Exploiting TLS Client Authentication for Widespread User Tracking

  • Foppe L
  • Martin J
  • Mayberry T
  • et al.
N/ACitations
Citations of this article
9Readers
Mendeley users who have this article in their library.

Abstract

TLS, and SSL before it, has long supported the option for clients to authenticate to servers using their own certificates, but this capability has not been widely used. However, with the development of its Push Notification Service, Apple has deployed this technology on millions of devices for the first time. Wachs et al. [42] determined iOS client certificates could be used by passive network adversaries to track individual devices across the internet. Subsequently, Apple has patched their software to fix this vulnerability. We show these countermeasures are not effective by demonstrating three novel active attacks against TLS Client Certificate Authentication that are successful despite the defenses. Additionally, we show these attacks work against all known instances of TLS Client Certificate Authentication, including smart cards like those widely deployed by the Estonian government as part of their Digital ID program. Our attacks include in-path man-in-the-middle versions as well as a more powerful on-path attack that can be carried out without full network control.

Cite

CITATION STYLE

APA

Foppe, L., Martin, J., Mayberry, T., Rye, E. C., & Brown, L. (2018). Exploiting TLS Client Authentication for Widespread User Tracking. Proceedings on Privacy Enhancing Technologies, 2018(4), 51–63. https://doi.org/10.1515/popets-2018-0031

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free