guess the correct log ct insights
play

GUESS THE CORRECT LOG CT INSIGHTS 1 2 3 4 5 Content TLS + - PowerPoint PPT Presentation

create your own exercise Berkay Kozan, Jan Krol Group 202 GUESS THE CORRECT LOG CT INSIGHTS 1 2 3 4 5 Content TLS + Vulnerabilities CA + Black Tulip How Certificate Transparency Works SCT delivering methods Merkle


  1. create your own exercise Berkay Kozan, Jan Krol Group 202 GUESS THE CORRECT LOG – CT INSIGHTS 1

  2. 2

  3. 3

  4. 4

  5. 5

  6. Content ⚫ TLS + Vulnerabilities ⚫ CA + Black Tulip ⚫ How Certificate Transparency Works ⚫ SCT delivering methods ⚫ Merkle Tree 6

  7. TLS ⚫ Cryptographic protocol ⚫ Secures website-browser connection ⚫ Main cryptographic system that underlies all HTTPS connections 7

  8. How can we be sure that we are really TLS connecting to the lab system? Certificate = public key + domain name ⚫ Cryptographic protocol ⚫ Secures website-browser connection ⚫ Main cryptographic system that underlies all HTTPS connections 7

  9. How can we be sure that we are really TLS connecting to the lab system? Certificate = public key + domain name ⚫ Cryptographic protocol ⚫ Secures website-browser connection ⚫ Main cryptographic system that underlies all HTTPS connections 7

  10. Vulnerabilites of SSL ⚫ Structural flaws ⚫ Vulnerabilities: Domain validation ⚫ End-to-end encryption ⚫ Chains of trust set up by certificate authorities ⚫ ⚫ CT is used to make CAs accountable 8

  11. Security Attacks ⚫ Website spoofing ⚫ Server impersonation ⚫ Man-in-the-middle attacks. 9

  12. Certificate Authorities ⚫ WE TRUST CAs to issue digital certificates. But should we? 10

  13. Black Tulip YOU 11

  14. Black Tulip YOU 11

  15. CA handshake 12

  16. CA handshake 12

  17. CA handshake 12

  18. CA handshake 12

  19. CA handshake YOU 12

  20. CA handshake YOU 12

  21. CA handshake YOU 12

  22. CA handshake YOU 12

  23. CA handshake YOU 12

  24. CA handshake YOU 12

  25. CA handshake YOU 12

  26. CA handshake YOU 12

  27. How CT Works 13

  28. How CT Works Log Server 13

  29. How CT Works Log Server Every new certifacte will be uploaded to the Log Server Watch for: • suspicious certificates • unauthorized certificates • unusual certificate extensions • certificates with strange permissions 13

  30. CT logs ⚫ CT log = network service which maintains entries of SSL certificates ⚫ Logs are independent ⚫ Qualities: − Append-only − Cryptographically assured − Publicly auditable 14

  31. CT logs ⚫ CT log = network service which maintains entries of SSL certificates thou shalt not hack – ⚫ Logs are independent RFC 69:62 ⚫ Qualities: − Append-only − Cryptographically assured − Publicly auditable 14

  32. SCT 15

  33. SCT Log Server 15

  34. SCT Log Server Certificate Authority 15

  35. SCT Log Server Certificate Submission Certificate Authority 15

  36. SCT Log Server Certificate SCT Submission Certificate Authority 15

  37. SCT Promise that the cert Log Server will be appended to the log. Certificate SCT Submission Certificate Authority 15

  38. SCT Promise that the cert Log Server will be appended to the log. Certificate SCT Submission Certificate Authority Maximum Merge Delay 15 (Appending musst happen within a reasonable time frame)

  39. SCT Promise that the cert Log Server will be appended to the log. Certificate SCT Submission Certificate Authority Maximum Merge Delay 15 (Appending musst happen within a reasonable time frame)

  40. SCT Delivering Methods: X.509v3 Extension 16

  41. SCT Delivering Methods: X.509v3 Extension Client (browser) 16

  42. SCT Delivering Methods: X.509v3 Extension fingernails4cash.com Client (browser) 16

  43. SCT Delivering Methods: X.509v3 Extension Certificate Authority fingernails4cash.com Client (browser) 16

  44. SCT Delivering Methods: X.509v3 Extension Log Server Certificate Authority fingernails4cash.com Client (browser) 16

  45. SCT Delivering Methods: X.509v3 Extension Log Server Certificate Submission (Precertificate) Certificate Authority fingernails4cash.com Client (browser) 16

  46. SCT Delivering Methods: X.509v3 Extension Log Server Certificate Submission SCT (Precertificate) Certificate Authority fingernails4cash.com Client (browser) 16

  47. SCT Delivering Methods: X.509v3 Extension Log Server Certificate Submission SCT (Precertificate) Certificate Authority Certificate Issuance (SSL cert w/SCT) fingernails4cash.com Client (browser) 16

  48. SCT Delivering Methods: X.509v3 Extension Log Server Certificate Submission SCT (Precertificate) Certificate Authority Certificate Issuance (SSL cert w/SCT) fingernails4cash.com TLS handshake (SCT embedded cert) Client (browser) 16

  49. SCT Delivering Methods: X.509v3 Extension Log Server Certificate Submission SCT (Precertificate) Certificate Authority Certificate Issuance (SSL cert w/SCT) fingernails4cash.com TLS handshake (SCT embedded cert) Client (browser) 16

  50. Merkle Tree • Simple binary tree Merkle Tree Hash • Once an hour a log server appends all new certs Node Hash t s to its log • Consistency Proof Leaf Hash a b c d • Merkle Audit Proof Certificate c1 c2 c3 c4 17

  51. Merkle Audit Proof t s a b c d c1 c2 c3 c4 Audit Proof 18

  52. Learning Goals The Following Learning Goals are Covered in the Lecture PreLab Lab Students understand CT operation X X X Students understand the vulnerabilities of SSL. X X Students understand how log proof works X X Students will fetch SCTs from TLS extension and analyze it X X Students write code to do an InclusionProof that verifies X that a cert is logged based on SCT X Students write code to perform an Merkle Audit Proof 19

  53. Teaser Practical Part Team 20

  54. References https://upload.wikimedia.org/wikipedia/commons/thumb/2/22/Symantec_logo10.svg/20 ⚫ 00px-Symantec_logo10.svg.png https://upload.wikimedia.org/wikipedia/commons/7/7d/Comodo-Secure-DNS.jpg ⚫ https://upload.wikimedia.org/wikipedia/commons/thumb/4/48/DigiCert_logo.svg/2000p ⚫ x-DigiCert_logo.svg.png https://pixabay.com/de/jesus-christus-religion-christentum-1340401/ ⚫ https://www.certificate-transparency.org/how-ct-works ⚫ https://www.certificate-transparency.org/log-proofs-work ⚫ Microsoft Office inbuilt Pictograms ⚫ Unsplash.com (License: All photos published on Unsplash can be used for free. You ⚫ can use them for commercial and noncommercial purposes. You do not need to ask permission from or provide credit to the photographer or Unsplash, although it is appreciated when possible.) 21

  55. Summary ⚫ TLS + Vulnerabilities ⚫ CA + Black Tulip ⚫ How Certificate Transparency Works ⚫ SCT delivering methods ⚫ Merkle Tree 22

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend