Corpus ID: 226221985

A survey and analysis of TLS interception mechanisms and motivations

@article{Carnavalet2020ASA,
  title={A survey and analysis of TLS interception mechanisms and motivations},
  author={Xavier de Carn{\'e} de Carnavalet and Paul C. van Oorschot},
  journal={ArXiv},
  year={2020},
  volume={abs/2010.16388}
}
TLS is an end-to-end protocol designed to provide confidentiality and integrity guarantees that improve end-user security and privacy. While TLS helps defend against pervasive surveillance of intercepted unencrypted traffic, it also hinders several common beneficial operations typically performed by middleboxes on the network traffic. This issue has resulted in some parties proposing various methods that "bypass" the confidentiality goals of TLS by playing with keys and certificates essentially… Expand

Figures and Tables from this paper

A Survey of Privacy-Preserving Techniques for Encrypted Traffic Inspection over Network Middleboxes
TLDR
Practical constraints, advantages and pitfalls towards adopting the MitM techniques are described, followed by insights on the gaps between research work and practical implementation in the industries, which leads to the discussion on the challenges and research directions. Expand
Zero-Knowledge Middleboxes
TLDR
It is shown how to make ZKMBs work with unmodified encrypted-communication protocols (specifically TLS 1.3), making ZK MBs invisible to servers, and designed zero-knowledge proofs for TLS 1-3 session keys are designed. Expand
Rusted Anchors: A National Client-Side View of Hidden Root CAs in the Web PKI Ecosystem
  • Yiming Zhang, Baojun Liu, +4 authors Zaifeng Zhang
  • Computer Science
  • CCS
  • 2021
TLDR
The findings uncover that the ecosystem of hidden root CAs is massive and dynamic, and shed light on the landscape of Web PKI security, and call for immediate efforts from the community to review the integrity of local root stores. Expand
A Sensitive Data Access Model in Support of Learning Health Systems
TLDR
The Sensitive Data Access Model (SDAM) is proposed, using a representation of agents and processes of data access systems, specific security requirements are presented and the SDAM layer architecture is described, with an emphasis on its mix-network dynamic topology approach. Expand

References

SHOWING 1-10 OF 129 REFERENCES
Multi-Context TLS (mcTLS): Enabling Secure In-Network Functionality in TLS
TLDR
This paper introduces multi-context TLS (mcTLS), which extends TLS to support middleboxes and breaks the current "all-or-nothing" security model by allowing endpoints and content providers to explicitly introduce middleboxes in secure end-to-end sessions while controlling which parts of the data they can read or write. Expand
maTLS: How to Make TLS middlebox-aware?
TLDR
A middlebox-aware TLS protocol, dubbed maTLS, is introduced, which allows middleboxes to participate in the TLS session in a visible and auditable fashion and achieves the above security goals with marginal overhead. Expand
Content delivery over TLS: a cryptographic analysis of keyless SSL
TLDR
This paper investigates the security guarantees provided by Keyless SSL, a CDN architecture currently deployed by CloudFlare that composes two TLS 1.2 handshakes to obtain a proxied TLS connection and presents 3(S)ACCEsecurity, a generalization of the 2-party ACCE security definition that has been used in several previous proofs for TLS. Expand
Locally Operated Cooperative Key Sharing (LOCKS)
TLDR
Locally Operated Cooperative Key Sharing is presented, a novel system that enables local clients to share their TLS session keys with the enterprise security monitoring system, facilitating DPI without subverting authentication. Expand
A Formal Treatment of Accountable Proxying Over TLS
TLDR
A provably-secure alternative to soon-to-be-standardized mcTLS is proposed: a generic and modular protocol-design that care- fully composes generic secure channel-establishment protocols, which prove secure. Expand
To Intercept or Not to Intercept: Analyzing TLS Interception in Network Appliances
TLDR
A framework for testing TLS inspecting appliances is developed, combining and extending tests from existing work on client-end and network-based interception, and several security issues regarding TLS version and certificate parameters mapping, CA trusted stores, private keys, and certificate validation tests are uncovered. Expand
Love All, Trust Few: on Trusting Intermediaries in HTTP
TLDR
This work presents EFGH, a pluggable TLS extension that allows a trusted third-party to be introduced in the two-party model without affecting the underlying end-to-end security of the channel. Expand
Killed by Proxy: Analyzing Client-end TLS Interce
TLDR
This work designs and performs a thorough analysis of eight antivirus and four parentalcontrol applications for Windows that act as TLS proxies, along with two additional products that only import a root certificate, finding that four products are vulnerable to full server impersonation under an active man-in-the-middle (MITM) attack out of the box, and two more if TLS filtering is enabled. Expand
ME-TLS: Middlebox-Enhanced TLS for Internet-of-Things Devices
TLDR
A new middlebox-enhanced TLS (ME-TLS), which enables endpoints to introduce authenticated middleboxes into a TLS session while control middleboxes’ access permission and processing order of traffic data is designed and implemented. Expand
And Then There Were More: Secure Communication for More Than Two Parties
TLDR
This paper proposes a security definition and presents Middlebox TLS (mbTLS), a protocol that provides it (in part by using Intel SGX to protect middleboxes from untrusted hardware), and shows that mbTLS is deployable today and introduces little overhead. Expand
...
1
2
3
4
5
...