The Potential of Individualized Trusted Root Stores: Minimizing the Attack Surface in the Light of CA Failures

نویسندگان

  • Johannes Braun
  • Gregor Rynkowski
چکیده

The security of most Internet applications relies on underlying public key infrastructures (PKIs) and thus on an ecosystem of certification authorities (CAs). The pool of PKIs responsible for the issuance and the maintenance of SSL certificates, called the Web PKI, has grown extremely large and complex. Herein, each CA is a single point of failure for the security, leading to an attack surface, the size of which is hardly assessable. This paper approaches the issue if and how the attack surface can be reduced in order to reduce the risk of relying on a malicious certificate. In particular we consider the individualization of the set of trusted CAs. We present a tool called Rootopia, which allows to assess the respective part of the Web PKI relevant for a user. Our analysis of browser histories of 22 Internet users reveals, that the major part of the PKI is completely irrelevant to a single user. The attack surface can be reduced by more than 90%, which shows the potential of the individualization of the set of trusted CAs. Furthermore, all the relevant CAs reside within a small set of countries. Our findings confirm, that we unnecessarily trust in a huge number of CAs, exposing ourselves to unnecessary

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

You Won't Be Needing These Any More: On Removing Unused Certificates from Trust Stores

SSL and HTTPS is currently a hotly debated topic – particularly the weakest link property of the CA based system has been heavily criticized. This has become even more relevant in the light of recent spying revelations. While there are several proposals how the CA system could be improved or replaced, none of these solutions is receiving widespread adoption, and even in a best case scenario it ...

متن کامل

CAge: Taming Certificate Authorities by Inferring Restricted Scopes

The existing HTTPS public-key infrastructure (PKI) uses a coarse-grained trust model: either a certificate authority (CA) is trusted by browsers to vouch for the identity of any domain or it is not trusted at all. More than a thousand root and intermediate CAs can currently sign certificates for any domain and be trusted by popular browsers. This violates the principle of least privilege and cr...

متن کامل

بررسی میزان محدودیت پتاسیم قابل استفاده برای گندم در یک خاک لسی

The objective of this study was determining the most limiting plant growth factor in the wheat root zone dominated by illite in clay fraction and a high specific surface with ample ammonium acetate extractible potassium. A completely randomized block design with 4 replicates was used in Seyed Miran Research Farm (Gorgan) during 2009-2010 growing season. Treatments were mineral fertilizers (to a...

متن کامل

Secure Routing Protocol: Affection on MANETs Performance

In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...

متن کامل

Light and electron microscopic study of the tongue in the White-eared bulbul (Pycnonotus leucotis)

The aim of the present study was to investigate the light and electron microscopic structure of the tongue in White-eared bulbul (Pycnonotus leucotis). Six adult White-eared bulbul (3 males and 3 females) in Shahrekord district were used in the investigation. Samples of the apex, body and root of the tongue were prepared routinely for light and electron microscopic study. Results showed that th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2013  شماره 

صفحات  -

تاریخ انتشار 2013