Measurement and Analysis of Private Key Sharing in the HTTPS - - PowerPoint PPT Presentation

measurement and analysis of private key sharing in the
SMART_READER_LITE
LIVE PREVIEW

Measurement and Analysis of Private Key Sharing in the HTTPS - - PowerPoint PPT Presentation

Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem Frank Cangialosi, Taejoong Chung, David Choffnes, Dave Levin, Bruce M. Maggs, Alan Mislove, Christo Wilson How do we know with whom we are communicating? How do we know


slide-1
SLIDE 1

Measurement and Analysis

  • f Private Key Sharing in

the HTTPS Ecosystem

Frank Cangialosi, Taejoong Chung, David Choffnes, Dave Levin, 
 Bruce M. Maggs, Alan Mislove, Christo Wilson

slide-2
SLIDE 2

How do we know with whom we are communicating?

slide-3
SLIDE 3

How do we know with whom we are communicating?

slide-4
SLIDE 4

Certificate

slide-5
SLIDE 5

Public Private

Certificate

slide-6
SLIDE 6

Certificate
 Authorities Public Private

Certificate

slide-7
SLIDE 7

Certificate
 Authorities Public Private

Certificate

slide-8
SLIDE 8

Certificate

How do we know with whom we are communicating?

slide-9
SLIDE 9

Certificate Certificate

How do we know with whom we are communicating?

slide-10
SLIDE 10

Certificate Certificate

How do we know with whom we are communicating?

slide-11
SLIDE 11

Certificate Certificate

TLS Handshake

How do we know with whom we are communicating?

slide-12
SLIDE 12

Certificate Certificate

How do we know with whom we are communicating?

slide-13
SLIDE 13

Certificate Certificate

How do we know with whom we are communicating?

slide-14
SLIDE 14

Certificate Certificate

Authentication fundamentally assumes: Only knows

How do we know with whom we are communicating?

slide-15
SLIDE 15

The PKI in today’s web

slide-16
SLIDE 16

Rare!

The PKI in today’s web

slide-17
SLIDE 17

The PKI in today’s web

slide-18
SLIDE 18

The PKI in today’s web

slide-19
SLIDE 19

The PKI in today’s web

slide-20
SLIDE 20

The PKI in today’s web

slide-21
SLIDE 21

Third-party Hosting Providers

  • Content delivery networks
  • Web hosting services
  • Cloud providers

Varying levels of involvement But all trusted to deliver content

slide-22
SLIDE 22

The PKI in today’s web

slide-23
SLIDE 23

Certificate

The PKI in today’s web

slide-24
SLIDE 24

Certificate

The PKI in today’s web

slide-25
SLIDE 25

Certificate

The PKI in today’s web

slide-26
SLIDE 26

Certificate

The PKI in today’s web

slide-27
SLIDE 27

Certificate

The PKI in today’s web

slide-28
SLIDE 28

Certificate

The PKI in today’s web

slide-29
SLIDE 29

Third-party hosting providers
 know their customers’ private keys

slide-30
SLIDE 30

Third-party hosting providers
 know their customers’ private keys Authentication fundamentally assumes: Only knows

slide-31
SLIDE 31

Example of key sharing

slide-32
SLIDE 32

What’s wrong with sharing?

  • 1. Complicates the trust model,


users don’t know who they’re
 really trusting


  • 2. Potential to create


centralization of trust


  • 3. Potential to create


single point of failure 
 (in terms of management)

slide-33
SLIDE 33

This study

slide-34
SLIDE 34

This study

How many websites share their private keys?

slide-35
SLIDE 35

This study

How many keys have 3rd parties obtained? How many websites share their private keys?

slide-36
SLIDE 36

This study

How has this affected key management? How many keys have 3rd parties obtained? How many websites share their private keys?

slide-37
SLIDE 37

How do we detect sharing at scale?

Rapid7 weekly port 443 scans 2013-2015

DATA

Domain Domain Domain Domain Certificate IP Addr Domain Domain Domain Domain Certificate IP Addr

slide-38
SLIDE 38

How do we detect sharing at scale?

Rapid7 weekly port 443 scans 2013-2015

DATA

IPv4 Scan Domain Domain Domain Domain Certificate IP Addr Domain Domain Domain Domain Certificate IP Addr

slide-39
SLIDE 39

How do we detect sharing at scale?

Rapid7 weekly port 443 scans 2013-2015

DATA

Domain Domain Domain Domain Certificate IP Addr Domain Domain Domain Domain Certificate IP Addr

slide-40
SLIDE 40

How do we detect sharing at scale?

Rapid7 weekly port 443 scans 2013-2015

DATA

Domain Domain Domain Domain Certificate Domain Domain Domain Domain Certificate IP Addr IP Addr

slide-41
SLIDE 41

How do we detect sharing at scale?

Rapid7 weekly port 443 scans 2013-2015

DATA

IPv4 Scan Domain Domain Domain Domain Certificate Domain Domain Domain Domain Certificate IP Addr IP Addr

slide-42
SLIDE 42

How do we detect sharing at scale?

Rapid7 weekly port 443 scans 2013-2015

DATA

Domain Domain Domain Domain Certificate Domain Domain Domain Domain Certificate IP Addr IP Addr

slide-43
SLIDE 43

How do we detect sharing at scale?

Domain Domain Domain Domain Certificate Domain Domain Domain Domain Certificate IP Addr IP Addr

Rapid7 weekly port 443 scans 2013-2015

DATA

slide-44
SLIDE 44

How do we detect sharing at scale?

Domain Domain Domain Domain Certificate Domain Domain Domain Domain Certificate IP Addr IP Addr

5.1 million valid leaf certificates Rapid7 weekly port 443 scans 2013-2015

DATA

slide-45
SLIDE 45

How do we detect sharing at scale?

Rapid7 weekly port 443 scans 2013-2015

DATA

Domain Domain Domain Domain Domain IP Addr IP Addr

5.1 million valid leaf certificates

slide-46
SLIDE 46

How do we detect sharing at scale?

Domain Domain Domain Domain Domain IP Addr IP Addr

Does the same entity that owns the domain own and operate the server at that IP address?

slide-47
SLIDE 47

How do we detect sharing at scale?

Domain Domain Domain Domain Domain IP Addr IP Addr

Reverse DNS

Does the same entity that owns the domain own and operate the server at that IP address?

slide-48
SLIDE 48

Domain equivalence?

google.com google.co.uk google.com youtube.com nestle.com friskies.com whitehouse.gov whitehouse.com

Domain names alone are not enough

slide-49
SLIDE 49

Incorporating whois

Emails in whois records reflect administrative domain

slide-50
SLIDE 50

google.com google.co.uk google.de zagat.com golang.org

Incorporating whois

Emails in whois records reflect administrative domain

slide-51
SLIDE 51

google.com google.co.uk google.de zagat.com golang.org whois Registrant Email:
 Admin Email: Tech Email: dns-admin@google.com dns-admin@google.com dns-admin@google.com

Incorporating whois

Emails in whois records reflect administrative domain

slide-52
SLIDE 52

google.com google.co.uk google.de zagat.com golang.org dns-admin@google.com dns-admin@google.com dns-admin@google.com

Incorporating whois

Emails in whois records reflect administrative domain

slide-53
SLIDE 53

google.com google.co.uk google.de zagat.com golang.org dns-admin@google.com dns-admin@google.com dns-admin@google.com

Incorporating whois

Emails in whois records reflect administrative domain

slide-54
SLIDE 54

google.com google.co.uk google.de zagat.com golang.org Registrant Email:
 Admin Email: Tech Email: dns-admin@google.com dns-admin@google.com dns-admin@google.com whois whois dns-admin@google.com dns-admin@google.com dns-admin@google.com

Incorporating whois

Emails in whois records reflect administrative domain

slide-55
SLIDE 55

google.com google.co.uk google.de zagat.com golang.org

Emails in whois records reflect administrative domain

dns-admin@google.com dns-admin@google.com dns-admin@google.com

Incorporating whois

slide-56
SLIDE 56

google.com google.co.uk google.de zagat.com golang.org

Emails in whois records reflect administrative domain

whois whois dns-admin@google.com dns-admin@google.com dns-admin@google.com

Incorporating whois

slide-57
SLIDE 57

google.com google.co.uk google.de zagat.com golang.org

Emails in whois records reflect administrative domain

Registrant Email:
 Admin Email: Tech Email: dns-admin@google.com dns-admin@google.com dns-admin@google.com whois whois dns-admin@google.com dns-admin@google.com dns-admin@google.com

Incorporating whois

slide-58
SLIDE 58

google.com google.co.uk google.de zagat.com golang.org dns-admin@google.com dns-admin@google.com dns-admin@google.com

Incorporating whois

Emails in whois records reflect administrative domain

slide-59
SLIDE 59

google.com google.co.uk google.de zagat.com golang.org

Incorporating whois

Domain Organization

Emails in whois records reflect administrative domain

slide-60
SLIDE 60

How do we detect sharing at scale?

Domain Domain Domain Domain Domain IP Addr IP Addr

Does the same entity that owns the domain own and operate the server at that IP address?

slide-61
SLIDE 61

Domain Domain Domain

How do we detect sharing at scale?

Domain Domain Org Domain Org Domain Domain Org IP Addr IP Addr

Does the same entity that owns the domain own and operate the server at that IP address?

slide-62
SLIDE 62

Domain Domain Domain

How do we detect sharing at scale?

Domain Domain Org Domain Org Domain Domain Org Host Host

Does the same entity that owns the domain own and operate the server at that IP address? Key sharing: domain org ≠ host org

slide-63
SLIDE 63

Domain Domain Domain

How do we detect sharing at scale?

Domain Domain Org Domain Org Domain Domain Org Host Host Host Org Host Org

Does the same entity that owns the domain own and operate the server at that IP address? Key sharing: domain org ≠ host org

slide-64
SLIDE 64

Outline

How many keys have providers aggregated? How does sharing impact key management? How prevalent is key sharing?

slide-65
SLIDE 65

How prevalent is key sharing?

Domain Domain Domain Domain Domain Org Domain Org Domain Domain Org Host Host Host Org Host Org

slide-66
SLIDE 66

How prevalent is key sharing?

Domain Domain Domain Domain Domain Org Domain Org Domain Domain Org Host Host Host Org Host Org Host Org Domain Org

slide-67
SLIDE 67

How prevalent is key sharing?

Domain Domain Domain Domain Domain Org Domain Org Domain Domain Org Host Host Host Org Host Org Host Org Domain Org

Self-hosted Key sharing

slide-68
SLIDE 68

How prevalent is key sharing?

Domain Domain Domain Domain Domain Org Domain Org Domain Domain Org Host Host Host Org Host Org Host Org Domain Org

Self-hosted Key sharing

slide-69
SLIDE 69

How prevalent is key sharing?

Domain Domain Domain Domain Domain Org Domain Org Domain Domain Org Host Host Host Org Host Org Host Org Domain Org

Self-hosted Key sharing

slide-70
SLIDE 70

How prevalent is key sharing?

0.2 0.4 0.6 0.8 1 1 10 102 103 104 105 CDF Number of Third-Party Hosting Providers Used Organizations

slide-71
SLIDE 71

How prevalent is key sharing?

0.2 0.4 0.6 0.8 1 1 10 102 103 104 105 CDF Number of Third-Party Hosting Providers Used Organizations

slide-72
SLIDE 72

How prevalent is key sharing?

0.2 0.4 0.6 0.8 1 1 10 102 103 104 105 CDF Number of Third-Party Hosting Providers Used Organizations

23.5% Self-hosted

slide-73
SLIDE 73

How prevalent is key sharing?

0.2 0.4 0.6 0.8 1 1 10 102 103 104 105 CDF Number of Third-Party Hosting Providers Used Organizations

23.5% Self-hosted

76.5% share at least 1 key

slide-74
SLIDE 74

How prevalent is key sharing?

0.2 0.4 0.6 0.8 1 1 10 102 103 104 105 CDF Number of Third-Party Hosting Providers Used Organizations

23.5% Self-hosted

76.5% share at least 1 key Who?

slide-75
SLIDE 75

Who shares?

0.2 0.4 0.6 0.8 1 200k 400k 600k 800k 1M Fraction of Domains Hosted

  • n Third-party Providers

Alexa Site Rank (bins of 10,000) At least one key shared All keys shared

slide-76
SLIDE 76

Who shares?

0.2 0.4 0.6 0.8 1 200k 400k 600k 800k 1M Fraction of Domains Hosted

  • n Third-party Providers

Alexa Site Rank (bins of 10,000) At least one key shared All keys shared

slide-77
SLIDE 77

Who shares?

0.2 0.4 0.6 0.8 1 200k 400k 600k 800k 1M Fraction of Domains Hosted

  • n Third-party Providers

Alexa Site Rank (bins of 10,000) At least one key shared All keys shared

43.2% (of Top 10k) share at least one

slide-78
SLIDE 78

Who shares?

0.2 0.4 0.6 0.8 1 200k 400k 600k 800k 1M Fraction of Domains Hosted

  • n Third-party Providers

Alexa Site Rank (bins of 10,000) At least one key shared All keys shared

43.2% (of Top 10k) share at least one 22.4% share all

slide-79
SLIDE 79

Who shares?

Key sharing is common across the Internet

0.2 0.4 0.6 0.8 1 200k 400k 600k 800k 1M Fraction of Domains Hosted

  • n Third-party Providers

Alexa Site Rank (bins of 10,000) At least one key shared All keys shared

43.2% (of Top 10k) share at least one 22.4% share all

slide-80
SLIDE 80

Outline

How many keys have providers aggregated? How does sharing impact key management? How prevalent is key sharing?

slide-81
SLIDE 81

Outline

How many keys have providers aggregated? How does sharing impact key management? How prevalent is key sharing?

  • 76.5% share with ≥ 1 provider
  • Common even among most

popular websites

slide-82
SLIDE 82

Domain Domain Domain Domain Domain Org Domain Org Domain Domain Org Host Host Host Org Host Org Host Org Domain Org

How many keys have providers aggregated?

slide-83
SLIDE 83

Domain Domain Domain Domain Domain Org Domain Org Domain Domain Org Host Host Host Org Host Org Host Org Domain Org

How many keys have providers aggregated?

slide-84
SLIDE 84

100 101 102 103 104 105 106 100 101 102 103 104 105 106 Number of Distinct Customers Served Rank-Order Third-Party Hosting Providers

How have keys been aggregated?

slide-85
SLIDE 85

100 101 102 103 104 105 106 100 101 102 103 104 105 106 Number of Distinct Customers Served Rank-Order Third-Party Hosting Providers

How have keys been aggregated?

slide-86
SLIDE 86

100 101 102 103 104 105 106 100 101 102 103 104 105 106 Number of Distinct Customers Served Rank-Order Third-Party Hosting Providers

How have keys been aggregated?

secureserver.net unifiedlayer.com amazonaws.com Cloud Flare Inc. Rackspace Hosting akamaitechnologies.com

266,110 151,628 117.229 78,369 54,158 15,440 … … #Organizations Hosting provider 277,891 175,089 122,158 87,077 63,418 22,671 … #Domains

slide-87
SLIDE 87

100 101 102 103 104 105 106 100 101 102 103 104 105 106 Number of Distinct Customers Served Rank-Order Third-Party Hosting Providers

How have keys been aggregated?

secureserver.net unifiedlayer.com amazonaws.com Cloud Flare Inc. Rackspace Hosting akamaitechnologies.com

266,110 151,628 117.229 78,369 54,158 15,440 … … #Organizations Hosting provider 277,891 175,089 122,158 87,077 63,418 22,671 … #Domains

slide-88
SLIDE 88

100 101 102 103 104 105 106 100 101 102 103 104 105 106 Number of Distinct Customers Served Rank-Order Third-Party Hosting Providers

How have keys been aggregated?

secureserver.net unifiedlayer.com amazonaws.com Cloud Flare Inc. Rackspace Hosting akamaitechnologies.com

266,110 151,628 117.229 78,369 54,158 15,440 … … #Organizations Hosting provider 277,891 175,089 122,158 87,077 63,418 22,671 … #Domains

Top 1% of providers hold keys for 86% of all organizations

slide-89
SLIDE 89

Domain Domain Domain Domain Domain Org Domain Org Domain Domain Org Host Host Host Org Host Org Host Org Domain Org

Does key sharing make enticing attack targets?

slide-90
SLIDE 90

Domain Domain Domain Domain Domain Org Domain Org Domain Domain Org Host Host Host Org Host Org Host Org Domain Org

Does key sharing make enticing attack targets?

slide-91
SLIDE 91

Domain Domain Domain Domain Domain Org Domain Org Domain Domain Org Host Host Host Org Host Org Host Org Domain Org

Does key sharing make enticing attack targets?

slide-92
SLIDE 92

Does key sharing make enticing attack targets?

0.2 0.4 0.6 0.8 1 100 101 102 103 104 105 106 Cumulative Fraction of Domains’ Keys Acquired Number of Hosting Providers Compromised Alexa Top 1k Alexa Top 1m All Domains

slide-93
SLIDE 93

Does key sharing make enticing attack targets?

0.2 0.4 0.6 0.8 1 100 101 102 103 104 105 106 Cumulative Fraction of Domains’ Keys Acquired Number of Hosting Providers Compromised Alexa Top 1k Alexa Top 1m All Domains

slide-94
SLIDE 94

Does key sharing make enticing attack targets?

0.2 0.4 0.6 0.8 1 100 101 102 103 104 105 106 Cumulative Fraction of Domains’ Keys Acquired Number of Hosting Providers Compromised Alexa Top 1k Alexa Top 1m All Domains 60% of Top 1K, same provider

slide-95
SLIDE 95

Does key sharing make enticing attack targets?

0.2 0.4 0.6 0.8 1 100 101 102 103 104 105 106 Cumulative Fraction of Domains’ Keys Acquired Number of Hosting Providers Compromised Alexa Top 1k Alexa Top 1m All Domains 60% of Top 1K, same provider

slide-96
SLIDE 96

Does key sharing make enticing attack targets?

0.2 0.4 0.6 0.8 1 100 101 102 103 104 105 106 Cumulative Fraction of Domains’ Keys Acquired Number of Hosting Providers Compromised Alexa Top 1k Alexa Top 1m All Domains >40% of all sites, 10 providers 60% of Top 1K, same provider

slide-97
SLIDE 97

Does key sharing make enticing attack targets?

0.2 0.4 0.6 0.8 1 100 101 102 103 104 105 106 Cumulative Fraction of Domains’ Keys Acquired Number of Hosting Providers Compromised Alexa Top 1k Alexa Top 1m All Domains

Popular hosting services are prime targets for attack

>40% of all sites, 10 providers 60% of Top 1K, same provider

slide-98
SLIDE 98

Outline

How many keys have providers aggregated? How does sharing impact key management? How prevalent is key sharing?

  • Top 1% of providers hold


keys for 86% of orgs

  • Attractive targets for attack
  • 76.5% share with ≥ 1 provider
  • Common even among most

popular websites

slide-99
SLIDE 99

Key Management

Request certificates Renew expiring certificates Revoke and reissue compromised certificates

slide-100
SLIDE 100

Who manages private keys?

CAs

Website acquires Third-party acquires

slide-101
SLIDE 101

Who manages private keys?

CAs

Website acquires Third-party acquires

slide-102
SLIDE 102

Who manages private keys?

CAs

Website acquires Third-party acquires

slide-103
SLIDE 103

Who manages private keys?

Website acquires Third-party acquires

slide-104
SLIDE 104

Who manages private keys?

Website acquires Third-party acquires

Diverse

“Self-managed”

slide-105
SLIDE 105

Who manages private keys?

Website acquires Third-party acquires

Diverse Heavily skewed

“Self-managed” “Outsourced”

slide-106
SLIDE 106

Who manages private keys?

Website acquires Third-party acquires

Diverse Heavily skewed

“Self-managed” “Outsourced”

58.4% of Alexa Top 10K 33.0% of all domains

slide-107
SLIDE 107

How does sharing impact key management?

0.75 0.8 0.85 0.9 0.95 1 04/07 04/11 04/15 04/19 04/23 04/27 05/01 05/05 Fraction of Certificates Not Revoked Date Self-managed Outsourced

Natural experiment: Heartbleed (4/7/2014)

slide-108
SLIDE 108

How does sharing impact key management?

0.75 0.8 0.85 0.9 0.95 1 04/07 04/11 04/15 04/19 04/23 04/27 05/01 05/05 Fraction of Certificates Not Revoked Date Self-managed Outsourced

Natural experiment: Heartbleed (4/7/2014)

slide-109
SLIDE 109

How does sharing impact key management?

0.75 0.8 0.85 0.9 0.95 1 04/07 04/11 04/15 04/19 04/23 04/27 05/01 05/05 Fraction of Certificates Not Revoked Date Self-managed Outsourced CloudFlare revocations

Natural experiment: Heartbleed (4/7/2014)

slide-110
SLIDE 110

How does sharing impact key management?

0.75 0.8 0.85 0.9 0.95 1 04/07 04/11 04/15 04/19 04/23 04/27 05/01 05/05 Fraction of Certificates Not Revoked Date Self-managed Outsourced 0.75 0.8 0.85 0.9 0.95 1 04/07 04/11 04/15 04/19 04/23 04/27 05/01 05/05 Fraction of Certificates Not Revoked Date Self-managed Outsourced Outsourced (w/o CF) CloudFlare revocations

Natural experiment: Heartbleed (4/7/2014)

slide-111
SLIDE 111

How does sharing impact key management?

0.75 0.8 0.85 0.9 0.95 1 04/07 04/11 04/15 04/19 04/23 04/27 05/01 05/05 Fraction of Certificates Not Revoked Date Self-managed Outsourced 0.75 0.8 0.85 0.9 0.95 1 04/07 04/11 04/15 04/19 04/23 04/27 05/01 05/05 Fraction of Certificates Not Revoked Date Self-managed Outsourced Outsourced (w/o CF) CloudFlare revocations Slightly more thorough

Natural experiment: Heartbleed (4/7/2014)

slide-112
SLIDE 112

How does sharing impact key management?

0.75 0.8 0.85 0.9 0.95 1 04/07 04/11 04/15 04/19 04/23 04/27 05/01 05/05 Fraction of Certificates Not Revoked Date Self-managed Outsourced 0.75 0.8 0.85 0.9 0.95 1 04/07 04/11 04/15 04/19 04/23 04/27 05/01 05/05 Fraction of Certificates Not Revoked Date Self-managed Outsourced Outsourced (w/o CF) CloudFlare revocations 10 days to react! Slightly more thorough

Natural experiment: Heartbleed (4/7/2014)

slide-113
SLIDE 113

How does sharing impact key management?

0.75 0.8 0.85 0.9 0.95 1 04/07 04/11 04/15 04/19 04/23 04/27 05/01 05/05 Fraction of Certificates Not Revoked Date Self-managed Outsourced 0.75 0.8 0.85 0.9 0.95 1 04/07 04/11 04/15 04/19 04/23 04/27 05/01 05/05 Fraction of Certificates Not Revoked Date Self-managed Outsourced Outsourced (w/o CF) CloudFlare revocations 10 days to react! Slightly more thorough

Natural experiment: Heartbleed (4/7/2014) A few revoked thoroughly, but many did not!

slide-114
SLIDE 114

How does sharing impact key management?

0.2 0.4 0.6 0.8 1 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 CDF of Hosting Providers Fraction of Heartbleed-vulnerable Certificates Revoked Self-managed Outsourced

Natural experiment: Heartbleed (4/7/2014)

(One year after Heartbleed)

slide-115
SLIDE 115

How does sharing impact key management?

0.2 0.4 0.6 0.8 1 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 CDF of Hosting Providers Fraction of Heartbleed-vulnerable Certificates Revoked Self-managed Outsourced

Natural experiment: Heartbleed (4/7/2014)

(One year after Heartbleed)

slide-116
SLIDE 116

How does sharing impact key management?

0.2 0.4 0.6 0.8 1 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 CDF of Hosting Providers Fraction of Heartbleed-vulnerable Certificates Revoked Self-managed Outsourced

66% of providers did not revoke a single vulnerable certificate!

Natural experiment: Heartbleed (4/7/2014)

(One year after Heartbleed)

slide-117
SLIDE 117

How does sharing impact key management?

0.2 0.4 0.6 0.8 1 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 CDF of Hosting Providers Fraction of Heartbleed-vulnerable Certificates Revoked Self-managed Outsourced

66% of providers did not revoke a single vulnerable certificate! A small minority of providers revoked most of their vulnerable certificates, but none revoked all

Natural experiment: Heartbleed (4/7/2014)

(One year after Heartbleed)

slide-118
SLIDE 118

Outline

How many keys have providers aggregated? How does sharing impact key management? How prevalent is key sharing?

  • Creates single point of failure
  • Most third-parties did poor

job of revoking

  • Top 1% of providers hold


keys for 86% of orgs

  • Attractive targets for attack
  • 76.5% share with ≥ 1 provider
  • Common even among most

popular websites

slide-119
SLIDE 119

Due to economic incentives, key sharing is prevalent in today’s web Future work on the PKI should take economics and hosting providers into account, ideally:
 hosting should not require key sharing Most providers are not managing keys responsibly

frankc@csail.mit.edu

securepki.org

Code and data available at: