Measuring the Latency and Pervasiveness of TLS Certificate Revocation
نویسندگان
چکیده
Today, Transport-Layer Security (TLS) is the bedrock of Internet security for the web and web-derived applications. TLS depends on the X.509 Public Key Infrastructure (PKI) to authenticate endpoint identity. An essential part of a PKI is the ability to quickly revoke certificates, for example, after a key compromise. Today the Online Certificate Status Protocol (OCSP) is the most common way to quickly distribute revocation information. However, prior and current concerns about OCSP latency and privacy raise questions about its use. We examine OCSP using passive network monitoring of live traffic at the Internet uplink of a large research university and verify the results using active scans. Our measurements show that the median latency of OCSP queries is quite good: only 20 ms today, much less than the 291 ms observed in 2012. This improvement is because content delivery networks (CDNs) serve most OCSP traffic today; our measurements show 94% of queries are served by CDNs. We also show that OCSP use is ubiquitous today: it is used by all popular web browsers, as well as important non-web applications such as MS-Windows code signing.
منابع مشابه
TrustBase: An Architecture to Repair and Strengthen Certificate-based Authentication
We describe TrustBase, an architecture that provides certificate-based authentication as an operating system service. TrustBase enforces best practices for certificate validation for all applications and transparently enables existing applications to be strengthened against failures of the CA system. The TrustBase system allows simple deployment of authentication systems that harden the CA syst...
متن کاملCertificate Transparency with Enhancements and Short Proofs
Browsers can detect malicious websites that are provisioned with forged or fake TLS/SSL certificates. However, they are not so good at detecting malicious websites if they are provisioned with mistakenly issued certificates or certificates that have been issued by a compromised certificate authority. Google proposed certificate transparency which is an open framework to monitor and audit certif...
متن کاملThe Case for Prefetching and Prevalidating TLS Server Certificates
A key bottleneck in a full TLS handshake is the need to fetch and validate the server certificate before establishing a secure connection. We propose a mechanism by which a browser can prefetch and prevalidate server certificates so that by the time the user clicks on an HTTPS link, the server’s certificate is immediately ready to be used. Combining this with a recent proposal called Snap Start...
متن کاملLeveraging DNS for timely SSL Certificate Revocation
Trust in SSL-based communication on the Internet is provided by Certificate Authorities in the form of signed certificates. When an organization uses an SSL certificate, it protects users’ sensitive information by encrypting all traffic between its servers and the users’ web browser. Sadly, current web browsers’ approaches to check the revocation status of a certificate, suffer from certain per...
متن کاملEvaluating Revocation Management in SPKI from a User’s Point of View
The topic of computer and network security has gained an ever-increasing amount of interest in recent years. The pervasiveness of computers everywhere means that novel users, from novice to expert, need to be able to manage their own security in an understandable way, when giving information about themselves or making transactions online. In this paper, we will present, discuss, and analyse the...
متن کامل