The Potential of an Individualized Set of trusted CAs: Defending against CA Failures in the Web PKI

被引:8
作者
Braun, Johannes [1 ]
Rynkowski, Gregor [1 ]
机构
[1] Tech Univ Darmstadt, Darmstadt, Germany
来源
2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM) | 2013年
关键词
D O I
10.1109/SocialCom.2013.90
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of most Internet applications relies on underlying public key infrastructures (PKIs) and thus on an ecosystem of certification authorities (CAs). The pool of PKIs responsible for the issuance and the maintenance of SSL certificates, called the Web PKI, has grown extremely large and complex. Herein, each CA is a single point of failure, leading to an attack surface, the size of which is hardly assessable. This paper approaches the issue if and how the attack surface can be reduced in order to minimize the risk of relying on a malicious certificate. In particular, we consider the individualization of the set of trusted CAs. We present a tool called Rootopia, which allows to individually assess the respective part of the Web PKI relevant for a user. Our analysis of browser histories of 22 Internet users reveals, that the major part of the PKI is completely irrelevant to a single user. On a per user level, the attack surface can be reduced by more than 90%, which shows the potential of the individualization of the set of trusted CAs. Furthermore, all the relevant CAs reside within a small set of countries. Our findings confirm that we unnecessarily trust in a huge number of CAs, thus exposing ourselves to unnecessary risks. Subsequently, we present an overview on our approach to realize the possible security gains.
引用
收藏
页码:600 / 605
页数:6
相关论文
共 18 条
[1]  
Abadi M, 2013, P 14 USENIX C HOT TO
[2]  
[Anonymous], 2012, BLACK TUL REP INV DI
[3]  
Braun Johannes, 2013, LNCS IN PRESS
[4]  
Comodo, REC RA COMPR
[5]  
Eckersley P., 2011, 20 USENIX SEC S AUG
[6]  
Ellison C., 2000, Computer Security Journal, V16, P1
[7]   PKI: It's not dead, just resting [J].
Gutmann, P .
COMPUTER, 2002, 35 (08) :41-+
[8]  
Gutmann P., 2013, ENG SECURIT IN PRESS
[9]  
h online, FLAM OV EXP MAD WIND
[10]  
Herley C, 2009, NEW SECURITY PARADIGMS WORKSHOP 2009, PROCEEDINGS, P133