Tracking the deployment of TLS 1.3 on the web

Author:

Holz Ralph1,Hiller Jens2,Amann Johanna3,Razaghpanah Abbas4,Jost Thomas2,Vallina-Rodriguez Narseo5,Hohlfeld Oliver6

Affiliation:

1. University of Twente and University of Sydney

2. RWTH Aachen University

3. University of Sydney and ICSI

4. ICSI

5. ICSI and IMDEA Networks

6. Brandenburg University of Technology

Abstract

Transport Layer Security (TLS) 1.3 is a redesign of the Web's most important security protocol. It was standardized in August 2018 after a four year-long, unprecedented design process involving many cryptographers and industry stakeholders. We use the rare opportunity to track deployment, uptake, and use of a new mission-critical security protocol from the early design phase until well over a year after standardization. For a profound view, we combine and analyze data from active domain scans, passive monitoring of large networks, and a crowd-sourcing effort on Android devices. In contrast to TLS 1.2, where adoption took more than five years and was prompted by severe attacks on previous versions, TLS 1.3 is deployed surprisingly speedily and without security concerns calling for it. Just 15 months after standardization, it is used in about 20% of connections we observe. Deployment on popular domains is at 30% and at about 10% across the com/net/org top-level domains (TLDs). We show that the development and fast deployment of TLS 1.3 is best understood as a story of experimentation and centralization. Very few giant, global actors drive the development. We show that Cloudflare alone brings deployment to sizable numbers and describe how actors like Facebook and Google use their control over both client and server endpoints to experiment with the protocol and ultimately deploy it at scale. This story cannot be captured by a single dataset alone, highlighting the need for multi-perspective studies on Internet evolution.

Publisher

Association for Computing Machinery (ACM)

Subject

Computer Networks and Communications,Software

Reference56 articles.

1. [n.d.]. massdns. A high-performance DNS stub resolver in C. Fork of massdns by Quirin Scheitle. https://github.com/quirins/massdns. [n.d.]. massdns. A high-performance DNS stub resolver in C. Fork of massdns by Quirin Scheitle. https://github.com/quirins/massdns.

2. [n.d.]. OpenSSL changelog. https://www.openssl.org/news/changelog.html. [n.d.]. OpenSSL changelog. https://www.openssl.org/news/changelog.html.

3. [n.d.]. Zeek Network Security Monitor. https://www.zeek.org/. [n.d.]. Zeek Network Security Monitor. https://www.zeek.org/.

4. [n.d.]. zgrab. Go application layer scanner. Fork of zgrab. https://github.com/tls-evolution/zgrab. [n.d.]. zgrab. Go application layer scanner. Fork of zgrab. https://github.com/tls-evolution/zgrab.

5. Imperfect Forward Secrecy

Cited by 44 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. EFACTLS: Effective Active TLS Fingerprinting for Large-Scale Server Deployment Characterization;IEEE Transactions on Network and Service Management;2024-06

2. Propagating Threat Scores with a TLS Ecosystem Graph Model Derived by Active Measurements;2024 8th Network Traffic Measurement and Analysis Conference (TMA);2024-05-21

3. Fingerprinting the Shadows: Unmasking Malicious Servers with Machine Learning-Powered TLS Analysis;Proceedings of the ACM Web Conference 2024;2024-05-13

4. This Is a Local Domain: On Amassing Country-Code Top-Level Domains from Public Data;ACM SIGCOMM Computer Communication Review;2024-04-30

5. TLS-handshake for Plug and Charge in vehicular communications;Computer Networks;2024-04

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3