App Tes<ng Results Cherry- picked 100 apps 21 apps trust all cer<ficates 20 apps accept all hostnames These 41 apps had an install-base of million! Captured creden<als for: American Express, Diners Club, Paypal, bank accounts, Facebook, Twieer, Google, Yahoo, Microsog Live ID, Box, WordPress, remote control servers, arbitrary accounts, and IBM Same<me, among others. More details can be found in our CCS paper: Why eve and mallove love Android Seite 59
60 Trusting all Certificates Correct HTTPS certificate validation is easy just don t do anything... What some Apps do: Seite 60
61 TrustManager Implementa<ons 22 different TrustManager implementa<ons NonValidatingTrustManager FakeTrustManager EasyX509TrustManager NaiveTrustManager TrustManager DummyTrustManager SimpleTrustManager AcceptAllTrustManager OpenTrustManager and all turn effec<ve cer<ficate valida<on off Seite 61
62 An<- Virus Example ZonerAV An<- Virus app for Android Awarded best free an<- virus app for Android by av- test.org Virus signature updates via HTTPS GET The good thing: It uses TLS Unfortunately: The wrong way static&final!hostnameverifier!do_not_verify!=!new!hostnameverifier()!!!! {!!!!!!! public&boolean!verify(string!paramstring,!sslsession!paramsslsession)!!!!!!! {!!!!!!!!!!!!!return&true;!!!!!!! }!! Zoner AV };! Seite 62
63 An<- Virus example Zoner fixed the bug immediately! Seite 63
64 How Do (Good) Apps React to MITMAs? Technically they do not endanger the user However they suffer from serious usability problems Flickr Facebook Seite 64
65 Common: Blaming Developers It s all the developers fault! Seite 65
66 Developers are not the enemy! Seite 66
67 Talking To Developers Finding broken HTTPS in Android and ios apps is good knowing what the root causes are is even beeer We contacted 80 developers of broken apps informed them offered further assistance asked them for an interview 15 developers agreed? Seite 67
68 Novice Developers This app was one of our first mobile apps and when we noticed that there were problems with the SSL certificate, we just implemented the first working solution we found on the Internet. Seite 68
69 Intermediate Developers We use self-signed certificates for testing purposes and the easiest way to make them working is to remove certificate validation. Somehow we must have forgotten to remove that code again when we released our app. Seite 69
70 Expert Developers (kind of...) [...] When I used Wireshark to look at the traffic, Wireshark said that this is a proper SSL protected data stream and I could not see any cleartext information when I manually inspected the packets. So I really cannot see what the problem is here. Seite 70
71 Expert Developers (time constrained) The app accepts all SSL certificates because some users wanted to connect to their blogs with self-signed certs and [ ] because Android does not provide an easy-to-use SSL certificate warning message, it was a lot easier to simply accept all self-signed certificates. vs. Seite 71
72 Developer Survey Summary Self-Signed Certificates Development. Developers commonly wish to use self-signed certificates for testing purposes and hence want to turn off certificate validation during testing. Self-Signed Certificates Production. A few developers wanted to use self-signed certificates in their production app for cost, effort and customer satisfaction reasons. Code Complexity. Developers described the code-level customization features of HTTPS as too complex and requiring too much effort. Certificate Pinning / Trusted Roots. Developers liked the idea of having an easy way to limit the number of trusted certificates and/or certificate authorities. Global Warning Message. Developers requested global HTTPS warning messages since they described building their own warning messages as too challenging. Seite 72
73 A new approach to TLS = custom code required; P = pluggable. Our modifications Existing architecture Central TLS service for Android Force TLS validation Supports self-signed certificates Certificate Pinning Standardised user interaction Alternate Cert validation strategies Force hostname verification Force certificate validation; Configurable by the users android.net.ssl TrustManagerClient (in app) uses replaced by org.apache.http.conn.ssl SSLSocketFactory uses javax.net.ssl TrustManager removed start HTTPS now secure on Android Backwards compatible, except apps that implemented pinning (19 in tested Android apps) updating them to the new pinning sytem is very easy android.net.ssl TrustManagerService (in system) Pluggable Certificate Validation: (CA-based validation, CT, AKI, TACK, etc.) Turn on/o SSLPinning, Accept all certificates on developer devices configures User options Developer options decisions warn if SSL validation fails Warn the user if connection is insecure Human Computer Interface Figure 1: This figure illustrates the process of creating an appified an SSLworld protected network connection. The Seite grey More details can be found in our CSS paper: Rethinking ssl development in 73
74 Chapter 4: System Design Seite 74
75 Problems with CAs (whom do we trust?) Approximately trusted root CAs in Firefox, Chrome, IE Explorer, Windows, Mac OS, Linux Extended to ~400 via CA hierarchies HTTPS only as strong as the weakest link Targeted attacks against CAs - a real world threat Everybody screws up End-users Administrators Developers System Designers? For more details see our FC paper: You Won't Be Needing These Any More Seite 75
76 We need more usable PKIs Up-and-coming PKIs DANE (probably doomed) Certificate Transparency (Google) ARPKI (Perrig et al.) All promise better security All add components (and complexity?) How will developers cope? How will administrators cope? How will users cope? Seite 76
77 Frontiers of USEC Research Studies Current USEC Researcher PKI Usability Research All layers of a PKI must be usable! End Users Administrators Deploy Create Use Software Software Software Software Software Software Software Software Software Systems System Endangers Endangers Developer Frontiers of Usable Security Matthew Smith, University of Bonn & Research Center L3S Seite 77
78 USEC Evaluation Techniques Evaluating Without Users Literature Review Cognitive Walkthrough Heuristic Evaluation Model-Based Evaluation Evaluating With Users Qualitative Conceptual Model Extraction Silent Observation Think Aloud Constructive Interaction Retrospective Testing Interviews Quantitative Controlled Experiments Questionnaires Prof. Smith - Fraunhofer FKIE Seite 78
79 10 Rules for a good Crypto API? Smith & USENIX Hotsec Easy to learn, even without crypto background 2. Easy to use, even without documentation 3. Hard to misuse. Incorrect use should lead to visible errors 4. Hard to circumvent errors except during testing/development 5. Easy to read and maintain code that uses it 6. Sufficiently powerful to satisfy (non-security) requirements 7. Easy to extend Hard to change/override core functionality 8. Appropriate to audience this means people with no crypto experience 9. Assist with/handle end-user interaction conduct developer studies 10. However, where possible integrate into standard APIs so normal developers never have to interact with crypto APIs in the first place Prof. Smith - Fraunhofer FKIE Seite 79
80 End-user PKI Experts are not the Enemy either! Seite 80
Why Eve and Mallory Love Android An Analysis of Android SSL (In)Security
Why Eve and Mallory Love Android An Analysis of Android SSL (In)Security Sascha Fahl Marian Harbach Thomas Muders Lars Baumgärtner Bernd Freisleben Ma:hew Smith Some Android Facts 330 million devices (as
Sascha Fahl, Marian Harbach, Matthew Smith. Usable Security and Privacy Lab Leibniz Universität Hannover
Hunting Down Broken SSL in Android Apps Sascha Fahl, Marian Harbach, Matthew Smith Usable Security and Privacy Lab Leibniz Universität Hannover OWASP AppSec 2013 Seite 1 Appification There s an App for
Why Eve and Mallory Love Android An Analysis of Android SSL (In)Security
Why Eve and Mallory Love Android An Analysis of Android SSL (In)Security Sascha Fahl Marian Harbach Thomas Muders Lars Baumgärtner Bernd Freisleben Matthew Smith Some Android Facts 330 million devices
SSL and Browsers: The Pillars of Broken Security
SSL and Browsers: The Pillars of Broken Security Ivan Ristic Wolfgang Kandek Qualys, Inc. Session ID: TECH-403 Session Classification: Intermediate SSL, TLS, And PKI SSL (or TLS, if you prefer) is the
Is Your SSL Website and Mobile App Really Secure?
Is Your SSL Website and Mobile App Really Secure? Agenda What is SSL / TLS SSL Vulnerabilities PC/Server Mobile Advice to the Public Hong Kong Computer Emergency Response Team Coordination Centre 香 港 電
SSL implementieren aber sicher!
SSL implementieren aber sicher! Karlsruher Entwicklertag 2014 21.05.2014 Dr. Yun Ding SSL in the news 2011 2012 2013 2014 BEAST CRIME Lucky 13 Compromised CAs RC4 biases BREACH DRBG Backdoor Apple goto
SSL/TLS: The Ugly Truth
SSL/TLS: The Ugly Truth Examining the flaws in SSL/TLS protocols, and the use of certificate authorities. Adrian Hayter CNS Hut 3 Team [email protected] Contents Introduction to SSL/TLS Cryptography
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Applied Technology Abstract The Web-based approach to system management taken by EMC Unisphere
Best Practice Guide (SSL Implementation) for Mobile App Development 最 佳 行 事 指 引. Jointly published by. Publication version 1.
Best Practice Guide (SSL Implementation) for Mobile App Development 流 動 應 用 程 式 (SSL 實 施 ) 最 佳 行 事 指 引 香 港 電 腦 事 故 協 調 中 心 ] Jointly published by [ 專 業 資 訊 保 安 協 會 ] Hong Kong Computer Emergency Response
ALTERNATIVES TO CERTIFICATION AUTHORITIES FOR A SECURE WEB
ALTERNATIVES TO CERTIFICATION AUTHORITIES FOR A SECURE WEB Scott Rea DigiCert, Inc. Session ID: SEC-T02 Session Classification: Intermediate BACKGROUND: WHAT IS A CERTIFICATION AUTHORITY? What is a certification
SSL BEST PRACTICES OVERVIEW
SSL BEST PRACTICES OVERVIEW THESE PROBLEMS ARE PERVASIVE 77.9% 5.2% 19.2% 42.3% 77.9% of sites are HTTP 5.2% have an incomplete chain 19.2% support weak/insecure cipher suites 42.3% support SSL 3.0 83.1%
SSL: Paved With Good Intentions. Richard Moore [email protected]
SSL: Paved With Good Intentions Richard Moore [email protected] Why do we need SSL? Privacy Online shopping Online banking Identity Protection Data Integrity Early SSL First public version was SSLv2
AndroSSL: A Platform to Test Android Applications Connection Security
AndroSSL: A Platform to Test Android Applications Connection Security François Gagnon, Marc-Antoine Ferland, Marc-Antoine Fortier, Simon Desloges, Jonathan Ouellet, and Catherine Boileau Cybersecurity
Why Johnny Can't Encrypt: A Usability Study of PGP
Why Johnny Can't Encrypt: A Usability Study of PGP Jan Sousedek Technische Universität Berlin, Germany Erasmus program Summer semester 2008 Seminar: Internet Security [email protected] Abstract Interfaces
Project X Mass interception of encrypted connections
Project X Mass interception of encrypted connections What? SSL/TLS interception TOR interception ...a thorny path Common Issues Public Key Pinning avoids rogue CA to sign certs Common Issues Google and
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
The Savage Curtain: Mobile SSL Failures
The Savage Curtain: Mobile SSL Failures Who are these guys? Tony Trummer - Staff Security Engineer aka SecBro Tushar Dalvi - Sr. Security Engineer & Pool Hustler A Private Little War Our employer generally
HTTPS Inspection with Cisco CWS
White Paper HTTPS Inspection with Cisco CWS What is HTTPS? Hyper Text Transfer Protocol Secure (HTTPS) is a secure version of the Hyper Text Transfer Protocol (HTTP). It is a combination of HTTP and a
A Proper Foundation: Extended Validation SSL
A Proper Foundation: Extended Validation SSL A critical model for SSL digital certificates and browser trust Get this White Paper Entrust, Inc. All Rights Reserved. 1 1 Contents Context of Internet Security...
ARPKI: Attack Resilient Public-Key Infrastructure
ARPKI: Attack Resilient Public-Key Infrastructure David Basin, Cas Cremers, Tiffany Hyun-Jin Kim, Adrian Perrig, Ralf Sasse, Pawel Szalachowski ETH Zurich, University of Oxford, CMU 1 PUBLIC KEYS AND CERTIFICATES
Securing End-to-End Internet communications using DANE protocol
Securing End-to-End Internet communications using DANE protocol Today, the Internet is used by nearly.5 billion people to communicate, provide/get information. When the communication involves sensitive
Cleaning Encrypted Traffic
Optenet Documentation Cleaning Encrypted Traffic Troubleshooting Guide iii Version History Doc Version Product Date Summary of Changes V6 OST-6.4.300 01/02/2015 English editing Optenet Documentation
Analysis of the HTTPS Certificate Ecosystem
Analysis of the HTTPS Certificate Ecosystem, James Kasten, Michael Bailey, J. Alex Halderman University of Michigan HTTPS and TLS How does HTTPS and the CA ecosystem fit into our daily lives? Nearly all
Implementation Vulnerabilities in SSL/TLS
Implementation Vulnerabilities in SSL/TLS Marián Novotný [email protected] ESET, spol. s r.o. Bratislava, Slovak Republic Abstract SSL/TLS protocol has become a standard way for establishing a secure communication
EECE 412, TERM PROJECT, DECEMBER 2009 1. EECE 412 Term Project: A Study on SSL Warning Effectiveness
EECE 412, TERM PROJECT, DECEMBER 2009 1 EECE 412 Term Project: A Study on SSL Warning Effectiveness Ildar Muslukhov Andreas Sotirakopoulos Levi Stoddard [email protected] [email protected] [email protected]
More on SHA-1 deprecation:
Dear PTC Axeda Customer, This message specifies Axeda and IDM Agent upgrade requirements and timelines for transitioning Axeda Enterprise Server, Global Access Server (GAS), Policy Server, and Questra
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
A Study of What Really Breaks SSL HITB Amsterdam 2011
A Study of What Really Breaks SSL HITB Amsterdam 2011 v1.0 Ivan Ristic Michael Small 20 May 2011 Agenda 1. State of SSL 2. Quick intro to SSL Labs 3. SSL Configuration Surveys 4. Survey of Actual SSL Usage
What s Your HTTPS Grade? A Case Study of HTTPS/SSL at Mid Michigan Community College. Brandon Kish @kishba [email protected]
What s Your HTTPS Grade? A Case Study of HTTPS/SSL at Mid Michigan Community College Brandon Kish @kishba [email protected] About Me Director of Programming Mid Michigan Community College ~4,500 students
Integrated SSL Scanning
Software Version 9.0 Copyright Copyright 1996-2008. Finjan Software Inc. and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included in this publication are the exclusive
You Won t Be Needing These Any More: On Removing Unused Certificates From Trust Stores
You Won t Be Needing These Any More: On Removing Unused Certificates From Trust Stores Henning Perl 1, Sascha Fahl 1, and Matthew Smith 2 1 Leibniz University Hannover, Germany, {perl, fahl}@dcsec.uni-hannover.de
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
Secure Web Appliance. SSL Intercept
Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...
Certificates and network security
Certificates and network security Tuomas Aura CSE-C3400 Information security Aalto University, autumn 2014 Outline X.509 certificates and PKI Network security basics: threats and goals Secure socket layer
Lesson 10: Attacks to the SSL Protocol
Lesson 10: Attacks to the SSL Protocol Luciano Bello - [email protected] Chalmers University Dr. Alfonso Muñoz - [email protected] T>SIC Group. Universidad Politécnica de Madrid Security of the SSL
What in the heck am I getting myself into! Capitalware's MQ Technical Conference v2.0.1.5
SSL Certificate Management or What in the heck am I getting myself into! Table of Contents What is SSL and TLS? What do SSL and TLS do (and not do)? Keystore and Certificate Lifecycle Certificates Certificate
Extended SSL Certificates
Introduction Widespread usage of internet has led to the growth of awareness amongst users, who now associate green address bar with security. Though people are able to recognize the green bar, there is
Workday Mobile Security FAQ
Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy
How to configure SSL proxying in Zorp 3 F5
How to configure SSL proxying in Zorp 3 F5 June 14, 2013 This tutorial describes how to configure Zorp to proxy SSL traffic Copyright 1996-2013 BalaBit IT Security Ltd. Table of Contents 1. Preface...
SBClient SSL. Ehab AbuShmais
SBClient SSL Ehab AbuShmais Agenda SSL Background U2 SSL Support SBClient SSL 2 What Is SSL SSL (Secure Sockets Layer) Provides a secured channel between two communication endpoints Addresses all three
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
SSL Considerations for CAS: Planning, Management, and Troubleshooting. Marvin Addison Middleware Services Virginia Tech October 13, 2010
SSL Considerations for CAS: Planning, Management, and Troubleshooting Marvin Addison Middleware Services Virginia Tech October 13, 2010 Agenda Planning and deployment considerations Discussion of Java
How to configure SSL proxying in Zorp 6
How to configure SSL proxying in Zorp 6 April 17, 2015 Abstract This tutorial describes how to configure Zorp to proxy SSL traffic Copyright 1996-2015 BalaBit IT Security Ltd. Table of Contents 1. Preface...
LBSEC. http://www.liveboxcloud.com
2014 LBSEC http://www.liveboxcloud.com LiveBox Srl does not release declarations or guarantee regarding this documentation and its use and declines any expressed or implied commercial or suitability guarantee
Basics of SSL Certification
Introduction To secure transmission of information from browser to a web server, a security protocol is used. SSL (Secure Socket Lock) is one of the most popular and widely accepted security protocols,
PowerChute TM Network Shutdown Security Features & Deployment
PowerChute TM Network Shutdown Security Features & Deployment By David Grehan, Sarah Jane Hannon ABSTRACT PowerChute TM Network Shutdown (PowerChute) software works in conjunction with the UPS Network
SSL Server Rating Guide
SSL Server Rating Guide version 2009j (20 May 2015) Copyright 2009-2015 Qualys SSL Labs (www.ssllabs.com) Abstract The Secure Sockets Layer (SSL) protocol is a standard for encrypted network communication.
SSL Interception Proxies. Jeff Jarmoc Sr. Security Researcher Dell SecureWorks. and Transitive Trust
SSL Interception Proxies Jeff Jarmoc Sr. Security Researcher Dell SecureWorks and Transitive Trust About this talk History & brief overview of SSL/TLS Interception proxies How and Why Risks introduced
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
Apache Security with SSL Using Ubuntu
Apache Security with SSL Using Ubuntu These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Some SSL background
CS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
How To Secure A Website With A Password Protected Login Process (Www.Siphone)
Preventing Spoofing, Phishing and Spamming by Secure Usability and Cryptography ICDCS 07/07/2006 Amir Herzberg Computer Science Department, Bar Ilan University http://amirherzberg.com 04/05/06 http://amirherzberg.com
Configuration Guide for RFMS 3.0 Initial Configuration. WiNG 5 How-To Guide. Digital Certificates. July 2011 Revision 1.0
Configuration Guide for RFMS 3.0 Initial Configuration XXX-XXXXXX-XX WiNG 5 How-To Guide Digital Certificates July 2011 Revision 1.0 MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark
SSL Report: ebfl.srpskabanka.rs (91.240.6.48)
Home Projects Qualys.com Contact You are here: Home > Projects > SSL Server Test > SSL Report: (91.240.6.48) Assessed on: Sun, 03 Jan 2016 15:46:07 UTC HIDDEN Clear cache Scan Another» Summary Overall
CSC574 - Computer and Network Security Module: Public Key Infrastructure
CSC574 - Computer and Network Security Module: Public Key Infrastructure Prof. William Enck Spring 2013 1 Meeting Someone New Anywhere in the Internet 2 What is a certificate? A certificate makes an association
M86 Web Filter USER GUIDE for M86 Mobile Security Client. Software Version: 5.0.00 Document Version: 02.01.12
M86 Web Filter USER GUIDE for M86 Mobile Security Client Software Version: 5.0.00 Document Version: 02.01.12 M86 WEB FILTER USER GUIDE FOR M86 MOBILE SECURITY CLIENT 2012 M86 Security All rights reserved.
BEGINNERS GUIDE TO SSL CERTIFICATES: Making the BEST choice when considering your online security options
BEGINNERS GUIDE TO SSL CERTIFICATES: Making the BEST choice when considering your online security options BEGINNERS GUIDE TO SSL CERTIFICATES Introduction Whether you are an individual or a company, you
Integrated SSL Scanning
Version 9.2 SSL Enhancements Copyright 1996-2008. Finjan Software Inc. and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included in this publication are the exclusive
How to configure HTTPS proxying in Zorp 5
How to configure HTTPS proxying in Zorp 5 June 24, 2014 This tutorial describes how to configure Zorp to proxy HTTPS traffic Copyright 1996-2014 BalaBit IT Security Ltd. Table of Contents 1. Preface...
Criminal charges are not pursued: Hacking PKI
Criminal charges are not pursued: Hacking PKI Mike Zusman Principal Consultant [email protected] About the Title From StartCom Critical Event Report https://blog.startcom.org/?p=161 Thanks
Legal notices. Legal notices. For legal notices, see http://help.adobe.com/en_us/legalnotices/index.html.
ADOBE AIR Security Legal notices Legal notices For legal notices, see http://help.adobe.com/en_us/legalnotices/index.html. iii Contents Installing and updating desktop applications...........................................................................
Internal Server Names and IP Address Requirements for SSL:
Internal Server Names and IP Address Requirements for SSL: Guidance on the Deprecation of Internal Server Names and Reserved IP Addresses provided by the CA/Browser Forum June 2012, Version 1.0 Introduction
Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
SSL, PKI and Secure Communication
SSL, PKI and Secure Communication Aditya Marella 20 th March, 2014 03/19/2014 Usable Privacy and Security 1 Secure Sockets Layer (SSL) Developed by Netscape Sits on top of TCP and below application level
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
Enhancing Web Application Security
Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor
An Application Package Configuration Approach to Mitigating Android SSL Vulnerabilities
An Application Package Configuration Approach to Mitigating Android SSL Vulnerabilities Vasant Tendulkar Department of Computer Science North Carolina State University [email protected] William Enck Department
$920+ GST Paid Annually. e-commerce Website Hosting Service HOSTING:: WHAT YOU GET WORDPRESS:: THEME + PLUG-IN UPDATES
e-commerce Website Hosting Service HOSTING:: WHAT YOU GET Where you host your website is an extremely important decision to make, if you choose simply on price, you may be making a huge mistake. We encourage
Michael Seltzer COMP 116: Security Final Paper. Client Side Encryption in the Web Browser Mentor: Ming Chow
Michael Seltzer COMP 116: Security Final Paper Client Side Encryption in the Web Browser Mentor: Ming Chow 1 Abstract Web service providers generally look to encryption as a means of ensuring data privacy
Basic Security Considerations for Email and Web Browsing
Basic Security Considerations for Email and Web Browsing There has been a significant increase in spear phishing and other such social engineering attacks via email in the last quarter of 2015, with notable
How to configure HTTPS proxying in Zorp 6
How to configure HTTPS proxying in Zorp 6 April 17, 2015 Abstract This tutorial describes how to configure Zorp to proxy HTTPS traffic Copyright 1996-2015 BalaBit IT Security Ltd. Table of Contents 1.
You re FREE Guide SSL. (Secure Sockets Layer) webvisions www.webvisions.com +65 6868 1168 [email protected]
SSL You re FREE Guide to (Secure Sockets Layer) What is a Digital Certificate? SSL Certificates, also known as public key certificates or Digital Certificates, are essential to secure Internet browsing.
Vulnerabilità dei protocolli SSL/TLS
Università degli Studi di Milano Facoltà di Scienze Matematiche, Fisiche e Naturali Dipartimento di Informatica e Comunicazione Vulnerabilità dei protocolli SSL/TLS Andrea Visconti Overview Introduction
1 Reflection ZFE 5. 2 Security Considerations 13. 3 Troubleshooting the Installation 19. Contents 1
1 Reflection ZFE 5 Introducing Reflection ZFE......................................................... 5 Reflection ZFE components.................................................. 5 System requirements..............................................................
CS 6262 - Network Security: Public Key Infrastructure
CS 6262 - Network Security: Public Key Infrastructure Professor Patrick Traynor 1/30/13 Meeting Someone New 2 What is a certificate? A certificate makes an association between a user identity/job/ attribute
Using a custom certificate for SSL inspection
Using a custom certificate for SSL inspection This recipe shows how use a FortiGate unit to generate a custom certificate signing request and to get this certificate signed by an enterprise root Certificate
Tips for Banking Online Safely
If proper attention is given to safety and security, banking and monetary activities can be completed online in a convenient and effective fashion. This guide helps to establish procedures for remaining
Tutorial on Smartphone Security
Tutorial on Smartphone Security Wenliang (Kevin) Du Professor [email protected] Smartphone Usage Smartphone Applications Overview» Built-in Protections (ios and Android)» Jailbreaking and Rooting» Security
9.92 Using HTTPS for building secure web applications v 1.0
2006-12-19 LiTH 9.92 Using HTTPS for building secure web applications v 1.0 Jonas Krogell Abstract Today most websites on the Internet uses normal HTTP for displaying the data for the visitors/users. HTTP
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
SSL Certificates 101
Whether you are an individual or a company, you should approach online security in the same way that you would approach physical security for your home or business. Not only does it make you feel safer
BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
NIST ITL July 2012 CA Compromise
NIST ITL July 2012 CA Compromise Prepared for: Intelligent People [email protected] 1 NIST ITL Bulletin on CA Compromise http://csrc.nist.gov/publications/nistbul/july-2012_itl-bulletin.pdf These
Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
Digital certificates and SSL
Digital certificates and SSL 20 out of 33 rated this helpful Applies to: Exchange Server 2013 Topic Last Modified: 2013-08-26 Secure Sockets Layer (SSL) is a method for securing communications between
beginners guide Beginners Guide Certificates the best decision when considering your online security options.
Beginners Guide to Digital SSL Certificates the best decision when considering your online security options. Beginners Guide to Digital SSL Certificates introduction Whether you are an individual or a
Certificate technology on Pulse Secure Access
Certificate technology on Pulse Secure Access How-to Guide Published Date July 2015 Contents Introduction: 3 Creating a Certificate signing request (CSR): 3 Import Intermediate CAs: 5 Using Trusted Client
Salesforce1 Mobile Security Guide
Salesforce1 Mobile Security Guide Version 1, 1 @salesforcedocs Last updated: December 8, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Secure Transfers. Contents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3
Contents SSL-Based Services: HTTPS and FTPS 2 Generating A Certificate 2 Creating A Self-Signed Certificate 3 Obtaining A Signed Certificate 4 Enabling Secure Services 5 A Note About Ports 5 Connecting
Djigzo email encryption. Djigzo white paper
Djigzo email encryption Djigzo white paper Copyright 2009-2011, djigzo.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in transit or
Web Security, Privacy, and Commerce
SECOND EDITION Web Security, Privacy, and Commerce Simson Garfinkel with Gene Spafford O'REILLT Beijing Cambridge Famham Köln Paris Sebastopol Taipei Tokyo Table of Contents Preface xi Part I. Web Technology
TechNote. Contents. Overview. Using a Windows Enterprise Root CA with DPI-SSL. Network Security
Network Security Using a Windows Enterprise Root CA with DPI-SSL Contents Overview... 1 Deployment Considerations... 2 Configuration Procedures... 3 Importing the Public CA Certificate for Trust... 3 Importing
By Jan De Clercq. Understanding. and Leveraging SSL-TLS. for Secure Communications
By Jan De Clercq Understanding and Leveraging SSL-TLS for Secure Communications ii Contents Chapter 2: Leveraging SSL/TLS for Secure Web Communications....... 21 Setting Up SSL/TLS on a Web Server..................................
Browser Interfaces and Extended Validation SSL Certificates: An Empirical Study
Browser Interfaces and Extended Validation SSL Certificates: An Empirical Study Robert Biddle, P.C. van Oorschot, Andrew S. Patrick, Jennifer Sobey, Tara Whalen Carleton University, Ottawa, ON, Canada
