Skip to main content

Short Paper: TLS Ecosystems in Networked Devices vs. Web Servers

  • Conference paper
Book cover Financial Cryptography and Data Security (FC 2017)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10322))

Included in the following conference series:

Abstract

Recently, high-speed IPv4 scanners, such as ZMap, have enabled rapid and timely collection of TLS certificates and other security-sensitive parameters. Such large datasets led to the development of the Censys search interface, facilitating comprehensive analysis of TLS deployments in the wild. Several recent studies analyzed TLS certificates as deployed in web servers. Beyond public web servers, TLS is deployed in many other Internet-connected devices, at home and enterprise environments, and at network backbones. In this paper, we report the results of a preliminary analysis using Censys on TLS deployments in such devices (e.g., routers, modems, NAS, printers, SCADA, and IoT devices in general). We compare certificates and TLS connection parameters from a security perspective, as found in common devices with Alexa 1M sites. Our results highlight significant weaknesses, and may serve as a catalyst to improve TLS security for these devices.

An extended version of this paper is available as a technical report [27], which additionally includes: analysis of certificate issuers, certificate reuse, DH prime number reuse, stronger cipher suites, and device type ranking.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Adrian, D., Bhargavan, K., Durumeric, Z., Gaudry, P., Green, M., Halderman, J.A., Heninger, N., Springall, D., Thomé, E., Valenta, L., VanderSloot, B., Wustrow, E., Zanella-Béguelink, S., Zimmermann, P.: Imperfect forward secrecy: how Diffie-Hellman fails in practice. In: CCS 2015, Denver, USA, October 2015

    Google Scholar 

  2. Arnaert, M., Bertrand, Y., Boudaoud, K.: Modeling vulnerable internet of things on SHODAN and CENSYS: an ontology for cyber security. In: SECUREWARE 2016, Nice, France, July 2016

    Google Scholar 

  3. ArsTechnica.com. Using IPv6 with Linux? you’ve likely been visited by Shodan and other scanners. News article, 1 February 2016

    Google Scholar 

  4. Aviram, N., Schinzel, S., Somorovsky, J., Heninger, N., Dankel, M., Steube, J., Valenta, L., Adrian, D., Halderman, J.A., Dukhovni, V., Käsper, E., Cohney, S., Engels, S., Paar, C., Shavitt, Y.: DROWN: breaking TLS using SSLv2. In: USENIX Security, Austin, USA, August 2016

    Google Scholar 

  5. Bhargavan, K., Leurent, G.: On the practical (in-)security of 64-bit block ciphers: collision attacks on HTTP over TLS and OpenVPN. In: CCS 2016, October 2016

    Google Scholar 

  6. Chung, T., Liu, Y., Choffnes, D., Levin, D., Maggs, B.M., Mislove, A., Wilson, C.: Measuring and applying invalid SSL certificates: the silent majority. In: IMC 2016 (2016)

    Google Scholar 

  7. Costin, A., Zaddach, J., Francillon, A., Balzarotti, D.: A large-scale analysis of the security of embedded firmwares. In: USENIX Security, August 2014

    Google Scholar 

  8. Costin, A., Zarras, A., Francillon, A.: Automated dynamic firmware analysis at scale: a case study on embedded web interfaces. In: ASIACCS 2016 (2016)

    Google Scholar 

  9. Cui, A., Costello, M., Stolfo, S.J.: When firmware modifications attack: a case study of embedded exploitation. In: NDSS 2013, San Diego, USA, February 2013

    Google Scholar 

  10. Cui, A., Stolfo, S.J.: A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan. In: ACSAC 2010, December 2010

    Google Scholar 

  11. de Carnavalet, X., Mannan, M.: Killed by proxy: analyzing client-end TLS interception software. In: NDSS 2016, San Diego, USA, February 2016

    Google Scholar 

  12. Duong, T., Rizzo, J.: Here come the \(\oplus \) ninjas. Technical report, May 2011

    Google Scholar 

  13. Durumeric, Z., Adrian, D., Mirian, A., Bailey, M., Halderman, J.: A search engine backed by internet-wide scanning. In: CCS 2015, Denver, USA, October 2015

    Google Scholar 

  14. Durumeric, Z., Kasten, J., Adrian, D., Halderman, J.A., Bailey, M., Li, F., Weaver, N., Amann, J., Beekman, J., Payer, M., Paxson, V.: The matter of Heartbleed. In: IMC 2014, Vancouver, Canada, November 2014

    Google Scholar 

  15. Durumeric, Z., Kasten, J., Bailey, M.: Analysis of the HTTPS certificate ecosystem. In: IMC 2013, October 2013

    Google Scholar 

  16. Durumeric, Z., Wustrow, E., Halderman, J.A.: ZMap: fast internet-wide scanning and its security applications. In: USENIX Security, August 2013

    Google Scholar 

  17. Electronic Frontier Foundation. The EFF SSL observatory. https://www.eff.org/observatory

  18. Garman, C., Paterson, K.G., Van der Merwe, T.: Attacks only get better: password recovery attacks against RC4 in TLS. In: USENIX Security, August 2015

    Google Scholar 

  19. Hastings, M., Fried, J., Heninger, N.: Weak keys remain widespread in network devices. In: IMC 2016, Santa Monica, USA, November 2016

    Google Scholar 

  20. Heninger, N., Durumeric, Z., Wustrow, E., Halderman, J.: Mining your Ps and Qs: detection of widespread weak keys in network devices. In: USENIX Security (2012)

    Google Scholar 

  21. Holz, R., Amann, J., Mehani, O., Wachs, M., Kaafar, M.A.: TLS in the wild: an internet-wide analysis of TLS-based protocols for electronic communication. In: NDSS 2016, San Diego, USA, February 2016

    Google Scholar 

  22. Lee, H., Malkin, T., Nahum, E.: Cryptographic strength of SSL/TLS servers. In: IMC 2007, San Diego, USA, October 2007

    Google Scholar 

  23. Möller, B., Duong, T., Kotowicz, K.: This POODLE bites: exploiting the SSL 3.0 fallback. Techical report, September 2014. https://www.openssl.org/bodo/ssl-poodle.pdf

  24. Pa, Y.M.P., Suzuki, S., Yoshioka, K., Matsumoto, T., Kasama, T., Rossow, C.: IoTPOT: analysing the rise of IoT compromises. In: USENIX Security (2015)

    Google Scholar 

  25. ReadWrite.com. Dyn DDoS attack sheds new light on the growing IoT problem. News article, 24 October 2016

    Google Scholar 

  26. Ronen, E., O’Flynn, C., Shamir, A., Weingarten, A.-O.: IoT goes nuclear: creating a ZigBee chain reaction. Cryptology ePrint Archive, Report 2016/1047 (2016)

    Google Scholar 

  27. Samarasinghe, N., Mannan,M.: Short paper: TLS ecosystems in networked devices vs. web servers. Technical report 982186, Concordia University, February 2017. http://spectrum.library.concordia.ca/982186/

  28. Stevens, M., Karpman, P., Peyrin, T.: Freestart collision for full SHA-1. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016. LNCS, vol. 9665, pp. 459–483. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-49890-3_18

    Chapter  Google Scholar 

  29. Stevens, M., Sotirov, A., Appelbaum, J., Lenstra, A., Molnar, D., Osvik, D.A., de Weger, B.: Short chosen-prefix collisions for MD5 and the creation of a Rogue CA certificate. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 55–69. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-03356-8_4

    Chapter  Google Scholar 

  30. Wang, X., Yu, H.: How to break MD5 and other hash functions. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19–35. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_2

    Chapter  Google Scholar 

Download references

Acknowledgements

We thank anonymous FC 2017 and IMC 2016 reviewers for their insightful comments and suggestions, and Zakir Durumeric for helping us with Censys. We also appreciate the feedback we received from the members of Concordia’s Madiba Security Research Group, especially, Xavier de Carné de Carnavalet. The second author is supported in part by an NSERC Discovery Grant.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nayanamana Samarasinghe .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 International Financial Cryptography Association

About this paper

Cite this paper

Samarasinghe, N., Mannan, M. (2017). Short Paper: TLS Ecosystems in Networked Devices vs. Web Servers. In: Kiayias, A. (eds) Financial Cryptography and Data Security. FC 2017. Lecture Notes in Computer Science(), vol 10322. Springer, Cham. https://doi.org/10.1007/978-3-319-70972-7_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-70972-7_30

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-70971-0

  • Online ISBN: 978-3-319-70972-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics