SlideShare uma empresa Scribd logo
1 de 14
Baixar para ler offline
Improving Revocation In The 
Ssl/Tls Jungle 
By: 
Mohammed Almeshekah 
Security Engineering Team 
! 
August 1st, 2013
Secure Connections (Ssl/Tls) & 
Revocation 
When Firefox connects to a secure (i.e. https) server, a certificate 
must be presented to establish the identity of the server. 
! 
The certificate chain must be valid (not revoked) at all times. Two 
traditional mechanisms exist: 
• CRL (Certificate Revocation List). 
• OCSP (Online Certificate Status Protocol).
What Is Done Currently In Firefox 
Checking (only the end entity) CRL and OCSP -> No response -> 
assume it is trusted!? 
Shipping a new release when major compromise occurs: 
• https://blog.mozilla.org/security/2011/09/02/diginotar-removal-follow-up/
What Did I Do @ Mozilla 
Building a tool to analyze the SSL/TLS Jungle of the Alexa top 1 
million sites (can easily be expanded to analyze the whole IPv4 
address range) 
! 
Building a tool to analyze the revocation dynamics of the Alexa top 1 
million. 
! 
Implement a better approach for certificate revocation in Firefox 
(Preloaded and Dynamic CRLSets).
Crls And Ocsps In The Jungle 
These certificates pointed to 1,774 CRLs and 1,292 authority (OCSP) servers. 
CRLs: 
• Only 987 CRL servers responded [about (~1/2) are dead]. 
• Total size of all CRLs is (~98 MB) [average is ~100 KB]. 
• ~2.65 millions revoked certificates. 
OCSPs: 
• Performance concerns (OCSP for every cert in the chain). 
• CAs learn your browsing habits (privacy concerns). 
• Response takes about 200ms in the US!
The Ssl/Tls Jungle - What Is Revoked? 
Why are certificate being revoked? 
! 
! 
! 
! 
!
The Ssl/Tls Jungle, Contd. 
Clearly we are in a bad shape: 
• Revocation servers are not responding. 
• A LOT of certificates being revoked. 
• CRLs have an overage overhead of 100K (FFOS!). 
• OCSP has privacy concerns, SSL/TLS connections have to ping a CA 
server. 
“Performance vs. Security vs. Privacy” -> Can we do something?
New Revocation Mechanisms 
We need more than one mechanism: 
• We cannot bundle 2.65 million revocation information in Firefox (that is 
only for the Alexa top 1 million). 
! 
Currently two projects are in progress: 
• OCSP Stapling [and must-staple] (by David Keeler) - Stapling is in 
Nightly now. 
‣ https://blog.mozilla.org/security/2013/07/29/ocsp-stapling-in-firefox/ 
• CRLSet.
Revocation Mechanisms
Crlset 
Firefox will be having two CRLSets: 
• Preloaded CRLSet - revoked certificates that come built-in the 
browser. 
• Dynamic CRLSet - seamlessly update the revocation information 
pushing the information to the browsers without having to push new 
releases. 
What to include in the CRLSet?
What To Revoke? 
We can distinguish two major categories: 
• Revocations due to CAs mistakes (e.g mis-issuance, CA compromise, ..) 
• Revocations due to server operators mistakes (server key compromise, 
etc). 
Currently the Preloaded CRLSet is based on the revocation reasons 
in the actual CRLs.
Done & In Progress 
The tools are already uploaded in Github: 
• https://github.com/meshekah/SSL_Certs 
CRLSet: 
• Bug 886471. 
• Preloaded is almost done (final testing and reviews). 
• Dynamic - most of the logic is done, need to bundle the XHR request 
and download the delta file.
Final Thoughts 
SSL/TLS and trust is a BIGger mess than I thought. 
It is very interesting to work on cutting edge ideas that have never 
been implemented before and set the standards. Data is GOLD in 
these cases. 
Special thanks to: 
• Sid Stamm - my great manager. 
• Camilo Viecco - my awesome advisor. 
• Brian Smith.
Thanks 
Presentation available at: 
www.meshekah.com 
Personal Email: meshekah@gmail.com - Twitter: @meshekah

Mais conteúdo relacionado

Destaque

نظام إدارة المؤسسات التدربية التعليمية
نظام إدارة المؤسسات التدربية التعليميةنظام إدارة المؤسسات التدربية التعليمية
نظام إدارة المؤسسات التدربية التعليميةTrans Gulf information technology
 
امن الشبكات المخاطر والحلول
امن الشبكات المخاطر والحلولامن الشبكات المخاطر والحلول
امن الشبكات المخاطر والحلولabayazed
 
Managing System Security
Managing System SecurityManaging System Security
Managing System SecurityPIREH
 
العرض المرئي عن الشركة عبر الخليج لتقنية المعلومات
 العرض المرئي عن الشركة عبر الخليج لتقنية المعلومات العرض المرئي عن الشركة عبر الخليج لتقنية المعلومات
العرض المرئي عن الشركة عبر الخليج لتقنية المعلوماتTrans Gulf information technology
 
افاق المعرفة- نظام ادارة المكتبات
افاق المعرفة- نظام ادارة المكتبات افاق المعرفة- نظام ادارة المكتبات
افاق المعرفة- نظام ادارة المكتبات Trans Gulf information technology
 
إختبارات في أمن المعلومات It security
إختبارات في أمن المعلومات It securityإختبارات في أمن المعلومات It security
إختبارات في أمن المعلومات It securitySherief Elmetwali
 
شبكات و أمن المعلومات 1
شبكات و أمن المعلومات 1شبكات و أمن المعلومات 1
شبكات و أمن المعلومات 1emad tawfeek
 
أساسيات أمن المعلومات
أساسيات أمن المعلوماتأساسيات أمن المعلومات
أساسيات أمن المعلوماتMohammed Almeshekah
 
information security
information securityinformation security
information securityMoamen Ayyad
 
Security of the database
Security of the databaseSecurity of the database
Security of the databasePratik Tamgadge
 
الوحدة السابعة - قاعدة البيانات وادارتها
الوحدة السابعة - قاعدة البيانات وادارتهاالوحدة السابعة - قاعدة البيانات وادارتها
الوحدة السابعة - قاعدة البيانات وادارتهاAmin Abu Hammad
 
TRANSMISION DE DATOS Resumen UNIDAD I UFT OPM 1.A
TRANSMISION DE DATOS Resumen UNIDAD I UFT OPM 1.ATRANSMISION DE DATOS Resumen UNIDAD I UFT OPM 1.A
TRANSMISION DE DATOS Resumen UNIDAD I UFT OPM 1.Aopereira2705
 

Destaque (17)

Truth and Consequences
Truth and ConsequencesTruth and Consequences
Truth and Consequences
 
منهجية قانون الانترنيت
منهجية قانون الانترنيتمنهجية قانون الانترنيت
منهجية قانون الانترنيت
 
نظام إدارة المؤسسات التدربية التعليمية
نظام إدارة المؤسسات التدربية التعليميةنظام إدارة المؤسسات التدربية التعليمية
نظام إدارة المؤسسات التدربية التعليمية
 
قضايا معرفية في الأمن السبراني
قضايا معرفية في الأمن السبرانيقضايا معرفية في الأمن السبراني
قضايا معرفية في الأمن السبراني
 
امن الشبكات المخاطر والحلول
امن الشبكات المخاطر والحلولامن الشبكات المخاطر والحلول
امن الشبكات المخاطر والحلول
 
Managing System Security
Managing System SecurityManaging System Security
Managing System Security
 
العرض المرئي عن الشركة عبر الخليج لتقنية المعلومات
 العرض المرئي عن الشركة عبر الخليج لتقنية المعلومات العرض المرئي عن الشركة عبر الخليج لتقنية المعلومات
العرض المرئي عن الشركة عبر الخليج لتقنية المعلومات
 
افاق المعرفة- نظام ادارة المكتبات
افاق المعرفة- نظام ادارة المكتبات افاق المعرفة- نظام ادارة المكتبات
افاق المعرفة- نظام ادارة المكتبات
 
مسودة مشروع قانون المعاملات الالكترونية الليبي
مسودة مشروع قانون المعاملات الالكترونية الليبيمسودة مشروع قانون المعاملات الالكترونية الليبي
مسودة مشروع قانون المعاملات الالكترونية الليبي
 
إختبارات في أمن المعلومات It security
إختبارات في أمن المعلومات It securityإختبارات في أمن المعلومات It security
إختبارات في أمن المعلومات It security
 
شبكات و أمن المعلومات 1
شبكات و أمن المعلومات 1شبكات و أمن المعلومات 1
شبكات و أمن المعلومات 1
 
أساسيات أمن المعلومات
أساسيات أمن المعلوماتأساسيات أمن المعلومات
أساسيات أمن المعلومات
 
information security
information securityinformation security
information security
 
Security of the database
Security of the databaseSecurity of the database
Security of the database
 
الوحدة السابعة - قاعدة البيانات وادارتها
الوحدة السابعة - قاعدة البيانات وادارتهاالوحدة السابعة - قاعدة البيانات وادارتها
الوحدة السابعة - قاعدة البيانات وادارتها
 
أمن المعلومات 4
أمن المعلومات 4أمن المعلومات 4
أمن المعلومات 4
 
TRANSMISION DE DATOS Resumen UNIDAD I UFT OPM 1.A
TRANSMISION DE DATOS Resumen UNIDAD I UFT OPM 1.ATRANSMISION DE DATOS Resumen UNIDAD I UFT OPM 1.A
TRANSMISION DE DATOS Resumen UNIDAD I UFT OPM 1.A
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Último (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Improving Revocation in the SSL/TLS jungle - Firefox Approach

  • 1. Improving Revocation In The Ssl/Tls Jungle By: Mohammed Almeshekah Security Engineering Team ! August 1st, 2013
  • 2. Secure Connections (Ssl/Tls) & Revocation When Firefox connects to a secure (i.e. https) server, a certificate must be presented to establish the identity of the server. ! The certificate chain must be valid (not revoked) at all times. Two traditional mechanisms exist: • CRL (Certificate Revocation List). • OCSP (Online Certificate Status Protocol).
  • 3. What Is Done Currently In Firefox Checking (only the end entity) CRL and OCSP -> No response -> assume it is trusted!? Shipping a new release when major compromise occurs: • https://blog.mozilla.org/security/2011/09/02/diginotar-removal-follow-up/
  • 4. What Did I Do @ Mozilla Building a tool to analyze the SSL/TLS Jungle of the Alexa top 1 million sites (can easily be expanded to analyze the whole IPv4 address range) ! Building a tool to analyze the revocation dynamics of the Alexa top 1 million. ! Implement a better approach for certificate revocation in Firefox (Preloaded and Dynamic CRLSets).
  • 5. Crls And Ocsps In The Jungle These certificates pointed to 1,774 CRLs and 1,292 authority (OCSP) servers. CRLs: • Only 987 CRL servers responded [about (~1/2) are dead]. • Total size of all CRLs is (~98 MB) [average is ~100 KB]. • ~2.65 millions revoked certificates. OCSPs: • Performance concerns (OCSP for every cert in the chain). • CAs learn your browsing habits (privacy concerns). • Response takes about 200ms in the US!
  • 6. The Ssl/Tls Jungle - What Is Revoked? Why are certificate being revoked? ! ! ! ! !
  • 7. The Ssl/Tls Jungle, Contd. Clearly we are in a bad shape: • Revocation servers are not responding. • A LOT of certificates being revoked. • CRLs have an overage overhead of 100K (FFOS!). • OCSP has privacy concerns, SSL/TLS connections have to ping a CA server. “Performance vs. Security vs. Privacy” -> Can we do something?
  • 8. New Revocation Mechanisms We need more than one mechanism: • We cannot bundle 2.65 million revocation information in Firefox (that is only for the Alexa top 1 million). ! Currently two projects are in progress: • OCSP Stapling [and must-staple] (by David Keeler) - Stapling is in Nightly now. ‣ https://blog.mozilla.org/security/2013/07/29/ocsp-stapling-in-firefox/ • CRLSet.
  • 10. Crlset Firefox will be having two CRLSets: • Preloaded CRLSet - revoked certificates that come built-in the browser. • Dynamic CRLSet - seamlessly update the revocation information pushing the information to the browsers without having to push new releases. What to include in the CRLSet?
  • 11. What To Revoke? We can distinguish two major categories: • Revocations due to CAs mistakes (e.g mis-issuance, CA compromise, ..) • Revocations due to server operators mistakes (server key compromise, etc). Currently the Preloaded CRLSet is based on the revocation reasons in the actual CRLs.
  • 12. Done & In Progress The tools are already uploaded in Github: • https://github.com/meshekah/SSL_Certs CRLSet: • Bug 886471. • Preloaded is almost done (final testing and reviews). • Dynamic - most of the logic is done, need to bundle the XHR request and download the delta file.
  • 13. Final Thoughts SSL/TLS and trust is a BIGger mess than I thought. It is very interesting to work on cutting edge ideas that have never been implemented before and set the standards. Data is GOLD in these cases. Special thanks to: • Sid Stamm - my great manager. • Camilo Viecco - my awesome advisor. • Brian Smith.
  • 14. Thanks Presentation available at: www.meshekah.com Personal Email: meshekah@gmail.com - Twitter: @meshekah