AKI): a Proposal for a Public-Key Validation Infrastructure∗

AKI): a Proposal for a Public-Key Validation Infrastructure∗

Accountable Key Infrastructure (AKI): A Proposal for a Public-Key Validation Infrastructure∗ Tiffany Hyun-Jin Kim Lin-Shung Huang Adrian Perrig Collin Jackson Virgil Gligor CyLab / Carnegie Mellon University {hyunjin1,adrian,virgil}@ece.cmu.edu {linshung.huang,collin.jackson}@sv.cmu.edu ABSTRACT illustrating the concept of weakest-link security. In fact, a mali- Recent trends in public-key infrastructure research explore the trade- ciously issued certificate for a site can be used by an adversary to off between decreased trust in Certificate Authorities (CAs), re- mount Man-in-the-Middle (MitM) attacks on connections to that silience against attacks, communication overhead (bandwidth and site. To demonstrate the large extent of the SSL universe in which latency) for setting up an SSL/TLS connection, and availability the weakest link could occur, EFF’s SSL Observatory reports that with respect to verifiability of public key information. In this pa- Microsoft IE and Mozilla Firefox trust 1482 different CA public per, we propose AKI as a new public-key validation infrastructure, keys [13]. to reduce the level of trust in CAs. AKI integrates an architec- Since CAs are in the business of managing cryptographic keys, ture for key revocation of all entities (e.g., CAs, domains) with an they are expected to have secure processes in place to protect their architecture for accountability of all infrastructure parties through keys. Regrettably, recent events have highlighted the inability of checks-and-balances. AKI efficiently handles common certifica- several CAs to keep their keys and certificate issuance processes tion operations, and gracefully handles catastrophic events such as secure. We list a few high-profile cases that were recently dis- domain key loss or compromise. We propose AKI to make progress covered. In March 2011, in an attack on a Comodo reseller, fake towards a public-key validation infrastructure with key revocation certificates were issued for mail.google.com, www.google.com, that reduces trust in any single entity. login.yahoo.com, login.skype.com, login.live.com, and addons.mozilla.org [11, 27]. Comodo suggested that the at- tack originated from an Iranian IP address. In August 2011, news Categories and Subject Descriptors broke that DigiNotar, a Dutch CA, improperly issued a certificate K.6.5 [MANAGEMENT OF COMPUTING AND INFORMA- for all Google domains to an external party [30]. It was claimed TION SYSTEMS]: Security and Protection—Authentication; C.2.0 that as many as 250 false certificates for an unknown number of [COMPUTER-COMMUNICATION NETWORKS]: General— domains were released. It was reported that these certificates were Security and protection used by the Iranian government to spy on Iranian citizens’ com- munications with Google email during the month of August 2011. Keywords For the Stuxnet malware, two Taiwanese CAs’ private keys were compromised, which the Stuxnet developers used to sign their mal- Public-Key Infrastructure, SSL, TLS, certificate validation, public ware [14]. Since not all CA vulnerabilities become public, we ex- log servers, accountability. pect that an even larger number of CA-breaches may have occurred. These examples demonstrate that CA breaches can result in real- 1. INTRODUCTION world attacks. Besides CA-based attacks, SSL/TLS has other vul- Secure connection establishment on the Internet through SSL nerabilities, for example the fact that users click through browser and TLS has been a tremendous success, as it is globally used for warnings in case of self-signed certificates [12]. In Syria, such an practically all secure web-based communication. Given that the attack was used to mount a MitM attack against Facebook [10], security of the majority of network-based financial or commercial supposedly by the Syrian Telecom Ministry. transactions relies on SSL/TLS, one would hope that its security is Addressing these problems is very challenging, as several seem- commensurate with its proliferation and importance. ingly conflicting requirements need to be satisfied. On one hand, Unfortunately, numerous attack vectors against SSL/TLS exist adversarial events such as CA private key compromise or domain and recently several high-profile attacks have demonstrated its vul- private key compromise need to be addressed. On the other hand, nerability in practice. The main weakness lies in the fact that cur- legitimate events such as switching to different CAs or key re- rent browsers trust hundreds of root Certificate Authority (CA) cer- creation after private key loss need to be supported. For example, tificates, and a security breach of a single CA can compromise the legitimate re-creation of a key pair and certificate after private-key security of sites protected by any one of the other CAs, powerfully loss may appear to be an impersonation attempt. Also, legitimately switching to a new CA to cease using a compromised CA that signs ∗An earlier version of this paper was published as a technical re- fraudulent certificates may also appear as a malicious event. Hence, port [18]. we aim to create a certificate infrastructure that can prevent adver- sarial attacks yet gracefully handle legitimate key and certificate Copyright is held by the International World Wide Web Conference Com- management events. mittee (IW3C2). IW3C2 reserves the right to provide a hyperlink to the author’s site if the Material is used in electronic media. We design a new certificate validation infrastructure to address WWW 2013, May 13–17, 2013, Rio de Janeiro, Brazil. these challenges. Our proposal is called Accountable Key Infras- ACM 978-1-4503-2035-1/13/05. tructure (AKI), integrating an architecture for key revocation of all • Privacy: Clients should not reveal which entity/server they es- entities (e.g., CAs, domains) with an architecture for accountability tablish an SSL/TLS connection with. of all infrastructure parties through checks-and-balances. • Efficiency: One of the most important efficiency requirements is AKI efficiently handles common certification operations and gra- to avoid increasing the latency of an SSL/TLS connection estab- cefully handles catastrophic events such as domain key loss or com- lishment — in particular, avoiding any additional round-trips to promise. We propose AKI to make progress towards a public-key external servers. Moreover, no additional infrastructure servers validation infrastructure with key revocation that reduces trust in should be needed. any single entity. To accomplish these goals, we leverage glob- ally visible directories (i.e., public log servers) that enable public 2.2 Assumptions integrity validation for certificate information. Such public vali- In our approach of checks and balances, we assume a set of en- dation provides accountability for CA’s actions, and thus creates tities that do not collude: CAs, public log servers, and validators. deterrence against fraudulent CA activities. To reduce the number We assume that these entities audit each others’ accountable oper- of trusted CAs, a domain can define which and how many CAs are ations and disseminate detected misbehavior. In the context of the required to update the certificate. To enable recovery from unan- current Internet, the Electronic Frontier Foundation (EFF) may be ticipated events, certificates can be updated through another set one entity that would play the role of a validator entity, for example. of CAs; however, the certificates become active after a domain- We assume that browsers store the authentic public keys of CAs, specified hold time. In case of fraudulent updates, legitimate do- public log servers, and validators. We also assume that all parties mains can react during the hold time to have the fraudulent certifi- are loosely time synchronized (up to a few minutes). cate removed. To evaluate the security, availability, and efficiency of our public- 2.3 Adversary Model key validation infrastructure and to enable comparison between dif- We consider an adversary whose main goal is to impersonate a ferent systems, we propose a new set of metrics. Specifically, we victim web site that is using HTTPS. To achieve this goal, the ad- propose Duration of Compromise (DoC), Duration of Unavailabil- versary may compromise some infrastructure servers that the vic- ity (DoU), and several efficiency metrics. The DoC metrics pro- tim trusts. An adversary may be able to temporarily gain control vide insight into the security of a system, measuring the impact of of some infrastructure servers that the victim trusts, but can gain a compromise or loss of various credentials, such as the private key long-term control of infrastructure servers that the victim does not of CAs or domains. The DoU metrics measure availability, again trust. Gaining control means access to private signing keys. depending on various events such as key compromise or loss. Fi- nally, the efficiency metrics measure the overhead of operating the 3. BACKGROUND public-key validation infrastructure and the overhead of secure ses- Two main families of proposals to reduce trust in CAs exist that sion establishment. We present these metrics in detail in Section 9. are related to our design: (1) certificate observatories and (2) time- line servers that provide public visibility into all certificate opera- 2. PROBLEM DEFINITION tions. We briefly provide an overview of these approaches. The core problem we aim to address is the design of a new public-key validation infrastructure that reduces the amount of trust 3.1 Certificate Observatories placed in any one infrastructure component (e.g., CA), yet reduces The first type to reduce the trust in CAs and prevent many of the system’s attack surface and single points of failure. Additional the attacks discussed in Section 1 is to create a public repository goals are efficiency and incentives for deployment for all associated of SSL/TLS server certificates and enable browsers to compare the parties. In this section, we first describe a list of desired properties, key they have received (presumably from the server) with the ob- followed by assumptions and the adversary model.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    11 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us