Server Authentication on the Past, Present, and Future Internet
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Certified Malware: Measuring Breaches of Trust in the Windows Code-Signing PKI
Certified Malware: Measuring Breaches of Trust in the Windows Code-Signing PKI Doowon Kim Bum Jun Kwon Tudor Dumitras, University of Maryland University of Maryland University of Maryland College Park, MD College Park, MD College Park, MD [email protected] [email protected] [email protected] ABSTRACT To establish trust in third-party software, we currently rely on Digitally signed malware can bypass system protection mechanisms the code-signing Public Key Infrastructure (PKI). This infrastruc- that install or launch only programs with valid signatures. It can ture includes Certification Authorities (CAs) that issue certificates also evade anti-virus programs, which often forego scanning signed to software publishers, vouching for their identity. Publishers use binaries. Known from advanced threats such as Stuxnet and Flame, these certificates to sign the software they release, and users rely this type of abuse has not been measured systematically in the on these signatures to decide which software packages to trust broader malware landscape. In particular, the methods, effective- (rather than maintaining a list of trusted packages). If adversaries ness window, and security implications of code-signing PKI abuse can compromise code signing certificates, this has severe impli- are not well understood. We propose a threat model that highlights cations for end-host security. Signed malware can bypass system three types of weaknesses in the code-signing PKI. We overcome protection mechanisms that install or launch only programs with challenges specific to code-signing measurements by introducing valid signatures, and it can evade anti-virus programs, which often techniques for prioritizing the collection of code-signing certificates neglect to scan signed binaries. -
Introduction to Cryptography
Mag. iur. Dr. techn. Michael Sonntag Introduction to Cryptography Institute of Networks and Security Johannes Kepler University Linz, Austria E-Mail: [email protected] Thanks to Rudolf Hörmanseder for some slides (esp. drawings!) Why cryptography? Security is a very important aspect, especially if money (or equivalents) are affected by transactions Not every information should be available to everyone Note: Data is sent in the Internet over numerous "open systems", where anyone can listen it! Security is needed! The technical aspect of security is cryptography Encrypting data against disclosure and modifications Signing data against modifications and repudiation Note: Cryptography does not solve all security problems! Example: Communication analysis (who talks to whom when) Other aspects of security are also needed » E.g.: Do you know what your employees actually do with data? Solutions: DRM, deactivation codes, anonymizers, … Michael Sonntag Introduction to Cryptography 2 Application areas Storing data in encrypted form Even access will not lead to disclosure (stolen laptops!) Example: File/-system encryption, password storage Transmitting data securely Enc. transmission prevents eavesdropping and tampering Example: TLS Identifying your partner Preventing man-in-the-middle attacks Example: TLS with uni-/bidirectional certificates Proof of identity & authority Avoiding impersonation Example: GPG E-Mail signatures, digital signatures (Austria: "Bürgerkarte“ – “citizen card”) Michael Sonntag Introduction to -
NATIONAL ARBITRATION FORUM DECISION Imageshack Corp. V
NATIONAL ARBITRATION FORUM DECISION ImageShack Corp. v. RegisterFly.com-Ref#17592297 c/o Whois Protection Services- ProtectFly.com Claim Number: FA0505000473833 PARTIES Complainant is ImageShack Corp. (“Complainant”). Respondent is Steven Baxt (“Respondent”), represented by John Berryhill, of Dann, Dorfman, Herrell, and Skillman P.C., 1601 Market Street, Suite 2400, Philadelphia, PA 19103. REGISTRAR AND DISPUTED DOMAIN NAME The domain name at issue is <imageshack.com>, registered with Enom, Inc. PANEL The undersigned certify that they have acted independently and impartially and to the best of their knowledge have no known conflict in serving as Panelists in this proceeding. Jeffrey M. Samuels, Chair Honorable Nelson A. Diaz Peter L. Michaelson PROCEDURAL HISTORY Complainant submitted a Complaint to the National Arbitration Forum electronically on May 9, 2005; the National Arbitration Forum received a hard copy of the Complaint on May 16, 2005. On May 10, 2005, Enom, Inc. confirmed by e-mail to the National Arbitration Forum that the domain name <imageshack.com> is registered with Enom, Inc. and that the Respondent is the current registrant of the name. Enom, Inc. has verified that Respondent is bound by the Enom, Inc. registration agreement and has thereby agreed to resolve domain-name disputes brought by third parties in accordance with ICANN’s Uniform Domain Name Dispute Resolution Policy (the “Policy”). On May 24, 2005, a Notification of Complaint and Commencement of Administrative Proceeding (the “Commencement Notification”), setting a deadline of June 13, 2004, by which Respondent could file a Response to the Complaint, was transmitted to Respondent via e-mail, post and fax, to all entities and persons listed on Respondent’s registration as technical, administrative and billing contacts, and to [email protected] by e-mail. -
The Arbitration of Celebrity Domain Name Disputes
1 - 1 - THE ARBITRATION OF CELEBRITY DOMAIN NAME DISPUTES BY THE HONOURABLE NEIL BROWN QC 1 The Problem You would think that celebrities, being what they are, would be keen to register their names as domain names, set up their own websites and use the websites to promote themselves. Some do, but others seem to have been slow off the mark, only to find that someone else has got up earlier and in effect stolen their name, registered it as a domain name and used the domain name to set up an unauthorized website. Of course, it can be worse than that: the domain name is sometimes linked directly to a pornography website or used as a bait to attract internet users who are then switched to a website selling anything form Viagra to Pacific cruises 2. This, of course, can give the celebrity a bad name or even a worse name than he or she had previously. Or he or she could just be made a figure of fun: see for instance the unfortunate events recounted in David Pecker v. Mr. Ferris , WIPO Case No. D2006-1514. Mr. David Pecker, apart from having an interesting surname, is Chairman and CEO of American Media, Inc (AMI) the publisher of several prominent lifestyle magazines. One can readily understand Mr. Pecker’s concern about not only having his name used as domain name without his permission, but more particularly about its being linked to a pornography site and hence linked in the public mind with pornography itself. It actually became worse in Mr. -
Blockchain-Based Certificate Transparency and Revocation
Blockchain-based Certificate Transparency and Revocation Transparency? Ze Wang1;2;3, Jingqiang Lin1;2;3??, Quanwei Cai1;2, Qiongxiao Wang1;2;3, Jiwu Jing1;2;3, and Daren Zha1;2 1 State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China. 2 Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing 100093, China. 3 School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China. {wangze,linjingqiang,caiquanwei,wangqiongxiao}@iie.ac.cn Abstract. Traditional X.509 public key infrastructures (PKIs) depend on certification authorities (CAs) to sign certificates, used in SSL/TLS to authenticate web servers and establish secure channels. However, recent security incidents indicate that CAs may (be compromised to) sign fraud- ulent certificates. In this paper, we propose blockchain-based certificate transparency and revocation transparency. Our scheme is compatible with X.509 PKIs but significantly reinforces the security guarantees of a certificate. The CA-signed certificates and their revocation status in- formation of an SSL/TLS web server are published by the subject (i.e., the web server) as a transaction, and miners of the community append it to the global certificate blockchain after verifying the transaction and mining a block. The certificate blockchain acts as append-only public logs to monitor CAs' certificate signing and revocation operations, and an SSL/TLS web server is granted with the cooperative control on its certificates to balance the absolute authority of CAs in traditional PKIs. We implement the prototype system with Firefox and Nginx, and the experimental results show that it introduces reasonable overheads. -
Mission Accomplished? HTTPS Security After Diginotar
Mission Accomplished? HTTPS Security after DigiNotar Johanna Amann* ICSI / LBL / Corelight Oliver Gasser* Technical University of Munich Quirin Scheitle* Technical University of Munich Lexi Brent The University of Sydney Georg Carle Technical University of Munich Ralph Holz The University of Sydney * Joint First Authorship Internet Measurement Conference (IMC) 2017 TLS/HTTPS Security Extensions • Certificate Transparency • HSTS (HTTP Strict Transport Security) • HPKP (HTTP Public Key Pinning) • SCSV (TLS Fallback Signaling Cipher Suite Value) • CAA (Certificate Authority Authorization) • DANE-TLSA (DNS Based Authentication of Named Entities) Methodology • Active & passive scans • Shared pipeline where possible • Active measurements from 2 continents • Largest Domain-based TLS scan so far • More than 192 Million domains • Passive measurements on 3 continents • More than 2.4 Billion observed TLS connections Certificate Transparency CA Issues Certificates Provides publicly auditable, append-only Log of certificates CT Log Also provides proof of inclusion Browser Verifies Proof of Inclusion Certificate Transparency CT Log CA Webserver Browser Certificate Transparency CT Log CA Certificate Webserver Browser Certificate Transparency CT Log CA Certificate Certificate Webserver Browser Certificate Transparency CT Log CA SCT Certificate Certificate Webserver Browser Certificate Transparency CT Log CA SCT Certificate Certificate Webserver Browser Certificate, SCT in TLS Ext. Certificate Transparency CT Log CA Webserver Browser Certificate Transparency Precertificate -
Brand Owners in ICANN-Land: the Reality of DNS Expansion
9/13/2017 Brand Owners in ICANN-land: the reality of DNS expansion J. Scott Evans | Director, Trademarks, Marketing, Copyright and DNS Policy © 2017 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. Past History . 1998 ICANN created with goal to bring competition to the domain name system. Before ICANN one company served as both the sole registrar and registry: Network Solutions, Inc. Seven original generic top level domain . .com; .net; .org; .gov; . mil; .edu; .int and =/- 200 county code top level domains (e.g, .us; .uk; .de) . 2000 ICANN holds first “proof of concept” round of expansion by adding 7 new top level domains . .aero; .biz; .coop; .info; .museum; .name and .pro . 2003/04 ICANN holds second “proof of concept” round of expansion by adding 6 new top level domains . .asia; .cat; .jobs; .mobi; .tel and .travel © 2017 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. 2 1 9/13/2017 Original Protections . How did you protect your trademark prelaunch? . Sunrise registrations . Trademark Claim Notice . How did you protect your trademark post launch? . Uniform Dispute Resolution Procedure (UDRP) . In US, lawsuit under the Anti-Cybersquatting Consumer Protection Act © 2017 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. 3 The Grand Plan . June 2008 ICANN votes to expand the number of top level of domains . October 2008 ICANN publishes Applicant Guidebook with no trademark protections . March 2009 ICANN empanels Implementation Review Team (“IRT”) . June 2009 IRT report recommends tapestry of IP protections . Trademark Clearinghouse . Sunrise Registrations . Trademark Claims Notice . Uniform Rapid Suspension System . Post Registration Dispute Resolution Process . December 2009 Special Trademark Issues review team issue report amending IRT recommendations. -
Debenham Decl Part 1.Pdf
I, Mark Debenham, declare as follows: 1. I am a Senior Manager of Investigations in the Digital Crimes Unit of Plaintiff Microsoft Corp.’s (“Microsoft”) Legal and Corporate Affairs group. I make this declaration in support of Plaintiffs’ Application For An Emergency Temporary Restraining Order, Seizure Order And Order To Show Cause Re Preliminary Injunction. I make this declaration of my own personal knowledge and, if called as a witness, I could and would testify competently to the truth of the matters set forth herein. 2. In my role at Microsoft, I assess technology security threats to Microsoft and the impact of such threats on Microsoft’s business. Prior to my current role, I worked as a security engineer in Microsoft’s Trustworthy Computing group, dealing with the discovery, remediation and mitigation of Internet and software security vulnerabilities. Among my responsibilities were investigating targeted attacks and driving the establishment of Microsoft Security Response Center’s response to online service vulnerabilities. Before joining Microsoft, I worked for Verizon Business as a Senior Network Security Specialist performing security assessments as part of its network security professional services team for clients ranging from healthcare and educational establishments to aerospace companies. 3. I have conducted an investigation of the structure and functions of three interrelated botnet architectures called “Zeus,” “Ice-IX,” and “SpyEye,” as well as the activities carried out through these botnets, and an assessment of the impact on Microsoft’s business and on users of the Internet. For simplicity, throughout this declaration, these interrelated architectures, each of which incorporates the “Zeus” code, are collectively referred to as the “Zeus Botnets.” The Zeus Botnets have caused, and continue to cause, extreme damage to Microsoft and other parties which, if allowed to continue, will be compounded as the case proceeds. -
Web Content Guidelines for Playstation®4
Web Content Guidelines for PlayStation®4 Version 9.00 © 2021 Sony Interactive Entertainment Inc. [Copyright and Trademarks] "PlayStation" and "DUALSHOCK" are registered trademarks or trademarks of Sony Interactive Entertainment Inc. Oracle and Java are registered trademarks of Oracle and/or its affiliates. "Mozilla" is a registered trademark of the Mozilla Foundation. The Bluetooth® word mark and logos are registered trademarks owned by the Bluetooth SIG, Inc. and any use of such marks by Sony Interactive Entertainment Inc. is under license. Other trademarks and trade names are those of their respective owners. Safari is a trademark of Apple Inc., registered in the U.S. and other countries. DigiCert is a trademark of DigiCert, Inc. and is protected under the laws of the United States and possibly other countries. Symantec and GeoTrust are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. VeriSign is a trademark of VeriSign, Inc. All other company, product, and service names on this guideline are trade names, trademarks, or registered trademarks of their respective owners. [Terms and Conditions] All rights (including, but not limited to, copyright) pertaining to this Guideline are managed, owned, or used with permission, by SIE. Except for personal, non-commercial, internal use, you are prohibited from using (including, but not limited to, copying, modifying, reproducing in whole or in part, uploading, transmitting, distributing, licensing, selling and publishing) any of this Guideline, without obtaining SIE’s prior written permission. SIE AND/OR ANY OF ITS AFFILIATES MAKE NO REPRESENTATION AND WARRANTY, EXPRESS OR IMPLIED, STATUTORY OR OTHERWISE, INCLUDING WARRANTIES OR REPRESENTATIONS WITH RESPECT TO THE ACCURACY, RELIABILITY, COMPLETENESS, FITNESS FOR PARTICULAR PURPOSE, NON-INFRINGEMENT OF THIRD PARTIES RIGHTS AND/OR SAFETY OF THE CONTENTS OF THIS GUIDELINE, AND ANY REPRESENTATIONS AND WARRANTIES RELATING THERETO ARE EXPRESSLY DISCLAIMED. -
Exploring CA Certificate Control
What’s in a Name? Exploring CA Certificate Control Zane Ma† Joshua Mason† Manos Antonakakis‡ Zakir Durumeric§ Michael Bailey† ‡Georgia Institute of Technology §Stanford University †University of Illinois at Urbana-Champaign Abstract other transgressions, prompted root store operators to begin discussions about removing trust in WoSign certificates. In TLS clients rely on a supporting PKI in which certificate July 2016, a new discovery revealed that StartCom, a seem- authorities (CAs)—trusted organizations—validate and cryp- ingly unaffiliated CA in Israel, was able to issue certificates tographically attest to the identities of web servers. A client’s signed by WoSign (a Chinese company). A deeper investiga- confidence that it is connecting to the right server depends tion of the incident eventually revealed that “the transaction entirely on the set of CAs that it trusts. However, as we demon- which completed the chain to give WoSign 100% ownership strate in this work, the identity specified in CA certificates is of StartCom completed on November 1st 2015” [59]. Further frequently inaccurate due to lax naming requirements, owner- evidence emerged that StartCom’s CA certificates had likely ship changes, and long-lived certificates. This not only mud- been integrated with WoSign operations as early as December dles client selection of trusted CAs, but also prevents PKI 2015 [56], when the removal of WoSign certificates from root operators and researchers from correctly attributing CA cer- stores appeared imminent. WoSign’s stealthy acquisition of tificate issues to CA organizations. To help Web PKI par- StartCom emphasizes the importance of transparency around ticipants understand the organizations that control each CA operational CA control for a secure web. -
BUTERA & ANDREWS Attorneys at Law 1301 Pennsylvania Avenue
BUTERA & ANDREWS Attorneys at Law 1301 Pennsylvania Avenue, N.W. Washington, D.C. 20004-1701 202-347-6875 Philip S. Corwin, Partner [email protected] By E-Mail: [email protected] February 15, 2008 Suzanne R. Sene Office of International Affairs National Telecommunications and Information Association 1401 Constitution Avenue, NW Room 4701 Washington, DC 20230 Re: Docket No. 071023616-7617-01; Notice of Inquiry regarding Midterm Review of the Joint Project Agreement (JPA) between the Department of Commerce and ICANN Dear Ms. Sene: This comment letter is submitted by the Internet Commerce Association (ICA) in regard to the November 2, 2007 Federal Register notice in regard to the above-referenced Docket item. ICA is a not-for-profit trade association representing the direct search industry. Its global membership is composed of individuals and companies that invest in domain names (DNs) and develop and monetize the associated websites, as well as providers of services to such entities. ICA’s members collectively hold portfolios comprised of tens of millions of DNs. Domain name investors and developers are the new media and e-commerce companies of the twenty-first century, with the current asset value of the direct search industry standing in excess of $10 billion and with these assets generating at least $1-2 billion in annual advertising revenues and associated e-commerce transactions. ICA’s mission is to promote the benefits of the activities of professional domain name investors, owners and developers to the press, advertisers, and governmental authorities on a global basis; and to strive for fairness among regulators and in ICANN’s dispute resolution process as well as in the taxation and treatment of DN registrants under all relevant laws, regulations, and agreements in the U.S. -
Analysis of the HTTPS Certificate Ecosystem
Analysis of the HTTPS Certificate Ecosystem∗ Zakir Durumeric, James Kasten, Michael Bailey, J. Alex Halderman Department of Electrical Engineering and Computer Science University of Michigan, Ann Arbor, MI 48109, USA {zakir, jdkasten, mibailey, jhalderm}@umich.edu ABSTRACT supporting public key infrastructure (PKI) composed of thousands We report the results of a large-scale measurement study of the of certificate authorities (CAs)—entities that are trusted by users’ HTTPS certificate ecosystem—the public-key infrastructure that un- browsers to vouch for the identity of web servers. CAs do this by derlies nearly all secure web communications. Using data collected signing digital certificates that associate a site’s public key with its by performing 110 Internet-wide scans over 14 months, we gain domain name. We place our full trust in each of these CAs—in detailed and temporally fine-grained visibility into this otherwise general, every CA has the ability to sign trusted certificates for any opaque area of security-critical infrastructure. We investigate the domain, and so the entire PKI is only as secure as the weakest CA. trust relationships among root authorities, intermediate authorities, Nevertheless, this complex distributed infrastructure is strikingly and the leaf certificates used by web servers, ultimately identify- opaque. There is no published list of signed website certificates ing and classifying more than 1,800 entities that are able to issue or even of the organizations that have trusted signing ability. In certificates vouching for the identity of any website. We uncover this work, we attempt to rectify this and shed light on the HTTPS practices that may put the security of the ecosystem at risk, and we certificate ecosystem.