A Qualitative Comparison of SSL Validation Alternatives

Similar documents
Securing the SSL/TLS channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs

SSL/TLS: The Ugly Truth

SSL, PKI and Secure Communication

SSL and Browsers: The Pillars of Broken Security

ARPKI: Attack Resilient Public-Key Infrastructure

You Won t Be Needing These Any More: On Removing Unused Certificates From Trust Stores

ALTERNATIVES TO CERTIFICATION AUTHORITIES FOR A SECURE WEB

Sascha Fahl, Marian Harbach, Matthew Smith. Usable Security and Privacy Lab Leibniz Universität Hannover

EMET 4.0 PKI MITIGATION. Neil Sikka DefCon 21

SSL implementieren aber sicher!

Accountable Key Infrastructure (AKI): A Proposal for a Public-Key Validation Infrastructure

Attacks against certification service providers and their ramifications

Should You Trust the Padlock? Web Security and the HTTPS Value Chain. Keeping Current 20 November 2013 Ken Calvert

Introduction to the DANE Protocol

Securing End-to-End Internet communications using DANE protocol

SSL BEST PRACTICES OVERVIEW

SSL: Paved With Good Intentions. Richard Moore

Alternatives and Enhancements to CAs for a Secure Web

ADDITIONAL Information Security Review, 3b/ November 2011 On vulnerabilities in the certificate system

Websense Content Gateway HTTPS Configuration

Secure Sockets Layer (SSL) / Transport Layer Security (TLS)

Server Certificates based on DNSSEC

POODLE. Yoshiaki Kasahara Kyushu University 2015/3/3 APAN 39th in Fukuoka 1

Public Key Infrastructure (PKI)

DNSSEC - Why Network Operators Should Care And How To Accelerate Deployment

The Building Blocks for Trusted Internet Services

Towards Short-Lived Certificates

Analyzing DANE's Response to Known DNSsec Vulnerabilities

Cer$ficates- as- an- Insurance (CaaI): Incen$vizing Accountability in SSL/TLS

Public Key Infrastructures. Andreas Hülsing

KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE. Mihir Bellare UCSD 1

Public Key Infrastructure PKI. Michael Maass and Blase Ur

Support Advisory: ArubaOS Default Certificate Expiration

NIST ITL July 2012 CA Compromise

The weakest link in the chain:

Why Eve and Mallory Love Android An Analysis of Android SSL (In)Security

SSL Interception Proxies. Jeff Jarmoc Sr. Security Researcher Dell SecureWorks. and Transitive Trust

SSL Server Rating Guide

Implementation Vulnerabilities in SSL/TLS

Certificate Authorities (CA) and SSL Certificates

Mobile Application Security

Search for Trust: An Analysis and Comparison of CA System Alternatives and Enhancements

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Next Steps In Accelerating DNSSEC Deployment

Using Entrust certificates with VPN

Support Advisory: ArubaOS Default Certificate Expiration

Chapter 7 Managing Users, Authentication, and Certificates

1 Domain Extension for MACs

Public Key Infrastructure

Tel: Tel: +44 (0) Comodo Group.

Key Management and Distribution

Authenticity of Public Keys

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

Network and Information Security Legislation in the EU

What is an SSL Certificate?

Kerberos. Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, BC. From Italy (?).

Opportunistic Security

TLS Proxies. draft-mcgrew-tls-proxy-server. D. McGrew D. Wing P. Gladstone Y. Nir

Running head: SSL CERTIFICATE AUTHORITY ISSUES 1. Investigating Implementations Designed. to Resolve SSL Certificate Authority Issues.

Designing a CA Single Sign-On Architecture for Enhanced Security

Protocol Rollback and Network Security

Comodo 2048 bit SSL Certificates. Security for your online business now and long into the future

BlackBerry 10.3 Work Space Only

Number of relevant issues

Best Practice Guide (SSL Implementation) for Mobile App Development 最 佳 行 事 指 引. Jointly published by. Publication version 1.

Apache Security with SSL Using Ubuntu

Walking The Security & Privacy Talk Moving from Compliance to Stewardship

Deploying DNSSEC: From End-Customer To Content

CSC574 - Computer and Network Security Module: Public Key Infrastructure

Setup SSL in SharePoint 2013 Using Domain Certificate

PCI Security Standards Council

ConCERTO Secure Solutions for Converged Systems

SSL Certificates and Bomgar

The USP Maker for the hosting industry Welcome to my presentation Christian Heutger WorldHostingDay

CERTIFICATION PRACTICE STATEMENT UPDATE

No Attack Necessary: The Surprising Dynamics of SSL Trust Relationships

Is Your SSL Website and Mobile App Really Secure?

Capture Resilient ElGamal Signature Protocols

Master Game and Media Technology. Improving PKI. Solution analysis in case of CA compromisation. Samira Zaker Soltani.

Apache Milagro (incubating) An Introduction ApacheCon North America

Lecture 13. Public Key Distribution (certification) PK-based Needham-Schroeder TTP. 3. [N a, A] PKb 6. [N a, N b ] PKa. 7.

Lesson 10: Attacks to the SSL Protocol

Before the. Committee on Energy and Commerce Subcommittee on Communications and Technology United States House of Representatives

Thick Client Application Security

DNS Security FAQ for Registrants

DIGIPASS Authentication for Check Point Connectra

CS255 Programming Project 2

Website Security: It s Not all About the Hacker Anymore

Lecture 10: CPA Encryption, MACs, Hash Functions. 2 Recap of last lecture - PRGs for one time pads

Frequently Asked Questions. Frequently Asked Questions: Securing the Future of Trust on the Internet

Enterprise Content Management System Monitor 5.1 Security Considerations Revision CENIT AG Brandner, Marc

The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems

Managing CA-Signed Certificates

Michael Coates michael-coates.blogspot.com

The Changing Face of SSL

Faking Extended Validation SSL Certificates in Internet Explorer 7

E2e-encrypted via enhanced certificate transparency

Web Security. Introduction: Understand applicable laws, legal issues and ethical issues regarding computer crime

A Step-by-Step guide for implementing DANE with a Proof of Concept

Protecting Your Organisation from Targeted Cyber Intrusion

Transcription:

A Qualitative Comparison of SSL Validation Alternatives OWASP AppSec Research 2013 August 22nd, 2013 Henning Perl, Sascha Fahl, Michael Brenner, and Matthew Smith Leibniz Universität Hannover

Outline Of This Talk What s SSL again? Things broken in SSL So many solutions! The best solution (or why there isn t any yet) Our evaluation system Perl, Fahl, Brenner, Smith A Qualitative Comparison of SSL Validation Alternatives Slide 2

How SSL works trusts signs cert authenticates to Client Secure connection Perl, Fahl, Brenner, Smith A Qualitative Comparison of SSL Validation Alternatives Slide 3

How SSL works and breaks trusts stolen cert signs cert authenticates to Client Man in the middle insecure connection Perl, Fahl, Brenner, Smith A Qualitative Comparison of SSL Validation Alternatives Slide 3

http://notaryicsiberkeleyedu/trust-tree/

SSL CA incidents In 2010, VeriSign was compromised, allowing the attackers to issue arbitrary certificates In March 2011, an attacker from Iran was able to compromise the Comodo CA and get certificates for wwwgooglecom, loginyahoocom, loginskypecom, addonsmozillaorg, and loginlivecom A MITMA attack with at least one these certificate was observed In August 2011, attackers used the DigiNotar CA to issue at least 200 fraudulent certificates and used them to impersonate web servers The breach eventually lead to the exclusion of the CA from most browsers and operating systems weakest link security Perl, Fahl, Brenner, Smith A Qualitative Comparison of SSL Validation Alternatives Slide 5

Things broken in SSL For sake of completeness Users ignore warnings (cf Sunshine et al, Crying Wolf: An Empirical Study of SSL Warning Effectiveness ) Attacks against the cryptosystem BEAST (2011) / CRIME (2012) attacks Padding oracle attack ( Lucky Thirteen, S&P 2013) Attacks against RC4 (Usenix 2013) SSL stripping (Marlinspike, Black Hat 2009) SSL validation / Weakest link CA security Perl, Fahl, Brenner, Smith A Qualitative Comparison of SSL Validation Alternatives Slide 6

Things broken in SSL For sake of completeness Users ignore warnings (cf Sunshine et al, Crying Wolf: An Empirical Study of SSL Warning Effectiveness ) Attacks against the cryptosystem BEAST (2011) / CRIME (2012) attacks Padding oracle attack ( Lucky Thirteen, S&P 2013) Attacks against RC4 (Usenix 2013) SSL stripping (Marlinspike, Black Hat 2009) SSL validation / Weakest link CA security Perl, Fahl, Brenner, Smith A Qualitative Comparison of SSL Validation Alternatives Slide 6

Types of solutions: Use of network perspective Perspectives, Convergence Keep a log of certificates Sovereign Keys (SK), Certificate Transparency (CT), Accountable Key Infrastructure (AKI) Serve certificates over DNS DANE Trust on first use TACK Perl, Fahl, Brenner, Smith A Qualitative Comparison of SSL Validation Alternatives Slide 7

Network Perspective (Perspectives, Convergence) globally distributed notaries N 1 N 2 N 3 N 4 N 5 N k Client No extra software on server Network delay Privacy Perl, Fahl, Brenner, Smith A Qualitative Comparison of SSL Validation Alternatives Slide 8

Keep A Log Of Certificates SK, CT, AKI trusts signs cert authenticates to Client Secure connection Perl, Fahl, Brenner, Smith A Qualitative Comparison of SSL Validation Alternatives Slide 9

Keep A Log Of Certificates SK, CT, AKI Certificate Log submits certificate Proof of inclusion trusts authenticates to signs cert Client Secure connection Perl, Fahl, Brenner, Smith A Qualitative Comparison of SSL Validation Alternatives Slide 9

Keep A Log Of Certificates SK, CT, AKI Certificate Log submits certificate Proof of inclusion trusts authenticates to signs cert Client Secure connection No extra software on server no extra network delay needs new infrastructure Perl, Fahl, Brenner, Smith A Qualitative Comparison of SSL Validation Alternatives Slide 9

Serve Certificates Over DNS DANE trusts signs cert authenticates to Client Secure connection Perl, Fahl, Brenner, Smith A Qualitative Comparison of SSL Validation Alternatives Slide 10

Serve Certificates Over DNS DANE DNS submits certificate Domain admin certificate and DNS response authenticates to signs cert Client Secure connection Perl, Fahl, Brenner, Smith A Qualitative Comparison of SSL Validation Alternatives Slide 10

Serve Certificates Over DNS DANE DNS submits certificate Domain admin certificate and DNS response authenticates to signs cert Client Secure connection No extra software on server reuses infrastructure DNSSEC Perl, Fahl, Brenner, Smith A Qualitative Comparison of SSL Validation Alternatives Slide 10

Pinning TACK Pinning on TACK public key; TACK secret key signs actual cert First connection TACK public key Client Secure connection? Subsequent connections Client TACK public key Secure connection Perl, Fahl, Brenner, Smith A Qualitative Comparison of SSL Validation Alternatives Slide 11

Pinning TACK Pinning on TACK public key; TACK secret key signs actual cert First connection TACK public key Client Secure connection? Subsequent connections Client TACK public key Secure connection No extra software on server no (just selfsign) No protection on first visit Perl, Fahl, Brenner, Smith A Qualitative Comparison of SSL Validation Alternatives Slide 11

What do we draw from this? Perl, Fahl, Brenner, Smith A Qualitative Comparison of SSL Validation Alternatives Slide 12

Our Evaluation Scheme Goals: Tool to compare solution Discussion about which properties are important Organize, formalize the debate Perl, Fahl, Brenner, Smith A Qualitative Comparison of SSL Validation Alternatives Slide 13

Our Evaluation Scheme Goals: Tool to compare solution Discussion about which properties are important Organize, formalize the debate Structure: One large table 12 Deployability Benefits 9 Security and Privacy Benefits Adversary Capabilities Active MITMA required Trusted CA certificate required Compromising user chosen third parties required Perl, Fahl, Brenner, Smith A Qualitative Comparison of SSL Validation Alternatives Slide 13

Capabilities Scheme Ref Deployability benefits No-User-Cost No--Cost -Compatible Browser-Compatible Incrementally-Deployable Negligible-Communication-Overhead Negligible-Computational-Overhead No-Additional-Infrastructure Trusted-Root-CA-support Custom-Root-CA-support Selfsigned-Certificate-support No-Out-Of-Band-Connection X509-Compatible Security benefits Built-In-Revocation OCSP-or-CRL-Compatibility Resilient-To-DOS-Attacks User-Privacy-Preserving Secure-Key-Migration Secure-Key-Migration-After-Credential-Theft Secure-Domain-Migration Active MITMA required Trusted CA certificate required (weakest link) Compromising user chosen third parties required (strongest link) First-Contact-Protection Connection-Protection SSL with CA-PKI (90 s) 0 Perspectives [13] (2008) n DANE [5] (2010) 1 Convergence [9] (2011) n Sovereign Keys [3] (2011) 1 Certificate Transparency [7] (2012) 1 TACK [8] (2012) 0 AKI [6] (2013) 1

Conclusion All proposals solve weakest link problem but in very different ways No clear winner Do we want/need/have to have? Deployment is challenging Question: When to fail hard? Perl, Fahl, Brenner, Smith A Qualitative Comparison of SSL Validation Alternatives Slide 15