@1qaz
2016-10-13T11:59:53.000000Z
字数 1432
阅读 1126
proxy
Mark O’Neill , Daniel Zappala
Brigham Young University
IMC'16 short paper [CCS'14 poster]
为了检测TLS代理的流行程度和使用方式,作者进行了15.2 million次证书测试,发现1/250的连接是被代理的。从被代理的连接中发现了疏忽的、不一致的、可疑的行为.
SP'14 analyz forged cert in the wild, facebook,1/500
CoNEXT'14 tangled mass:android root cert store,Netalyzer,1/15000
//Facebook 在白名单中,不出名的网站不太可能在白名单中
主要方法:deploy Flash app on endpoint via Google AdWords
两次测量:
1. 142 countries,2.9 million tests, author's own server
2. 5 contries(China, Ukraine etc) proxied in 147 countries, 12.3 million tests,Alexa top million + author's server
basic findings:
* test1中被代理的连接 11,764/2.9 million ,1/250,70%宣称证书由firewall颁发,12%由企业颁发
* test2, 50,761/12.3 million
* 代理率在国家间差别较大
* 一款家长控制软件不验证证书,直接替换;8个malware 通过安装根证书插入广告。Null issuer,伪造CA签名,降低公钥长度
background略
流程:
1. 客户端浏览器从服务器获取Flash app
2. Flash向服务器发起TLS握手,记录ServerHello和证书信息
3. 汇报结果。服务端比较证书,不符表明有代理
test1, 2014.1.6 - 2014.1.30,author's server
keyword:sports,security,freedom,smart phone,entertainment
代理是否有选择性?(黑白名单)
test2,2014.10.8-2014.10.15,
Popluar + Business + Porn + Author's
签发者
Malware issuer: "Sendori, Inc", "Web-MakerPlus Ltd", and "IopFailZeroAccessCreate"
不验证合法性: Kurupira , replace untrusted certicate
with a signed trusted one
降级:2048bits, 5951(50%)被修改的证书为1024,21个为512
23(0.2%) MD5,0.06% 2432 bits
伪造签名:49(0.42%) claim signed by DigiCert. Original cert is signed by DigiCert High Assurance CA-3. just copy the field
修改subject: 51(0.43%)
增强证书校验安全性的方法
* multi-path probing:Convergence
* shared password: TLS-SRP
* DNS: DANE
* Cert Pinning
* Cert transparency