Revocation Speedrun: How the WebPKI Copes with Fraudulent Certificates

Author:

Friess Jens1ORCID,Schulmann Haya2ORCID,Waidner Michael1ORCID

Affiliation:

1. ATHENE & TU Darmstadt & Fraunhofer SIT, Darmstadt, Germany

2. ATHENE & Goethe-Universität Frankfurt & Fraunhofer SIT, Frankfurt, Germany

Abstract

The TLS ecosystem depends on certificates to bootstrap secure connections. Certificate Authorities (CAs) are trusted to issue these correctly. However, as a result of security breaches or attacks, certificates may be issued fraudulently and need to be revoked prematurely. Revocation, as a reactive measure, is fundamentally damage control and, as such, time is critical. Therefore, measuring reaction delay is the first step to identifying how well the revocation system functions. In this paper we attempt to characterize the current performance of the WebPKI in dealing with fraudulent certificates. We present measurements of each step in the revocation process: the detection of certificate issuance through Certificate Transparency (CT) monitoring, the administrative revocation process at popular CAs, and the revocation checking behavior of end-user clients, both in a controlled virtualized environment and in the wild. We perform two live measurements, in 2022 and 2023, respectively, to provide a longitudinal comparison. We find that detection and revocation of fraudulent certificates is quick and efficient when leveraging CT and can be completed within 6.5 hours on average. Furthermore, CT is being increasingly enforced by some browsers. However, ∼83% of the clients we observed, across popular browsers, brands and OSes, completely disregard a certificate's status, whileall of the studied browsers still display soft-fail behavior, making them vulnerable to attackers capable of interfering with the network. Of the clients that do check revocation, we find that 35% can be made to accept a revoked certificate through the use of OCSP Stapling. We expect this number to grow with client-side adoption of OCSP Stapling [RFC6961]. Current OCSP expiration times allow a revoked certificate to remain fully valid for up to 7 days for the majority of CAs, exposing clients to attacks.

Funder

CROSSING

ATHENE

Publisher

Association for Computing Machinery (ACM)

Reference36 articles.

1. Apple. 2017. Your Apps and Evolving Network Security Standards. https://developer.apple.com/videos/play/wwdc2017/701/ Apple. 2017. Your Apps and Evolving Network Security Standards. https://developer.apple.com/videos/play/wwdc2017/701/

2. Apple. 2021a. Apple Platform Security: Certificate validity checking. https://support.apple.com/guide/security/tls-security-sec100a75d12/1/web/1 Apple. 2021a. Apple Platform Security: Certificate validity checking. https://support.apple.com/guide/security/tls-security-sec100a75d12/1/web/1

3. Apple. 2021b. Log List. https://valid.apple.com/ct/log_list/current_log_list.json Apple. 2021b. Log List. https://valid.apple.com/ct/log_list/current_log_list.json

4. R. Barnes J. Hoffman-Andrews D. McCarney and J. Kasten. 2019. Automatic Certificate Management Environment (ACME). RFC 8555. RFC Editor. R. Barnes J. Hoffman-Andrews D. McCarney and J. Kasten. 2019. Automatic Certificate Management Environment (ACME). RFC 8555. RFC Editor.

5. Henry Birge-Lee , Yixin Sun , Anne Edmundson , Jennifer Rexford , and Prateek Mittal . 2018 . Bamboozling Certificate Authorities with BGP . In Proc. 27th USENIX Security Symposium (USENIX Security 18) (2018), 833 -- 849. Henry Birge-Lee, Yixin Sun, Anne Edmundson, Jennifer Rexford, and Prateek Mittal. 2018. Bamboozling Certificate Authorities with BGP. In Proc. 27th USENIX Security Symposium (USENIX Security 18) (2018), 833 -- 849.

Cited by 2 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Threat-TLS: A Tool for Threat Identification in Weak, Malicious, or Suspicious TLS Connections;Proceedings of the 19th International Conference on Availability, Reliability and Security;2024-07-30

2. A compliance-based ranking of certificate authorities using probabilistic approaches;International Journal of Information Security;2024-05-29

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3