RevCast : Fast, Private Certificate Revocation over FM radio Aaron - - PowerPoint PPT Presentation

revcast fast private certificate revocation over fm radio
SMART_READER_LITE
LIVE PREVIEW

RevCast : Fast, Private Certificate Revocation over FM radio Aaron - - PowerPoint PPT Presentation

RevCast : Fast, Private Certificate Revocation over FM radio Aaron Schulman Stanford University Dave Levin Neil Spring University of Maryland University of Maryland Authentication in the PKI Authentication in the PKI I want an


slide-1
SLIDE 1

RevCast: Fast, Private Certificate Revocation

  • ver FM radio

Aaron Schulman Stanford University Dave Levin University of Maryland Neil Spring
 University of Maryland

slide-2
SLIDE 2

Authentication in the PKI

slide-3
SLIDE 3

I want an encrypted connection.

Authentication in the PKI

slide-4
SLIDE 4

I want an encrypted connection.

Authentication in the PKI

Certificate #12

Signed by CA:

slide-5
SLIDE 5

I want an encrypted connection.

Authentication in the PKI

Certificate #12

Signed by CA:

The CA ( ) attests that is controlled by

slide-6
SLIDE 6

Is bound to ?

Authentication in the PKI

Certificate #12

Signed by CA:

The CA ( ) attests that is controlled by

slide-7
SLIDE 7

Is bound to ?

Authentication in the PKI

Certificate #12

Signed by CA:

Trusted 
 Root CAs

The CA ( ) attests that is controlled by

slide-8
SLIDE 8

Is bound to ?

Authentication in the PKI

Certificate #12

Signed by CA:

Trusted 
 Root CAs

The CA ( ) attests that is controlled by

slide-9
SLIDE 9

Revocation in the PKI

Trusted 
 Root CAs

C Certificate #12

Signed by CA:

slide-10
SLIDE 10

Revocation in the PKI

Trusted 
 Root CAs

C

Certificate #12

Signed by CA:
slide-11
SLIDE 11

Revocation in the PKI

Trusted 
 Root CAs

C

Certificate #12

Signed by CA:
slide-12
SLIDE 12

Revocation in the PKI

Trusted 
 Root CAs

C

Certificate #12

Signed by CA:
slide-13
SLIDE 13

Revocation in the PKI

Trusted 
 Root CAs

C

Certificate #12

Signed by CA:
slide-14
SLIDE 14

Revocation in the PKI

Trusted 
 Root CAs

C

Certificate #12

Signed by CA:
slide-15
SLIDE 15

Revocation in the PKI

Trusted 
 Root CAs

C

Certificate #12

Signed by CA:
slide-16
SLIDE 16

Revocation in the PKI

Trusted 
 Root CAs

C

Certificate #12

Signed by CA:

Revocation

Certificate #12

Signed by CA:

slide-17
SLIDE 17

Revocation in the PKI

Trusted 
 Root CAs

C

Certificate #12

Signed by CA:

Revocation

Certificate #12

Signed by CA:

The CA ( ) breaks the binding of with

slide-18
SLIDE 18

Revocation in the PKI

Trusted 
 Root CAs

C

Certificate #12

Signed by CA:

Revocation

Certificate #12

Signed by CA:

The CA ( ) breaks the binding of with

slide-19
SLIDE 19

Revocation in the PKI

Trusted 
 Root CAs

C

Certificate #12

Signed by CA:

Revocation

Certificate #12

Signed by CA:

The CA ( ) breaks the binding of with

slide-20
SLIDE 20

Revocation in the PKI

Trusted 
 Root CAs

C

Certificate #12

Signed by CA:

Revocation

Certificate #12

Signed by CA:

The CA ( ) breaks the binding of with

slide-21
SLIDE 21

Revocation in the PKI

Trusted 
 Root CAs

C

Certificate #12

Signed by CA:

Revocation

Certificate #12

Signed by CA:

The CA ( ) breaks the binding of with

One revocation every 1.1 seconds for all CAs on the Internet

slide-22
SLIDE 22

Every device needs revocations

C

Revocation

Certificate #12

Signed by CA:

slide-23
SLIDE 23

Every device needs revocations

C

Revocation

Certificate #12

Signed by CA:

slide-24
SLIDE 24

Properties of revocation systems

slide-25
SLIDE 25

Properties of revocation systems

10s Timeliness Clients’ revocation
 state should be
 up-to-date, ideally
 within 10s of seconds

slide-26
SLIDE 26

Properties of revocation systems

10s Timeliness Clients’ revocation
 state should be
 up-to-date, ideally
 within 10s of seconds

$ $ $ $ $ $

Low-cost dissemination The distribution
 mechanism must scale
 with CAs, certificates, and clients

slide-27
SLIDE 27

Properties of revocation systems

10s Timeliness Clients’ revocation
 state should be
 up-to-date, ideally
 within 10s of seconds

$ $ $ $ $ $

Low-cost dissemination The distribution
 mechanism must scale
 with CAs, certificates, and clients Privacy Users’ browsing
 habits should not
 have to be revealed

slide-28
SLIDE 28

Properties of revocation systems

10s Timeliness Clients’ revocation
 state should be
 up-to-date, ideally
 within 10s of seconds

$ $ $ $ $ $

Low-cost dissemination The distribution
 mechanism must scale
 with CAs, certificates, and clients Privacy Users’ browsing
 habits should not
 have to be revealed

It is generally regarded that no system can possibly achieve all three.

slide-29
SLIDE 29

Properties of revocation systems

10s Timeliness Clients’ revocation
 state should be
 up-to-date, ideally
 within 10s of seconds

$ $ $ $ $ $

Low-cost dissemination The distribution
 mechanism must scale
 with CAs, certificates, and clients Privacy Users’ browsing
 habits should not
 have to be revealed

It is generally regarded that no system can possibly achieve all three.

RevCast

✔ ✔ ✔

slide-30
SLIDE 30

Certificate Revocation Lists
 (CRL) Online Certificate Status Protocol (OCSP) OCSP Stapling Short lived certs

Existing revocation systems

CA

Client Client Client Client

Org

CRL

124, 24 21, 2521

Revocation

Certificate #12

Signed by CA:

Certificate #12

Signed by CA:

Still ok

Certificate #12 Signed by CA:

Still ok

Certificate #12 Signed by CA:

CA

Org

CA

Certificate #12

Signed by CA:

CA

slide-31
SLIDE 31

CA

Client Client Client Client

Org

CRL 124, 24 21, 2521 Revocation Certificate #12 Signed by CA: Certificate #12 Signed by CA: Still ok Certificate #12 Signed by CA: Still ok Certificate #12 Signed by CA:

CA

Org

CA

Certificate #12 Signed by CA:

CA

slide-32
SLIDE 32

CRLs

❌ ❌

OCSP

❌ ❌

Short lived

✔*

Stapling

Existing revocation systems

Client

CRL 124, 24 21, 2521

CA CA

Client

Revocation Certificate #12 Signed by CA:

Client

Org

CA

Client

Certificate #12 Signed

CA

Org Certificate #12 Signed Still ok Certificate #12 Signed Still ok Certificate #12 Signed
slide-33
SLIDE 33

CRLs

❌ ❌

OCSP

❌ ❌

Short lived

✔*

Stapling

Existing revocation systems

All of these protocols rely on unicast transmission of revocations

Client

CRL 124, 24 21, 2521

CA CA

Client

Revocation Certificate #12 Signed by CA:

Client

Org

CA

Client

Certificate #12 Signed

CA

Org Certificate #12 Signed Still ok Certificate #12 Signed Still ok Certificate #12 Signed
slide-34
SLIDE 34

Unicast is not well suited

for distributing revocations

Doesn’t scale to distributing to every device on the Internet Failures are benign indication of connectivity issues (soft-fail) Multicast revocation is also flawed (Sybils, MITM, DoS)

slide-35
SLIDE 35

RevCast

Revocation

Certificate #12

Signed by CA:

We propose broadcasting revocations over FM RDS

Tower: http://cityspottercards.com/

slide-36
SLIDE 36

RevCast

Revocation

Certificate #12

Signed by CA:

We propose broadcasting revocations over FM RDS

Tower: http://cityspottercards.com/

slide-37
SLIDE 37

FM RDS coverage is ideal for disseminating revocations

  • Transmitters are where people are
  • Up to 10 million people per tower

200,000 150,000 100,000 50,000

slide-38
SLIDE 38

Properties of revocation systems

Privacy

Radio broadcasts are inherently receiver anonymous

$ $ $ $ $ $

Low-cost dissemination

One transmission covers up to 10 million
 & Under-monotized

slide-39
SLIDE 39

Properties of revocation systems

Privacy

Radio broadcasts are inherently receiver anonymous

$ $ $ $ $ $

Low-cost dissemination

One transmission covers up to 10 million
 & Under-monotized

slide-40
SLIDE 40

Properties of revocation systems

Privacy

Radio broadcasts are inherently receiver anonymous

$ $ $ $ $ $

Low-cost dissemination

One transmission covers up to 10 million
 & Under-monotized

  • Solved. Let’s go party like it’s 1989!
slide-41
SLIDE 41

One tiny problem. RDS has an effective bitrate of 421.8 bps.

10s

Timeliness?

slide-42
SLIDE 42

RevCast protocol - fitting revocations in 421.8 bps


Evaluate RevCast with 2 months of revocations

Rest of the talk

slide-43
SLIDE 43

Revoking over FM RDS

CAs Radio station Receivers

slide-44
SLIDE 44

Revoking over FM RDS

CAs Radio station Receivers

R R

R

1

2

3

slide-45
SLIDE 45

R

R R

1

2

3

Revoking over FM RDS

CAs Radio station Receivers

R R

R

1

2

3

slide-46
SLIDE 46

Losses can go undetected

CAs Radio station

R

R

R R

R

Receivers

1

2

3 1

2 R3

slide-47
SLIDE 47

Losses can go undetected

CAs Radio station

R

R

R R

R

Receivers

1

2

3 1

2 R3

slide-48
SLIDE 48

Losses can go undetected

CAs Radio station

R

R

R R

R

Receivers

1

2

3 1

2 R3

slide-49
SLIDE 49

Losses can go undetected

CAs Radio station

R

R

R R

R

Receivers

1

2

3 1

2 R3

GoDaddy didn’t revoke

slide-50
SLIDE 50

Making losses detectible with “nothing now”

CAs Radio station

R

R

R R

Receivers

1

2

1

2

Nn

Nn

3 3

slide-51
SLIDE 51

Making losses detectible with “nothing now”

CAs Radio station

R

R

R R

Receivers

1

2

1

2 GoDaddy says they didn’t revoke

Nn

Nn

3 3

slide-52
SLIDE 52

Making losses detectible with “nothing now”

CAs Radio station

R

R

R R

Receivers

1

2

1

2 GoDaddy says they didn’t revoke

Nn

Nn

3 3

slide-53
SLIDE 53

Making losses detectible with “nothing now”

CAs Radio station

R

R

R R

Receivers

1

2

1

2 GoDaddy says they didn’t revoke

Nn

Nn

3 3

slide-54
SLIDE 54

Making losses detectible with “nothing now”

CAs Radio station

R

R

R R

Receivers

1

2

1

2

Nn

Nn

3 3

Danger!!! I am not up- to-date with GoDaddy

slide-55
SLIDE 55

Sleeping receivers can lose synchronization

CAs Radio station

R

R

R R

Receivers

1

2

1

2

Nn

Nn

3 3

Z

Z

Z

Z
slide-56
SLIDE 56

Sleeping receivers can lose synchronization

CAs Radio station

R

R

R R

Receivers

1

2

1

2

Nn

Nn

3 3 What did I miss?

slide-57
SLIDE 57

Sleeping receivers stay up-to-date with “Nothing since”

CAs Radio station

R

R

R R

Receivers

1

2

1

2

Ns

Ns

3 3

Z

Z

Z

Z
slide-58
SLIDE 58

Sleeping receivers stay up-to-date with “Nothing since”

CAs Radio station

R

R

R R

Receivers

1

2

1

2

Ns

Ns

3 3 I didn’t miss anything from GoDaddy

slide-59
SLIDE 59

RevCast messages

Nn

Ns

Nothing now Nothing since

All other CAs

Must sign every 10s

R

Revocation

Revoking 
 CAs

slide-60
SLIDE 60

Shortening “nothing now” and “nothing since”

{M} {M}

slide-61
SLIDE 61

Shortening “nothing now” and “nothing since”

{M} {M} {M} {M}

slide-62
SLIDE 62

Shortening “nothing now” and “nothing since”

{M} {M} {M} {M}

Problem: FM RDS doesn’t scale to hundreds of signatures

slide-63
SLIDE 63

Shortening “nothing now” and “nothing since”

{M} {M}

Problem: FM RDS doesn’t scale to hundreds of signatures

slide-64
SLIDE 64

{M}

Shortening “nothing now” and “nothing since”

{M} {M}

Problem: FM RDS doesn’t scale to hundreds of signatures

[Boldyreva 2003]

Multi-signatures: combine multiple CA signatures into one

slide-65
SLIDE 65

{M}

Shortening “nothing now” and “nothing since”

{M} {M} {M} {M} {M}

Problem: FM RDS doesn’t scale to hundreds of signatures

2.89 seconds for both “nothing new” and “nothing since”

[Boldyreva 2003]

Multi-signatures: combine multiple CA signatures into one

slide-66
SLIDE 66

R1

Nn

R1

2

RevCast summary

CAs Radio station Receivers

2

Nn

2

Ns

3

Ns

3

slide-67
SLIDE 67

Evaluation

  • 1. How quickly can RevCast send updates?

  • 2. How would RevCast handle a worst case scenario?

  • 3. Is RevCast practical?
slide-68
SLIDE 68

Evaluation

978 CRLs extracted from Rapid7’s scan of the entire IPv4 space

102 103 104 105 1 2013 2 3 4 5 6 7 8 9 10 11 12 1 2014 2 3 4 5 # of Revocations Per Day Month: Year: Heartbleed Weekday Saturday Sunday

slide-69
SLIDE 69

Evaluation

978 CRLs extracted from Rapid7’s scan of the entire IPv4 space

Security takes the weekends off

102 103 104 105 1 2013 2 3 4 5 6 7 8 9 10 11 12 1 2014 2 3 4 5 # of Revocations Per Day Month: Year: Heartbleed Weekday Saturday Sunday

slide-70
SLIDE 70

Evaluation

978 CRLs extracted from Rapid7’s scan of the entire IPv4 space

Security takes the weekends off 114,021 402,747

102 103 104 105 1 2013 2 3 4 5 6 7 8 9 10 11 12 1 2014 2 3 4 5 # of Revocations Per Day Month: Year: Heartbleed Weekday Saturday Sunday

slide-71
SLIDE 71

How quickly can RevCast update?

0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0.01 0.1 1 10 100 CDF Fraction of interval required Interval (s) 10 20 60 120

slide-72
SLIDE 72

How quickly can RevCast update?

96% of 10sec intervals 99.999% of 2min intervals

0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0.01 0.1 1 10 100 CDF Fraction of interval required Interval (s) 10 20 60 120

slide-73
SLIDE 73

Worst-case scenario

0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0.1 1 10 100 CDF Fraction of interval required Interval (10s) Pre-heartbleed Post-heartbleed

slide-74
SLIDE 74

Worst-case scenario

70% of time, up-to-date within 10 seconds

0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0.1 1 10 100 CDF Fraction of interval required Interval (10s) Pre-heartbleed Post-heartbleed

slide-75
SLIDE 75

Worst-case scenario

70% of time, up-to-date within 10 seconds

0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0.1 1 10 100 CDF Fraction of interval required Interval (10s) Pre-heartbleed Post-heartbleed

The most extreme takes 15.5 minutes

slide-76
SLIDE 76

Why does RevCast work?

In a small window, there are usually
 few revocations

0.00 0.20 0.40 0.60 0.80 1.00 1 10 100 1000 CDF Revocations Per Interval Interval (s) 20 120

slide-77
SLIDE 77

Why does RevCast work?

In a small window, there are usually
 few revocations

0.00 0.20 0.40 0.60 0.80 1.00 1 10 100 1000 CDF Revocations Per Interval Interval (s) 20 120

slide-78
SLIDE 78

Why does RevCast work?

Different CAs rarely
 revoke within the same window In a small window, there are usually
 few revocations

0.00 0.20 0.40 0.60 0.80 1.00 1 10 100 CDF CAs Revoking Per Interval Interval (s) 20 120

slide-79
SLIDE 79

Why does RevCast work?

Different CAs rarely
 revoke within the same window In a small window, there are usually
 few revocations

  • Most CAs co-sign “nothing now” messages
  • When they do have something to revoke, it’s a small list

0.00 0.20 0.40 0.60 0.80 1.00 1 10 100 CDF CAs Revoking Per Interval Interval (s) 20 120

slide-80
SLIDE 80

FM RDS is ideal for disseminating revocations

Receivers:

  • Tiny and cheap (2.5 x 2.5 mm)
  • Already built into many devices*


Robustness:

  • 10 error correcting bits for every 16 bits
  • VHF & FM (same used for emergency weather radio)

*receivers not antennas

slide-81
SLIDE 81

Conclusions

It is possible to design a revocation system that provides timelines, privacy, and is low cost. Broadcasting revocations is a novel application of
 multi-signatures.

Practical in today’s Internet, and necessary in tomorrow’s.