Abstract
Recently, high-speed IPv4 scanners, such as ZMap, have enabled rapid and timely collection of TLS certificates and other security-sensitive parameters. Such large datasets led to the development of the Censys search interface, facilitating comprehensive analysis of TLS deployments in the wild. Several recent studies analyzed TLS certificates as deployed in web servers. Beyond public web servers, TLS is deployed in many other Internet-connected devices, at home and enterprise environments, and at network backbones. In this paper, we report the results of a preliminary analysis using Censys on TLS deployments in such devices (e.g., routers, modems, NAS, printers, SCADA, and IoT devices in general). We compare certificates and TLS connection parameters from a security perspective, as found in common devices with Alexa 1M sites. Our results highlight significant weaknesses, and may serve as a catalyst to improve TLS security for these devices.
An extended version of this paper is available as a technical report [27], which additionally includes: analysis of certificate issuers, certificate reuse, DH prime number reuse, stronger cipher suites, and device type ranking.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Adrian, D., Bhargavan, K., Durumeric, Z., Gaudry, P., Green, M., Halderman, J.A., Heninger, N., Springall, D., Thomé, E., Valenta, L., VanderSloot, B., Wustrow, E., Zanella-Béguelink, S., Zimmermann, P.: Imperfect forward secrecy: how Diffie-Hellman fails in practice. In: CCS 2015, Denver, USA, October 2015
Arnaert, M., Bertrand, Y., Boudaoud, K.: Modeling vulnerable internet of things on SHODAN and CENSYS: an ontology for cyber security. In: SECUREWARE 2016, Nice, France, July 2016
ArsTechnica.com. Using IPv6 with Linux? you’ve likely been visited by Shodan and other scanners. News article, 1 February 2016
Aviram, N., Schinzel, S., Somorovsky, J., Heninger, N., Dankel, M., Steube, J., Valenta, L., Adrian, D., Halderman, J.A., Dukhovni, V., Käsper, E., Cohney, S., Engels, S., Paar, C., Shavitt, Y.: DROWN: breaking TLS using SSLv2. In: USENIX Security, Austin, USA, August 2016
Bhargavan, K., Leurent, G.: On the practical (in-)security of 64-bit block ciphers: collision attacks on HTTP over TLS and OpenVPN. In: CCS 2016, October 2016
Chung, T., Liu, Y., Choffnes, D., Levin, D., Maggs, B.M., Mislove, A., Wilson, C.: Measuring and applying invalid SSL certificates: the silent majority. In: IMC 2016 (2016)
Costin, A., Zaddach, J., Francillon, A., Balzarotti, D.: A large-scale analysis of the security of embedded firmwares. In: USENIX Security, August 2014
Costin, A., Zarras, A., Francillon, A.: Automated dynamic firmware analysis at scale: a case study on embedded web interfaces. In: ASIACCS 2016 (2016)
Cui, A., Costello, M., Stolfo, S.J.: When firmware modifications attack: a case study of embedded exploitation. In: NDSS 2013, San Diego, USA, February 2013
Cui, A., Stolfo, S.J.: A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan. In: ACSAC 2010, December 2010
de Carnavalet, X., Mannan, M.: Killed by proxy: analyzing client-end TLS interception software. In: NDSS 2016, San Diego, USA, February 2016
Duong, T., Rizzo, J.: Here come the \(\oplus \) ninjas. Technical report, May 2011
Durumeric, Z., Adrian, D., Mirian, A., Bailey, M., Halderman, J.: A search engine backed by internet-wide scanning. In: CCS 2015, Denver, USA, October 2015
Durumeric, Z., Kasten, J., Adrian, D., Halderman, J.A., Bailey, M., Li, F., Weaver, N., Amann, J., Beekman, J., Payer, M., Paxson, V.: The matter of Heartbleed. In: IMC 2014, Vancouver, Canada, November 2014
Durumeric, Z., Kasten, J., Bailey, M.: Analysis of the HTTPS certificate ecosystem. In: IMC 2013, October 2013
Durumeric, Z., Wustrow, E., Halderman, J.A.: ZMap: fast internet-wide scanning and its security applications. In: USENIX Security, August 2013
Electronic Frontier Foundation. The EFF SSL observatory. https://www.eff.org/observatory
Garman, C., Paterson, K.G., Van der Merwe, T.: Attacks only get better: password recovery attacks against RC4 in TLS. In: USENIX Security, August 2015
Hastings, M., Fried, J., Heninger, N.: Weak keys remain widespread in network devices. In: IMC 2016, Santa Monica, USA, November 2016
Heninger, N., Durumeric, Z., Wustrow, E., Halderman, J.: Mining your Ps and Qs: detection of widespread weak keys in network devices. In: USENIX Security (2012)
Holz, R., Amann, J., Mehani, O., Wachs, M., Kaafar, M.A.: TLS in the wild: an internet-wide analysis of TLS-based protocols for electronic communication. In: NDSS 2016, San Diego, USA, February 2016
Lee, H., Malkin, T., Nahum, E.: Cryptographic strength of SSL/TLS servers. In: IMC 2007, San Diego, USA, October 2007
Möller, B., Duong, T., Kotowicz, K.: This POODLE bites: exploiting the SSL 3.0 fallback. Techical report, September 2014. https://www.openssl.org/bodo/ssl-poodle.pdf
Pa, Y.M.P., Suzuki, S., Yoshioka, K., Matsumoto, T., Kasama, T., Rossow, C.: IoTPOT: analysing the rise of IoT compromises. In: USENIX Security (2015)
ReadWrite.com. Dyn DDoS attack sheds new light on the growing IoT problem. News article, 24 October 2016
Ronen, E., O’Flynn, C., Shamir, A., Weingarten, A.-O.: IoT goes nuclear: creating a ZigBee chain reaction. Cryptology ePrint Archive, Report 2016/1047 (2016)
Samarasinghe, N., Mannan,M.: Short paper: TLS ecosystems in networked devices vs. web servers. Technical report 982186, Concordia University, February 2017. http://spectrum.library.concordia.ca/982186/
Stevens, M., Karpman, P., Peyrin, T.: Freestart collision for full SHA-1. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016. LNCS, vol. 9665, pp. 459–483. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-49890-3_18
Stevens, M., Sotirov, A., Appelbaum, J., Lenstra, A., Molnar, D., Osvik, D.A., de Weger, B.: Short chosen-prefix collisions for MD5 and the creation of a Rogue CA certificate. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 55–69. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-03356-8_4
Wang, X., Yu, H.: How to break MD5 and other hash functions. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19–35. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_2
Acknowledgements
We thank anonymous FC 2017 and IMC 2016 reviewers for their insightful comments and suggestions, and Zakir Durumeric for helping us with Censys. We also appreciate the feedback we received from the members of Concordia’s Madiba Security Research Group, especially, Xavier de Carné de Carnavalet. The second author is supported in part by an NSERC Discovery Grant.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 International Financial Cryptography Association
About this paper
Cite this paper
Samarasinghe, N., Mannan, M. (2017). Short Paper: TLS Ecosystems in Networked Devices vs. Web Servers. In: Kiayias, A. (eds) Financial Cryptography and Data Security. FC 2017. Lecture Notes in Computer Science(), vol 10322. Springer, Cham. https://doi.org/10.1007/978-3-319-70972-7_30
Download citation
DOI: https://doi.org/10.1007/978-3-319-70972-7_30
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-70971-0
Online ISBN: 978-3-319-70972-7
eBook Packages: Computer ScienceComputer Science (R0)