SSL Research with Bro Johanna Amann International Computer Science - - PowerPoint PPT Presentation

ssl research with bro
SMART_READER_LITE
LIVE PREVIEW

SSL Research with Bro Johanna Amann International Computer Science - - PowerPoint PPT Presentation

SSL Research with Bro Johanna Amann International Computer Science Institute johanna@icir.org http://www.icir.org/johanna SSL Client Server Client hello Server hello Certificate (Server Key Exchg) Client Key Exchange Change Cipher Spec


slide-1
SLIDE 1

SSL Research with Bro

Johanna Amann International Computer Science Institute

johanna@icir.org http://www.icir.org/johanna

slide-2
SLIDE 2

SSL

Client Server

Client hello Server hello Certificate Client Key Exchange Change Cipher Spec Finished Change Cipher Spec Finished Encrypted application data (Server Key Exchg)

slide-3
SLIDE 3

SSL

Client Server

Client hello Server hello Certificate Client Key Exchange Change Cipher Spec Finished Change Cipher Spec Finished Encrypted application data (Server Key Exchg) client_hello (extensions) server_hello (extensions) x509_* events

ssl_handshake_message ssl_handshake_message ssl_change_cipher_spec ssl_encrypted_data ssl_change_cipher_spec ssl_encrypted_data ssl_encrypted_data

slide-4
SLIDE 4

Bro History

1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2011 1995 2010 1996 2012

Vern writes 1st line of code

2013 2014

USENIX Paper Backdoors Stepping Stones Anonymizer
 Active Mapping Context Signat. TRW
 State Mgmt.

  • Independ. State

Host Context Time Machine Enterprise Traffic BinPAC DPD 2nd Path Bro Cluster
 Shunt Autotuning Parallel Prototype

Academic Publications

Input Framework SSL Trust SSL Errors Summary Stats HILTI DPI Concurrency PLC Modeling Android Root Certs Heart bleed

Bro Center

v2.3 Performance SNMP, Radius, SSL++

Bro SDCI

v2.0 User Experience v0.2 1st CHANGES entry v0.6 RegExps Login analysis v0.8aX/0.9aX
 SSL/SMB

STABLE releases

BroLite v1.1/v1.2 when Stmt Resource tuning Broccoli DPD v1.5 BroControl v0.7a90 Profiling State Mgmt v1.4 DHCP/BitTorrent HTTP entities NetFlow Bro Lite Deprecated v1.0 BinPAC IRC/RPC analyzers 64-bit support Sane version numbers v0.4
 HTTP analysis Scan detector IP fragments
 Linux support v0.7a175/0.8aX Signatures SMTP IPv6 support User manual

v0.7a48 Consistent CHANGES

v1.3 Ctor expressions GeoIP Conn Compressor 0.8a37 Communication Persistence Namespaces Log Rotation LBNL starts using Bro

  • perationally

v2.1 IPv6 Input Framew. v2.2 File Analysis Summary Stats

2015 2016

v2.4 Broker, Plugins, DTLS/KRB NetControl VAST Tor SSL OCSP Speed Certificate Ecosystem TLS Electronic Comm. Spicy v2.5, SMB, NetControl, VNC, StartTLS

slide-5
SLIDE 5

Bro SSL - v1.5.3

ssl_conn_attempt ssl_conn_server_reply ssl_conn_established ssl_conn_reused ssl_conn_alert ssl_conn_weak ssl_session_insertion process_X509_extensions ssl_X509_error ssl_certificate_seen ssl_certificate

slide-6
SLIDE 6

Bro SSL - v1.5.3

ssl_conn_attempt ssl_conn_server_reply ssl_conn_established ssl_conn_reused ssl_conn_alert ssl_conn_weak ssl_session_insertion process_X509_extensions ssl_X509_error ssl_certificate_seen ssl_certificate

Client Server

Client hello Server hello Certificate Client Key Exchange Change Cipher Spec Finished Change Cipher Spec Finished Encrypted application data (Server Key Exchg)

?

slide-7
SLIDE 7

Bro SSL - v2.0

client_hello server_hello ssl_session_ticket_handshake ssl_established x509_certificate ssl_extension ssl_alert

slide-8
SLIDE 8

Bro SSL - v2.1

client_hello server_hello ssl_session_ticket_handshake ssl_established x509_certificate ssl_extension ssl_alert

slide-9
SLIDE 9

Bro SSL - v2.1

client_hello server_hello ssl_session_ticket_handshake ssl_established x509_certificate ssl_extension ssl_alert

Several bug fixes Parsing TLS server extensions works More information in log file

slide-10
SLIDE 10

Bro SSL - v2.2

client_hello server_hello ssl_session_ticket_handshake ssl_established x509_certificate ssl_extension ssl_alert

slide-11
SLIDE 11

Bro SSL - v2.2

client_hello server_hello ssl_session_ticket_handshake ssl_established x509_certificate ssl_extension ssl_alert

Several bug fixes Client/server random available Support TLS 1.2

slide-12
SLIDE 12

Bro SSL - v2.3

client_hello server_hello ssl_session_ticket_handshake ssl_established x509_certificate ssl_extension ssl_alert

slide-13
SLIDE 13

Bro SSL - v2.3

client_hello server_hello ssl_session_ticket_handshake ssl_established x509_certificate ssl_extension ssl_alert ssl_stapled_ocsp ssl_encrypted_data ssl_dh_server_params ssl_change_cipher_spec ssl_handshake_message ssl_encrypted_data ssl_extension_ex_point_formats ssl_server_curve ssl_change_cipher_spec x509_extension x509_ext_basic_constraints

x509_ext_subject_alternative_name

ssl_extension_elliptic_curves

ssl_extension_application_layer_protocol_negotiation

ssl_extension_server_name

slide-14
SLIDE 14

Bro SSL events - v2.4

ssl_stapled_ocsp ssl_encrypted_data ssl_dh_server_params ssl_change_cipher_spec ssl_handshake_message ssl_encrypted_data ssl_extension_ex_point_formats ssl_server_curve ssl_change_cipher_spec x509_extension x509_ext_basic_constraints

x509_ext_subject_alternative_name

ssl_extension_elliptic_curves

ssl_extension_application_layer_protocol_negotiation

ssl_extension_server_name client_hello server_hello ssl_session_ticket_handshake ssl_established x509_certificate ssl_extension ssl_alert

slide-15
SLIDE 15

Bro SSL events - v2.4

ssl_stapled_ocsp ssl_encrypted_data ssl_dh_server_params ssl_change_cipher_spec ssl_handshake_message ssl_encrypted_data ssl_extension_ex_point_formats ssl_server_curve ssl_change_cipher_spec x509_extension x509_ext_basic_constraints

x509_ext_subject_alternative_name

ssl_extension_elliptic_curves

ssl_extension_application_layer_protocol_negotiation

ssl_extension_server_name client_hello server_hello ssl_session_ticket_handshake ssl_established x509_certificate ssl_extension ssl_alert

First DTLS support TLS record layer fragmentation

slide-16
SLIDE 16

Payload Type Version Length

Record Header

SSL Protocol Basics

  • Record based protocol
  • Records do not have to map to TCP packets
  • Record header is never encrypted, only payload is


(after the handshake is done)

slide-17
SLIDE 17

Payload Type Version Length

Record Header

SSL Protocol Basics

  • Record based protocol
  • Records do not have to map to TCP packets
  • Record header is never encrypted, only payload is


(after the handshake is done)

Common record types:

  • Change Cipher Spec
  • Alert
  • Handshake
  • Application Data
slide-18
SLIDE 18

Payload Type Version Length

Record Header

SSL Protocol Basics

  • Record based protocol
  • Records do not have to map to TCP packets
  • Record header is never encrypted, only payload is


(after the handshake is done)

slide-19
SLIDE 19

Fragmentation

server_hello Type:

Handshake

Version: 1.2 Length: 66

slide-20
SLIDE 20

Fragmentation

server_hello Type:

Handshake

Version: 1.2 Length: 66 certificate Type:

Handshake

Version: 1.2 Length: 3804

slide-21
SLIDE 21

Fragmentation

server_… Type:

Handshake

Version: 1.2 Length: 40 ..hell.. Type:

Handshake

Version: 1.2 Length: 20 Version: 1.2

  • Length:

3810 certificate

slide-22
SLIDE 22

Bro SSL events - v2.5

ssl_stapled_ocsp ssl_encrypted_data ssl_dh_server_params ssl_change_cipher_spec ssl_handshake_message ssl_encrypted_data ssl_extension_ex_point_formats ssl_change_cipher_spec x509_extension x509_ext_basic_constraints

x509_ext_subject_alternative_name

ssl_extension_elliptic_curves

ssl_extension_application_layer_protocol_negotiation

ssl_extension_server_name client_hello server_hello ssl_session_ticket_handshake ssl_established x509_certificate ssl_extension ssl_alert ssl_server_curve

slide-23
SLIDE 23

Bro SSL events - v2.5

ssl_stapled_ocsp ssl_encrypted_data ssl_dh_server_params ssl_change_cipher_spec ssl_handshake_message ssl_encrypted_data ssl_extension_ex_point_formats ssl_change_cipher_spec x509_extension x509_ext_basic_constraints

x509_ext_subject_alternative_name

ssl_extension_elliptic_curves

ssl_extension_application_layer_protocol_negotiation

ssl_extension_server_name client_hello server_hello ssl_session_ticket_handshake ssl_established x509_certificate ssl_extension ssl_alert ssl_server_curve

ssl_extension_signature_algorithm

slide-24
SLIDE 24

Bro SSL events - v2.5

ssl_stapled_ocsp ssl_encrypted_data ssl_dh_server_params ssl_change_cipher_spec ssl_handshake_message ssl_encrypted_data ssl_extension_ex_point_formats ssl_change_cipher_spec x509_extension x509_ext_basic_constraints

x509_ext_subject_alternative_name

ssl_extension_elliptic_curves

ssl_extension_application_layer_protocol_negotiation

ssl_extension_server_name client_hello server_hello ssl_session_ticket_handshake ssl_established x509_certificate ssl_extension ssl_alert ssl_server_curve

ssl_extension_signature_algorithm

Completely working DTLS support More StartTLS

slide-25
SLIDE 25

ICSI Notary

Internet Internal Network Bro Network Monitor Storage & Evaluation Outgoing SSL Sessions Data Provider Collector

slide-26
SLIDE 26

Notary - Collected features

Available ciphers Timestamp Version Analyzer Error Packet loss Hash(client session ID) Client & Server TLS extensions Selected cipher Hash(client IP , server IP) Content length Server certificates Hash(server session ID) Connection history Server IP Ticket lifetime hint Duration Server Name Indication Client EC curve Client EC point formats DH parameter size Number Client Certs Send & received bytes Client & Server ALPN TLS Alerts

slide-27
SLIDE 27

Notary - Certificates

slide-28
SLIDE 28

http://notary.icsi.berkeley.edu

slide-29
SLIDE 29

SSL Research 2016

Measuring the Latency and Pervasiveness of TLS Certificate Revocation

  • L. Zhu, J. Amann, J. Heidemann, PAM 2016

TLS in the wild: An Internet-wide Analysis of TLS-based Protocols for Electronic Communication

  • R. Holz, J. Amann, O. Mehani, M. Wachs, M. A. Kaafar, NDSS 2016

Towards a Complete View of the Certificate Ecosystem B, VanderSloot, J. Amann, M. Bernhard, Z. Durumeric, M. Bailey, J. A. Halderman, IMC 2016 Exploring Tor's Activity Through Long-term Passive TLS Traffic Measurement

  • J. Amann, R. Sommer, PAM 2016
slide-30
SLIDE 30
  • Popular network for anonymous Internet access
  • First release in 2002
  • Today more than 2,000,000 simultaneous clients
  • Uses TLS as its underlying communication protocol
slide-31
SLIDE 31

google.com facebook.com

slide-32
SLIDE 32

google.com facebook.com

slide-33
SLIDE 33

google.com facebook.com

slide-34
SLIDE 34

google.com facebook.com

slide-35
SLIDE 35

google.com facebook.com

slide-36
SLIDE 36

google.com facebook.com

slide-37
SLIDE 37

google.com facebook.com Directory Server

slide-38
SLIDE 38

Tor Certificates

Version 3 Issuer C=BE, O=GlobalSign nv-sa, CN=GlobalSign Domain Validation CA - SHA256 - G2 Subject OU=Domain Control Validated, CN=*.bro.org Not-Before Aug 25 16:55:00 2015 GMT Not-After Nov 28 21:21:16 2016 GMT

slide-39
SLIDE 39

Tor Certificates

Version 3 Issuer C=BE, O=GlobalSign nv-sa, CN=GlobalSign Domain Validation CA - SHA256 - G2 Subject OU=Domain Control Validated, CN=*.bro.org Not-Before Aug 25 16:55:00 2015 GMT Not-After Nov 28 21:21:16 2016 GMT Version 3 Issuer CN=www.hjo5uvxa5cdg3gjgf.com Subject CN=www.pongobhog2f6p.net Not-Before Dec 17 10:34:58 2013 GMT Not-After Dec 17 10:34:58 2014 GMT

slide-40
SLIDE 40

Tor Certificates

Version 3 Issuer C=BE, O=GlobalSign nv-sa, CN=GlobalSign Domain Validation CA - SHA256 - G2 Subject OU=Domain Control Validated, CN=*.bro.org Not-Before Aug 25 16:55:00 2015 GMT Not-After Nov 28 21:21:16 2016 GMT Version 3 Issuer CN=www.hjo5uvxa5cdg3gjgf.com Subject CN=www.pongobhog2f6p.net Not-Before Dec 17 10:34:58 2013 GMT Not-After Dec 17 10:34:58 2014 GMT

slide-41
SLIDE 41

Tor Certificates

Source: Tor src/common/tortls.c

slide-42
SLIDE 42

Tor Certificates

Source: Tor src/common/crypto.c

slide-43
SLIDE 43

Exploring Tor's Activity Through Long-term Passive TLS Traffic Measurement

  • J. Amann, R. Sommer, PAM 2016

Relays by Day

e d b c a

5000 10000 2007−12−01 2008−06−01 2008−12−01 2009−06−01 2009−12−01 2010−06−01 2010−12−01 2011−06−01 2011−12−01 2012−06−01 2012−12−01 2013−06−01 2013−12−01 2014−06−01 2014−12−01 2015−06−01 2015−12−01 IPs per day Flags a: Total b: Fast c: Stable d: Guard Relay e: Exit Relay

slide-44
SLIDE 44

Exploring Tor's Activity Through Long-term Passive TLS Traffic Measurement

  • J. Amann, R. Sommer, PAM 2016

Relays by Day

c b a

2000 4000 6000 2 1 2 − 4 − 1 2 1 2 − 7 − 1 2 1 2 − 1 − 1 2 1 3 − 1 − 1 2 1 3 − 4 − 1 2 1 3 − 7 − 1 2 1 3 − 1 − 1 2 1 4 − 1 − 1 2 1 4 − 4 − 1 2 1 4 − 7 − 1 2 1 4 − 1 − 1 2 1 5 − 1 − 1 2 1 5 − 4 − 1 2 1 5 − 7 − 1 2 1 5 − 1 − 1 IPs per day Server Types (top to bottom) a: All Servers b: Guard Relays c: Exit Relays

slide-45
SLIDE 45

Exploring Tor's Activity Through Long-term Passive TLS Traffic Measurement

  • J. Amann, R. Sommer, PAM 2016

Relays by Day

c b a

2000 4000 6000 2 1 2 − 4 − 1 2 1 2 − 7 − 1 2 1 2 − 1 − 1 2 1 3 − 1 − 1 2 1 3 − 4 − 1 2 1 3 − 7 − 1 2 1 3 − 1 − 1 2 1 4 − 1 − 1 2 1 4 − 4 − 1 2 1 4 − 7 − 1 2 1 4 − 1 − 1 2 1 5 − 1 − 1 2 1 5 − 4 − 1 2 1 5 − 7 − 1 2 1 5 − 1 − 1 IPs per day Server Types (top to bottom) a: All Servers b: Guard Relays c: Exit Relays Mevade

slide-46
SLIDE 46

Exploring Tor's Activity Through Long-term Passive TLS Traffic Measurement

  • J. Amann, R. Sommer, PAM 2016

Median & Mean Conn. Durations

b a

3 10 20 50 100 2 1 2 − 1 2 − 1 2 1 3 − 3 − 1 2 1 3 − 6 − 1 2 1 3 − 9 − 1 2 1 3 − 1 2 − 1 2 1 4 − 3 − 1 2 1 4 − 6 − 1 2 1 4 − 9 − 1 2 1 4 − 1 2 − 1 2 1 5 − 3 − 1 2 1 5 − 6 − 1 2 1 5 − 9 − 1 [Mean/Median] conn durations/day Connection durations a: Mean b: Median

slide-47
SLIDE 47

Exploring Tor's Activity Through Long-term Passive TLS Traffic Measurement

  • J. Amann, R. Sommer, PAM 2016

Tor connection Durations

Site 1st Qu. Median Mean 3rd Qu. Max N1 3.0 3.0 9.6 10.1 9,839 N2 3.0 6.3 19.5 16.8 22,280 N3 1.5 3.0 7.3 3.2 16,370 X1 3.0 3.0 8.3 3.3 10,120

slide-48
SLIDE 48

Client Fingerprints

0.00 0.25 0.50 0.75 1.00

2012−09−01 2012−11−01 2013−01−01 2013−03−01 2013−05−01 2013−07−01 2013−09−01 2013−11−01 2014−01−01 2014−03−01 2014−05−01 2014−07−01 2014−09−01 2014−11−01 2015−01−01 2015−03−01 2015−05−01

[%] clients with version per month

slide-49
SLIDE 49

Exploring Tor's Activity Through Long-term Passive TLS Traffic Measurement

  • J. Amann, R. Sommer, PAM 2016

Tor Server Versions

0.1.2.17 0.1.2.18 0.1.2.19 0.2.0.30 0.2.0.31 0.2.0.32 0.2.0.33 0.2.0.34 0.2.0.35 0.2.1.19 0.2.1.20 0.2.1.21 0.2.1.22 0.2.1.23 0.2.1.24 0.2.1.25 0.2.1.26 0.2.1.27 0.2.1.28 0.2.1.29 0.2.1.30 0.2.2.32 0.2.2.33 0.2.2.34 0.2.2.35 0.2.2.36 0.2.2.37 0.2.2.38 0.2.2.39 0.2.3.19−rc 0.2.3.20−rc 0.2.3.22−rc 0.2.3.24−rc 0.2.3.25 0.2.4.17−rc 0.2.4.19 0.2.4.20 0.2.4.21 0.2.4.22 0.2.4.23 0.2.4.24 0.2.4.27 0.2.5.10 0.2.5.11 0.2.5.12 0.2.5.8−rc 0.2.6.10 0.2.6.9

0.0 0.2 0.4 0.6 0.8 2008−02−01 2008−08−01 2009−02−01 2009−08−01 2010−02−01 2010−08−01 2011−02−01 2011−08−01 2012−02−01 2012−08−01 2013−02−01 2013−08−01 2014−02−01 2014−08−01 2015−02−01 2015−08−01 [%] servers with version per month

slide-50
SLIDE 50

Exploring Tor's Activity Through Long-term Passive TLS Traffic Measurement

  • J. Amann, R. Sommer, PAM 2016

Chosen Ciphersuites

e d c b a

0.00 0.25 0.50 0.75 1.00 2012−11−01 2013−02−01 2013−05−01 2013−08−01 2013−11−01 2014−02−01 2014−05−01 2014−08−01 2014−11−01 2015−02−01 2015−05−01 2015−08−01 [%] connections with cipher/month Cipher suites a: DHE_AES_256_CBC_SHA b: ECDHE_AES_256_CBC_SHA c: ECDHE_AES_128_GCM_SHA256 d: ECDHE_AES_128_CBC_SHA e: DHE_AES_128_CBC_SHA

slide-51
SLIDE 51

Measuring the Latency and Pervasiveness of TLS Certificate Revocation

  • L. Zhu, J. Amann, J. Heidemann, PAM 2016

OCSP

Is revocation checking really not feasible?

slide-52
SLIDE 52

Measuring the Latency and Pervasiveness of TLS Certificate Revocation

  • L. Zhu, J. Amann, J. Heidemann, PAM 2016

OCSP

HTTPS Server OCSP Server

client hello server hello More handshake messages OCSP request OCSP reply Application data

slide-53
SLIDE 53

Measuring the Latency and Pervasiveness of TLS Certificate Revocation

  • L. Zhu, J. Amann, J. Heidemann, PAM 2016

OCSP Clients

category application percent Web browsers 32.10% Firefox 31.63% Chrome .21% Pale moon .06% Opera .06% Rekonq, Bolt, Midori, Iceweasel, Seamonkey, Safari <.15% Sonkeror, IE, Camino, Epiphany, Konqueror Library or daemon used by applications 66.87%

  • cspd

37.15% Microsoft-CryptoAPI 23.74% securityd 4.74% java 1.24% cfnetwork <.0001% Email client .32% Thunderbird .30% Postbox, Gomeza, Zdesktop, Eudora, Icedove .02% Other applications .33% Lightning .31% Zotero .01% Celtx, ppkhandler, Komodo, Dalvik, slimerjs, Unity <.0074% Phoenix, Sunbird, Slurp, miniupnpc, googlebot Entrust entelligence security provider Unknown .38% Unknown .38%

slide-54
SLIDE 54

Measuring the Latency and Pervasiveness of TLS Certificate Revocation

  • L. Zhu, J. Amann, J. Heidemann, PAM 2016

OCSP - Speed

0.2 0.4 0.6 0.8 1 0.0001 0.001 0.01 0.1 1 10 100 1000 median: 19.25 ms CDF OCSP lookup time (seconds) all no connection reuse connection reuse get post

slide-55
SLIDE 55

Measuring the Latency and Pervasiveness of TLS Certificate Revocation

  • L. Zhu, J. Amann, J. Heidemann, PAM 2016

OCSP Servers

Query Traffic OCSP Servers CDN 39313464 94% 120 39%

  • ther

2526338 6% 184 61% total 41839802 100% 304 100%

slide-56
SLIDE 56

Measuring the Latency and Pervasiveness of TLS Certificate Revocation

  • L. Zhu, J. Amann, J. Heidemann, PAM 2016

OCSP Servers

server

  • bserved CDN

lookup

  • csp.digicert.com

phicdn.net 6,205,125 14.83% clients1.google.com self-hosted 4,859,409 11.61% sr.symcd.com akamaiedge 3,778,672 9.03%

  • csp.entrust.net

akamaiedge 2,421,420 5.79%

  • csp.godaddy.com

self-hosted (using akadns) 2,399,931 5.74%

  • csp.usertrust.com

self-hosted 2,248,577 5.37% vassg141.ocsp.omniroot.com akamai 1,915,287 4.58% ss.symcd.com akamaiedge 1,663,053 3.97%

  • csp.comodoca.com

self-hosted 1,478,911 3.53%

  • csp.verisign.com

akamaiedge 1,345,724 3.22% all 294 others 13,523,693 32.32% total 41,839,802 100%

slide-57
SLIDE 57

Measuring the Latency and Pervasiveness of TLS Certificate Revocation

  • L. Zhu, J. Amann, J. Heidemann, PAM 2016

OCSP - Speed

0.2 0.4 0.6 0.8 1 0.0001 0.001 0.01 0.1 1 10 100 1000 0.0001 0.001 0.01 0.1 1 10 100 1000 10000 median: 0.0965 median: 15.8 ms median: 241.3 ms CDF Latency (seconds) OCSP/TLS Latency ratio OCSP (all) TLS (all) ratio TLS (1 OCSP) TLS (>1 OCSP)

slide-58
SLIDE 58

Measuring the Latency and Pervasiveness of TLS Certificate Revocation

  • L. Zhu, J. Amann, J. Heidemann, PAM 2016

OCSP - Caching time

0.2 0.4 0.6 0.8 1 0.24 h 2.4 h 1 d 10 d 100 d 7 days CDF validity time of OCSP response (log-scale)

slide-59
SLIDE 59

Measuring the Latency and Pervasiveness of TLS Certificate Revocation

  • L. Zhu, J. Amann, J. Heidemann, PAM 2016

OCSP - Revoked Certificates

0.05 0.1 0.15 0.2 0.25 0.3 07-28 08-07 08-17 08-27 09-06 09-16 09-26 percent of OCSP responses unknown revoked

slide-60
SLIDE 60

TLS in the wild: An Internet-wide Analysis of TLS-based Protocols for Electronic Communication

  • R. Holz, J. Amann, O. Mehani, M. Wachs, M. A. Kaafar, NDSS 2016

Electronic Communication

How secure is SSL for SMTP, IMAP, XMPP, …

slide-61
SLIDE 61

TLS in the wild: An Internet-wide Analysis of TLS-based Protocols for Electronic Communication

  • R. Holz, J. Amann, O. Mehani, M. Wachs, M. A. Kaafar, NDSS 2016

Dataset

Protocol Port Connections Servers SMTP† 25 3,870,542 8626 SMTPS 465 37,306 266 SUBMISSION† 587 7,849,434 373 IMAP† 143 25,900 239 IMAPS 993 4,620,043 1196 POP3† 110 18,774 110 POP3S 995 159,702 341 IRC† 6667 53 2 IRCS 6697 18,238 15 XMPP, C2S† 5222 13,517 229 XMPPS, C2S 5223 911,411 2163 XMPP, S2S† 5269 175 2 XMPPS, S2S 5270

slide-62
SLIDE 62

TLS in the wild: An Internet-wide Analysis of TLS-based Protocols for Electronic Communication

  • R. Holz, J. Amann, O. Mehani, M. Wachs, M. A. Kaafar, NDSS 2016

StartTLS - upgraded

Active probing Passive monitoring Supported Supporting Offering Upgraded Protocol & upgraded servers connections connections SMTP 30.82% 59% 97% 94% SUBMISSION 43.03% 98% 99.9% 97% IMAP 50.91% 77% 70% 44% POP3 45.62% 55% 73% 62% IRC 0.14% – – – XMPP, C2S 2.44% – – – XMPP, S2S 0.39% – – –

slide-63
SLIDE 63

TLS in the wild: An Internet-wide Analysis of TLS-based Protocols for Electronic Communication

  • R. Holz, J. Amann, O. Mehani, M. Wachs, M. A. Kaafar, NDSS 2016

Valid certificates

SMTP POP3 IMAP SMTPS SUBMISSION IMAPS POP3S XMPP C2S XMPP S2S IRC IRCS SMTP POP3 IMAP SMTPS SUBMISSION IMAPS POP3S XMPP C2S XMPP S2S IRC IRCS

Servers Connections

10 20 30 40 50 60 70 80 90 100 25 465 587 143 993 110 995 6667 6697 5222 5269 25 465 587 143 993 110 995 6667 6697 5222 5269 Percent of Connections/Servers

broken expired self−signed verifiable

slide-64
SLIDE 64

TLS in the wild: An Internet-wide Analysis of TLS-based Protocols for Electronic Communication

  • R. Holz, J. Amann, O. Mehani, M. Wachs, M. A. Kaafar, NDSS 2016

Used ciphers

SMTP SMTP SMTP SMTP POP3 POP3 POP3 IMAP IMAP IMAP SMTPS SMTPS SMTPS SMTPS SUBMISSION SUBMISSION SUBMISSION SUBMISSION IMAPS IMAPS IMAPS POP3S POP3S POP3S POP3S XMPP C2S XMPP C2S XMPP C2S XMPP C2S 10 20 30 40 50 60 70 80 90 100 25 465 587 143 993 110 995 5222 Percent of connections

rc4 aes dhe ecdhe

slide-65
SLIDE 65
slide-66
SLIDE 66

Notary contributions

Please consider contributing data to the ICSI Notary, which provided data used in several of the studies in this presentation.