2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS) 2016
DOI: 10.1109/icdcs.2016.91
|View full text |Cite
|
Sign up to set email alerts
|

RITM: Revocation in the Middle

Abstract: Abstract-Although TLS is used on a daily basis by many critical applications, the public-key infrastructure that it relies on still lacks an adequate revocation mechanism. An ideal revocation mechanism should be inexpensive, efficient, secure, and privacypreserving. Moreover, rising trends in pervasive encryption pose new scalability challenges that a modern revocation system should address. In this paper, we investigate how network nodes can deliver certificate-validity information to clients. We present RITM… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 17 publications
(10 citation statements)
references
References 28 publications
0
10
0
Order By: Relevance
“…Short-lived, multisigned certificates greatly reduce the need for a revocation system, but do not completely suppress it. Given that designing a satisfactory revocation system has proven to be an extremely challenging task [25,38,39], we consider it to go beyond the scope of this paper. Nevertheless, the security of BlockPKI can be further improved by combining it with any existing revocation scheme.…”
Section: Discussionmentioning
confidence: 99%
“…Short-lived, multisigned certificates greatly reduce the need for a revocation system, but do not completely suppress it. Given that designing a satisfactory revocation system has proven to be an extremely challenging task [25,38,39], we consider it to go beyond the scope of this paper. Nevertheless, the security of BlockPKI can be further improved by combining it with any existing revocation scheme.…”
Section: Discussionmentioning
confidence: 99%
“…One approach is through a middlebox. Revocation in the Middle (RITM) [8] is one such strategy that distributes revocation information to middleboxes throughout the Internet via a CDN. As the middlebox intercepts traffic, it checks each certificate's revocation status and appends this status to the connection as part of a TLS extension.…”
Section: Network-assisted Revocationmentioning
confidence: 99%
“…For CRLs and OCSP these requirements are highly variable depending on the usage of certificates by a given client, though average costs can be established for both of these strategies. For 7 While other revocation strategies also allow clients to adopt a hard-fail policy (such as OCSP Must-Staple [25] and RITM [8]), no other previously proposed strategy can do so without adding new entities in the PKI ecosystem or forcing relatively high numbers of servers to change their configurations and key management practices.…”
Section: A Efficiencymentioning
confidence: 99%
See 1 more Smart Citation
“…They scanned over the whole Internet and found misconfigured trust relationships between certificate chains that can be exploited. Other studies such as [15], [32] have also analysed the aspect of HTTPS certificate validation and revocation and found several issues that can allow attackers to interfere with the security provided by HTTPS.…”
Section: Related Workmentioning
confidence: 99%