2022
DOI: 10.1109/tdsc.2020.3000595
|View full text |Cite
|
Sign up to set email alerts
|

On the Validation of Web X.509 Certificates by TLS Interception Products

Abstract: The Transport Layer Security (TLS) protocol aims to provide confidentiality and integrity of data. It is based on X.509 Certificates. Our previous research showed that popular Web Browsers exhibit non-standardized behaviour with respect to the certificate validation process [1]. This paper extends that work by examining their handling of OCSP Stapling. We also examine several popular HTTPS interception products, including proxies and anti-virus tools, regarding their certificate validation processes. We analys… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…A Certificate Authority (CA) is a third party trusted by browsers and domain owners alike, issuing such certificates which link a specific domain name to the public key used by the host server. [20] The authentication of a communication endpoint can also build upon the physical presence of a hardware device, either via properties of the device itself (e.g. Physical Unclonable Functions (PUFs) [21]) or via private information stored on the device (e.g.…”
Section: ) Authenticationmentioning
confidence: 99%
“…A Certificate Authority (CA) is a third party trusted by browsers and domain owners alike, issuing such certificates which link a specific domain name to the public key used by the host server. [20] The authentication of a communication endpoint can also build upon the physical presence of a hardware device, either via properties of the device itself (e.g. Physical Unclonable Functions (PUFs) [21]) or via private information stored on the device (e.g.…”
Section: ) Authenticationmentioning
confidence: 99%
“…Web browsers and other client applications must verify the certificate by downloading the CRL or accessing the OCSP responder. Validation of certificates is important to maintain secure communication, and users should carefully perform validation to avoid encrypted communication by unreliable certificates [8,9].…”
Section: Introductionmentioning
confidence: 99%