Abstract
The security of Internet-based applications fundamentally relies on the trustworthiness of Certificate Authorities (CAs). We practically demonstrate for the first time that even a weak off-path attacker can effectively subvert the trustworthiness of popular commercially used CAs. Our attack targets CAs which use Domain Validation (DV) for authenticating domain ownership; collectively these CAs control 99% of the certificates market. The attack utilises DNS Cache poisoning and tricks the CA into issuing fraudulent certificates for domains the attacker does not legitimately own – namely certificates binding the attacker’s public key to a victim domain. We discuss short and long term defences, but argue that they fall short of securing DV. To mitigate the threats we propose Domain Validation++ (DV++). DV++ replaces the need in cryptography through assumptions in distributed systems. While retaining the benefits of DV (automation, efficiency and low costs) DV++ is secure even against Man-in-the-Middle (MitM) attackers. Deployment of DV++ is simple and does not require changing the existing infrastructure nor systems of the CAs. We demonstrate security of DV++ under realistic assumptions and provide open source access to DV++ implementation.
| Original language | English |
|---|---|
| Title of host publication | CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security |
| Publisher | Association for Computing Machinery |
| Pages | 2060-2076 |
| Number of pages | 17 |
| ISBN (Electronic) | 9781450356930 |
| DOIs | |
| State | Published - 15 Oct 2018 |
| Externally published | Yes |
| Event | 25th ACM Conference on Computer and Communications Security, CCS 2018 - Toronto, Canada Duration: 15 Oct 2018 → … |
Publication series
| Name | Proceedings of the ACM Conference on Computer and Communications Security |
|---|---|
| ISSN (Print) | 1543-7221 |
Conference
| Conference | 25th ACM Conference on Computer and Communications Security, CCS 2018 |
|---|---|
| Country/Territory | Canada |
| City | Toronto |
| Period | 15/10/18 → … |
Bibliographical note
Publisher Copyright:© 2018 Association for Computing Machinery.
Funding
The research reported in this paper was supported in part by the German Federal Ministry of Education and Research (BMBF), by the Hessian Ministry of Science and the Arts within CRISP (www.crisp-da.de/) and co-funded by the DFG as part of project S3 within the CRC 1119 CROSSING.
| Funders |
|---|
| Hessian Ministry of Science and the Arts |
| Deutsche Forschungsgemeinschaft |
| Bundesministerium für Bildung und Forschung |
Keywords
- CA attacks
- Certificates
- DNS cache poisoning
- PKI security
Fingerprint
Dive into the research topics of 'Domain Validation++ for MitM-resilient PKI'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver