Reducing the X.509 Attack Surface with DNSSEC’s DANE
نویسندگان
چکیده
For the last decade, perhaps the most commonly used type of end-user security has been the HTTP Secure (HTTPS) protocol employed by web browsers (which runs over the Secure Sockets Layer, SSL or its successor, TLS). In HTTPS, any service (such as a website) may create its own cryptographic certificate to secure its communication channel, and clients use this certificate to verify data from, and transmit data to the server. This model has helped to secure online banking transactions, eCommerce websites, social networking websites, and more. However, two inherent complications to this approach are that clients must have a secure way to learn the authentic certificate for each website before they begin using this protocol, and they must be able to determine if they can trust the named entity that the certificate belongs to. These complications are conflated in today’s security model, which is based on a list of prespecified trusted X.509 Certificate Authorities (CAs) that every client must know a priori, and a very ad-hoc approach to determining which of this list of CAs will vouch for any keys discovered. In this paper we first outline some of the fundamental problems that exist with today’s CA model, problems that arise from its conflation of the two inherent complications, and some of the implications and attack vectors that these problems present to the security of this model’s users. Then we introduce some of the relative benefits that can be gained from a new approach being standardized in the IETF called DNSbased Authentication of Named Entities (DANE), in which certificate credentials are verified by DNSSEC-enabled zones, rather than the CA model used today. We illustrate that the DNSSEC-verification model reduces the attack surface that users currently inherit, and show that this model opens avenues that have previously remained elusive (such as a usable S/MIME verification infrastructure).
منابع مشابه
Quantifying Systemic Dependencies Through Attack Surface Analysis
To systematically address the increasing security threats of today’s networked systems, one important step is to quantify the potential vulnerabilities a system may face. The concept of “attack surface” has emerged in recent years as a measure of such vulnerabilities. However given the high degrees of interdependencies among networked systems, it remains an open challenge of how to systematical...
متن کاملTo Trust, or not to Trust, that is the Question: Structural Properties of X.509 Certificates
The SSL/TLS protocol suite constitutes the key building block of today’s Internet security, providing encryption and authentication for end-to-end communication with its underlying X.509 certificate infrastructure. However, the system remains brittle due to its liberal delegation of signing authority: a single compromised certification authority undermines trust globally. Several recent high-pr...
متن کاملSpoiled Onions: Exposing Malicious Tor Exit Relays
Several hundred Tor exit relays together push more than 1 GiB/s of network traffic. However, it is easy for exit relays to snoop and tamper with anonymised network traffic and as all relays are run by independent volunteers, not all of them are innocuous. In this paper, we seek to expose malicious exit relays and document their actions. First, we monitored the Tor network after developing a fas...
متن کاملInter-Protocol Interleaving Attacks on Some Authentication and Key Distribution Protocols
We present a new attack, called the inter-protocol interleaving attack, on authentication and key distribution protocols. The attack enlightens us two things. The first is that when considering attacks against a protocol, we should consider not only the protocol itself, but also the interaction with other protocols. The second is about a warning of “not using the shared secret keys between a se...
متن کاملTask Force ( IETF )
The Cryptographic Message Syntax (CMS), unlike X.509/PKIX certificates, is vulnerable to algorithm substitution attacks. In an algorithm substitution attack, the attacker changes either the algorithm being used or the parameters of the algorithm in order to change the result of a signature verification process. In X.509 certificates, the signature algorithm is protected because it is duplicated...
متن کامل