CDNs’ Dark Side: Security Problems in CDN-to-Origin Connections
نویسندگان
چکیده
Content Delivery Networks (CDNs) play a vital role in today’s Internet ecosystem. To reduce the latency of loading website’s content, CDNs deploy edge servers different geographic locations. CDN providers also offer important security features including protection against Denial Service (DoS) attacks, Web Application Firewalls (WAFs), and recently, issuing managing certificates for their customers. Many popular websites use to benefit from both performance advantages. For HTTPS websites, Transport Layer Security (TLS) choices may differ connections between end-users (front-end or user-to-CDN), origin server (back-end CDN-to-Origin). Modern browsers can stop/warn users if weak insecure TLS/HTTPS options are used front-end connections. However, such problems back-end not visible end-users, lead serious issues (e.g., validating certificate MitM attacks). In this article, we primarily analyze communication; include inadequate validation support vulnerable TLS configurations. We develop test framework investigate connection 14 leading (including Cloudflare, Microsoft Azure, Amazon, Fastly), where could create an account. Surprisingly, all CDNs, found that prevented/warned by modern browsers; examples failing validate server’s certificate, using cipher suites as RC4, MD5, SHA-1, even allowing plain HTTP origin. identified 168,795 Alexa top 1 million potentially Man-in-the-Middle (MitM) attacks regardless origin/CDN configurations chosen owner.
منابع مشابه
Source Security and the Dark Side
Does the open source software development process lead to more secure software? In this article we attempt to explore arguments for and against this premise. First, we need to understand what open source software is and how it differs from closed source software. Open source allows users access to the source code, or internals, of the software. A popular example of open source software is the L...
متن کاملThe Dark Side of Security by Obscurity
MiFare Classic is the most popular contactless smart card with some 200 millions copies in circulation worldwide. At Esorics 2008 Dutch researchers showed that the underlying cipher Crypto-1 can be cracked in as little as 0.1 seconds if the attacker can eavesdrop the RF communications with the (genuine) reader. We discovered that a MiFare classic card can be cloned in a much more practical tota...
متن کاملCdp Cdn Ccb Cdp Cdn Ccb Cdp Cdn
Mika Kämäräinen, Matti Paavola, Mikko Saukoski, Erkka Laulainen, Lauri Koskinen, Marko Kosunen, and Kari Halonen. 2008. A 1.5μW 1V 2-order sensor front-end with signal boosting and offset compensation for a capacitive 3-axis micro-accelerometer. In: Digest of Technical Papers of the 2008 IEEE International Solid-State Circuits Conference (ISSCC 2008). San Francisco, CA, USA. 3-7 February 2008. ...
متن کاملEmpowering Browser Security for Mobile Devices Using Smart CDNs
There has been a great deal of attention on browser security in recent years. However, the majority of projects in this space have focused on security of desktop browsers, while it is likely that it is the mobile browsers that will be targets of security attacks in the coming years. In this paper we propose the use of “smart CDNs” to quickly drive security innovations into the mobile browser sp...
متن کاملO Brave New World: The Dark Side of Cyberspace
This article focuses on some of the negative aspects of cyberspace andcyberculture. First, it offers an examination of the impact of our use ofsocial media, and Facebook in particular, on our psyches, pointing out thatusers of social media can be thought of as audiences. These audiencesand information about them can be sold to marketers and advertisers.Next, it offers a case study of a widespre...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Digital threats
سال: 2023
ISSN: ['2692-1626', '2576-5337']
DOI: https://doi.org/10.1145/3499428