User Tracking Via Google's QUIC Protocol

User Tracking Via Google's QUIC Protocol

11th October 2018 PET-CON 2018.2 User Tracking via Google’s QUIC Protocol Erik Sy, M.Sc. 1 Introduction to the QUIC Transport Protocol § QUIC over UDP provides an alternative HTTPS stack to TLS over TCP – Allows for zero round-trip time secure connection establishment § Deployment on the Internet – accounts for 7% of global Internet traffic – more than five million hosts in IPv4 currently support QUIC – supported by Google Chrome (approx. 60% browser market share) – other use cases include DNS over QUIC, FTP over QUIC, SMTP over QUIC 2 QUIC’s Connection Establishment § QUIC reuses cached server config and token across several user sessions Client Server Client Server Inchoate CHLO (…) CHLO (SCID_1, Token_2, KeyShare_3, …) REJ (PUBS, CRT, SCID_1, Token_1, …) Encrypted Request (…) CHLO (SCID_1, Token_1, KeyShare_1, …) Encrypted Request (…) SHLO (Token_3, KeyShare_4, …) Encrypted Response (…) SHLO (Token_2, KeyShare_2, …) Encrypted Response (…) a) Initial Handshake b) Subsequent Handshake 3 Opportunities and Limitations of Tracking via QUIC § Independent of common tracking approaches like IP addresses, HTTP cookies and browser fingerprinting § Opportunities compared to browser fingerprinting – Faster unique identification of a user – Lower consumption of bandwidth and computational resources § Limitations – Browser restarts terminate a tracking period – QUIC configuration of a browser • Lifetime of Token and server configs • Feasibility of third-party tracking 4 Experiments to test Browsers’ default QUIC Configuration § Measurement of QUIC’s Token lifetime within popular browsers – Maximum delay between two website visits for whiCh the browser still attempts to establish the new ConneCtion with an CaChed Token § Investigating the feasibility of third-party traCking via QUIC User Loading Website A Loading Website B Website A Third-party T Website B (incl. T) (incl. T) 6 Summary on the Browser’s default QUIC Configuration Browser Lower boundary of Third-party Tracking Token’s lifetime Chrome 20 days viable Opera 18 days viable Chromium 20 days viable Chrome 11 days viable (mobile) 7 Countermeasures § Browser vendors must align tracking via QUIC with HTTP cookie policies – Disabling third-party tracking via QUIC through sandboxing – Limiting the lifetime of cached QUIC data to a single page visit if not cookies are set by that website – Prevent a reset of the Token’s and server config’s lifetime § Connection establishments based on public key cryptography require mechanisms to assure that public keys are not unique per user § Privacy advocates – Observed browser behaviour seems not to comply with principles of privacy by design and privacy by default (Article 25 of GDPR) 8 Conclusion § Zero round-trip time secure connection establishment requires prefetched data which can be potentially abused for tracking § Tracking via QUIC is a real-world privacy problem which allows the tracker to circumvent strict HTTP cookie policies and IP address changes § Countermeasures require the action of browser vendors 9 Thank you Questions and Answers E-mail: [email protected] Preprint: Please request pre-print article per email. 10.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    9 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us