Analysis of SSL certificate reissues and revocations in the wake of heartbleed

ZhangLiang, ChoffnesDavid, DumitraşTudor, LevinDave, MisloveAlan, SchulmanAaron, WilsonChristo

Commun. ACM(2018)

引用 67|浏览508
暂无评分
摘要
A properly managed public key infrastructure (PKI) is critical to ensure secure communication on the Internet. Surprisingly, some of the most important administrative steps---in particular, reissuing new X.509 certificates and revoking old ones---are manual and remained unstudied, largely because it is difficult to measure these manual processes at scale. We use Heartbleed, a widespread OpenSSL vulnerability from 2014, as a natural experiment to determine whether administrators are properly managing their certificates. All domains affected by Heartbleed should have patched their software, revoked their old (possibly compromised) certificates, and reissued new ones, all as quickly as possible. We find the reality to be far from the ideal: over 73% of vulnerable certificates were not reissued and over 87% were not revoked three weeks after Heartbleed was disclosed. Our results also show a drastic decline in revocations on the weekends, even immediately following the Heartbleed announcement. These results are an important step in understanding the manual processes on which users rely for secure, authenticated communication.
更多
查看译文
关键词
reissue,extended validation,ssl,heartbleed,https,revocation,tls,network operations,x.509,network protocols,certificates,x 509
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要