In Log We Trust: Revealing Poor Security Practices with Certificate Transparency Logs and Internet Measurements

24Citations
Citations of this article
25Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In recent years, multiple security incidents involving Certificate Authority (CA) misconduct demonstrated the need for strengthened certificate issuance processes. Certificate Transparency (CT) logs make the issuance publicly traceable and auditable. In this paper, we leverage the information in CT logs to analyze if certificates adhere to the industry’s Baseline Requirements. We find 907 k certificates in violation of Baseline Requirements, which we pinpoint to issuing CAs. Using data from active measurements we compare certificate deployment to logged certificates, identify non-HTTPS certificates in logs, evaluate CT-specific HTTP headers, and augment IP address hitlists using data from CT logs. Moreover, we conduct passive and active measurements to carry out a first analysis of CT’s gossiping and pollination approaches, finding low deployment. We encourage the reproducibility of network measurement research by publishing data from active scans, measurement programs, and analysis tools.

Cite

CITATION STYLE

APA

Gasser, O., Hof, B., Helm, M., Korczynski, M., Holz, R., & Carle, G. (2018). In Log We Trust: Revealing Poor Security Practices with Certificate Transparency Logs and Internet Measurements. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10771 LNCS, pp. 173–185). Springer Verlag. https://doi.org/10.1007/978-3-319-76481-8_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free