Abstract
The security of Internet-based applications fundamentally relies on the trustworthiness of Certificate Authorities (CAs). We practically demonstrate for the first time that even a weak off-path attacker can effectively subvert the trustworthiness of popular commercially used CAs. Our attack targets CAs which use Domain Validation (DV) for authenticating domain ownership; collectively these CAs control 99% of the certificates market. The attack utilises DNS Cache poisoning and tricks the CA into issuing fraudulent certificates for domains the attacker does not legitimately own – namely certificates binding the attacker’s public key to a victim domain. We discuss short and long term defences, but argue that they fall short of securing DV. To mitigate the threats we propose Domain Validation++ (DV++). DV++ replaces the need in cryptography through assumptions in distributed systems. While retaining the benefits of DV (automation, efficiency and low costs) DV++ is secure even against Man-in-the-Middle (MitM) attackers. Deployment of DV++ is simple and does not require changing the existing infrastructure nor systems of the CAs. We demonstrate security of DV++ under realistic assumptions and provide open source access to DV++ implementation.
| Original language | English |
|---|---|
| Title of host publication | CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security |
| Publisher | Association for Computing Machinery |
| Pages | 2060-2076 |
| Number of pages | 17 |
| ISBN (Electronic) | 9781450356930 |
| DOIs | |
| State | Published - 15 Oct 2018 |
| Externally published | Yes |
| Event | 25th ACM Conference on Computer and Communications Security, CCS 2018 - Toronto, Canada Duration: 15 Oct 2018 → … |
Publication series
| Name | Proceedings of the ACM Conference on Computer and Communications Security |
|---|---|
| ISSN (Print) | 1543-7221 |
Conference
| Conference | 25th ACM Conference on Computer and Communications Security, CCS 2018 |
|---|---|
| Country/Territory | Canada |
| City | Toronto |
| Period | 15/10/18 → … |
Bibliographical note
Publisher Copyright:© 2018 Association for Computing Machinery.
Keywords
- CA attacks
- Certificates
- DNS cache poisoning
- PKI security