Investigating Large Scale HTTPS Interception in Kazakhstan

38Citations
Citations of this article
27Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Increased adoption of HTTPS has created a largely encrypted web, but these security gains are on a collision course with governments that desire visibility into and control over user communications. Last year, the government of Kazakhstan conducted an unprecedented large-scale HTTPS interception attack by forcing users to trust a custom root certificate. We were able to detect the interception and monitor its scale and evolution using measurements from in-country vantage points and remote measurement techniques. We find that the attack targeted connections to 37 unique domains, with a focus on social media and communication services, suggesting a surveillance motive, and that it affected a large fraction of connections passing through the country's largest ISP, Kazakhtelecom. Our continuous real-time measurements indicated that the interception system was shut down after being intermittently active for 21 days. Subsequently, supported by our findings, two major browsers (Mozilla Firefox and Google Chrome) completely blocked the use of Kazakhstan's custom root. However, the incident sets a dangerous precedent, not only for Kazakhstan but for other countries that may seek to circumvent encryption online.

Cite

CITATION STYLE

APA

Raman, R. S., Evdokimov, L., Wurstrow, E., Alex Halderman, J., & Ensafi, R. (2020). Investigating Large Scale HTTPS Interception in Kazakhstan. In Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC (pp. 125–132). Association for Computing Machinery. https://doi.org/10.1145/3419394.3423665

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free