Server-side Adoption of Certificate Transparency
Carl Nykvist, Linköping University Linus Sjöström, Linköping University Josef Gustafsson, Linköping University Niklas Carlsson, Linköping University
- Proc. PAM, Berlin, Germany, Mar. 2018
Server-side Adoption of Certificate Transparency Carl Nykvist, - - PowerPoint PPT Presentation
Server-side Adoption of Certificate Transparency Carl Nykvist, Linkping University Linus Sjstrm, Linkping University Josef Gustafsson, Linkping University Niklas Carlsson, Linkping University Proc. PAM , Berlin, Germany, Mar. 2018
Server-side Adoption of Certificate Transparency
Carl Nykvist, Linköping University Linus Sjöström, Linköping University Josef Gustafsson, Linköping University Niklas Carlsson, Linköping University
E.g., HTTPS does HTTP over TLS
E.g., HTTPS does HTTP over TLS User need to trust Google’s public key is Google’s
E.g., HTTPS does HTTP over TLS User need to trust Google’s public key is Google’s
E.g., HTTPS does HTTP over TLS User need to trust Google’s public key is Google’s User need to trust FB’s public key is FBs
E.g., HTTPS does HTTP over TLS User need to trust Google’s public key is Google’s User need to trust FB’s public key is FB’s
E.g., HTTPS does HTTP over TLS User need to trust Google’s public key is Google’s
Verisign) tells us that a public key belongs to Google,
E.g., HTTPS does HTTP over TLS User need to trust Google’s public key is Google’s
Verisign) tells us that a public key belongs to Google,
E.g., HTTPS does HTTP over TLS User need to trust Google’s public key is Google’s
Trusted CA This is Google’s public key …
Symantec had issued test certificates for 76 domains that they did not own (including Google domains) and another 2,458 unregistered domains …
E.g., HTTPS does HTTP over TLS User need to trust Google’s public key is Google’s
Symantec (Trusted CA) This is Google’s public key … Some server
all their certificates in public (append-only) CT logs
certificates be logged in 1 Google log and 1 other log
for DV certificates too …
E.g., HTTPS does HTTP over TLS User need to trust Google’s public key is Google’s
Symantec (Trusted CA) This is Google’s public key … Some server
E.g., HTTPS does HTTP over TLS User need to trust Google’s public key is Google’s
Symantec (Trusted CA) This is Google’s public key … Some server CT log
E.g., HTTPS does HTTP over TLS User need to trust Google’s public key is Google’s
Symantec (Trusted CA) This is Google’s public key … Some server ... and here is a proof that the cert has been logged. CT log
S S
E.g., HTTPS does HTTP over TLS User need to trust Google’s public key is Google’s
Symantec (Trusted CA)
Certificate
Some server
Signed Certificate Timestamp (SCT)
L
S
Browser Server
R R
CA Browser Server
R R
CA Browser Server CA
R R
R R
CA Browser Server
R L L
CA Browser Server
R L
CA Browser Server
L
R L R L
CA Browser Server
L
R L R L
CA Browser Server
L
This is server X’s public key, signed with private key
Trust store include CA’s root cert (and public key)
R L R L
CA Browser Server
L
Log Log Log Log
L S S S
Log Log Log Log
L S S S
Log Log Log Log
L S S S
Log Log Log Log
L S S S
Log Log Log Log Monitor
L S S
All HTTPS sessions for a week
Amann et al. (IMC ‘17), VanderSloot et al.(IMC ‘16)
All HTTPS sessions for a week
Amann et al. (IMC ‘17), VanderSloot et al.(IMC ‘16) Log Log Log Log Monitor
L S S S
Alexa top 1M SCTs
4+ months
May 2017 Oct 2017
the other methods
non-SCT
the other methods
non-SCT
the other methods
non-SCT
short tail
TLS domains both
domains
the other methods
non-SCT
and other differences dominated by the certificates themselves (keys included)
hopefully pushing others to follow
(e.g., Google) that appear to provide much faster connection establishment and handshake times
weak signatures and public keys
Niklas Carlsson (niklas.carlsson@liu.se)
www.ida.liu.se/~nikca/
Server-side Adoption of Certificate Transparency
Carl Nykvist, Linus Sjöström, Josef Gustafsson, Niklas Carlsson