Fraunhofer-Gesellschaft

Publica

Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.

Domain validation++ for MitM-resilient PKI

 
: Brandt, Markus; Dai, Tiaxing; Klein, Amit; Shulman, Haya; Waidner, Michael

:

Lie, D. ; Association for Computing Machinery -ACM-:
CCS 2018, ACM SIGSAC Conference on Computer and Communications Security. Proceedings : Toronto, Canada, October 15 - 19, 2018
New York: ACM, 2018
ISBN: 978-1-4503-5693-0
S.2060-2076
Conference on Computer and Communications Security (CCS) <2018, Toronto>
Englisch
Konferenzbeitrag
Fraunhofer SIT ()

Abstract
The security of Internet-based applications fundamentally relies on the trustworthiness of Certificate Authorities (CAs). We practically demonstrate for the first time that even a weak off-path attacker can effectively subvert the trustworthiness of popular commercially used CAs. Our attack targets CAs which use Domain Validation (DV) for authenticating domain ownership; collectively these CAs control 99% of the certificates market. The attack utilises DNS Cache poisoning and tricks the CA into issuing fraudulent certificates for domains the attacker does not legitimately own -- namely certificates binding the attacker's public key to a victim domain. We discuss short and long term defences, but argue that they fall short of securing DV. To mitigate the threats we propose Domain Validation ++ (DV++). DV++ replaces the need in cryptography through assumptions in distributed systems. While retaining the benefits of DV (automation, efficiency and low costs) DV++ is secure even against Man-in-the-Middle (MitM) attackers. Deployment of DV++ is simple and does not require changing the existing infrastructure nor systems of the CAs. We demonstrate security of DV++ under realistic assumptions and provide open source access to DV++ implementation.

: http://publica.fraunhofer.de/dokumente/N-524019.html