Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates
Title | Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Borgolte, Kevin, Fiebig, Tobias, Hao, Shuang, Kruegel, Christopher, Vigna, Giovanni |
Conference Name | Proceedings of the Applied Networking Research Workshop |
Publisher | ACM |
ISBN Number | 978-1-4503-5585-8 |
Keywords | Automated Certificate Management Environment (ACME), certificate authority, Certificate Issuance, certificate transparency, cloud computing, Domain Name System (DNS), Domain Validation, human factors, IP Address Re-Use, Metrics, Misconfiguration, pubcrawl, resilience, Scalability, Secure Sockets Layer (SSL), security risk management, SSL Trust Models, Transport Layer Security (TLS), Trust-based Ecosystem, Use After Free (UAF) |
Abstract | Infrastructure-as-a-Service (IaaS), more generally the "cloud," changed the landscape of system operations on the Internet. Clouds' elasticity allow operators to rapidly allocate and use resources as needed, from virtual machines, to storage, to IP addresses, which is what made clouds popular. We show that the dynamic component paired with developments in trust-based ecosystems (e.g., TLS certificates) creates so far unknown attacks. We demonstrate that it is practical to allocate IP addresses to which stale DNS records point. Considering the ubiquity of domain validation in trust ecosystems, like TLS, an attacker can then obtain a valid and trusted certificate. The attacker can then impersonate the service, exploit residual trust for phishing, or might even distribute malicious code. Even worse, an aggressive attacker could succeed in less than 70 seconds, well below common time-to-live (TTL) for DNS. In turn, she could exploit normal service migrations to obtain a valid certificate, and, worse, she might not be bound by DNS records being (temporarily) stale. We introduce a new authentication method for trust-based domain validation, like IETF's automated certificate management environment (ACME), that mitigates staleness issues without incurring additional certificate requester effort by incorporating the existing trust of a name into the validation process. Based on previously published work [1]. [1] Kevin Borgolte, Tobias Fiebig, Shuang Hao, Christopher Kruegel, Giovanni Vigna. February 2018. Cloud Strife: Mitigating the Security Risks of Domain-Validated Certificates. In Proceedings of the 25th Network and Distributed Systems Security Symposium (NDSS '18). Internet Society (ISOC). DOI: 10.14722/ndss.2018.23327. URL: https://doi.org/10.14722/nd |
URL | https://dl.acm.org/citation.cfm?doid=3232755.3232859 |
DOI | 10.1145/3232755.3232859 |
Citation Key | borgolte_cloud_2018 |
- Misconfiguration
- Use After Free (UAF)
- Trust-based Ecosystem
- Transport Layer Security (TLS)
- SSL Trust Models
- Security Risk Management
- Secure Sockets Layer (SSL)
- Scalability
- resilience
- pubcrawl
- Automated Certificate Management Environment (ACME)
- Metrics
- IP Address Re-Use
- Human Factors
- Domain Validation
- Domain Name System (DNS)
- Cloud Computing
- certificate transparency
- Certificate Issuance
- certificate authority