The DNS security mess D. J. Bernstein University of Illinois at - - PowerPoint PPT Presentation

the dns security mess d j bernstein university of
SMART_READER_LITE
LIVE PREVIEW

The DNS security mess D. J. Bernstein University of Illinois at - - PowerPoint PPT Presentation

The DNS security mess D. J. Bernstein University of Illinois at Chicago & Technische Universiteit Eindhoven Paul Vixie, 1995, on DNSSEC: This sounds simple but it has deep reaching consequences in both the protocol and the


slide-1
SLIDE 1

The DNS security mess

  • D. J. Bernstein

University of Illinois at Chicago & Technische Universiteit Eindhoven Paul Vixie, 1995, on DNSSEC:

This sounds simple but it has deep reaching consequences in both the protocol and the implementation—which is why it’s taken more than a year to choose a security model and design a solution. We expect it to be another year before DNSSEC is in wide use on the leading edge, and at least a year after that before its use is commonplace on the Internet.

Before I start my talk, some comments on HTTPSEC. Warning: HTTPSEC ✻= HTTPS.

slide-2
SLIDE 2

The DNS security mess

  • D. J. Bernstein

University of Illinois at Chicago & Technische Universiteit Eindhoven Paul Vixie, 1995, on DNSSEC:

This sounds simple but it has deep reaching consequences in both the protocol and the implementation—which is why it’s taken more than a year to choose a security model and design a solution. We expect it to be another year before DNSSEC is in wide use on the leading edge, and at least a year after that before its use is commonplace on the Internet.

Before I start my talk, some comments on HTTPSEC. Warning: HTTPSEC ✻= HTTPS. HTTPSEC motivation You use HTTP all the time: e.g., http://nu.nl. Your computer requests a web page from the nu.nl server. The server sends a web page.

slide-3
SLIDE 3

The DNS security mess

  • D. J. Bernstein

University of Illinois at Chicago & Technische Universiteit Eindhoven Paul Vixie, 1995, on DNSSEC:

This sounds simple but it has deep reaching consequences in both the protocol and the implementation—which is why it’s taken more than a year to choose a security model and design a solution. We expect it to be another year before DNSSEC is in wide use on the leading edge, and at least a year after that before its use is commonplace on the Internet.

Before I start my talk, some comments on HTTPSEC. Warning: HTTPSEC ✻= HTTPS. HTTPSEC motivation You use HTTP all the time: e.g., http://nu.nl. Your computer requests a web page from the nu.nl server. The server sends a web page. Your computer is using a wireless network that also has many other computers. Some of those computers are controlled by attackers.

slide-4
SLIDE 4

The DNS security mess

  • D. J. Bernstein

University of Illinois at Chicago & Technische Universiteit Eindhoven Paul Vixie, 1995, on DNSSEC:

This sounds simple but it has deep reaching consequences in both the protocol and the implementation—which is why it’s taken more than a year to choose a security model and design a solution. We expect it to be another year before DNSSEC is in wide use on the leading edge, and at least a year after that before its use is commonplace on the Internet.

Before I start my talk, some comments on HTTPSEC. Warning: HTTPSEC ✻= HTTPS. HTTPSEC motivation You use HTTP all the time: e.g., http://nu.nl. Your computer requests a web page from the nu.nl server. The server sends a web page. Your computer is using a wireless network that also has many other computers. Some of those computers are controlled by attackers. Or maybe you’re in Iran, and the network is the attacker.

slide-5
SLIDE 5

DNS security mess Bernstein University of Illinois at Chicago & echnische Universiteit Eindhoven Vixie, 1995, on DNSSEC:

sounds simple but it has deep reaching consequences in both the protocol and the implementation—which is why it’s taken more ear to choose a security model and

  • solution. We expect it to be another

re DNSSEC is in wide use on the edge, and at least a year after that use is commonplace on the Internet.

I start my talk, comments on HTTPSEC. rning: HTTPSEC ✻= HTTPS. HTTPSEC motivation You use HTTP all the time: e.g., http://nu.nl. Your computer requests a web page from the nu.nl server. The server sends a web page. Your computer is using a wireless network that also has many other computers. Some of those computers are controlled by attackers. Or maybe you’re in Iran, and the network is the attacker. Standard Confidentialit despite espionage. Integrity despite co Availabilit

slide-6
SLIDE 6

security mess Illinois at Chicago & Universiteit Eindhoven 1995, on DNSSEC:

it has deep reaching the protocol and the is why it’s taken more a security model and expect it to be another in wide use on the ast a year after that commonplace on the Internet.

my talk,

  • n HTTPSEC.

HTTPSEC ✻= HTTPS. HTTPSEC motivation You use HTTP all the time: e.g., http://nu.nl. Your computer requests a web page from the nu.nl server. The server sends a web page. Your computer is using a wireless network that also has many other computers. Some of those computers are controlled by attackers. Or maybe you’re in Iran, and the network is the attacker. Standard security goals: Confidentiality (p despite espionage. Integrity (authenticit despite corruption. Availability despite

slide-7
SLIDE 7

Chicago & Eindhoven DNSSEC:

reaching and the taken more del and e another

  • n the

after that the Internet.

HTTPSEC. ✻ HTTPS. HTTPSEC motivation You use HTTP all the time: e.g., http://nu.nl. Your computer requests a web page from the nu.nl server. The server sends a web page. Your computer is using a wireless network that also has many other computers. Some of those computers are controlled by attackers. Or maybe you’re in Iran, and the network is the attacker. Standard security goals: Confidentiality (privacy etc.) despite espionage. Integrity (authenticity etc.) despite corruption. Availability despite sabotage.

slide-8
SLIDE 8

HTTPSEC motivation You use HTTP all the time: e.g., http://nu.nl. Your computer requests a web page from the nu.nl server. The server sends a web page. Your computer is using a wireless network that also has many other computers. Some of those computers are controlled by attackers. Or maybe you’re in Iran, and the network is the attacker. Standard security goals: Confidentiality (privacy etc.) despite espionage. Integrity (authenticity etc.) despite corruption. Availability despite sabotage.

slide-9
SLIDE 9

HTTPSEC motivation You use HTTP all the time: e.g., http://nu.nl. Your computer requests a web page from the nu.nl server. The server sends a web page. Your computer is using a wireless network that also has many other computers. Some of those computers are controlled by attackers. Or maybe you’re in Iran, and the network is the attacker. Standard security goals: Confidentiality (privacy etc.) despite espionage. Integrity (authenticity etc.) despite corruption. Availability despite sabotage. HTTP provides none of this. By watching the network, attacker easily acquires data: the HTTP request, the web page. Attacker easily changes data. Attacker easily destroys data.

slide-10
SLIDE 10

HTTPSEC motivation use HTTP all the time: http://nu.nl. computer requests a web from the nu.nl server. server sends a web page. computer is using wireless network that has many other computers.

  • f those computers are

controlled by attackers. ybe you’re in Iran, and network is the attacker. Standard security goals: Confidentiality (privacy etc.) despite espionage. Integrity (authenticity etc.) despite corruption. Availability despite sabotage. HTTP provides none of this. By watching the network, attacker easily acquires data: the HTTP request, the web page. Attacker easily changes data. Attacker easily destroys data. HTTPSEC: HTTPSEC to “bolster HTTPSEC for the nu.nl to attach to the nu.nl These signatures “verification authenticit data” obtained

slide-11
SLIDE 11

motivation all the time: http://nu.nl. requests a web nu.nl server. sends a web page. is using rk that

  • ther computers.

computers are attackers. in Iran, and the attacker. Standard security goals: Confidentiality (privacy etc.) despite espionage. Integrity (authenticity etc.) despite corruption. Availability despite sabotage. HTTP provides none of this. By watching the network, attacker easily acquires data: the HTTP request, the web page. Attacker easily changes data. Attacker easily destroys data. HTTPSEC: “HTTP HTTPSEC modifies to “bolster online sec HTTPSEC provides for the nu.nl server to attach PGP signatures to the nu.nl HTTP These signatures allo “verification of the authenticity, and integrit data” obtained through

slide-12
SLIDE 12

time: web server. page. computers. are and er. Standard security goals: Confidentiality (privacy etc.) despite espionage. Integrity (authenticity etc.) despite corruption. Availability despite sabotage. HTTP provides none of this. By watching the network, attacker easily acquires data: the HTTP request, the web page. Attacker easily changes data. Attacker easily destroys data. HTTPSEC: “HTTP Security HTTPSEC modifies HTTP to “bolster online security”. HTTPSEC provides a way for the nu.nl server admin to attach PGP signatures to the nu.nl HTTP responses. These signatures allow “verification of the origin, authenticity, and integrity of data” obtained through HTTP

slide-13
SLIDE 13

Standard security goals: Confidentiality (privacy etc.) despite espionage. Integrity (authenticity etc.) despite corruption. Availability despite sabotage. HTTP provides none of this. By watching the network, attacker easily acquires data: the HTTP request, the web page. Attacker easily changes data. Attacker easily destroys data. HTTPSEC: “HTTP Security” HTTPSEC modifies HTTP to “bolster online security”. HTTPSEC provides a way for the nu.nl server admin to attach PGP signatures to the nu.nl HTTP responses. These signatures allow “verification of the origin, authenticity, and integrity of data” obtained through HTTP.

slide-14
SLIDE 14

Standard security goals: Confidentiality (privacy etc.) despite espionage. Integrity (authenticity etc.) despite corruption. Availability despite sabotage. provides none of this. atching the network, er easily acquires data: HTTP request, the web page. er easily changes data. er easily destroys data. HTTPSEC: “HTTP Security” HTTPSEC modifies HTTP to “bolster online security”. HTTPSEC provides a way for the nu.nl server admin to attach PGP signatures to the nu.nl HTTP responses. These signatures allow “verification of the origin, authenticity, and integrity of data” obtained through HTTP. To verify your computer retrieve the from the

slide-15
SLIDE 15

y goals: (privacy etc.) espionage. (authenticity etc.) rruption. despite sabotage. none of this. network, acquires data: request, the web page. changes data. destroys data. HTTPSEC: “HTTP Security” HTTPSEC modifies HTTP to “bolster online security”. HTTPSEC provides a way for the nu.nl server admin to attach PGP signatures to the nu.nl HTTP responses. These signatures allow “verification of the origin, authenticity, and integrity of data” obtained through HTTP. To verify these signatures, your computer needs retrieve the PGP public from the nu.nl admin.

slide-16
SLIDE 16

etc.) etc.)

  • tage.

this. data: eb page. data. data. HTTPSEC: “HTTP Security” HTTPSEC modifies HTTP to “bolster online security”. HTTPSEC provides a way for the nu.nl server admin to attach PGP signatures to the nu.nl HTTP responses. These signatures allow “verification of the origin, authenticity, and integrity of data” obtained through HTTP. To verify these signatures, your computer needs to retrieve the PGP public key from the nu.nl admin.

slide-17
SLIDE 17

HTTPSEC: “HTTP Security” HTTPSEC modifies HTTP to “bolster online security”. HTTPSEC provides a way for the nu.nl server admin to attach PGP signatures to the nu.nl HTTP responses. These signatures allow “verification of the origin, authenticity, and integrity of data” obtained through HTTP. To verify these signatures, your computer needs to retrieve the PGP public key from the nu.nl admin.

slide-18
SLIDE 18

HTTPSEC: “HTTP Security” HTTPSEC modifies HTTP to “bolster online security”. HTTPSEC provides a way for the nu.nl server admin to attach PGP signatures to the nu.nl HTTP responses. These signatures allow “verification of the origin, authenticity, and integrity of data” obtained through HTTP. To verify these signatures, your computer needs to retrieve the PGP public key from the nu.nl admin. What if the key is forged?

slide-19
SLIDE 19

HTTPSEC: “HTTP Security” HTTPSEC modifies HTTP to “bolster online security”. HTTPSEC provides a way for the nu.nl server admin to attach PGP signatures to the nu.nl HTTP responses. These signatures allow “verification of the origin, authenticity, and integrity of data” obtained through HTTP. To verify these signatures, your computer needs to retrieve the PGP public key from the nu.nl admin. What if the key is forged? Answer: HTTPSEC provides a way for a trusted Netherlands government representative to PGP-sign the nu.nl public key.

slide-20
SLIDE 20

HTTPSEC: “HTTP Security” HTTPSEC modifies HTTP to “bolster online security”. HTTPSEC provides a way for the nu.nl server admin to attach PGP signatures to the nu.nl HTTP responses. These signatures allow “verification of the origin, authenticity, and integrity of data” obtained through HTTP. To verify these signatures, your computer needs to retrieve the PGP public key from the nu.nl admin. What if the key is forged? Answer: HTTPSEC provides a way for a trusted Netherlands government representative to PGP-sign the nu.nl public key. What if that key is forged? Answer: Internet Central Headquarters signed the Netherlands public key.

slide-21
SLIDE 21

HTTPSEC: “HTTP Security” HTTPSEC modifies HTTP

  • lster online security”.

HTTPSEC provides a way nu.nl server admin attach PGP signatures nu.nl HTTP responses. signatures allow verification of the origin, authenticity, and integrity of

  • btained through HTTP.

To verify these signatures, your computer needs to retrieve the PGP public key from the nu.nl admin. What if the key is forged? Answer: HTTPSEC provides a way for a trusted Netherlands government representative to PGP-sign the nu.nl public key. What if that key is forged? Answer: Internet Central Headquarters signed the Netherlands public key. Internet was generated Hardware

  • wned by

a well-kno Hardware signs data by 3 out held by V 3 VeriSign meet every they have

slide-22
SLIDE 22

HTTP Security” difies HTTP

  • nline security”.

rovides a way server admin signatures HTTP responses. signatures allow the origin, integrity of through HTTP. To verify these signatures, your computer needs to retrieve the PGP public key from the nu.nl admin. What if the key is forged? Answer: HTTPSEC provides a way for a trusted Netherlands government representative to PGP-sign the nu.nl public key. What if that key is forged? Answer: Internet Central Headquarters signed the Netherlands public key. Internet Central HQ was generated by an Hardware Security

  • wned by VeriSign,

a well-known American Hardware Security signs data if autho by 3 out of 16 sma held by VeriSign T 3 VeriSign Trust Managers meet every week in they have to sign new

slide-23
SLIDE 23

Security” ”. admin signatures

  • nses.
  • f

HTTP. To verify these signatures, your computer needs to retrieve the PGP public key from the nu.nl admin. What if the key is forged? Answer: HTTPSEC provides a way for a trusted Netherlands government representative to PGP-sign the nu.nl public key. What if that key is forged? Answer: Internet Central Headquarters signed the Netherlands public key. Internet Central HQ key was generated by an expensive Hardware Security Module

  • wned by VeriSign,

a well-known American company Hardware Security Module signs data if authorized by 3 out of 16 smart cards held by VeriSign Trust Managers. 3 VeriSign Trust Managers meet every week in case they have to sign new data.

slide-24
SLIDE 24

To verify these signatures, your computer needs to retrieve the PGP public key from the nu.nl admin. What if the key is forged? Answer: HTTPSEC provides a way for a trusted Netherlands government representative to PGP-sign the nu.nl public key. What if that key is forged? Answer: Internet Central Headquarters signed the Netherlands public key. Internet Central HQ key was generated by an expensive Hardware Security Module

  • wned by VeriSign,

a well-known American company. Hardware Security Module signs data if authorized by 3 out of 16 smart cards held by VeriSign Trust Managers. 3 VeriSign Trust Managers meet every week in case they have to sign new data.

slide-25
SLIDE 25

verify these signatures, computer needs to retrieve the PGP public key the nu.nl admin. if the key is forged? er: HTTPSEC provides a r a trusted Netherlands government representative to PGP-sign the nu.nl public key. if that key is forged? er: Internet Central Headquarters signed the Netherlands public key. Internet Central HQ key was generated by an expensive Hardware Security Module

  • wned by VeriSign,

a well-known American company. Hardware Security Module signs data if authorized by 3 out of 16 smart cards held by VeriSign Trust Managers. 3 VeriSign Trust Managers meet every week in case they have to sign new data. If your computer software Internet Your computer the Netherlands and the signature PGP-verifies Next ste the nu.nl and the Finally PGP-verify HTTPSEC-signed

slide-26
SLIDE 26

signatures, needs to public key admin. is forged? HTTPSEC provides a ed Netherlands resentative to nu.nl public key. is forged? Internet Central igned the public key. Internet Central HQ key was generated by an expensive Hardware Security Module

  • wned by VeriSign,

a well-known American company. Hardware Security Module signs data if authorized by 3 out of 16 smart cards held by VeriSign Trust Managers. 3 VeriSign Trust Managers meet every week in case they have to sign new data. If your computer has software then it already Internet Central HQ Your computer retrieves the Netherlands public and the Internet Central signature of that public PGP-verifies this signature. Next step: retrieve the nu.nl admin’s and the Netherlands Finally PGP-verify HTTPSEC-signed

slide-27
SLIDE 27

ey rovides a Netherlands to public key. rged? Internet Central HQ key was generated by an expensive Hardware Security Module

  • wned by VeriSign,

a well-known American company. Hardware Security Module signs data if authorized by 3 out of 16 smart cards held by VeriSign Trust Managers. 3 VeriSign Trust Managers meet every week in case they have to sign new data. If your computer has HTTPSEC software then it already knows Internet Central HQ public k Your computer retrieves the Netherlands public key and the Internet Central HQ signature of that public key; PGP-verifies this signature. Next step: retrieve and verify the nu.nl admin’s public key and the Netherlands signature. Finally PGP-verify nu.nl’s HTTPSEC-signed responses.

slide-28
SLIDE 28

Internet Central HQ key was generated by an expensive Hardware Security Module

  • wned by VeriSign,

a well-known American company. Hardware Security Module signs data if authorized by 3 out of 16 smart cards held by VeriSign Trust Managers. 3 VeriSign Trust Managers meet every week in case they have to sign new data. If your computer has HTTPSEC software then it already knows the Internet Central HQ public key. Your computer retrieves the Netherlands public key and the Internet Central HQ signature of that public key; PGP-verifies this signature. Next step: retrieve and verify the nu.nl admin’s public key and the Netherlands signature. Finally PGP-verify nu.nl’s HTTPSEC-signed responses.

slide-29
SLIDE 29

Internet Central HQ key generated by an expensive are Security Module by VeriSign, ell-known American company. are Security Module data if authorized

  • ut of 16 smart cards

y VeriSign Trust Managers. eriSign Trust Managers very week in case have to sign new data. If your computer has HTTPSEC software then it already knows the Internet Central HQ public key. Your computer retrieves the Netherlands public key and the Internet Central HQ signature of that public key; PGP-verifies this signature. Next step: retrieve and verify the nu.nl admin’s public key and the Netherlands signature. Finally PGP-verify nu.nl’s HTTPSEC-signed responses. HTTPSEC Many Internet are extremely Can they The critical in HTTPSEC: PGP signatures “Per-query Signature saved; sent Hopefully sign each

slide-30
SLIDE 30

HQ key y an expensive Security Module eriSign, American company. Security Module authorized smart cards Trust Managers. Managers in case sign new data. If your computer has HTTPSEC software then it already knows the Internet Central HQ public key. Your computer retrieves the Netherlands public key and the Internet Central HQ signature of that public key; PGP-verifies this signature. Next step: retrieve and verify the nu.nl admin’s public key and the Netherlands signature. Finally PGP-verify nu.nl’s HTTPSEC-signed responses. HTTPSEC performance Many Internet servers are extremely busy Can they afford crypto? The critical design in HTTPSEC: precompute PGP signatures of “Per-query crypto Signature is computed saved; sent to many Hopefully the admin sign each HTTP resp

slide-31
SLIDE 31

ensive company. Managers. Managers data. If your computer has HTTPSEC software then it already knows the Internet Central HQ public key. Your computer retrieves the Netherlands public key and the Internet Central HQ signature of that public key; PGP-verifies this signature. Next step: retrieve and verify the nu.nl admin’s public key and the Netherlands signature. Finally PGP-verify nu.nl’s HTTPSEC-signed responses. HTTPSEC performance Many Internet servers are extremely busy. Can they afford crypto? The critical design decision in HTTPSEC: precompute PGP signatures of all data. “Per-query crypto is bad.” Signature is computed once; saved; sent to many clients. Hopefully the admin can affo sign each HTTP response once.

slide-32
SLIDE 32

If your computer has HTTPSEC software then it already knows the Internet Central HQ public key. Your computer retrieves the Netherlands public key and the Internet Central HQ signature of that public key; PGP-verifies this signature. Next step: retrieve and verify the nu.nl admin’s public key and the Netherlands signature. Finally PGP-verify nu.nl’s HTTPSEC-signed responses. HTTPSEC performance Many Internet servers are extremely busy. Can they afford crypto? The critical design decision in HTTPSEC: precompute PGP signatures of all data. “Per-query crypto is bad.” Signature is computed once; saved; sent to many clients. Hopefully the admin can afford to sign each HTTP response once.

slide-33
SLIDE 33

computer has HTTPSEC re then it already knows the Internet Central HQ public key. computer retrieves Netherlands public key the Internet Central HQ signature of that public key; PGP-verifies this signature. step: retrieve and verify nu.nl admin’s public key the Netherlands signature. PGP-verify nu.nl’s HTTPSEC-signed responses. HTTPSEC performance Many Internet servers are extremely busy. Can they afford crypto? The critical design decision in HTTPSEC: precompute PGP signatures of all data. “Per-query crypto is bad.” Signature is computed once; saved; sent to many clients. Hopefully the admin can afford to sign each HTTP response once. Clients don’t

  • f verifying

HTTPSEC client-side precomputation choice of Many HTTPSEC 640-bit RSA, 768-bit RSA, 1024-bit signatures DSA, “10 verification

slide-34
SLIDE 34

computer has HTTPSEC already knows the HQ public key. retrieves public key Central HQ t public key; this signature. ve and verify admin’s public key Netherlands signature. PGP-verify nu.nl’s HTTPSEC-signed responses. HTTPSEC performance Many Internet servers are extremely busy. Can they afford crypto? The critical design decision in HTTPSEC: precompute PGP signatures of all data. “Per-query crypto is bad.” Signature is computed once; saved; sent to many clients. Hopefully the admin can afford to sign each HTTP response once. Clients don’t share

  • f verifying a signature.

HTTPSEC tries to client-side costs (and precomputation costs) choice of crypto primitive. Many HTTPSEC crypto 640-bit RSA, original 768-bit RSA, many 1024-bit RSA, current signatures from VeriSign DSA, “10 to 40 times verification” but fast

slide-35
SLIDE 35

HTTPSEC knows the public key. HQ ey; signature. verify key signature. ’s

  • nses.

HTTPSEC performance Many Internet servers are extremely busy. Can they afford crypto? The critical design decision in HTTPSEC: precompute PGP signatures of all data. “Per-query crypto is bad.” Signature is computed once; saved; sent to many clients. Hopefully the admin can afford to sign each HTTP response once. Clients don’t share the work

  • f verifying a signature.

HTTPSEC tries to reduce client-side costs (and precomputation costs) through choice of crypto primitive. Many HTTPSEC crypto options: 640-bit RSA, original specs; 768-bit RSA, many docs; 1024-bit RSA, current signatures from VeriSign etc.; DSA, “10 to 40 times as slow verification” but faster for signing.

slide-36
SLIDE 36

HTTPSEC performance Many Internet servers are extremely busy. Can they afford crypto? The critical design decision in HTTPSEC: precompute PGP signatures of all data. “Per-query crypto is bad.” Signature is computed once; saved; sent to many clients. Hopefully the admin can afford to sign each HTTP response once. Clients don’t share the work

  • f verifying a signature.

HTTPSEC tries to reduce client-side costs (and precomputation costs) through choice of crypto primitive. Many HTTPSEC crypto options: 640-bit RSA, original specs; 768-bit RSA, many docs; 1024-bit RSA, current signatures from VeriSign etc.; DSA, “10 to 40 times as slow for verification” but faster for signing.

slide-37
SLIDE 37

HTTPSEC performance Internet servers extremely busy. they afford crypto? critical design decision HTTPSEC: precompute signatures of all data. er-query crypto is bad.” Signature is computed once; sent to many clients. efully the admin can afford to each HTTP response once. Clients don’t share the work

  • f verifying a signature.

HTTPSEC tries to reduce client-side costs (and precomputation costs) through choice of crypto primitive. Many HTTPSEC crypto options: 640-bit RSA, original specs; 768-bit RSA, many docs; 1024-bit RSA, current signatures from VeriSign etc.; DSA, “10 to 40 times as slow for verification” but faster for signing. HTTPSEC choices s for no reason fear of overload. HTTPSEC to survive and even for reason More complexit ✮ including Author of HTTP server: implementing is just staggering.”

slide-38
SLIDE 38

rmance servers busy. crypto? design decision recompute

  • f all data.

crypto is bad.” computed once; many clients. admin can afford to response once. Clients don’t share the work

  • f verifying a signature.

HTTPSEC tries to reduce client-side costs (and precomputation costs) through choice of crypto primitive. Many HTTPSEC crypto options: 640-bit RSA, original specs; 768-bit RSA, many docs; 1024-bit RSA, current signatures from VeriSign etc.; DSA, “10 to 40 times as slow for verification” but faster for signing. HTTPSEC made b choices such as 640-bit for no reason other fear of overload. HTTPSEC needed to survive the inevitable and even more complexit for reasons I’ll explain. More complexity ✮ including security holes. Author of one very HTTP server: “The implementing every is just staggering.”

slide-39
SLIDE 39

decision data.

  • nce;

clients. afford to

  • nce.

Clients don’t share the work

  • f verifying a signature.

HTTPSEC tries to reduce client-side costs (and precomputation costs) through choice of crypto primitive. Many HTTPSEC crypto options: 640-bit RSA, original specs; 768-bit RSA, many docs; 1024-bit RSA, current signatures from VeriSign etc.; DSA, “10 to 40 times as slow for verification” but faster for signing. HTTPSEC made breakable choices such as 640-bit RSA for no reason other than fear of overload. HTTPSEC needed more options to survive the inevitable breaks; and even more complexity for reasons I’ll explain. More complexity ✮ more bugs, including security holes. Author of one very popular HTTP server: “The effort of implementing everything correctly is just staggering.”

slide-40
SLIDE 40

Clients don’t share the work

  • f verifying a signature.

HTTPSEC tries to reduce client-side costs (and precomputation costs) through choice of crypto primitive. Many HTTPSEC crypto options: 640-bit RSA, original specs; 768-bit RSA, many docs; 1024-bit RSA, current signatures from VeriSign etc.; DSA, “10 to 40 times as slow for verification” but faster for signing. HTTPSEC made breakable choices such as 640-bit RSA for no reason other than fear of overload. HTTPSEC needed more options to survive the inevitable breaks; and even more complexity for reasons I’ll explain. More complexity ✮ more bugs, including security holes. Author of one very popular HTTP server: “The effort of implementing everything correctly is just staggering.”

slide-41
SLIDE 41

Clients don’t share the work verifying a signature. HTTPSEC tries to reduce client-side costs (and recomputation costs) through

  • f crypto primitive.

HTTPSEC crypto options: 640-bit RSA, original specs; 768-bit RSA, many docs; 1024-bit RSA, current signatures from VeriSign etc.; “10 to 40 times as slow for verification” but faster for signing. HTTPSEC made breakable choices such as 640-bit RSA for no reason other than fear of overload. HTTPSEC needed more options to survive the inevitable breaks; and even more complexity for reasons I’ll explain. More complexity ✮ more bugs, including security holes. Author of one very popular HTTP server: “The effort of implementing everything correctly is just staggering.” HTTPSEC How do requests without

slide-42
SLIDE 42

re the work signature. to reduce (and costs) through primitive. crypto options: riginal specs; many docs; current VeriSign etc.; times as slow for faster for signing. HTTPSEC made breakable choices such as 640-bit RSA for no reason other than fear of overload. HTTPSEC needed more options to survive the inevitable breaks; and even more complexity for reasons I’ll explain. More complexity ✮ more bugs, including security holes. Author of one very popular HTTP server: “The effort of implementing everything correctly is just staggering.” HTTPSEC confidentialit How do you encrypt requests and responses without per-client

slide-43
SLIDE 43

rk through

  • ptions:

ecs; etc.; slow for signing. HTTPSEC made breakable choices such as 640-bit RSA for no reason other than fear of overload. HTTPSEC needed more options to survive the inevitable breaks; and even more complexity for reasons I’ll explain. More complexity ✮ more bugs, including security holes. Author of one very popular HTTP server: “The effort of implementing everything correctly is just staggering.” HTTPSEC confidentiality How do you encrypt requests and responses without per-client crypto?

slide-44
SLIDE 44

HTTPSEC made breakable choices such as 640-bit RSA for no reason other than fear of overload. HTTPSEC needed more options to survive the inevitable breaks; and even more complexity for reasons I’ll explain. More complexity ✮ more bugs, including security holes. Author of one very popular HTTP server: “The effort of implementing everything correctly is just staggering.” HTTPSEC confidentiality How do you encrypt requests and responses without per-client crypto?

slide-45
SLIDE 45

HTTPSEC made breakable choices such as 640-bit RSA for no reason other than fear of overload. HTTPSEC needed more options to survive the inevitable breaks; and even more complexity for reasons I’ll explain. More complexity ✮ more bugs, including security holes. Author of one very popular HTTP server: “The effort of implementing everything correctly is just staggering.” HTTPSEC confidentiality How do you encrypt requests and responses without per-client crypto? Answer: You can’t, and HTTPSEC doesn’t even try. The HTTPSEC RFC says “Due to a deliberate design choice, HTTPSEC does not provide confidentiality.”

slide-46
SLIDE 46

HTTPSEC made breakable choices such as 640-bit RSA for no reason other than fear of overload. HTTPSEC needed more options to survive the inevitable breaks; and even more complexity for reasons I’ll explain. More complexity ✮ more bugs, including security holes. Author of one very popular HTTP server: “The effort of implementing everything correctly is just staggering.” HTTPSEC confidentiality How do you encrypt requests and responses without per-client crypto? Answer: You can’t, and HTTPSEC doesn’t even try. The HTTPSEC RFC says “Due to a deliberate design choice, HTTPSEC does not provide confidentiality.” This is very strange, but not the worst part of HTTPSEC.

slide-47
SLIDE 47

HTTPSEC made breakable choices such as 640-bit RSA reason other than

  • verload.

HTTPSEC needed more options survive the inevitable breaks; even more complexity sons I’ll explain. complexity ✮ more bugs, including security holes. r of one very popular server: “The effort of implementing everything correctly staggering.” HTTPSEC confidentiality How do you encrypt requests and responses without per-client crypto? Answer: You can’t, and HTTPSEC doesn’t even try. The HTTPSEC RFC says “Due to a deliberate design choice, HTTPSEC does not provide confidentiality.” This is very strange, but not the worst part of HTTPSEC. The HTTPSEC When nu.nl receives http://nu.nl/economie/ it looks fo /var/www/economie/index.html

  • n its local

An HTTPSEC http://nu.nl/economie/ index.html.httpsec-pgp Server admin index.html.httpsec-pgp with a signature

slide-48
SLIDE 48

made breakable 640-bit RSA

  • ther than

needed more options inevitable breaks; complexity explain. ✮ more bugs, y holes. very popular “The effort of everything correctly staggering.” HTTPSEC confidentiality How do you encrypt requests and responses without per-client crypto? Answer: You can’t, and HTTPSEC doesn’t even try. The HTTPSEC RFC says “Due to a deliberate design choice, HTTPSEC does not provide confidentiality.” This is very strange, but not the worst part of HTTPSEC. The HTTPSEC da When nu.nl HTTP receives a request http://nu.nl/economie/ it looks for a file /var/www/economie/index.html

  • n its local disk.

An HTTPSEC client http://nu.nl/economie/ index.html.httpsec-pgp Server admin has created index.html.httpsec-pgp with a signature of

slide-49
SLIDE 49

able RSA

  • ptions

reaks; ✮ bugs, r

  • f

correctly HTTPSEC confidentiality How do you encrypt requests and responses without per-client crypto? Answer: You can’t, and HTTPSEC doesn’t even try. The HTTPSEC RFC says “Due to a deliberate design choice, HTTPSEC does not provide confidentiality.” This is very strange, but not the worst part of HTTPSEC. The HTTPSEC data model When nu.nl HTTP server receives a request for http://nu.nl/economie/, it looks for a file /var/www/economie/index.html

  • n its local disk.

An HTTPSEC client also asks http://nu.nl/economie/ index.html.httpsec-pgp. Server admin has created index.html.httpsec-pgp with a signature of index.html

slide-50
SLIDE 50

HTTPSEC confidentiality How do you encrypt requests and responses without per-client crypto? Answer: You can’t, and HTTPSEC doesn’t even try. The HTTPSEC RFC says “Due to a deliberate design choice, HTTPSEC does not provide confidentiality.” This is very strange, but not the worst part of HTTPSEC. The HTTPSEC data model When nu.nl HTTP server receives a request for http://nu.nl/economie/, it looks for a file /var/www/economie/index.html

  • n its local disk.

An HTTPSEC client also asks for http://nu.nl/economie/ index.html.httpsec-pgp. Server admin has created index.html.httpsec-pgp with a signature of index.html.

slide-51
SLIDE 51

HTTPSEC confidentiality do you encrypt requests and responses without per-client crypto? er: You can’t, HTTPSEC doesn’t even try. HTTPSEC RFC says to a deliberate design choice, HTTPSEC does not rovide confidentiality.” very strange, but the worst part of HTTPSEC. The HTTPSEC data model When nu.nl HTTP server receives a request for http://nu.nl/economie/, it looks for a file /var/www/economie/index.html

  • n its local disk.

An HTTPSEC client also asks for http://nu.nl/economie/ index.html.httpsec-pgp. Server admin has created index.html.httpsec-pgp with a signature of index.html. There ar

  • f softwa

admins manage e.g., wiki-creation

slide-52
SLIDE 52

confidentiality encrypt responses er-client crypto? can’t, doesn’t even try. RFC says erate design HTTPSEC does not confidentiality.” strange, but rt of HTTPSEC. The HTTPSEC data model When nu.nl HTTP server receives a request for http://nu.nl/economie/, it looks for a file /var/www/economie/index.html

  • n its local disk.

An HTTPSEC client also asks for http://nu.nl/economie/ index.html.httpsec-pgp. Server admin has created index.html.httpsec-pgp with a signature of index.html. There are hundreds

  • f software tools to

admins manage web e.g., wiki-creation

slide-53
SLIDE 53

even try. design not HTTPSEC. The HTTPSEC data model When nu.nl HTTP server receives a request for http://nu.nl/economie/, it looks for a file /var/www/economie/index.html

  • n its local disk.

An HTTPSEC client also asks for http://nu.nl/economie/ index.html.httpsec-pgp. Server admin has created index.html.httpsec-pgp with a signature of index.html. There are hundreds (thousands?)

  • f software tools to help

admins manage web sites: e.g., wiki-creation tools.

slide-54
SLIDE 54

The HTTPSEC data model When nu.nl HTTP server receives a request for http://nu.nl/economie/, it looks for a file /var/www/economie/index.html

  • n its local disk.

An HTTPSEC client also asks for http://nu.nl/economie/ index.html.httpsec-pgp. Server admin has created index.html.httpsec-pgp with a signature of index.html. There are hundreds (thousands?)

  • f software tools to help

admins manage web sites: e.g., wiki-creation tools.

slide-55
SLIDE 55

The HTTPSEC data model When nu.nl HTTP server receives a request for http://nu.nl/economie/, it looks for a file /var/www/economie/index.html

  • n its local disk.

An HTTPSEC client also asks for http://nu.nl/economie/ index.html.httpsec-pgp. Server admin has created index.html.httpsec-pgp with a signature of index.html. There are hundreds (thousands?)

  • f software tools to help

admins manage web sites: e.g., wiki-creation tools. When these tools create index.html, do they also create index.html.httpsec-pgp?

slide-56
SLIDE 56

The HTTPSEC data model When nu.nl HTTP server receives a request for http://nu.nl/economie/, it looks for a file /var/www/economie/index.html

  • n its local disk.

An HTTPSEC client also asks for http://nu.nl/economie/ index.html.httpsec-pgp. Server admin has created index.html.httpsec-pgp with a signature of index.html. There are hundreds (thousands?)

  • f software tools to help

admins manage web sites: e.g., wiki-creation tools. When these tools create index.html, do they also create index.html.httpsec-pgp? What about dynamic data?

slide-57
SLIDE 57

The HTTPSEC data model When nu.nl HTTP server receives a request for http://nu.nl/economie/, it looks for a file /var/www/economie/index.html

  • n its local disk.

An HTTPSEC client also asks for http://nu.nl/economie/ index.html.httpsec-pgp. Server admin has created index.html.httpsec-pgp with a signature of index.html. There are hundreds (thousands?)

  • f software tools to help

admins manage web sites: e.g., wiki-creation tools. When these tools create index.html, do they also create index.html.httpsec-pgp? What about dynamic data? HTTPSEC purists say “Answers should always be static”.

slide-58
SLIDE 58

HTTPSEC data model nu.nl HTTP server receives a request for http://nu.nl/economie/,

  • ks for a file

/var/www/economie/index.html local disk. HTTPSEC client also asks for http://nu.nl/economie/ index.html.httpsec-pgp. admin has created index.html.httpsec-pgp signature of index.html. There are hundreds (thousands?)

  • f software tools to help

admins manage web sites: e.g., wiki-creation tools. When these tools create index.html, do they also create index.html.httpsec-pgp? What about dynamic data? HTTPSEC purists say “Answers should always be static”. What ab Are the signatures Can an attack

  • bsolete

If clocks then signatures include expiration But frequent is an administra HTTPSEC admin screws expire; every refuses to

slide-59
SLIDE 59

data model HTTP server request for http://nu.nl/economie/, /var/www/economie/index.html client also asks for http://nu.nl/economie/ index.html.httpsec-pgp. has created index.html.httpsec-pgp

  • f index.html.

There are hundreds (thousands?)

  • f software tools to help

admins manage web sites: e.g., wiki-creation tools. When these tools create index.html, do they also create index.html.httpsec-pgp? What about dynamic data? HTTPSEC purists say “Answers should always be static”. What about old data? Are the signatures Can an attacker repla

  • bsolete signed data?

If clocks are synchronized then signatures can include expiration But frequent re-signing is an administrativ HTTPSEC suicide: admin screws up; signatures expire; every HTTPSEC refuses to load the

slide-60
SLIDE 60

del server , /var/www/economie/index.html asks for . index.html. There are hundreds (thousands?)

  • f software tools to help

admins manage web sites: e.g., wiki-creation tools. When these tools create index.html, do they also create index.html.httpsec-pgp? What about dynamic data? HTTPSEC purists say “Answers should always be static”. What about old data? Are the signatures still valid? Can an attacker replay

  • bsolete signed data?

If clocks are synchronized then signatures can include expiration times. But frequent re-signing is an administrative disaster. HTTPSEC suicide: admin screws up; signatures expire; every HTTPSEC client refuses to load the page.

slide-61
SLIDE 61

There are hundreds (thousands?)

  • f software tools to help

admins manage web sites: e.g., wiki-creation tools. When these tools create index.html, do they also create index.html.httpsec-pgp? What about dynamic data? HTTPSEC purists say “Answers should always be static”. What about old data? Are the signatures still valid? Can an attacker replay

  • bsolete signed data?

If clocks are synchronized then signatures can include expiration times. But frequent re-signing is an administrative disaster. HTTPSEC suicide: admin screws up; signatures expire; every HTTPSEC client refuses to load the page.

slide-62
SLIDE 62

are hundreds (thousands?) ware tools to help admins manage web sites: wiki-creation tools. these tools create index.html, they also create index.html.httpsec-pgp? about dynamic data? HTTPSEC purists say “Answers always be static”. What about old data? Are the signatures still valid? Can an attacker replay

  • bsolete signed data?

If clocks are synchronized then signatures can include expiration times. But frequent re-signing is an administrative disaster. HTTPSEC suicide: admin screws up; signatures expire; every HTTPSEC client refuses to load the page. HTTPSEC 2010.09.02: 2010.10.07:

slide-63
SLIDE 63

hundreds (thousands?) to help web sites: wiki-creation tools.

  • ls create

create index.html.httpsec-pgp? dynamic data? purists say “Answers static”. What about old data? Are the signatures still valid? Can an attacker replay

  • bsolete signed data?

If clocks are synchronized then signatures can include expiration times. But frequent re-signing is an administrative disaster. HTTPSEC suicide: admin screws up; signatures expire; every HTTPSEC client refuses to load the page. HTTPSEC suicide 2010.09.02: US government. 2010.10.07: Belgian

slide-64
SLIDE 64

(thousands?) ? data? Answers What about old data? Are the signatures still valid? Can an attacker replay

  • bsolete signed data?

If clocks are synchronized then signatures can include expiration times. But frequent re-signing is an administrative disaster. HTTPSEC suicide: admin screws up; signatures expire; every HTTPSEC client refuses to load the page. HTTPSEC suicide examples: 2010.09.02: US government. 2010.10.07: Belgian government.

slide-65
SLIDE 65

What about old data? Are the signatures still valid? Can an attacker replay

  • bsolete signed data?

If clocks are synchronized then signatures can include expiration times. But frequent re-signing is an administrative disaster. HTTPSEC suicide: admin screws up; signatures expire; every HTTPSEC client refuses to load the page. HTTPSEC suicide examples: 2010.09.02: US government. 2010.10.07: Belgian government.

slide-66
SLIDE 66

What about old data? Are the signatures still valid? Can an attacker replay

  • bsolete signed data?

If clocks are synchronized then signatures can include expiration times. But frequent re-signing is an administrative disaster. HTTPSEC suicide: admin screws up; signatures expire; every HTTPSEC client refuses to load the page. HTTPSEC suicide examples: 2010.09.02: US government. 2010.10.07: Belgian government. 2012.02.23: httpsec-ref.org.

slide-67
SLIDE 67

What about old data? Are the signatures still valid? Can an attacker replay

  • bsolete signed data?

If clocks are synchronized then signatures can include expiration times. But frequent re-signing is an administrative disaster. HTTPSEC suicide: admin screws up; signatures expire; every HTTPSEC client refuses to load the page. HTTPSEC suicide examples: 2010.09.02: US government. 2010.10.07: Belgian government. 2012.02.23: httpsec-ref.org. 2012.02.28: “Last night I was unable to check the weather forecast, because the fine folks at NOAA.gov / weather.gov broke their HTTPSEC.”

slide-68
SLIDE 68

What about old data? Are the signatures still valid? Can an attacker replay

  • bsolete signed data?

If clocks are synchronized then signatures can include expiration times. But frequent re-signing is an administrative disaster. HTTPSEC suicide: admin screws up; signatures expire; every HTTPSEC client refuses to load the page. HTTPSEC suicide examples: 2010.09.02: US government. 2010.10.07: Belgian government. 2012.02.23: httpsec-ref.org. 2012.02.28: “Last night I was unable to check the weather forecast, because the fine folks at NOAA.gov / weather.gov broke their HTTPSEC.” 2012.02.28, HTTPSEC-REF tech-support rep: “httpsec- accept-expired yes”

slide-69
SLIDE 69

about old data? the signatures still valid? an attacker replay

  • bsolete signed data?

cks are synchronized signatures can include expiration times. frequent re-signing administrative disaster. HTTPSEC suicide: screws up; signatures expire; every HTTPSEC client refuses to load the page. HTTPSEC suicide examples: 2010.09.02: US government. 2010.10.07: Belgian government. 2012.02.23: httpsec-ref.org. 2012.02.28: “Last night I was unable to check the weather forecast, because the fine folks at NOAA.gov / weather.gov broke their HTTPSEC.” 2012.02.28, HTTPSEC-REF tech-support rep: “httpsec- accept-expired yes” What ab

slide-70
SLIDE 70

data? signatures still valid? replay data? synchronized can expiration times.

  • signing

tive disaster. suicide: up; signatures HTTPSEC client the page. HTTPSEC suicide examples: 2010.09.02: US government. 2010.10.07: Belgian government. 2012.02.23: httpsec-ref.org. 2012.02.28: “Last night I was unable to check the weather forecast, because the fine folks at NOAA.gov / weather.gov broke their HTTPSEC.” 2012.02.28, HTTPSEC-REF tech-support rep: “httpsec- accept-expired yes” What about nonexistent

slide-71
SLIDE 71

valid? disaster. signatures client HTTPSEC suicide examples: 2010.09.02: US government. 2010.10.07: Belgian government. 2012.02.23: httpsec-ref.org. 2012.02.28: “Last night I was unable to check the weather forecast, because the fine folks at NOAA.gov / weather.gov broke their HTTPSEC.” 2012.02.28, HTTPSEC-REF tech-support rep: “httpsec- accept-expired yes” What about nonexistent files?

slide-72
SLIDE 72

HTTPSEC suicide examples: 2010.09.02: US government. 2010.10.07: Belgian government. 2012.02.23: httpsec-ref.org. 2012.02.28: “Last night I was unable to check the weather forecast, because the fine folks at NOAA.gov / weather.gov broke their HTTPSEC.” 2012.02.28, HTTPSEC-REF tech-support rep: “httpsec- accept-expired yes” What about nonexistent files?

slide-73
SLIDE 73

HTTPSEC suicide examples: 2010.09.02: US government. 2010.10.07: Belgian government. 2012.02.23: httpsec-ref.org. 2012.02.28: “Last night I was unable to check the weather forecast, because the fine folks at NOAA.gov / weather.gov broke their HTTPSEC.” 2012.02.28, HTTPSEC-REF tech-support rep: “httpsec- accept-expired yes” What about nonexistent files? Does the server admin precompute PGP signatures on “aaaaa does not exist”, “aaaab does not exist”, etc.?

slide-74
SLIDE 74

HTTPSEC suicide examples: 2010.09.02: US government. 2010.10.07: Belgian government. 2012.02.23: httpsec-ref.org. 2012.02.28: “Last night I was unable to check the weather forecast, because the fine folks at NOAA.gov / weather.gov broke their HTTPSEC.” 2012.02.28, HTTPSEC-REF tech-support rep: “httpsec- accept-expired yes” What about nonexistent files? Does the server admin precompute PGP signatures on “aaaaa does not exist”, “aaaab does not exist”, etc.? Crazy! Obvious approach: “We sign each page that exists, and don’t sign anything else.”

slide-75
SLIDE 75

HTTPSEC suicide examples: 2010.09.02: US government. 2010.10.07: Belgian government. 2012.02.23: httpsec-ref.org. 2012.02.28: “Last night I was unable to check the weather forecast, because the fine folks at NOAA.gov / weather.gov broke their HTTPSEC.” 2012.02.28, HTTPSEC-REF tech-support rep: “httpsec- accept-expired yes” What about nonexistent files? Does the server admin precompute PGP signatures on “aaaaa does not exist”, “aaaab does not exist”, etc.? Crazy! Obvious approach: “We sign each page that exists, and don’t sign anything else.” User asks for nonexistent page. Receives unsigned answer saying the page doesn’t exist. Has no choice but to trust it.

slide-76
SLIDE 76

HTTPSEC suicide examples: 2010.09.02: US government. 2010.10.07: Belgian government. 2012.02.23: httpsec-ref.org. 2012.02.28: “Last night I unable to check the weather forecast, because fine folks at NOAA.gov weather.gov broke their HTTPSEC.” 2012.02.28, HTTPSEC-REF tech-support rep: “httpsec- accept-expired yes” What about nonexistent files? Does the server admin precompute PGP signatures on “aaaaa does not exist”, “aaaab does not exist”, etc.? Crazy! Obvious approach: “We sign each page that exists, and don’t sign anything else.” User asks for nonexistent page. Receives unsigned answer saying the page doesn’t exist. Has no choice but to trust it. User asks Receives a response saying the Has no choice Clearly a Sometimes This is not

slide-77
SLIDE 77

suicide examples: government. Belgian government. httpsec-ref.org. Last night I check the forecast, because at NOAA.gov broke their HTTPSEC-REF rep: “httpsec- yes” What about nonexistent files? Does the server admin precompute PGP signatures on “aaaaa does not exist”, “aaaab does not exist”, etc.? Crazy! Obvious approach: “We sign each page that exists, and don’t sign anything else.” User asks for nonexistent page. Receives unsigned answer saying the page doesn’t exist. Has no choice but to trust it. User asks for nu.nl/economie Receives unsigned a response forged b saying the page do Has no choice but Clearly a violation Sometimes a violation This is not a good

slide-78
SLIDE 78

examples: government. government. httpsec-ref.org. I because NOAA.gov their HTTPSEC-REF httpsec- What about nonexistent files? Does the server admin precompute PGP signatures on “aaaaa does not exist”, “aaaab does not exist”, etc.? Crazy! Obvious approach: “We sign each page that exists, and don’t sign anything else.” User asks for nonexistent page. Receives unsigned answer saying the page doesn’t exist. Has no choice but to trust it. User asks for nu.nl/economie Receives unsigned answer, a response forged by attacker, saying the page doesn’t exist. Has no choice but to trust it. Clearly a violation of availabilit Sometimes a violation of integrit This is not a good approach.

slide-79
SLIDE 79

What about nonexistent files? Does the server admin precompute PGP signatures on “aaaaa does not exist”, “aaaab does not exist”, etc.? Crazy! Obvious approach: “We sign each page that exists, and don’t sign anything else.” User asks for nonexistent page. Receives unsigned answer saying the page doesn’t exist. Has no choice but to trust it. User asks for nu.nl/economie. Receives unsigned answer, a response forged by attacker, saying the page doesn’t exist. Has no choice but to trust it. Clearly a violation of availability. Sometimes a violation of integrity. This is not a good approach.

slide-80
SLIDE 80

What about nonexistent files? Does the server admin precompute PGP signatures on “aaaaa does not exist”, “aaaab does not exist”, etc.? Crazy! Obvious approach: “We sign each page that exists, and don’t sign anything else.” User asks for nonexistent page. Receives unsigned answer saying the page doesn’t exist. Has no choice but to trust it. User asks for nu.nl/economie. Receives unsigned answer, a response forged by attacker, saying the page doesn’t exist. Has no choice but to trust it. Clearly a violation of availability. Sometimes a violation of integrity. This is not a good approach. Alternative: “NHTTPSEC”. e.g. clegg.com/nonex query returns “There are no pages between clegg.com/nick and clegg.com/start” + signature.

slide-81
SLIDE 81

about nonexistent files? the server admin recompute PGP signatures on does not exist”, does not exist”, etc.? Obvious approach: sign each page that exists, don’t sign anything else.” asks for nonexistent page. Receives unsigned answer the page doesn’t exist. choice but to trust it. User asks for nu.nl/economie. Receives unsigned answer, a response forged by attacker, saying the page doesn’t exist. Has no choice but to trust it. Clearly a violation of availability. Sometimes a violation of integrity. This is not a good approach. Alternative: “NHTTPSEC”. e.g. clegg.com/nonex query returns “There are no pages between clegg.com/nick and clegg.com/start” + signature. Try clegg.com/foo After several all clegg.com alan, alvis calendar jennifer wiki.

slide-82
SLIDE 82

nonexistent files? admin signatures on not exist”, not exist”, etc.? approach: page that exists, anything else.” nonexistent page. unsigned answer doesn’t exist. but to trust it. User asks for nu.nl/economie. Receives unsigned answer, a response forged by attacker, saying the page doesn’t exist. Has no choice but to trust it. Clearly a violation of availability. Sometimes a violation of integrity. This is not a good approach. Alternative: “NHTTPSEC”. e.g. clegg.com/nonex query returns “There are no pages between clegg.com/nick and clegg.com/start” + signature. Try clegg.com/foo After several queries all clegg.com names: alan, alvis, andrew calendar, home, imogene jennifer, mail, nick wiki.

slide-83
SLIDE 83

files? signatures on etc.? exists, else.” page. exist. it. User asks for nu.nl/economie. Receives unsigned answer, a response forged by attacker, saying the page doesn’t exist. Has no choice but to trust it. Clearly a violation of availability. Sometimes a violation of integrity. This is not a good approach. Alternative: “NHTTPSEC”. e.g. clegg.com/nonex query returns “There are no pages between clegg.com/nick and clegg.com/start” + signature. Try clegg.com/foo etc. After several queries have all clegg.com names: alan, alvis, andrew, brian calendar, home, imogene, jennifer, mail, nick, start wiki.

slide-84
SLIDE 84

User asks for nu.nl/economie. Receives unsigned answer, a response forged by attacker, saying the page doesn’t exist. Has no choice but to trust it. Clearly a violation of availability. Sometimes a violation of integrity. This is not a good approach. Alternative: “NHTTPSEC”. e.g. clegg.com/nonex query returns “There are no pages between clegg.com/nick and clegg.com/start” + signature. Try clegg.com/foo etc. After several queries have all clegg.com names: alan, alvis, andrew, brian, calendar, home, imogene, jennifer, mail, nick, start, wiki.

slide-85
SLIDE 85

User asks for nu.nl/economie. Receives unsigned answer, a response forged by attacker, saying the page doesn’t exist. Has no choice but to trust it. Clearly a violation of availability. Sometimes a violation of integrity. This is not a good approach. Alternative: “NHTTPSEC”. e.g. clegg.com/nonex query returns “There are no pages between clegg.com/nick and clegg.com/start” + signature. Try clegg.com/foo etc. After several queries have all clegg.com names: alan, alvis, andrew, brian, calendar, home, imogene, jennifer, mail, nick, start, wiki. The clegg.com administrator disabled HTTP directory indexing — but then leaked the same data by installing HTTPSEC with the default NHTTPSEC.

slide-86
SLIDE 86

asks for nu.nl/economie. Receives unsigned answer,

  • nse forged by attacker,

the page doesn’t exist. choice but to trust it. a violation of availability. Sometimes a violation of integrity. not a good approach. Alternative: “NHTTPSEC”. e.g. clegg.com/nonex query returns are no pages between clegg.com/nick and clegg.com/start” + signature. Try clegg.com/foo etc. After several queries have all clegg.com names: alan, alvis, andrew, brian, calendar, home, imogene, jennifer, mail, nick, start, wiki. The clegg.com administrator disabled HTTP directory indexing — but then leaked the same data by installing HTTPSEC with the default NHTTPSEC. Summary: all ♥ names

  • n an NHTTPS

(with signatures that there using ♥ HTTPSEC

slide-87
SLIDE 87

nu.nl/economie. unsigned answer, rged by attacker, doesn’t exist. but to trust it. violation of availability. violation of integrity.

  • d approach.

“NHTTPSEC”. e.g. clegg.com/nonex query returns pages between and clegg.com/start” + signature. Try clegg.com/foo etc. After several queries have all clegg.com names: alan, alvis, andrew, brian, calendar, home, imogene, jennifer, mail, nick, start, wiki. The clegg.com administrator disabled HTTP directory indexing — but then leaked the same data by installing HTTPSEC with the default NHTTPSEC. Summary: Attacker all ♥ names of pages

  • n an NHTTPSEC

(with signatures gua that there are no mo using ♥ HTTPSEC

slide-88
SLIDE 88

nu.nl/economie. attacker, exist. it. availability. integrity. roach. “NHTTPSEC”. e.g. returns between signature. Try clegg.com/foo etc. After several queries have all clegg.com names: alan, alvis, andrew, brian, calendar, home, imogene, jennifer, mail, nick, start, wiki. The clegg.com administrator disabled HTTP directory indexing — but then leaked the same data by installing HTTPSEC with the default NHTTPSEC. Summary: Attacker learns all ♥ names of pages

  • n an NHTTPSEC server

(with signatures guaranteeing that there are no more) using ♥ HTTPSEC queries.

slide-89
SLIDE 89

Try clegg.com/foo etc. After several queries have all clegg.com names: alan, alvis, andrew, brian, calendar, home, imogene, jennifer, mail, nick, start, wiki. The clegg.com administrator disabled HTTP directory indexing — but then leaked the same data by installing HTTPSEC with the default NHTTPSEC. Summary: Attacker learns all ♥ names of pages

  • n an NHTTPSEC server

(with signatures guaranteeing that there are no more) using ♥ HTTPSEC queries.

slide-90
SLIDE 90

Try clegg.com/foo etc. After several queries have all clegg.com names: alan, alvis, andrew, brian, calendar, home, imogene, jennifer, mail, nick, start, wiki. The clegg.com administrator disabled HTTP directory indexing — but then leaked the same data by installing HTTPSEC with the default NHTTPSEC. Summary: Attacker learns all ♥ names of pages

  • n an NHTTPSEC server

(with signatures guaranteeing that there are no more) using ♥ HTTPSEC queries. This is not a good approach.

slide-91
SLIDE 91

Try clegg.com/foo etc. After several queries have all clegg.com names: alan, alvis, andrew, brian, calendar, home, imogene, jennifer, mail, nick, start, wiki. The clegg.com administrator disabled HTTP directory indexing — but then leaked the same data by installing HTTPSEC with the default NHTTPSEC. Summary: Attacker learns all ♥ names of pages

  • n an NHTTPSEC server

(with signatures guaranteeing that there are no more) using ♥ HTTPSEC queries. This is not a good approach. HTTPSEC purists disagree: “It is part of the design philosophy of the Web that the data in it is public.” But this notion is so extreme that it became an HTTPSEC public-relations problem.

slide-92
SLIDE 92

clegg.com/foo etc. several queries have clegg.com names: alvis, andrew, brian, calendar, home, imogene, jennifer, mail, nick, start, clegg.com administrator disabled HTTP directory indexing then leaked the same data talling HTTPSEC the default NHTTPSEC. Summary: Attacker learns all ♥ names of pages

  • n an NHTTPSEC server

(with signatures guaranteeing that there are no more) using ♥ HTTPSEC queries. This is not a good approach. HTTPSEC purists disagree: “It is part of the design philosophy of the Web that the data in it is public.” But this notion is so extreme that it became an HTTPSEC public-relations problem. New HTTPSEC

  • 1. “NHTTPSEC3”

Use a “one-w such as (iterated Reveal hashes instead of “There hashes ✿ ✿ ✿ ✿ ✿ ✿

slide-93
SLIDE 93

clegg.com/foo etc. queries have names: andrew, brian, , imogene, , nick, start, administrator directory indexing ed the same data HTTPSEC NHTTPSEC. Summary: Attacker learns all ♥ names of pages

  • n an NHTTPSEC server

(with signatures guaranteeing that there are no more) using ♥ HTTPSEC queries. This is not a good approach. HTTPSEC purists disagree: “It is part of the design philosophy of the Web that the data in it is public.” But this notion is so extreme that it became an HTTPSEC public-relations problem. New HTTPSEC app

  • 1. “NHTTPSEC3”

Use a “one-way hash such as (iterated salted) Reveal hashes of names instead of revealing “There are no names hashes between ✿ ✿ ✿ ✿ ✿ ✿

slide-94
SLIDE 94

brian, , start, administrator indexing same data NHTTPSEC. Summary: Attacker learns all ♥ names of pages

  • n an NHTTPSEC server

(with signatures guaranteeing that there are no more) using ♥ HTTPSEC queries. This is not a good approach. HTTPSEC purists disagree: “It is part of the design philosophy of the Web that the data in it is public.” But this notion is so extreme that it became an HTTPSEC public-relations problem. New HTTPSEC approach:

  • 1. “NHTTPSEC3” technology:

Use a “one-way hash function” such as (iterated salted) SHA-1. Reveal hashes of names instead of revealing names. “There are no names with hashes between ✿ ✿ ✿ and ✿ ✿ ✿

slide-95
SLIDE 95

Summary: Attacker learns all ♥ names of pages

  • n an NHTTPSEC server

(with signatures guaranteeing that there are no more) using ♥ HTTPSEC queries. This is not a good approach. HTTPSEC purists disagree: “It is part of the design philosophy of the Web that the data in it is public.” But this notion is so extreme that it became an HTTPSEC public-relations problem. New HTTPSEC approach:

  • 1. “NHTTPSEC3” technology:

Use a “one-way hash function” such as (iterated salted) SHA-1. Reveal hashes of names instead of revealing names. “There are no names with hashes between ✿ ✿ ✿ and ✿ ✿ ✿ ”

slide-96
SLIDE 96

Summary: Attacker learns all ♥ names of pages

  • n an NHTTPSEC server

(with signatures guaranteeing that there are no more) using ♥ HTTPSEC queries. This is not a good approach. HTTPSEC purists disagree: “It is part of the design philosophy of the Web that the data in it is public.” But this notion is so extreme that it became an HTTPSEC public-relations problem. New HTTPSEC approach:

  • 1. “NHTTPSEC3” technology:

Use a “one-way hash function” such as (iterated salted) SHA-1. Reveal hashes of names instead of revealing names. “There are no names with hashes between ✿ ✿ ✿ and ✿ ✿ ✿ ”

  • 2. Marketing:

Pretend that NHTTPSEC3 is less damaging than NSEC. “NHTTPSEC3 does not allow enumeration of the site.”

slide-97
SLIDE 97

Summary: Attacker learns ♥ names of pages NHTTPSEC server signatures guaranteeing there are no more) ♥ HTTPSEC queries. not a good approach. HTTPSEC purists disagree: part of the design philosophy of the Web the data in it is public.” this notion is so extreme became an HTTPSEC public-relations problem. New HTTPSEC approach:

  • 1. “NHTTPSEC3” technology:

Use a “one-way hash function” such as (iterated salted) SHA-1. Reveal hashes of names instead of revealing names. “There are no names with hashes between ✿ ✿ ✿ and ✿ ✿ ✿ ”

  • 2. Marketing:

Pretend that NHTTPSEC3 is less damaging than NSEC. “NHTTPSEC3 does not allow enumeration of the site.” Reality: by abusing computes for many quickly discovers (and kno

slide-98
SLIDE 98

ttacker learns ♥ pages EC server guaranteeing no more) ♥ HTTPSEC queries.

  • d approach.

purists disagree: design e Web it is public.” is so extreme an HTTPSEC problem. New HTTPSEC approach:

  • 1. “NHTTPSEC3” technology:

Use a “one-way hash function” such as (iterated salted) SHA-1. Reveal hashes of names instead of revealing names. “There are no names with hashes between ✿ ✿ ✿ and ✿ ✿ ✿ ”

  • 2. Marketing:

Pretend that NHTTPSEC3 is less damaging than NSEC. “NHTTPSEC3 does not allow enumeration of the site.” Reality: Attacker grabs by abusing NHTTPSEC3; computes the same for many different quickly discovers almost (and knows # missing

slide-99
SLIDE 99

♥ ranteeing ♥ queries. roach. e: public.” xtreme HTTPSEC New HTTPSEC approach:

  • 1. “NHTTPSEC3” technology:

Use a “one-way hash function” such as (iterated salted) SHA-1. Reveal hashes of names instead of revealing names. “There are no names with hashes between ✿ ✿ ✿ and ✿ ✿ ✿ ”

  • 2. Marketing:

Pretend that NHTTPSEC3 is less damaging than NSEC. “NHTTPSEC3 does not allow enumeration of the site.” Reality: Attacker grabs the hashes by abusing NHTTPSEC3; computes the same hash function for many different name guess quickly discovers almost all names (and knows # missing name

slide-100
SLIDE 100

New HTTPSEC approach:

  • 1. “NHTTPSEC3” technology:

Use a “one-way hash function” such as (iterated salted) SHA-1. Reveal hashes of names instead of revealing names. “There are no names with hashes between ✿ ✿ ✿ and ✿ ✿ ✿ ”

  • 2. Marketing:

Pretend that NHTTPSEC3 is less damaging than NSEC. “NHTTPSEC3 does not allow enumeration of the site.” Reality: Attacker grabs the hashes by abusing NHTTPSEC3; computes the same hash function for many different name guesses; quickly discovers almost all names (and knows # missing names).

slide-101
SLIDE 101

New HTTPSEC approach:

  • 1. “NHTTPSEC3” technology:

Use a “one-way hash function” such as (iterated salted) SHA-1. Reveal hashes of names instead of revealing names. “There are no names with hashes between ✿ ✿ ✿ and ✿ ✿ ✿ ”

  • 2. Marketing:

Pretend that NHTTPSEC3 is less damaging than NSEC. “NHTTPSEC3 does not allow enumeration of the site.” Reality: Attacker grabs the hashes by abusing NHTTPSEC3; computes the same hash function for many different name guesses; quickly discovers almost all names (and knows # missing names). HTTPSEC purists: “You could have sent all the same guesses as queries to the server.”

slide-102
SLIDE 102

New HTTPSEC approach:

  • 1. “NHTTPSEC3” technology:

Use a “one-way hash function” such as (iterated salted) SHA-1. Reveal hashes of names instead of revealing names. “There are no names with hashes between ✿ ✿ ✿ and ✿ ✿ ✿ ”

  • 2. Marketing:

Pretend that NHTTPSEC3 is less damaging than NSEC. “NHTTPSEC3 does not allow enumeration of the site.” Reality: Attacker grabs the hashes by abusing NHTTPSEC3; computes the same hash function for many different name guesses; quickly discovers almost all names (and knows # missing names). HTTPSEC purists: “You could have sent all the same guesses as queries to the server.” 4Mbps flood of queries is under 5000 noisy guesses/sec. NHTTPSEC3 allows typical attackers 10000000 to 10000000000 silent guesses/sec.

slide-103
SLIDE 103

HTTPSEC approach: “NHTTPSEC3” technology: “one-way hash function” as (iterated salted) SHA-1. Reveal hashes of names

  • f revealing names.

are no names with between ✿ ✿ ✿ and ✿ ✿ ✿ ” rketing: Pretend that NHTTPSEC3 is damaging than NSEC. NHTTPSEC3 does not allow enumeration of the site.” Reality: Attacker grabs the hashes by abusing NHTTPSEC3; computes the same hash function for many different name guesses; quickly discovers almost all names (and knows # missing names). HTTPSEC purists: “You could have sent all the same guesses as queries to the server.” 4Mbps flood of queries is under 5000 noisy guesses/sec. NHTTPSEC3 allows typical attackers 10000000 to 10000000000 silent guesses/sec. Another Each HTTPSEC is another Often your

  • f keys from

Could be HTTPSEC by accepting and sending through Much low

slide-104
SLIDE 104

approach: “NHTTPSEC3” technology: hash function” salted) SHA-1.

  • f names

revealing names. names with ✿ ✿ ✿ and ✿ ✿ ✿ ” NHTTPSEC3 is than NSEC. does not allow the site.” Reality: Attacker grabs the hashes by abusing NHTTPSEC3; computes the same hash function for many different name guesses; quickly discovers almost all names (and knows # missing names). HTTPSEC purists: “You could have sent all the same guesses as queries to the server.” 4Mbps flood of queries is under 5000 noisy guesses/sec. NHTTPSEC3 allows typical attackers 10000000 to 10000000000 silent guesses/sec. Another HTTPSEC Each HTTPSEC k is another file to retrieve. Often your browser

  • f keys from several

Could be a serious HTTPSEC speeds by accepting requests and sending responses through UDP pack Much lower overhead

slide-105
SLIDE 105

roach: technology: function” SHA-1. names. with ✿ ✿ ✿ ✿ ✿ ✿ ” NHTTPSEC3 is NSEC. allow Reality: Attacker grabs the hashes by abusing NHTTPSEC3; computes the same hash function for many different name guesses; quickly discovers almost all names (and knows # missing names). HTTPSEC purists: “You could have sent all the same guesses as queries to the server.” 4Mbps flood of queries is under 5000 noisy guesses/sec. NHTTPSEC3 allows typical attackers 10000000 to 10000000000 silent guesses/sec. Another HTTPSEC optimization Each HTTPSEC key/signature is another file to retrieve. Often your browser needs a chain

  • f keys from several servers.

Could be a serious slowdown. HTTPSEC speeds this up by accepting requests and sending responses through UDP packets. Much lower overhead than TCP

slide-106
SLIDE 106

Reality: Attacker grabs the hashes by abusing NHTTPSEC3; computes the same hash function for many different name guesses; quickly discovers almost all names (and knows # missing names). HTTPSEC purists: “You could have sent all the same guesses as queries to the server.” 4Mbps flood of queries is under 5000 noisy guesses/sec. NHTTPSEC3 allows typical attackers 10000000 to 10000000000 silent guesses/sec. Another HTTPSEC optimization Each HTTPSEC key/signature is another file to retrieve. Often your browser needs a chain

  • f keys from several servers.

Could be a serious slowdown. HTTPSEC speeds this up by accepting requests and sending responses through UDP packets. Much lower overhead than TCP.

slide-107
SLIDE 107

y: Attacker grabs the hashes using NHTTPSEC3; computes the same hash function any different name guesses; quickly discovers almost all names knows # missing names). HTTPSEC purists: “You could sent all the same guesses queries to the server.” flood of queries is 5000 noisy guesses/sec. NHTTPSEC3 allows typical ers 10000000 to 10000000000 silent guesses/sec. Another HTTPSEC optimization Each HTTPSEC key/signature is another file to retrieve. Often your browser needs a chain

  • f keys from several servers.

Could be a serious slowdown. HTTPSEC speeds this up by accepting requests and sending responses through UDP packets. Much lower overhead than TCP. The bad HTTPSEC much, much, than HTTPSEC Attacker UDP request victim’s to many The HTTPSEC blast the much larger taking victim

slide-108
SLIDE 108

er grabs the hashes NHTTPSEC3; same hash function different name guesses; almost all names missing names). purists: “You could same guesses server.” queries is noisy guesses/sec. allows typical 10000000 to silent guesses/sec. Another HTTPSEC optimization Each HTTPSEC key/signature is another file to retrieve. Often your browser needs a chain

  • f keys from several servers.

Could be a serious slowdown. HTTPSEC speeds this up by accepting requests and sending responses through UDP packets. Much lower overhead than TCP. The bad news: HTTPSEC responses much, much, much than HTTPSEC reques Attacker forges many UDP request packets victim’s IP address to many HTTPSEC The HTTPSEC servers blast the victim with much larger volume taking victim off the

slide-109
SLIDE 109

the hashes function guesses; all names names). could guesses guesses/sec. ypical guesses/sec. Another HTTPSEC optimization Each HTTPSEC key/signature is another file to retrieve. Often your browser needs a chain

  • f keys from several servers.

Could be a serious slowdown. HTTPSEC speeds this up by accepting requests and sending responses through UDP packets. Much lower overhead than TCP. The bad news: HTTPSEC responses are much, much, much larger than HTTPSEC requests. Attacker forges many UDP request packets from victim’s IP address to many HTTPSEC servers. The HTTPSEC servers blast the victim with much larger volume of data, taking victim off the Internet.

slide-110
SLIDE 110

Another HTTPSEC optimization Each HTTPSEC key/signature is another file to retrieve. Often your browser needs a chain

  • f keys from several servers.

Could be a serious slowdown. HTTPSEC speeds this up by accepting requests and sending responses through UDP packets. Much lower overhead than TCP. The bad news: HTTPSEC responses are much, much, much larger than HTTPSEC requests. Attacker forges many UDP request packets from victim’s IP address to many HTTPSEC servers. The HTTPSEC servers blast the victim with much larger volume of data, taking victim off the Internet.

slide-111
SLIDE 111

Another HTTPSEC optimization HTTPSEC key/signature another file to retrieve. your browser needs a chain eys from several servers. be a serious slowdown. HTTPSEC speeds this up accepting requests sending responses through UDP packets. lower overhead than TCP. The bad news: HTTPSEC responses are much, much, much larger than HTTPSEC requests. Attacker forges many UDP request packets from victim’s IP address to many HTTPSEC servers. The HTTPSEC servers blast the victim with much larger volume of data, taking victim off the Internet. The RFC provides against denial

slide-112
SLIDE 112

HTTPSEC optimization key/signature retrieve. wser needs a chain several servers. serious slowdown. eeds this up requests

  • nses

ckets.

  • verhead than TCP.

The bad news: HTTPSEC responses are much, much, much larger than HTTPSEC requests. Attacker forges many UDP request packets from victim’s IP address to many HTTPSEC servers. The HTTPSEC servers blast the victim with much larger volume of data, taking victim off the Internet. The RFC says “HT provides no protection against denial of service

slide-113
SLIDE 113

ization ey/signature a chain servers. wn. TCP. The bad news: HTTPSEC responses are much, much, much larger than HTTPSEC requests. Attacker forges many UDP request packets from victim’s IP address to many HTTPSEC servers. The HTTPSEC servers blast the victim with much larger volume of data, taking victim off the Internet. The RFC says “HTTPSEC provides no protection against denial of service attacks.”

slide-114
SLIDE 114

The bad news: HTTPSEC responses are much, much, much larger than HTTPSEC requests. Attacker forges many UDP request packets from victim’s IP address to many HTTPSEC servers. The HTTPSEC servers blast the victim with much larger volume of data, taking victim off the Internet. The RFC says “HTTPSEC provides no protection against denial of service attacks.”

slide-115
SLIDE 115

The bad news: HTTPSEC responses are much, much, much larger than HTTPSEC requests. Attacker forges many UDP request packets from victim’s IP address to many HTTPSEC servers. The HTTPSEC servers blast the victim with much larger volume of data, taking victim off the Internet. The RFC says “HTTPSEC provides no protection against denial of service attacks.” The RFC doesn’t say “HTTPSEC is a pool of remote-controlled attack drones, the worst DDoS amplifier

  • n the Internet.”
slide-116
SLIDE 116

The bad news: HTTPSEC responses are much, much, much larger than HTTPSEC requests. Attacker forges many UDP request packets from victim’s IP address to many HTTPSEC servers. The HTTPSEC servers blast the victim with much larger volume of data, taking victim off the Internet. The RFC says “HTTPSEC provides no protection against denial of service attacks.” The RFC doesn’t say “HTTPSEC is a pool of remote-controlled attack drones, the worst DDoS amplifier

  • n the Internet.”

Exericse: investigate

  • ther types of DoS attacks.

e.g. HTTPSEC advertising says zero server-CPU-time cost. How much server CPU time can attackers actually consume?

slide-117
SLIDE 117

bad news: HTTPSEC responses are much, much larger HTTPSEC requests. er forges many request packets from victim’s IP address many HTTPSEC servers. HTTPSEC servers the victim with larger volume of data, victim off the Internet. The RFC says “HTTPSEC provides no protection against denial of service attacks.” The RFC doesn’t say “HTTPSEC is a pool of remote-controlled attack drones, the worst DDoS amplifier

  • n the Internet.”

Exericse: investigate

  • ther types of DoS attacks.

e.g. HTTPSEC advertising says zero server-CPU-time cost. How much server CPU time can attackers actually consume? The worst

slide-118
SLIDE 118
  • nses are

much larger requests. many packets from address HTTPSEC servers. servers with volume of data, the Internet. The RFC says “HTTPSEC provides no protection against denial of service attacks.” The RFC doesn’t say “HTTPSEC is a pool of remote-controlled attack drones, the worst DDoS amplifier

  • n the Internet.”

Exericse: investigate

  • ther types of DoS attacks.

e.g. HTTPSEC advertising says zero server-CPU-time cost. How much server CPU time can attackers actually consume? The worst part of

slide-119
SLIDE 119

servers. data, Internet. The RFC says “HTTPSEC provides no protection against denial of service attacks.” The RFC doesn’t say “HTTPSEC is a pool of remote-controlled attack drones, the worst DDoS amplifier

  • n the Internet.”

Exericse: investigate

  • ther types of DoS attacks.

e.g. HTTPSEC advertising says zero server-CPU-time cost. How much server CPU time can attackers actually consume? The worst part of HTTPSEC

slide-120
SLIDE 120

The RFC says “HTTPSEC provides no protection against denial of service attacks.” The RFC doesn’t say “HTTPSEC is a pool of remote-controlled attack drones, the worst DDoS amplifier

  • n the Internet.”

Exericse: investigate

  • ther types of DoS attacks.

e.g. HTTPSEC advertising says zero server-CPU-time cost. How much server CPU time can attackers actually consume? The worst part of HTTPSEC

slide-121
SLIDE 121

The RFC says “HTTPSEC provides no protection against denial of service attacks.” The RFC doesn’t say “HTTPSEC is a pool of remote-controlled attack drones, the worst DDoS amplifier

  • n the Internet.”

Exericse: investigate

  • ther types of DoS attacks.

e.g. HTTPSEC advertising says zero server-CPU-time cost. How much server CPU time can attackers actually consume? The worst part of HTTPSEC The data signed by HTTPSEC doesn’t actually include the web pages that the browser shows to the user.

slide-122
SLIDE 122

The RFC says “HTTPSEC provides no protection against denial of service attacks.” The RFC doesn’t say “HTTPSEC is a pool of remote-controlled attack drones, the worst DDoS amplifier

  • n the Internet.”

Exericse: investigate

  • ther types of DoS attacks.

e.g. HTTPSEC advertising says zero server-CPU-time cost. How much server CPU time can attackers actually consume? The worst part of HTTPSEC The data signed by HTTPSEC doesn’t actually include the web pages that the browser shows to the user. HTTPSEC signs only routing information: specifically, 30x HTTP redirects.

slide-123
SLIDE 123

The RFC says “HTTPSEC provides no protection against denial of service attacks.” The RFC doesn’t say “HTTPSEC is a pool of remote-controlled attack drones, the worst DDoS amplifier

  • n the Internet.”

Exericse: investigate

  • ther types of DoS attacks.

e.g. HTTPSEC advertising says zero server-CPU-time cost. How much server CPU time can attackers actually consume? The worst part of HTTPSEC The data signed by HTTPSEC doesn’t actually include the web pages that the browser shows to the user. HTTPSEC signs only routing information: specifically, 30x HTTP redirects. The HTTPSEC excuse for this: signing redirects is simpler than signing the final web page.

slide-124
SLIDE 124

RFC says “HTTPSEC rovides no protection against denial of service attacks.” RFC doesn’t say “HTTPSEC is a pool of remote-controlled attack drones, rst DDoS amplifier Internet.” Exericse: investigate types of DoS attacks. HTTPSEC advertising says server-CPU-time cost. much server CPU time attackers actually consume? The worst part of HTTPSEC The data signed by HTTPSEC doesn’t actually include the web pages that the browser shows to the user. HTTPSEC signs only routing information: specifically, 30x HTTP redirects. The HTTPSEC excuse for this: signing redirects is simpler than signing the final web page.

$ telnet Trying 173.194.66.102... Connected Escape character GET / HTTP/1.1 Host: google.com HTTP/1.1 Location: ...

HTTPSEC

  • n the “

✦ www.google.com

slide-125
SLIDE 125

“HTTPSEC rotection service attacks.” esn’t say pool of remote-controlled attack drones, amplifier investigate DoS attacks. advertising says server-CPU-time cost. server CPU time actually consume? The worst part of HTTPSEC The data signed by HTTPSEC doesn’t actually include the web pages that the browser shows to the user. HTTPSEC signs only routing information: specifically, 30x HTTP redirects. The HTTPSEC excuse for this: signing redirects is simpler than signing the final web page.

$ telnet google.com Trying 173.194.66.102... Connected to google.com. Escape character GET / HTTP/1.1 Host: google.com HTTP/1.1 301 Moved Location: http://www.google.com/ ...

HTTPSEC allows

  • n the “google.com ✦

www.google.com”

slide-126
SLIDE 126

attacks.” drones, attacks. advertising says cost. time consume? The worst part of HTTPSEC The data signed by HTTPSEC doesn’t actually include the web pages that the browser shows to the user. HTTPSEC signs only routing information: specifically, 30x HTTP redirects. The HTTPSEC excuse for this: signing redirects is simpler than signing the final web page.

$ telnet google.com 80 Trying 173.194.66.102... Connected to google.com. Escape character is ’^]’. GET / HTTP/1.1 Host: google.com HTTP/1.1 301 Moved Permanently Location: http://www.google.com/ ...

HTTPSEC allows a signature

  • n the “google.com ✦

www.google.com” redirect.

slide-127
SLIDE 127

The worst part of HTTPSEC The data signed by HTTPSEC doesn’t actually include the web pages that the browser shows to the user. HTTPSEC signs only routing information: specifically, 30x HTTP redirects. The HTTPSEC excuse for this: signing redirects is simpler than signing the final web page.

$ telnet google.com 80 Trying 173.194.66.102... Connected to google.com. Escape character is ’^]’. GET / HTTP/1.1 Host: google.com HTTP/1.1 301 Moved Permanently Location: http://www.google.com/ ...

HTTPSEC allows a signature

  • n the “google.com ✦

www.google.com” redirect.

slide-128
SLIDE 128
  • rst part of HTTPSEC

data signed by HTTPSEC esn’t actually include eb pages that rowser shows to the user. HTTPSEC signs only routing information: ecifically, 30x HTTP redirects. HTTPSEC excuse for this: redirects simpler than the final web page.

$ telnet google.com 80 Trying 173.194.66.102... Connected to google.com. Escape character is ’^]’. GET / HTTP/1.1 Host: google.com HTTP/1.1 301 Moved Permanently Location: http://www.google.com/ ...

HTTPSEC allows a signature

  • n the “google.com ✦

www.google.com” redirect.

$ telnet Trying 173.194.67.104... Connected Escape character GET / HTTP/1.1 Host: www.google.com HTTP/1.1 Location: ...

HTTPSEC

  • n the “

✦ www.google.nl

slide-129
SLIDE 129
  • f HTTPSEC

by HTTPSEC include that ws to the user.

  • nly

rmation: HTTP redirects. excuse for this: web page.

$ telnet google.com 80 Trying 173.194.66.102... Connected to google.com. Escape character is ’^]’. GET / HTTP/1.1 Host: google.com HTTP/1.1 301 Moved Permanently Location: http://www.google.com/ ...

HTTPSEC allows a signature

  • n the “google.com ✦

www.google.com” redirect.

$ telnet www.google.com Trying 173.194.67.104... Connected to www.google.com. Escape character GET / HTTP/1.1 Host: www.google.com HTTP/1.1 302 Found Location: http://www.google.nl/ ...

HTTPSEC allows

  • n the “www.google.com ✦

www.google.nl”

slide-130
SLIDE 130

HTTPSEC HTTPSEC user. redirects. this: page.

$ telnet google.com 80 Trying 173.194.66.102... Connected to google.com. Escape character is ’^]’. GET / HTTP/1.1 Host: google.com HTTP/1.1 301 Moved Permanently Location: http://www.google.com/ ...

HTTPSEC allows a signature

  • n the “google.com ✦

www.google.com” redirect.

$ telnet www.google.com 80 Trying 173.194.67.104... Connected to www.google.com. Escape character is ’^]’. GET / HTTP/1.1 Host: www.google.com HTTP/1.1 302 Found Location: http://www.google.nl/ ...

HTTPSEC allows a signature

  • n the “www.google.com ✦

www.google.nl” redirect.

slide-131
SLIDE 131

$ telnet google.com 80 Trying 173.194.66.102... Connected to google.com. Escape character is ’^]’. GET / HTTP/1.1 Host: google.com HTTP/1.1 301 Moved Permanently Location: http://www.google.com/ ...

HTTPSEC allows a signature

  • n the “google.com ✦

www.google.com” redirect.

$ telnet www.google.com 80 Trying 173.194.67.104... Connected to www.google.com. Escape character is ’^]’. GET / HTTP/1.1 Host: www.google.com HTTP/1.1 302 Found Location: http://www.google.nl/ ...

HTTPSEC allows a signature

  • n the “www.google.com ✦

www.google.nl” redirect.

slide-132
SLIDE 132

telnet google.com 80 173.194.66.102... Connected to google.com. character is ’^]’. HTTP/1.1 google.com HTTP/1.1 301 Moved Permanently Location: http://www.google.com/

HTTPSEC allows a signature “google.com ✦ www.google.com” redirect.

$ telnet www.google.com 80 Trying 173.194.67.104... Connected to www.google.com. Escape character is ’^]’. GET / HTTP/1.1 Host: www.google.com HTTP/1.1 302 Found Location: http://www.google.nl/ ...

HTTPSEC allows a signature

  • n the “www.google.com ✦

www.google.nl” redirect.

$ telnet Trying 173.194.66.94... Connected Escape character GET / HTTP/1.1 Host: www.google.nl HTTP/1.1 ...

The resp Google w HTTPSEC HTTPSEC

slide-133
SLIDE 133

google.com 80 173.194.66.102... google.com. is ’^]’. Moved Permanently http://www.google.com/

ws a signature google.com ✦ ” redirect.

$ telnet www.google.com 80 Trying 173.194.67.104... Connected to www.google.com. Escape character is ’^]’. GET / HTTP/1.1 Host: www.google.com HTTP/1.1 302 Found Location: http://www.google.nl/ ...

HTTPSEC allows a signature

  • n the “www.google.com ✦

www.google.nl” redirect.

$ telnet www.google.nl Trying 173.194.66.94... Connected to www.google.nl. Escape character GET / HTTP/1.1 Host: www.google.nl HTTP/1.1 200 OK ...

The response contains Google web page. HTTPSEC does not HTTPSEC signs only

slide-134
SLIDE 134

’^]’. Permanently http://www.google.com/

signature ✦ redirect.

$ telnet www.google.com 80 Trying 173.194.67.104... Connected to www.google.com. Escape character is ’^]’. GET / HTTP/1.1 Host: www.google.com HTTP/1.1 302 Found Location: http://www.google.nl/ ...

HTTPSEC allows a signature

  • n the “www.google.com ✦

www.google.nl” redirect.

$ telnet www.google.nl 80 Trying 173.194.66.94... Connected to www.google.nl. Escape character is ’^]’. GET / HTTP/1.1 Host: www.google.nl HTTP/1.1 200 OK ...

The response contains the actual Google web page. HTTPSEC does not sign this HTTPSEC signs only redirects.

slide-135
SLIDE 135

$ telnet www.google.com 80 Trying 173.194.67.104... Connected to www.google.com. Escape character is ’^]’. GET / HTTP/1.1 Host: www.google.com HTTP/1.1 302 Found Location: http://www.google.nl/ ...

HTTPSEC allows a signature

  • n the “www.google.com ✦

www.google.nl” redirect.

$ telnet www.google.nl 80 Trying 173.194.66.94... Connected to www.google.nl. Escape character is ’^]’. GET / HTTP/1.1 Host: www.google.nl HTTP/1.1 200 OK ...

The response contains the actual Google web page. HTTPSEC does not sign this. HTTPSEC signs only redirects.

slide-136
SLIDE 136

telnet www.google.com 80 173.194.67.104... Connected to www.google.com. character is ’^]’. HTTP/1.1 www.google.com HTTP/1.1 302 Found Location: http://www.google.nl/

HTTPSEC allows a signature “www.google.com ✦ www.google.nl” redirect.

$ telnet www.google.nl 80 Trying 173.194.66.94... Connected to www.google.nl. Escape character is ’^]’. GET / HTTP/1.1 Host: www.google.nl HTTP/1.1 200 OK ...

The response contains the actual Google web page. HTTPSEC does not sign this. HTTPSEC signs only redirects. “You ma and you’re

slide-137
SLIDE 137

www.google.com 80 173.194.67.104... www.google.com. is ’^]’. www.google.com Found http://www.google.nl/

ws a signature www.google.com ✦ ” redirect.

$ telnet www.google.nl 80 Trying 173.194.66.94... Connected to www.google.nl. Escape character is ’^]’. GET / HTTP/1.1 Host: www.google.nl HTTP/1.1 200 OK ...

The response contains the actual Google web page. HTTPSEC does not sign this. HTTPSEC signs only redirects. “You may say this and you’re not the

slide-138
SLIDE 138

80 www.google.com. ’^]’. http://www.google.nl/

signature ✦ redirect.

$ telnet www.google.nl 80 Trying 173.194.66.94... Connected to www.google.nl. Escape character is ’^]’. GET / HTTP/1.1 Host: www.google.nl HTTP/1.1 200 OK ...

The response contains the actual Google web page. HTTPSEC does not sign this. HTTPSEC signs only redirects. “You may say this is stupid, and you’re not the only one.”

slide-139
SLIDE 139

$ telnet www.google.nl 80 Trying 173.194.66.94... Connected to www.google.nl. Escape character is ’^]’. GET / HTTP/1.1 Host: www.google.nl HTTP/1.1 200 OK ...

The response contains the actual Google web page. HTTPSEC does not sign this. HTTPSEC signs only redirects. “You may say this is stupid, and you’re not the only one.”

slide-140
SLIDE 140

$ telnet www.google.nl 80 Trying 173.194.66.94... Connected to www.google.nl. Escape character is ’^]’. GET / HTTP/1.1 Host: www.google.nl HTTP/1.1 200 OK ...

The response contains the actual Google web page. HTTPSEC does not sign this. HTTPSEC signs only redirects. “You may say this is stupid, and you’re not the only one.” If final web page isn’t signed, what is the security benefit of signing the redirects? Attacker simply forges the page.

slide-141
SLIDE 141

$ telnet www.google.nl 80 Trying 173.194.66.94... Connected to www.google.nl. Escape character is ’^]’. GET / HTTP/1.1 Host: www.google.nl HTTP/1.1 200 OK ...

The response contains the actual Google web page. HTTPSEC does not sign this. HTTPSEC signs only redirects. “You may say this is stupid, and you’re not the only one.” If final web page isn’t signed, what is the security benefit of signing the redirects? Attacker simply forges the page. If final web page is signed, what is the security benefit of signing the redirects? Attacker can’t forge the page.

slide-142
SLIDE 142

$ telnet www.google.nl 80 Trying 173.194.66.94... Connected to www.google.nl. Escape character is ’^]’. GET / HTTP/1.1 Host: www.google.nl HTTP/1.1 200 OK ...

The response contains the actual Google web page. HTTPSEC does not sign this. HTTPSEC signs only redirects. “You may say this is stupid, and you’re not the only one.” If final web page isn’t signed, what is the security benefit of signing the redirects? Attacker simply forges the page. If final web page is signed, what is the security benefit of signing the redirects? Attacker can’t forge the page. Redirects can benefit from availability and confidentiality, but HTTPSEC doesn’t provide availability and confidentiality.

slide-143
SLIDE 143

telnet www.google.nl 80 173.194.66.94... Connected to www.google.nl. character is ’^]’. HTTP/1.1 www.google.nl HTTP/1.1 200 OK

response contains the actual

  • gle web page.

HTTPSEC does not sign this. HTTPSEC signs only redirects. “You may say this is stupid, and you’re not the only one.” If final web page isn’t signed, what is the security benefit of signing the redirects? Attacker simply forges the page. If final web page is signed, what is the security benefit of signing the redirects? Attacker can’t forge the page. Redirects can benefit from availability and confidentiality, but HTTPSEC doesn’t provide availability and confidentiality. HTTPSEC After yea ❃100 people, tens of millions regulations from government direct pa please install

slide-144
SLIDE 144

www.google.nl 80 173.194.66.94... www.google.nl. is ’^]’. www.google.nl

  • ntains the actual

page. not sign this.

  • nly redirects.

“You may say this is stupid, and you’re not the only one.” If final web page isn’t signed, what is the security benefit of signing the redirects? Attacker simply forges the page. If final web page is signed, what is the security benefit of signing the redirects? Attacker can’t forge the page. Redirects can benefit from availability and confidentiality, but HTTPSEC doesn’t provide availability and confidentiality. HTTPSEC vs. HTTPS After years of development ❃100 people, grants tens of millions of regulations requiring from government agencies, direct payments to please install HTTPSEC:

slide-145
SLIDE 145

80 www.google.nl. ’^]’.

actual this. redirects. “You may say this is stupid, and you’re not the only one.” If final web page isn’t signed, what is the security benefit of signing the redirects? Attacker simply forges the page. If final web page is signed, what is the security benefit of signing the redirects? Attacker can’t forge the page. Redirects can benefit from availability and confidentiality, but HTTPSEC doesn’t provide availability and confidentiality. HTTPSEC vs. HTTPS After years of development b ❃100 people, grants totalling tens of millions of EUR, U.S. regulations requiring HTTPSEC from government agencies, and direct payments to admins to please install HTTPSEC:

slide-146
SLIDE 146

“You may say this is stupid, and you’re not the only one.” If final web page isn’t signed, what is the security benefit of signing the redirects? Attacker simply forges the page. If final web page is signed, what is the security benefit of signing the redirects? Attacker can’t forge the page. Redirects can benefit from availability and confidentiality, but HTTPSEC doesn’t provide availability and confidentiality. HTTPSEC vs. HTTPS After years of development by ❃100 people, grants totalling tens of millions of EUR, U.S. regulations requiring HTTPSEC from government agencies, and direct payments to admins to please install HTTPSEC:

slide-147
SLIDE 147

“You may say this is stupid, and you’re not the only one.” If final web page isn’t signed, what is the security benefit of signing the redirects? Attacker simply forges the page. If final web page is signed, what is the security benefit of signing the redirects? Attacker can’t forge the page. Redirects can benefit from availability and confidentiality, but HTTPSEC doesn’t provide availability and confidentiality. HTTPSEC vs. HTTPS After years of development by ❃100 people, grants totalling tens of millions of EUR, U.S. regulations requiring HTTPSEC from government agencies, and direct payments to admins to please install HTTPSEC: HTTPSEC is running on a few thousand Internet servers. Network World, 2013.01.29: “HTTPSEC adoption stalls

  • utside of federal government”
slide-148
SLIDE 148

may say this is stupid,

  • u’re not the only one.”

final web page isn’t signed, is the security benefit of the redirects? er simply forges the page. final web page is signed, is the security benefit of the redirects? er can’t forge the page. Redirects can benefit from availability and confidentiality, HTTPSEC doesn’t provide availability and confidentiality. HTTPSEC vs. HTTPS After years of development by ❃100 people, grants totalling tens of millions of EUR, U.S. regulations requiring HTTPSEC from government agencies, and direct payments to admins to please install HTTPSEC: HTTPSEC is running on a few thousand Internet servers. Network World, 2013.01.29: “HTTPSEC adoption stalls

  • utside of federal government”

There’s comp HTTPS and confidentialit for the complete HTTPS web tools HTTPS doesn’t have with nonexistent tries to avoid isn’t a huge

slide-149
SLIDE 149

this is stupid, the only one.” isn’t signed, security benefit of redirects? forges the page. is signed, security benefit of redirects? forge the page. enefit from confidentiality,

  • esn’t provide

confidentiality. HTTPSEC vs. HTTPS After years of development by ❃100 people, grants totalling tens of millions of EUR, U.S. regulations requiring HTTPSEC from government agencies, and direct payments to admins to please install HTTPSEC: HTTPSEC is running on a few thousand Internet servers. Network World, 2013.01.29: “HTTPSEC adoption stalls

  • utside of federal government”

There’s competition: HTTPS aims for integrit and confidentiality for the complete w HTTPS works with web tools and dynamic HTTPS doesn’t allo doesn’t have any p with nonexistent files; tries to avoid leaking isn’t a huge DDoS

slide-150
SLIDE 150

stupid,

  • ne.”

signed, enefit of page. signed, enefit of page. confidentiality, rovide confidentiality. HTTPSEC vs. HTTPS After years of development by ❃100 people, grants totalling tens of millions of EUR, U.S. regulations requiring HTTPSEC from government agencies, and direct payments to admins to please install HTTPSEC: HTTPSEC is running on a few thousand Internet servers. Network World, 2013.01.29: “HTTPSEC adoption stalls

  • utside of federal government”

There’s competition: HTTPS! HTTPS aims for integrity and confidentiality for the complete web pages. HTTPS works with existing web tools and dynamic data. HTTPS doesn’t allow replays; doesn’t have any problems with nonexistent files; tries to avoid leaking data; isn’t a huge DDoS amplifier.

slide-151
SLIDE 151

HTTPSEC vs. HTTPS After years of development by ❃100 people, grants totalling tens of millions of EUR, U.S. regulations requiring HTTPSEC from government agencies, and direct payments to admins to please install HTTPSEC: HTTPSEC is running on a few thousand Internet servers. Network World, 2013.01.29: “HTTPSEC adoption stalls

  • utside of federal government”

There’s competition: HTTPS! HTTPS aims for integrity and confidentiality for the complete web pages. HTTPS works with existing web tools and dynamic data. HTTPS doesn’t allow replays; doesn’t have any problems with nonexistent files; tries to avoid leaking data; isn’t a huge DDoS amplifier.

slide-152
SLIDE 152

HTTPSEC vs. HTTPS years of development by ❃ people, grants totalling

  • f millions of EUR, U.S.

regulations requiring HTTPSEC government agencies, and payments to admins to install HTTPSEC: HTTPSEC is running on a few thousand Internet servers. rk World, 2013.01.29: “HTTPSEC adoption stalls

  • utside of federal government”

There’s competition: HTTPS! HTTPS aims for integrity and confidentiality for the complete web pages. HTTPS works with existing web tools and dynamic data. HTTPS doesn’t allow replays; doesn’t have any problems with nonexistent files; tries to avoid leaking data; isn’t a huge DDoS amplifier. What the say about “HTTPS to be const

slide-153
SLIDE 153

HTTPS development by ❃ grants totalling

  • f EUR, U.S.

requiring HTTPSEC government agencies, and to admins to HTTPSEC: running on a few Internet servers. 2013.01.29: adoption stalls federal government” There’s competition: HTTPS! HTTPS aims for integrity and confidentiality for the complete web pages. HTTPS works with existing web tools and dynamic data. HTTPS doesn’t allow replays; doesn’t have any problems with nonexistent files; tries to avoid leaking data; isn’t a huge DDoS amplifier. What the HTTPSEC say about HTTPS: “HTTPS requires to be constantly online.”

slide-154
SLIDE 154

development by ❃ totalling U.S. HTTPSEC agencies, and to few 2013.01.29: stalls government” There’s competition: HTTPS! HTTPS aims for integrity and confidentiality for the complete web pages. HTTPS works with existing web tools and dynamic data. HTTPS doesn’t allow replays; doesn’t have any problems with nonexistent files; tries to avoid leaking data; isn’t a huge DDoS amplifier. What the HTTPSEC proponents say about HTTPS: “HTTPS requires keys to be constantly online.”

slide-155
SLIDE 155

There’s competition: HTTPS! HTTPS aims for integrity and confidentiality for the complete web pages. HTTPS works with existing web tools and dynamic data. HTTPS doesn’t allow replays; doesn’t have any problems with nonexistent files; tries to avoid leaking data; isn’t a huge DDoS amplifier. What the HTTPSEC proponents say about HTTPS: “HTTPS requires keys to be constantly online.”

slide-156
SLIDE 156

There’s competition: HTTPS! HTTPS aims for integrity and confidentiality for the complete web pages. HTTPS works with existing web tools and dynamic data. HTTPS doesn’t allow replays; doesn’t have any problems with nonexistent files; tries to avoid leaking data; isn’t a huge DDoS amplifier. What the HTTPSEC proponents say about HTTPS: “HTTPS requires keys to be constantly online.” Yes, it does; so what?

slide-157
SLIDE 157

There’s competition: HTTPS! HTTPS aims for integrity and confidentiality for the complete web pages. HTTPS works with existing web tools and dynamic data. HTTPS doesn’t allow replays; doesn’t have any problems with nonexistent files; tries to avoid leaking data; isn’t a huge DDoS amplifier. What the HTTPSEC proponents say about HTTPS: “HTTPS requires keys to be constantly online.” Yes, it does; so what? “HTTPS requires servers to use per-query crypto.”

slide-158
SLIDE 158

There’s competition: HTTPS! HTTPS aims for integrity and confidentiality for the complete web pages. HTTPS works with existing web tools and dynamic data. HTTPS doesn’t allow replays; doesn’t have any problems with nonexistent files; tries to avoid leaking data; isn’t a huge DDoS amplifier. What the HTTPSEC proponents say about HTTPS: “HTTPS requires keys to be constantly online.” Yes, it does; so what? “HTTPS requires servers to use per-query crypto.” Yes, it does; so what?

slide-159
SLIDE 159

There’s competition: HTTPS! HTTPS aims for integrity and confidentiality for the complete web pages. HTTPS works with existing web tools and dynamic data. HTTPS doesn’t allow replays; doesn’t have any problems with nonexistent files; tries to avoid leaking data; isn’t a huge DDoS amplifier. What the HTTPSEC proponents say about HTTPS: “HTTPS requires keys to be constantly online.” Yes, it does; so what? “HTTPS requires servers to use per-query crypto.” Yes, it does; so what? “HTTPS protects only the channel, not the data. It doesn’t provide end-to-end security.”

slide-160
SLIDE 160

There’s competition: HTTPS! HTTPS aims for integrity and confidentiality for the complete web pages. HTTPS works with existing web tools and dynamic data. HTTPS doesn’t allow replays; doesn’t have any problems with nonexistent files; tries to avoid leaking data; isn’t a huge DDoS amplifier. What the HTTPSEC proponents say about HTTPS: “HTTPS requires keys to be constantly online.” Yes, it does; so what? “HTTPS requires servers to use per-query crypto.” Yes, it does; so what? “HTTPS protects only the channel, not the data. It doesn’t provide end-to-end security.” Huh? What does this mean?

slide-161
SLIDE 161

There’s competition: HTTPS! HTTPS aims for integrity confidentiality complete web pages. HTTPS works with existing

  • ls and dynamic data.

HTTPS doesn’t allow replays; esn’t have any problems nonexistent files; to avoid leaking data; huge DDoS amplifier. What the HTTPSEC proponents say about HTTPS: “HTTPS requires keys to be constantly online.” Yes, it does; so what? “HTTPS requires servers to use per-query crypto.” Yes, it does; so what? “HTTPS protects only the channel, not the data. It doesn’t provide end-to-end security.” Huh? What does this mean? “If the site signed data laptop to which gives which verifies then the HTTPS

slide-162
SLIDE 162

etition: HTTPS! r integrity confidentiality web pages. with existing dynamic data. allow replays; any problems files; leaking data; DDoS amplifier. What the HTTPSEC proponents say about HTTPS: “HTTPS requires keys to be constantly online.” Yes, it does; so what? “HTTPS requires servers to use per-query crypto.” Yes, it does; so what? “HTTPS protects only the channel, not the data. It doesn’t provide end-to-end security.” Huh? What does this mean? “If the site owner copies signed data from his laptop to an untrusted which gives it to y which verifies the signed then the server can’t HTTPS lets the server

slide-163
SLIDE 163

HTTPS! pages. existing data. replays; data; amplifier. What the HTTPSEC proponents say about HTTPS: “HTTPS requires keys to be constantly online.” Yes, it does; so what? “HTTPS requires servers to use per-query crypto.” Yes, it does; so what? “HTTPS protects only the channel, not the data. It doesn’t provide end-to-end security.” Huh? What does this mean? “If the site owner copies PGP- signed data from his trusted laptop to an untrusted server, which gives it to your browser, which verifies the signed data, then the server can’t change HTTPS lets the server change

slide-164
SLIDE 164

What the HTTPSEC proponents say about HTTPS: “HTTPS requires keys to be constantly online.” Yes, it does; so what? “HTTPS requires servers to use per-query crypto.” Yes, it does; so what? “HTTPS protects only the channel, not the data. It doesn’t provide end-to-end security.” Huh? What does this mean? “If the site owner copies PGP- signed data from his trusted laptop to an untrusted server, which gives it to your browser, which verifies the signed data, then the server can’t change it. HTTPS lets the server change it.”

slide-165
SLIDE 165

What the HTTPSEC proponents say about HTTPS: “HTTPS requires keys to be constantly online.” Yes, it does; so what? “HTTPS requires servers to use per-query crypto.” Yes, it does; so what? “HTTPS protects only the channel, not the data. It doesn’t provide end-to-end security.” Huh? What does this mean? “If the site owner copies PGP- signed data from his trusted laptop to an untrusted server, which gives it to your browser, which verifies the signed data, then the server can’t change it. HTTPS lets the server change it.” Yes, of course, but why is the site owner putting his data on an untrusted server?

slide-166
SLIDE 166

What the HTTPSEC proponents say about HTTPS: “HTTPS requires keys to be constantly online.” Yes, it does; so what? “HTTPS requires servers to use per-query crypto.” Yes, it does; so what? “HTTPS protects only the channel, not the data. It doesn’t provide end-to-end security.” Huh? What does this mean? “If the site owner copies PGP- signed data from his trusted laptop to an untrusted server, which gives it to your browser, which verifies the signed data, then the server can’t change it. HTTPS lets the server change it.” Yes, of course, but why is the site owner putting his data on an untrusted server? “HTTPS destroys the caching

  • layer. This Matters.”
slide-167
SLIDE 167

What the HTTPSEC proponents say about HTTPS: “HTTPS requires keys to be constantly online.” Yes, it does; so what? “HTTPS requires servers to use per-query crypto.” Yes, it does; so what? “HTTPS protects only the channel, not the data. It doesn’t provide end-to-end security.” Huh? What does this mean? “If the site owner copies PGP- signed data from his trusted laptop to an untrusted server, which gives it to your browser, which verifies the signed data, then the server can’t change it. HTTPS lets the server change it.” Yes, of course, but why is the site owner putting his data on an untrusted server? “HTTPS destroys the caching

  • layer. This Matters.”

Yeah, sure it does. Film at 11: Internet Destroyed By HTTPS.

slide-168
SLIDE 168

the HTTPSEC proponents

  • ut HTTPS:

“HTTPS requires keys constantly online.” does; so what? “HTTPS requires servers per-query crypto.” does; so what? “HTTPS protects only the channel, not the data. It doesn’t rovide end-to-end security.” What does this mean? “If the site owner copies PGP- signed data from his trusted laptop to an untrusted server, which gives it to your browser, which verifies the signed data, then the server can’t change it. HTTPS lets the server change it.” Yes, of course, but why is the site owner putting his data on an untrusted server? “HTTPS destroys the caching

  • layer. This Matters.”

Yeah, sure it does. Film at 11: Internet Destroyed By HTTPS. The DNS I’ve been data sent including google.com ✦ www.google.com ✦ www.google.nl www.google.nl But there many mo Domain

slide-169
SLIDE 169

HTTPSEC proponents HTTPS: requires keys

  • nline.”

what? requires servers crypto.” what? ts only the

  • data. It doesn’t

end-to-end security.” es this mean? “If the site owner copies PGP- signed data from his trusted laptop to an untrusted server, which gives it to your browser, which verifies the signed data, then the server can’t change it. HTTPS lets the server change it.” Yes, of course, but why is the site owner putting his data on an untrusted server? “HTTPS destroys the caching

  • layer. This Matters.”

Yeah, sure it does. Film at 11: Internet Destroyed By HTTPS. The DNS security I’ve been describing data sent to your b including two HTTP google.com ✦ www.google.com www.google.com ✦ www.google.nl www.google.nl w But there are actually many more redirection Domain Name System

slide-170
SLIDE 170
  • nents

doesn’t y.” mean? “If the site owner copies PGP- signed data from his trusted laptop to an untrusted server, which gives it to your browser, which verifies the signed data, then the server can’t change it. HTTPS lets the server change it.” Yes, of course, but why is the site owner putting his data on an untrusted server? “HTTPS destroys the caching

  • layer. This Matters.”

Yeah, sure it does. Film at 11: Internet Destroyed By HTTPS. The DNS security mess I’ve been describing data sent to your browser, including two HTTP redirects: google.com ✦ www.google.com www.google.com ✦ www.google.nl www.google.nl web page But there are actually many more redirection steps: Domain Name System lookups.

slide-171
SLIDE 171

“If the site owner copies PGP- signed data from his trusted laptop to an untrusted server, which gives it to your browser, which verifies the signed data, then the server can’t change it. HTTPS lets the server change it.” Yes, of course, but why is the site owner putting his data on an untrusted server? “HTTPS destroys the caching

  • layer. This Matters.”

Yeah, sure it does. Film at 11: Internet Destroyed By HTTPS. The DNS security mess I’ve been describing data sent to your browser, including two HTTP redirects: google.com ✦ www.google.com www.google.com ✦ www.google.nl www.google.nl web page But there are actually many more redirection steps: Domain Name System lookups.

slide-172
SLIDE 172

site owner copies PGP- data from his trusted to an untrusted server, gives it to your browser, verifies the signed data, the server can’t change it. HTTPS lets the server change it.”

  • f course, but why is the

wner putting his data on untrusted server? “HTTPS destroys the caching This Matters.” sure it does. Film at 11: Internet Destroyed By HTTPS. The DNS security mess I’ve been describing data sent to your browser, including two HTTP redirects: google.com ✦ www.google.com www.google.com ✦ www.google.nl www.google.nl web page But there are actually many more redirection steps: Domain Name System lookups. com NS google.com google.com google.com ✦ www.google.com 173.194.66.99 www.google.com ✦ www.google.nl nl NS 192.5.4.1 google.nl www.google.nl www.google.nl

slide-173
SLIDE 173

wner copies PGP- his trusted untrusted server, your browser, the signed data, can’t change it. server change it.” but why is the putting his data on server? ys the caching Matters.”

  • es. Film at 11:

ed By HTTPS. The DNS security mess I’ve been describing data sent to your browser, including two HTTP redirects: google.com ✦ www.google.com www.google.com ✦ www.google.nl www.google.nl web page But there are actually many more redirection steps: Domain Name System lookups. com NS 192.5.6.30 google.com NS 216.239.34.10 google.com A 74.125.136.100 google.com ✦ www.google.com www.google.com 173.194.66.99 www.google.com ✦ www.google.nl nl NS 192.5.4.1 google.nl NS 216.239.34.10 www.google.nl A www.google.nl w

slide-174
SLIDE 174

PGP- trusted server, wser, data, change it. change it.” the data on caching at 11: TPS. The DNS security mess I’ve been describing data sent to your browser, including two HTTP redirects: google.com ✦ www.google.com www.google.com ✦ www.google.nl www.google.nl web page But there are actually many more redirection steps: Domain Name System lookups. com NS 192.5.6.30 google.com NS 216.239.34.10 google.com A 74.125.136.100 google.com ✦ www.google.com www.google.com A 173.194.66.99 www.google.com ✦ www.google.nl nl NS 192.5.4.1 google.nl NS 216.239.34.10 www.google.nl A 74.125.132.94 www.google.nl web page

slide-175
SLIDE 175

The DNS security mess I’ve been describing data sent to your browser, including two HTTP redirects: google.com ✦ www.google.com www.google.com ✦ www.google.nl www.google.nl web page But there are actually many more redirection steps: Domain Name System lookups. com NS 192.5.6.30 google.com NS 216.239.34.10 google.com A 74.125.136.100 google.com ✦ www.google.com www.google.com A 173.194.66.99 www.google.com ✦ www.google.nl nl NS 192.5.4.1 google.nl NS 216.239.34.10 www.google.nl A 74.125.132.94 www.google.nl web page

slide-176
SLIDE 176

DNS security mess een describing sent to your browser, including two HTTP redirects: google.com ✦ www.google.com www.google.com ✦ www.google.nl www.google.nl web page there are actually more redirection steps: Domain Name System lookups. com NS 192.5.6.30 google.com NS 216.239.34.10 google.com A 74.125.136.100 google.com ✦ www.google.com www.google.com A 173.194.66.99 www.google.com ✦ www.google.nl nl NS 192.5.4.1 google.nl NS 216.239.34.10 www.google.nl A 74.125.132.94 www.google.nl web page DNSSEC in very much HTTPSEC All the p are shared including almost all cryptographically

slide-177
SLIDE 177

security mess ing

  • ur browser,

HTTP redirects: ✦ www.google.com ✦ web page actually redirection steps: System lookups. com NS 192.5.6.30 google.com NS 216.239.34.10 google.com A 74.125.136.100 google.com ✦ www.google.com www.google.com A 173.194.66.99 www.google.com ✦ www.google.nl nl NS 192.5.4.1 google.nl NS 216.239.34.10 www.google.nl A 74.125.132.94 www.google.nl web page DNSSEC signs DNS in very much the same HTTPSEC signs HTTP All the problems of are shared by DNSS including lack of deplo almost all DNS pack cryptographically unp

slide-178
SLIDE 178

redirects: ✦ www.google.com ✦ steps:

  • kups.

com NS 192.5.6.30 google.com NS 216.239.34.10 google.com A 74.125.136.100 google.com ✦ www.google.com www.google.com A 173.194.66.99 www.google.com ✦ www.google.nl nl NS 192.5.4.1 google.nl NS 216.239.34.10 www.google.nl A 74.125.132.94 www.google.nl web page DNSSEC signs DNS redirects in very much the same way that HTTPSEC signs HTTP redirects. All the problems of HTTPSEC are shared by DNSSEC, including lack of deployment: almost all DNS packets are cryptographically unprotected.

slide-179
SLIDE 179

com NS 192.5.6.30 google.com NS 216.239.34.10 google.com A 74.125.136.100 google.com ✦ www.google.com www.google.com A 173.194.66.99 www.google.com ✦ www.google.nl nl NS 192.5.4.1 google.nl NS 216.239.34.10 www.google.nl A 74.125.132.94 www.google.nl web page DNSSEC signs DNS redirects in very much the same way that HTTPSEC signs HTTP redirects. All the problems of HTTPSEC are shared by DNSSEC, including lack of deployment: almost all DNS packets are cryptographically unprotected.

slide-180
SLIDE 180

com NS 192.5.6.30 google.com NS 216.239.34.10 google.com A 74.125.136.100 google.com ✦ www.google.com www.google.com A 173.194.66.99 www.google.com ✦ www.google.nl nl NS 192.5.4.1 google.nl NS 216.239.34.10 www.google.nl A 74.125.132.94 www.google.nl web page DNSSEC signs DNS redirects in very much the same way that HTTPSEC signs HTTP redirects. All the problems of HTTPSEC are shared by DNSSEC, including lack of deployment: almost all DNS packets are cryptographically unprotected. Actually, HTTPSEC is an imaginary imitation of DNSSEC, not a real proposal. But DNSSEC is a real proposal, and has all of these problems.