• Corpus ID: 226221985

A survey and analysis of TLS interception mechanisms and motivations

  title={A survey and analysis of TLS interception mechanisms and motivations},
  author={Xavier de Carn{\'e} de Carnavalet and Paul C. van Oorschot},
TLS is an end-to-end protocol designed to provide confidentiality and integrity guarantees that improve end-user security and privacy. While TLS helps defend against pervasive surveillance of intercepted unencrypted traffic, it also hinders several common beneficial operations typically performed by middleboxes on the network traffic. This issue has resulted in some parties proposing various methods that "bypass" the confidentiality goals of TLS by playing with keys and certificates essentially… 

Figures and Tables from this paper

A Survey of Privacy-Preserving Techniques for Encrypted Traffic Inspection over Network Middleboxes
Practical constraints, advantages and pitfalls towards adopting the MitM techniques are described, followed by insights on the gaps between research work and practical implementation in the industries, which leads to the discussion on the challenges and research directions.
Zero-Knowledge Middleboxes
It is shown how to make ZKMBs work with unmodified encrypted-communication protocols (specifically TLS 1.3), making ZK MBs invisible to servers, and designed zero-knowledge proofs for TLS 1-3 session keys are designed.
A Survey on TLS-Encrypted Malware Network Traffic Analysis Applicable to Security Operations Centers
Recently, a majority of security operations centers (SOCs) have been facing a critical issue of increased adoption of transport layer security (TLS) encryption on the Internet, in network traffic
Rusted Anchors: A National Client-Side View of Hidden Root CAs in the Web PKI Ecosystem
The findings uncover that the ecosystem of hidden root CAs is massive and dynamic, and shed light on the landscape of Web PKI security, and call for immediate efforts from the community to review the integrity of local root stores.
Experimental Evaluation of Malware Family Classification Methods from Sequential Information of TLS-Encrypted Traffic
In parallel with the rapid adoption of transport layer security (TLS), malware has utilized the encrypted communication channel provided by TLS to hinder detection from network traffic. To this end,
A Sensitive Data Access Model in Support of Learning Health Systems
The Sensitive Data Access Model (SDAM) is proposed, using a representation of agents and processes of data access systems, specific security requirements are presented and the SDAM layer architecture is described, with an emphasis on its mix-network dynamic topology approach.


Multi-Context TLS (mcTLS): Enabling Secure In-Network Functionality in TLS
This paper introduces multi-context TLS (mcTLS), which extends TLS to support middleboxes and breaks the current "all-or-nothing" security model by allowing endpoints and content providers to explicitly introduce middleboxes in secure end-to-end sessions while controlling which parts of the data they can read or write.
maTLS: How to Make TLS middlebox-aware?
A middlebox-aware TLS protocol, dubbed maTLS, is introduced, which allows middleboxes to participate in the TLS session in a visible and auditable fashion and achieves the above security goals with marginal overhead.
Content delivery over TLS: a cryptographic analysis of keyless SSL
This paper investigates the security guarantees provided by Keyless SSL, a CDN architecture currently deployed by CloudFlare that composes two TLS 1.2 handshakes to obtain a proxied TLS connection and presents 3(S)ACCEsecurity, a generalization of the 2-party ACCE security definition that has been used in several previous proofs for TLS.
Locally Operated Cooperative Key Sharing (LOCKS)
Locally Operated Cooperative Key Sharing is presented, a novel system that enables local clients to share their TLS session keys with the enterprise security monitoring system, facilitating DPI without subverting authentication.
A Formal Treatment of Accountable Proxying Over TLS
A provably-secure alternative to soon-to-be-standardized mcTLS is proposed: a generic and modular protocol-design that care- fully composes generic secure channel-establishment protocols, which prove secure.
To Intercept or Not to Intercept: Analyzing TLS Interception in Network Appliances
A framework for testing TLS inspecting appliances is developed, combining and extending tests from existing work on client-end and network-based interception, and several security issues regarding TLS version and certificate parameters mapping, CA trusted stores, private keys, and certificate validation tests are uncovered.
Love All, Trust Few: on Trusting Intermediaries in HTTP
This work presents EFGH, a pluggable TLS extension that allows a trusted third-party to be introduced in the two-party model without affecting the underlying end-to-end security of the channel.
Killed by Proxy: Analyzing Client-end TLS Interce
This work designs and performs a thorough analysis of eight antivirus and four parentalcontrol applications for Windows that act as TLS proxies, along with two additional products that only import a root certificate, finding that four products are vulnerable to full server impersonation under an active man-in-the-middle (MITM) attack out of the box, and two more if TLS filtering is enabled.
ME-TLS: Middlebox-Enhanced TLS for Internet-of-Things Devices
A new middlebox-enhanced TLS (ME-TLS), which enables endpoints to introduce authenticated middleboxes into a TLS session while control middleboxes’ access permission and processing order of traffic data is designed and implemented.
And Then There Were More: Secure Communication for More Than Two Parties
This paper proposes a security definition and presents Middlebox TLS (mbTLS), a protocol that provides it (in part by using Intel SGX to protect middleboxes from untrusted hardware), and shows that mbTLS is deployable today and introduces little overhead.