论文标题

表征证书透明度日志的根部景观

Characterizing the Root Landscape of Certificate Transparency Logs

论文作者

Korzhitskii, Nikita, Carlsson, Niklas

论文摘要

Internet安全和隐私立场是由证书权限(CAS)签署的公共证书的可信赖性。但是,软件产品不信任相同的CAS,因此要维护不同的根商店,每个商店通常包含数百个能够为任何域发布“可信赖”证书的可信根。误会证书的事件激发了Google执行和执行证书透明度(CT)。 CT以公开,可审计和仅附加方式记录档案证书。 CT的采用改变了信托格局。作为此更改的一部分,CT日志开始维护自己的根列表和日志证书,并将其链回到一个受信任的根之一中。在本文中,我们介绍了这种新兴的CT根商店景观的第一个表征,以及我们开发的用于数据收集,可视化和根存储分析的工具。我们比较日志的根存储,并相互量化它们的变化,以及主要软件供应商的根存储,查看不断发展的供应商CT策略,并表明根存储的管理不善可能与log不当行为有关。最后,我们介绍并讨论了我们已发送给参与Apple和Google CT日志程序的日志运营商的调查结果。

Internet security and privacy stand on the trustworthiness of public certificates signed by Certificate Authorities (CAs). However, software products do not trust the same CAs and therefore maintain different root stores, each typically containing hundreds of trusted roots capable of issuing "trusted" certificates for any domain. Incidents with misissued certificates motivated Google to implement and enforce Certificate Transparency (CT). CT logs archive certificates in a public, auditable and append-only manner. The adoption of CT changed the trust landscape. As a part of this change, CT logs started to maintain their own root lists and log certificates that chain back to one of the trusted roots. In this paper, we present the first characterization of this emerging CT root store landscape, as well as the tool that we developed for data collection, visualization, and analysis of the root stores. We compare the logs' root stores and quantify their changes with respect to both each other and the root stores of major software vendors, look at evolving vendor CT policies, and show that root store mismanagement may be linked to log misbehavior. Finally, we present and discuss the results of a survey that we have sent to the log operators participating in Apple's and Google's CT log programs.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源