Analysis of the HTTPS Certificate Ecosystem



Similar documents
Fast Internet-wide scanning and its security applications

SSL and Browsers: The Pillars of Broken Security

ALTERNATIVES TO CERTIFICATION AUTHORITIES FOR A SECURE WEB

ZMap. Fast Internet-Wide Scanning and its Security Applications. Zakir Durumeric Eric Wustrow J. Alex Halderman. University of Michigan

Internal Server Names and IP Address Requirements for SSL:

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

SSL BEST PRACTICES OVERVIEW

ITL BULLETIN FOR JULY Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance

SSL/TLS: The Ugly Truth

State of PKI for SSL/TLS

Public Key Infrastructures

Microsoft Trusted Root Certificate: Program Requirements

Overview. SSL Cryptography Overview CHAPTER 1

More on SHA-1 deprecation:

Digital certificates and SSL

A Study of What Really Breaks SSL HITB Amsterdam 2011

Basics of SSL Certification

SSL: Paved With Good Intentions. Richard Moore

CTS2134 Introduction to Networking. Module Network Security

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Integrated SSL Scanning

SBClient SSL. Ehab AbuShmais

M86 Web Filter USER GUIDE for M86 Mobile Security Client. Software Version: Document Version:

Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C

You Won t Be Needing These Any More: On Removing Unused Certificates From Trust Stores

CSC/ECE 574 Computer and Network Security. What Is PKI. Certification Authorities (CA)

This section includes troubleshooting topics about certificates.

Bugzilla ID: Bugzilla Summary:

The USP Maker for the hosting industry Welcome to my presentation Christian Heutger WorldHostingDay

COMODO CERTIFICATE MANAGER. Simplify SSL Certificate Management Across the Enterprise

SSL Server Rating Guide

Raise your Google Ranking

Fast, Scalable And Secure Web Hosting For Entrepreneurs

Public Key Infrastructure (PKI)

Certificate Management. PAN-OS Administrator s Guide. Version 7.0

How to configure SSL proxying in Zorp 3 F5

Scan Report Executive Summary. Part 2. Component Compliance Summary IP Address :

Installing an SSL Certificate Provided by a Certificate Authority (CA) on the BlueSecure Controller (BSC)

How to configure SSL proxying in Zorp 6

SSL Certificates: A Simple Solution to Website Security

HTTPS Inspection with Cisco CWS

Certificates and network security

Comodo Certification Practice Statement

Securing the SSL/TLS channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs

Project X Mass interception of encrypted connections

CSE543 - Introduction to Computer and Network Security. Module: Public Key Infrastructure

Understanding Digital Certificates & Secure Sockets Layer A Fundamental Requirement for Internet Transactions

Extended SSL Certificates

Purpose of PKI PUBLIC KEY INFRASTRUCTURE (PKI) Terminology in PKIs. Chain of Certificates

SSL Certificates and Bomgar

Introduction to Network Security Key Management and Distribution

Comodo 2048 bit SSL Certificates. Security for your online business now and long into the future

Does your Organization Need a Managed SSL Service?

CA-DAY Michael Kranawetter, Chief Security Advisor (Tom Albertson, Security Program Manager) Microsoft

Version Highlights. CertainT 100 SSL Accelerator. Version International. New hardware and software version. North America

Integrated SSL Scanning

Prioritizing Trust: Certificate Authority Best Practices

Savitribai Phule Pune University

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Internet SSL Survey 2010! Black Hat USA 2010

Joint Knowledge Online. CAC Login Troubleshooting Guide

Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions

App Orchestration 2.5

Breaking the Myths of Extended Validation SSL Certificates

IPv4 Shortage Multiple SSL Certificates on a single IP address

Introduction to Cryptography

Cleaning Encrypted Traffic

NIST ITL July 2012 CA Compromise

Configuration Guide BES12. Version 12.2

Chapter 17. Transport-Level Security

EMET 4.0 PKI MITIGATION. Neil Sikka DefCon 21

Frequently Asked Questions. Frequently Asked Questions: Securing the Future of Trust on the Internet

Securing Microsoft Exchange 2010 with Symantec SSL Certificates

Websense Content Gateway HTTPS Configuration

Securing Microsoft Exchange 2010 With VeriSign Authentication Services

Comodo Certification Practice Statement

How To Install A Citrix Netscaler On A Pc Or Mac Or Ipad (For A Web Browser) With A Certificate Certificate (For An Ipad) On A Netscaler (For Windows) With An Ipro (For

[SMO-SFO-ICO-PE-046-GU-

Certificate Management

Web Presence Security

Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience

Siemens PKI Certificate Authority (CA) Hierarchy

Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1

Transcription:

Analysis of the HTTPS Certificate Ecosystem, James Kasten, Michael Bailey, J. Alex Halderman University of Michigan

HTTPS and TLS How does HTTPS and the CA ecosystem fit into our daily lives? Nearly all secure web communication relies on HTTPS - online banking, e-mail, e-commerce transactions, etc. HTTPS provides confidentiality, integrity, and authentication HTTPS is dependent on a supporting PKI thousands of certificate authorities we rely on to vouch for sites identities The supporting PKI is opaque we blindly rely on these CAs There has been much previous work including including the EFF s SSL Observatory, Holz et al. at IMC, and Akhawe et al. at WWW

Talk Outline 1. HTTPS Background 2. Data Collection Methodology 3. Identifying Trusted Authorities 4. Worrisome Trends and Observations 5. How can we make the HTTPS ecosystem more secure?

Certificate Authorities How do certificates provide authentication? Web browsers trust certificate authorities to investigate and vouch for the identities of trusted websites Web Brower CAs vouch for a website s identity by signing digital certificates with a browser trusted certificate and key Web browsers store a list of these trusted authorities certificates known as roots CA Certificate Website Website

Intermediate Authorities How do intermediate authorities fit into the picture? Root authorities delegate the ability to sign certificates to intermediate authorities Web Browser Root Certificate Root Certificate Intermediate Intermediate Website Website

Intermediate Authorities How do intermediate authorities fit into the picture? Root authorities delegate the ability to sign certificates to intermediate authorities Web Browser In all but a handful of cases, intermediates can sign for certificates for any domain Root Certificate US Gov t Root Certificate Google google.com google.com

Intermediate Authorities How do intermediate authorities fit into the picture? Root authorities delegate the ability to sign certificates to intermediate authorities In all but a handful of cases, intermediates can sign for certificates for any domain Root Certificate? US Gov t Web Browser Root Certificate Google Non-roots aren t publicly known until they are found in the wild? google.com google.com

Intermediate Authorities How do intermediate authorities fit into the picture? Web Browser Hundreds of roots? Thousands of intermediates? Millions of leaf certificates

Talk Outline 1. HTTPS Background 2. Data Collection Methodology 3. Identifying Trusted Authorities 4. Worrisome Trends and Observations 5. How can we make the HTTPS ecosystem more secure?

Dataset and Methodology How do we measure the certificate authority ecosystem? We performed 110 scans of the IPv4 address space over an 18 month period using ZMap, OpenSSL, and libevent Completed 1.8 billion TLS handshakes and collected certificates We collected: - 42 million unique certificates - 6.9 million browser trusted from 109 million hosts Dataset available at https://scans.io and code at https://zmap.io

Responsible Data Collection How do we reduce the impact of active scanning? Reducing Scan Impact Scan in random order and at a reduced scan rate Signal benign nature over HTTP, DNS, and WHOIS Honor all requests to be excluded from future scans Excluded Networks Correspondence with 145 individuals and organizations Excluded 91 networks (.11% of the address space) 2 requests from ISPs account for 50% of addresses

Talk Outline 1. HTTPS Background 2. Data Collection Methodology 3. Identifying Trusted Authorities 4. Worrisome Trends and Observations 5. How can we make the HTTPS ecosystem more secure?

Identifying Trusted Authorities Who do we trust to sign a certificate for any website? Identified 1,832 CA certificates belonging to 683 organizations 80% of the organizations were not commercial CAs Organizations included religious institutions, libraries, cities, corporations, and non-profits CA certificates were owned by organizations in 57 countries CAs by Organization Type Academic Institutions 40% Commercial Authorities 20% Governments 12% Corporations 12% Other Types 16% CAs by Owning Country United States 30% Germany 21% France 4% Japan 3% Other Countries 42%

The Path to Power How are organizations obtaining CA certificates? 311 (45%) of the organizations were provided certificates by German National Research and Education Network (DFN) A large number of root CAs have provided CA certificates to unrelated third-party organizations and governments Largest were GTE CyberTrust Solutions (Verizon) and Comodo - Provided unrestricted CA certificates to 62 organizations Financial institutions (e.g. Visa) and some countries used CA certificates included in each brower root store

Distribution of Trust Who do we trust on a day-to-day basis? Large companies have acquired smaller CAs 75% are signed by Comodo, Symantec, and GoDaddy 90% are descendants of 4 roots 90% are signed by 40 intermediates Signed Certificates 1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 Certificate Authorities Root Certificates Intermediate Certificates 0 5 10 15 20 25 30 35 40 45 50 n most popular 26% are signed by a single intermediate certificate

Talk Outline 1. HTTPS Background 2. Data Collection Methodology 3. Identifying Trusted Authorities 4. Worrisome Trends and Observations 5. How can we make the HTTPS ecosystem more secure?

Misaligned Objectives CAs are providing services that harm the HTTPS ecosystem Only 7 of the CA certificates we found had a name constraints - All other organizations can sign for any domain Only 40% of CA certificates had a length constraint - All other organizations can create new CA certificates Almost 5% of certificates are trusted for a local domain - e.g. mail, exchange, and intranet - provide no actual protection against attackers

Community Shortsightedness We are not considering the long-term consequences today CA certificates are being issued for 40+ years in the future 49% of certificates have a 1024-bit key in their trust chain In 2012, 1.4 million signed new certificates were signed using a 1024-bit root authority 15 organizations provide no avenues for revocation Certificate Authorities 1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 NIST recommended end of 1024-bit key usage 0 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 Years until Expiration 70% of trusted CA using a 1024-bit key certificates expire after 2016

Client Deployment Difficulties It remains difficult for end-users to correctly deploy HTTPS 13% of hosts serving once trusted certificates are misconfigured 20% of hosts remove expired certificates after expiration or revocation 47 of the signing certificates were not for web traffic due to end users using code signing keys, etc. CAs by Owning Country Expired 6% Not Yet Valid.02% Revoked.3% Incorrect Intermediates 7% Unnecessary Root 42% Optimal Configuration 45%

Impact of the Lack of Oversight What is the real world impact of these observations? We are making errors on a day-to-day basis There s has been an impact to ignoring our community s guidelines such as least privilege and defense in depth Case 1: A mis-issued CA certificate issued by Turktrust to a transit authority that was revoked after signing for *.google.com Case 2: South Korea misissued 1,400 CA certificates that were prevented from causing harm by a root length constraint

Talk Outline 1. HTTPS Background 2. Data Collection Methodology 3. Identifying Trusted Authorities 4. Worrisome Trends and Observations 5. How can we make the HTTPS ecosystem more secure?

Moving Forward How do we make the HTTPS Ecosystem more secure? A lack of oversight has led to an unmaintainable ecosystem - We need to consider ideas such as Certificate Transparency Groups such as the CA/B Forum are on the right track, but are toothless and even their members are ignoring their policies We need web browsers to coordinate and demand change A lot of recent work on bugs in TLS implementations, but also important to consider how we help users to move to HTTTPS

Conclusion Analyzed HTTPS Ecosystem by performing regular comprehensive scans of the IPv4 address space Identified CA certificates, the organizations that control a CA certificate, and how they gained these rights Explored several of the most worrisome trends that we observed over the past year of scanning Discussed potential avenues for the security community to improve the HTTPS ecosystem moving forward

Questions? University of Michigan zakir@umich.edu https://httpsecosystem.org