SlideShare une entreprise Scribd logo
1  sur  14
Télécharger pour lire hors ligne
Improving Revocation In The 
Ssl/Tls Jungle 
By: 
Mohammed Almeshekah 
Security Engineering Team 
! 
August 1st, 2013
Secure Connections (Ssl/Tls) & 
Revocation 
When Firefox connects to a secure (i.e. https) server, a certificate 
must be presented to establish the identity of the server. 
! 
The certificate chain must be valid (not revoked) at all times. Two 
traditional mechanisms exist: 
• CRL (Certificate Revocation List). 
• OCSP (Online Certificate Status Protocol).
What Is Done Currently In Firefox 
Checking (only the end entity) CRL and OCSP -> No response -> 
assume it is trusted!? 
Shipping a new release when major compromise occurs: 
• https://blog.mozilla.org/security/2011/09/02/diginotar-removal-follow-up/
What Did I Do @ Mozilla 
Building a tool to analyze the SSL/TLS Jungle of the Alexa top 1 
million sites (can easily be expanded to analyze the whole IPv4 
address range) 
! 
Building a tool to analyze the revocation dynamics of the Alexa top 1 
million. 
! 
Implement a better approach for certificate revocation in Firefox 
(Preloaded and Dynamic CRLSets).
Crls And Ocsps In The Jungle 
These certificates pointed to 1,774 CRLs and 1,292 authority (OCSP) servers. 
CRLs: 
• Only 987 CRL servers responded [about (~1/2) are dead]. 
• Total size of all CRLs is (~98 MB) [average is ~100 KB]. 
• ~2.65 millions revoked certificates. 
OCSPs: 
• Performance concerns (OCSP for every cert in the chain). 
• CAs learn your browsing habits (privacy concerns). 
• Response takes about 200ms in the US!
The Ssl/Tls Jungle - What Is Revoked? 
Why are certificate being revoked? 
! 
! 
! 
! 
!
The Ssl/Tls Jungle, Contd. 
Clearly we are in a bad shape: 
• Revocation servers are not responding. 
• A LOT of certificates being revoked. 
• CRLs have an overage overhead of 100K (FFOS!). 
• OCSP has privacy concerns, SSL/TLS connections have to ping a CA 
server. 
“Performance vs. Security vs. Privacy” -> Can we do something?
New Revocation Mechanisms 
We need more than one mechanism: 
• We cannot bundle 2.65 million revocation information in Firefox (that is 
only for the Alexa top 1 million). 
! 
Currently two projects are in progress: 
• OCSP Stapling [and must-staple] (by David Keeler) - Stapling is in 
Nightly now. 
‣ https://blog.mozilla.org/security/2013/07/29/ocsp-stapling-in-firefox/ 
• CRLSet.
Revocation Mechanisms
Crlset 
Firefox will be having two CRLSets: 
• Preloaded CRLSet - revoked certificates that come built-in the 
browser. 
• Dynamic CRLSet - seamlessly update the revocation information 
pushing the information to the browsers without having to push new 
releases. 
What to include in the CRLSet?
What To Revoke? 
We can distinguish two major categories: 
• Revocations due to CAs mistakes (e.g mis-issuance, CA compromise, ..) 
• Revocations due to server operators mistakes (server key compromise, 
etc). 
Currently the Preloaded CRLSet is based on the revocation reasons 
in the actual CRLs.
Done & In Progress 
The tools are already uploaded in Github: 
• https://github.com/meshekah/SSL_Certs 
CRLSet: 
• Bug 886471. 
• Preloaded is almost done (final testing and reviews). 
• Dynamic - most of the logic is done, need to bundle the XHR request 
and download the delta file.
Final Thoughts 
SSL/TLS and trust is a BIGger mess than I thought. 
It is very interesting to work on cutting edge ideas that have never 
been implemented before and set the standards. Data is GOLD in 
these cases. 
Special thanks to: 
• Sid Stamm - my great manager. 
• Camilo Viecco - my awesome advisor. 
• Brian Smith.
Thanks 
Presentation available at: 
www.meshekah.com 
Personal Email: meshekah@gmail.com - Twitter: @meshekah

Contenu connexe

En vedette

نظام إدارة المؤسسات التدربية التعليمية
نظام إدارة المؤسسات التدربية التعليميةنظام إدارة المؤسسات التدربية التعليمية
نظام إدارة المؤسسات التدربية التعليميةTrans Gulf information technology
 
امن الشبكات المخاطر والحلول
امن الشبكات المخاطر والحلولامن الشبكات المخاطر والحلول
امن الشبكات المخاطر والحلولabayazed
 
Managing System Security
Managing System SecurityManaging System Security
Managing System SecurityPIREH
 
العرض المرئي عن الشركة عبر الخليج لتقنية المعلومات
 العرض المرئي عن الشركة عبر الخليج لتقنية المعلومات العرض المرئي عن الشركة عبر الخليج لتقنية المعلومات
العرض المرئي عن الشركة عبر الخليج لتقنية المعلوماتTrans Gulf information technology
 
افاق المعرفة- نظام ادارة المكتبات
افاق المعرفة- نظام ادارة المكتبات افاق المعرفة- نظام ادارة المكتبات
افاق المعرفة- نظام ادارة المكتبات Trans Gulf information technology
 
إختبارات في أمن المعلومات It security
إختبارات في أمن المعلومات It securityإختبارات في أمن المعلومات It security
إختبارات في أمن المعلومات It securitySherief Elmetwali
 
شبكات و أمن المعلومات 1
شبكات و أمن المعلومات 1شبكات و أمن المعلومات 1
شبكات و أمن المعلومات 1emad tawfeek
 
أساسيات أمن المعلومات
أساسيات أمن المعلوماتأساسيات أمن المعلومات
أساسيات أمن المعلوماتMohammed Almeshekah
 
information security
information securityinformation security
information securityMoamen Ayyad
 
Security of the database
Security of the databaseSecurity of the database
Security of the databasePratik Tamgadge
 
الوحدة السابعة - قاعدة البيانات وادارتها
الوحدة السابعة - قاعدة البيانات وادارتهاالوحدة السابعة - قاعدة البيانات وادارتها
الوحدة السابعة - قاعدة البيانات وادارتهاAmin Abu Hammad
 
TRANSMISION DE DATOS Resumen UNIDAD I UFT OPM 1.A
TRANSMISION DE DATOS Resumen UNIDAD I UFT OPM 1.ATRANSMISION DE DATOS Resumen UNIDAD I UFT OPM 1.A
TRANSMISION DE DATOS Resumen UNIDAD I UFT OPM 1.Aopereira2705
 

En vedette (17)

Truth and Consequences
Truth and ConsequencesTruth and Consequences
Truth and Consequences
 
منهجية قانون الانترنيت
منهجية قانون الانترنيتمنهجية قانون الانترنيت
منهجية قانون الانترنيت
 
نظام إدارة المؤسسات التدربية التعليمية
نظام إدارة المؤسسات التدربية التعليميةنظام إدارة المؤسسات التدربية التعليمية
نظام إدارة المؤسسات التدربية التعليمية
 
قضايا معرفية في الأمن السبراني
قضايا معرفية في الأمن السبرانيقضايا معرفية في الأمن السبراني
قضايا معرفية في الأمن السبراني
 
امن الشبكات المخاطر والحلول
امن الشبكات المخاطر والحلولامن الشبكات المخاطر والحلول
امن الشبكات المخاطر والحلول
 
Managing System Security
Managing System SecurityManaging System Security
Managing System Security
 
العرض المرئي عن الشركة عبر الخليج لتقنية المعلومات
 العرض المرئي عن الشركة عبر الخليج لتقنية المعلومات العرض المرئي عن الشركة عبر الخليج لتقنية المعلومات
العرض المرئي عن الشركة عبر الخليج لتقنية المعلومات
 
افاق المعرفة- نظام ادارة المكتبات
افاق المعرفة- نظام ادارة المكتبات افاق المعرفة- نظام ادارة المكتبات
افاق المعرفة- نظام ادارة المكتبات
 
مسودة مشروع قانون المعاملات الالكترونية الليبي
مسودة مشروع قانون المعاملات الالكترونية الليبيمسودة مشروع قانون المعاملات الالكترونية الليبي
مسودة مشروع قانون المعاملات الالكترونية الليبي
 
إختبارات في أمن المعلومات It security
إختبارات في أمن المعلومات It securityإختبارات في أمن المعلومات It security
إختبارات في أمن المعلومات It security
 
شبكات و أمن المعلومات 1
شبكات و أمن المعلومات 1شبكات و أمن المعلومات 1
شبكات و أمن المعلومات 1
 
أساسيات أمن المعلومات
أساسيات أمن المعلوماتأساسيات أمن المعلومات
أساسيات أمن المعلومات
 
information security
information securityinformation security
information security
 
Security of the database
Security of the databaseSecurity of the database
Security of the database
 
الوحدة السابعة - قاعدة البيانات وادارتها
الوحدة السابعة - قاعدة البيانات وادارتهاالوحدة السابعة - قاعدة البيانات وادارتها
الوحدة السابعة - قاعدة البيانات وادارتها
 
أمن المعلومات 4
أمن المعلومات 4أمن المعلومات 4
أمن المعلومات 4
 
TRANSMISION DE DATOS Resumen UNIDAD I UFT OPM 1.A
TRANSMISION DE DATOS Resumen UNIDAD I UFT OPM 1.ATRANSMISION DE DATOS Resumen UNIDAD I UFT OPM 1.A
TRANSMISION DE DATOS Resumen UNIDAD I UFT OPM 1.A
 

Dernier

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 

Dernier (20)

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 

Improving Revocation in the SSL/TLS jungle - Firefox Approach

  • 1. Improving Revocation In The Ssl/Tls Jungle By: Mohammed Almeshekah Security Engineering Team ! August 1st, 2013
  • 2. Secure Connections (Ssl/Tls) & Revocation When Firefox connects to a secure (i.e. https) server, a certificate must be presented to establish the identity of the server. ! The certificate chain must be valid (not revoked) at all times. Two traditional mechanisms exist: • CRL (Certificate Revocation List). • OCSP (Online Certificate Status Protocol).
  • 3. What Is Done Currently In Firefox Checking (only the end entity) CRL and OCSP -> No response -> assume it is trusted!? Shipping a new release when major compromise occurs: • https://blog.mozilla.org/security/2011/09/02/diginotar-removal-follow-up/
  • 4. What Did I Do @ Mozilla Building a tool to analyze the SSL/TLS Jungle of the Alexa top 1 million sites (can easily be expanded to analyze the whole IPv4 address range) ! Building a tool to analyze the revocation dynamics of the Alexa top 1 million. ! Implement a better approach for certificate revocation in Firefox (Preloaded and Dynamic CRLSets).
  • 5. Crls And Ocsps In The Jungle These certificates pointed to 1,774 CRLs and 1,292 authority (OCSP) servers. CRLs: • Only 987 CRL servers responded [about (~1/2) are dead]. • Total size of all CRLs is (~98 MB) [average is ~100 KB]. • ~2.65 millions revoked certificates. OCSPs: • Performance concerns (OCSP for every cert in the chain). • CAs learn your browsing habits (privacy concerns). • Response takes about 200ms in the US!
  • 6. The Ssl/Tls Jungle - What Is Revoked? Why are certificate being revoked? ! ! ! ! !
  • 7. The Ssl/Tls Jungle, Contd. Clearly we are in a bad shape: • Revocation servers are not responding. • A LOT of certificates being revoked. • CRLs have an overage overhead of 100K (FFOS!). • OCSP has privacy concerns, SSL/TLS connections have to ping a CA server. “Performance vs. Security vs. Privacy” -> Can we do something?
  • 8. New Revocation Mechanisms We need more than one mechanism: • We cannot bundle 2.65 million revocation information in Firefox (that is only for the Alexa top 1 million). ! Currently two projects are in progress: • OCSP Stapling [and must-staple] (by David Keeler) - Stapling is in Nightly now. ‣ https://blog.mozilla.org/security/2013/07/29/ocsp-stapling-in-firefox/ • CRLSet.
  • 10. Crlset Firefox will be having two CRLSets: • Preloaded CRLSet - revoked certificates that come built-in the browser. • Dynamic CRLSet - seamlessly update the revocation information pushing the information to the browsers without having to push new releases. What to include in the CRLSet?
  • 11. What To Revoke? We can distinguish two major categories: • Revocations due to CAs mistakes (e.g mis-issuance, CA compromise, ..) • Revocations due to server operators mistakes (server key compromise, etc). Currently the Preloaded CRLSet is based on the revocation reasons in the actual CRLs.
  • 12. Done & In Progress The tools are already uploaded in Github: • https://github.com/meshekah/SSL_Certs CRLSet: • Bug 886471. • Preloaded is almost done (final testing and reviews). • Dynamic - most of the logic is done, need to bundle the XHR request and download the delta file.
  • 13. Final Thoughts SSL/TLS and trust is a BIGger mess than I thought. It is very interesting to work on cutting edge ideas that have never been implemented before and set the standards. Data is GOLD in these cases. Special thanks to: • Sid Stamm - my great manager. • Camilo Viecco - my awesome advisor. • Brian Smith.
  • 14. Thanks Presentation available at: www.meshekah.com Personal Email: meshekah@gmail.com - Twitter: @meshekah