Push Away Your Privacy: Precise User Tracking Based on TLS Client Certificate Authentication
Chair of Network Architectures and Services TUM Department of Informatics Technical University of Munich (TUM)
Push Away Your Privacy: Precise User Tracking Based on TLS Client - - PowerPoint PPT Presentation
Chair of Network Architectures and Services TUM Department of Informatics Technical University of Munich (TUM) Push Away Your Privacy: Precise User Tracking Based on TLS Client Certificate Authentication Matthias Wachs, Quirin Scheitle, and
Chair of Network Architectures and Services TUM Department of Informatics Technical University of Munich (TUM)
ClientHello ServerHello, Certificate, . . . , CertificateRequest, . . . Certificate,. . . , Finished Finished [Application Data]
Figure: TLS 1.2 handshake, Unencrypted Data, [Encrypted Data]
Quirin Scheitle (TUM) | Push Away Your Privacy: Precise User Tracking Based on TLS CCA 2
Quirin Scheitle (TUM) | Push Away Your Privacy: Precise User Tracking Based on TLS CCA 3
Figure: Push Service Architecture: Messages brokered to Apps through the Push Notification Service.
Quirin Scheitle (TUM) | Push Away Your Privacy: Precise User Tracking Based on TLS CCA 4
Serial Number: ab:12:34:56:78:9a:bc:de:f0:12 Issuer: C=US, O=Apple Inc., OU=Apple iPhone, CN=Apple iPhone Device CA Validity Not Before: Apr 8 12:34:56 2015 GMT Validity Not After : Apr 8 12:34:56 2016 GMT Subject: CN=12345678-1234-1234-1234-123456789ABC Key ... (all data redacted)
Quirin Scheitle (TUM) | Push Away Your Privacy: Precise User Tracking Based on TLS CCA 5
1: APNs CCA certificates are bound to devices. However, these devices are typically private and carried by a user at most times, which allows inferences into user tracking.
Quirin Scheitle (TUM) | Push Away Your Privacy: Precise User Tracking Based on TLS CCA 6
Quirin Scheitle (TUM) | Push Away Your Privacy: Precise User Tracking Based on TLS CCA 7
Quirin Scheitle (TUM) | Push Away Your Privacy: Precise User Tracking Based on TLS CCA 8
Note: We are tracking a device. As mobile devices are typically closely carried, they allow conclusions about users. Wed Thu Fri Sat Sun Mon Tue Wed Thu Fri Sat Sun Mon Tue Day and connection type of APNs login 8 10 12 14 16 18 20 22 Time of day
Quirin Scheitle (TUM) | Push Away Your Privacy: Precise User Tracking Based on TLS CCA 9
2 4 6 8 10 12 14 16 18 # of days 0 % 20 % 40 % 60 % 80 % 100 % % of certificates seen on n days
Quirin Scheitle (TUM) | Push Away Your Privacy: Precise User Tracking Based on TLS CCA 10
Quirin Scheitle (TUM) | Push Away Your Privacy: Precise User Tracking Based on TLS CCA 11
Quirin Scheitle (TUM) | Push Away Your Privacy: Precise User Tracking Based on TLS CCA 12
C l i e n t H e l l
e r v e r H e l l
. . . , C e r t i fi c a t e , C e r t i fi c a t e R e q u e s t , . . . , F i n i s h e d , [ A p p l i c a t i
D a t a ] C e r t i fi c a t e , . . . , F i n i s h e d , [ A p p l i c a t i
D a t a ] [Application Data]
Figure: TLS 1.3 handshake, Unencrypted Data, [Encrypted Data]
Quirin Scheitle (TUM) | Push Away Your Privacy: Precise User Tracking Based on TLS CCA 13
Quirin Scheitle (TUM) | Push Away Your Privacy: Precise User Tracking Based on TLS CCA 14