Home > Research > Publications & Outputs > Domain Validation++ For MitM-Resilient PKI

Links

Text available via DOI:

View graph of relations

Domain Validation++ For MitM-Resilient PKI

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

Domain Validation++ For MitM-Resilient PKI. / Brandt, Markus; Dai, Tianxiang; Klein, Amit et al.
ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2018. p. 2060-2076.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Brandt, M, Dai, T, Klein, A, Shulman, H & Waidner, M 2018, Domain Validation++ For MitM-Resilient PKI. in ACM SIGSAC Conference on Computer and Communications Security. ACM, New York, pp. 2060-2076. https://doi.org/10.1145/3243734.3243790

APA

Brandt, M., Dai, T., Klein, A., Shulman, H., & Waidner, M. (2018). Domain Validation++ For MitM-Resilient PKI. In ACM SIGSAC Conference on Computer and Communications Security (pp. 2060-2076). ACM. https://doi.org/10.1145/3243734.3243790

Vancouver

Brandt M, Dai T, Klein A, Shulman H, Waidner M. Domain Validation++ For MitM-Resilient PKI. In ACM SIGSAC Conference on Computer and Communications Security. New York: ACM. 2018. p. 2060-2076 doi: 10.1145/3243734.3243790

Author

Brandt, Markus ; Dai, Tianxiang ; Klein, Amit et al. / Domain Validation++ For MitM-Resilient PKI. ACM SIGSAC Conference on Computer and Communications Security. New York : ACM, 2018. pp. 2060-2076

Bibtex

@inproceedings{a5fd1c399dc64a7285354ad1145d0281,
title = "Domain Validation++ For MitM-Resilient PKI",
abstract = "The security of Internet-based applications fundamentally relies on the trustworthiness of Certificate Authorities (CAs). We practically demonstrate for the first time that even a weak off-path attacker can effectively subvert the trustworthiness of popular commercially used CAs. Our attack targets CAs which use Domain Validation (DV) for authenticating domain ownership; collectively these CAs control 99% of the certificates market. The attack utilises DNS Cache poisoning and tricks the CA into issuing fraudulent certificates for domains the attacker does not legitimately own -- namely certificates binding the attacker's public key to a victim domain. We discuss short and long term defences, but argue that they fall short of securing DV. To mitigate the threats we propose Domain Validation++ (DV++). DV++ replaces the need in cryptography through assumptions in distributed systems. While retaining the benefits of DV (automation, efficiency and low costs) DV++ is secure even against Man-in-the-Middle (MitM) attackers. Deployment of DV++ is simple and does not require changing the existing infrastructure nor systems of the CAs. We demonstrate security of DV++ under realistic assumptions and provide open source access to DV++ implementation.",
author = "Markus Brandt and Tianxiang Dai and Amit Klein and Haya Shulman and Michael Waidner",
year = "2018",
month = oct,
day = "15",
doi = "10.1145/3243734.3243790",
language = "English",
pages = "2060--2076",
booktitle = "ACM SIGSAC Conference on Computer and Communications Security",
publisher = "ACM",

}

RIS

TY - GEN

T1 - Domain Validation++ For MitM-Resilient PKI

AU - Brandt, Markus

AU - Dai, Tianxiang

AU - Klein, Amit

AU - Shulman, Haya

AU - Waidner, Michael

PY - 2018/10/15

Y1 - 2018/10/15

N2 - The security of Internet-based applications fundamentally relies on the trustworthiness of Certificate Authorities (CAs). We practically demonstrate for the first time that even a weak off-path attacker can effectively subvert the trustworthiness of popular commercially used CAs. Our attack targets CAs which use Domain Validation (DV) for authenticating domain ownership; collectively these CAs control 99% of the certificates market. The attack utilises DNS Cache poisoning and tricks the CA into issuing fraudulent certificates for domains the attacker does not legitimately own -- namely certificates binding the attacker's public key to a victim domain. We discuss short and long term defences, but argue that they fall short of securing DV. To mitigate the threats we propose Domain Validation++ (DV++). DV++ replaces the need in cryptography through assumptions in distributed systems. While retaining the benefits of DV (automation, efficiency and low costs) DV++ is secure even against Man-in-the-Middle (MitM) attackers. Deployment of DV++ is simple and does not require changing the existing infrastructure nor systems of the CAs. We demonstrate security of DV++ under realistic assumptions and provide open source access to DV++ implementation.

AB - The security of Internet-based applications fundamentally relies on the trustworthiness of Certificate Authorities (CAs). We practically demonstrate for the first time that even a weak off-path attacker can effectively subvert the trustworthiness of popular commercially used CAs. Our attack targets CAs which use Domain Validation (DV) for authenticating domain ownership; collectively these CAs control 99% of the certificates market. The attack utilises DNS Cache poisoning and tricks the CA into issuing fraudulent certificates for domains the attacker does not legitimately own -- namely certificates binding the attacker's public key to a victim domain. We discuss short and long term defences, but argue that they fall short of securing DV. To mitigate the threats we propose Domain Validation++ (DV++). DV++ replaces the need in cryptography through assumptions in distributed systems. While retaining the benefits of DV (automation, efficiency and low costs) DV++ is secure even against Man-in-the-Middle (MitM) attackers. Deployment of DV++ is simple and does not require changing the existing infrastructure nor systems of the CAs. We demonstrate security of DV++ under realistic assumptions and provide open source access to DV++ implementation.

U2 - 10.1145/3243734.3243790

DO - 10.1145/3243734.3243790

M3 - Conference contribution/Paper

SP - 2060

EP - 2076

BT - ACM SIGSAC Conference on Computer and Communications Security

PB - ACM

CY - New York

ER -