Visible to the public Measuring the Security Harm of TLS Crypto Shortcuts

TitleMeasuring the Security Harm of TLS Crypto Shortcuts
Publication TypeConference Paper
Year of Publication2016
AuthorsSpringall, Drew, Durumeric, Zakir, Halderman, J. Alex
Conference NameProceedings of the 2016 Internet Measurement Conference
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4526-2
KeywordsCross Layer Security, edward snowden, gchq, government surveillance, Human Behavior, Metrics, nation state attacker, NSA, pubcrawl, Resiliency, scalabilty, secure socket layer, session resumption, SSL, SSL Trust Models, TLS, Transport Layer Security
Abstract

TLS has the potential to provide strong protection against network-based attackers and mass surveillance, but many implementations take security shortcuts in order to reduce the costs of cryptographic computations and network round trips. We report the results of a nine-week study that measures the use and security impact of these shortcuts for HTTPS sites among Alexa Top Million domains. We find widespread deployment of DHE and ECDHE private value reuse, TLS session resumption, and TLS session tickets. These practices greatly reduce the protection afforded by forward secrecy: connections to 38% of Top Million HTTPS sites are vulnerable to decryption if the server is compromised up to 24 hours later, and 10% up to 30 days later, regardless of the selected cipher suite. We also investigate the practice of TLS secrets and session state being shared across domains, finding that in some cases, the theft of a single secret value can compromise connections to tens of thousands of sites. These results suggest that site operators need to better understand the tradeoffs between optimizing TLS performance and providing strong security, particularly when faced with nation-state attackers with a history of aggressive, large-scale surveillance.

URLhttp://doi.acm.org/10.1145/2987443.2987480
DOI10.1145/2987443.2987480
Citation Keyspringall_measuring_2016