Proceedings 2017 Network and Distributed System Security Symposium 2017
DOI: 10.14722/ndss.2017.23456
|View full text |Cite
|
Sign up to set email alerts
|

The Security Impact of HTTPS Interception

Abstract: As HTTPS deployment grows, middlebox and antivirus products are increasingly intercepting TLS connections to retain visibility into network traffic. In this work, we present a comprehensive study on the prevalence and impact of HTTPS interception. First, we show that web servers can detect interception by identifying a mismatch between the HTTP User-Agent header and TLS client behavior. We characterize the TLS handshakes of major browsers and popular interception products, which we use to build a set of heuris… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

3
96
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 122 publications
(99 citation statements)
references
References 19 publications
3
96
0
Order By: Relevance
“…As soon as an app trusts such a rogue certificate, the owner of the rogue certificate can issue valid certificates for any domain visited by the device and can, therefore, pretend to be any server [21]. This enables an attacker to act as a middle man (man-in-the-middle [MitM]) between the client and the server, leading to undermined integrity of server responses and loss of privacy between the client (and thus the user of an app) and the server [40]. In Android version <7, the user can install such a certificate himself.…”
Section: Methodsmentioning
confidence: 99%
“…As soon as an app trusts such a rogue certificate, the owner of the rogue certificate can issue valid certificates for any domain visited by the device and can, therefore, pretend to be any server [21]. This enables an attacker to act as a middle man (man-in-the-middle [MitM]) between the client and the server, leading to undermined integrity of server responses and loss of privacy between the client (and thus the user of an app) and the server [40]. In Android version <7, the user can install such a certificate himself.…”
Section: Methodsmentioning
confidence: 99%
“…• When a locally installed root of trust is in use, Chrome disables various certificate validation and TLS security checks that cannot reasonably be enforced for local roots, such as HTTP Public Key Pinning [7]. Most proxies do not implement these checks themselves, and in many cases do not perform even basic certificate validation, leaving the user vulnerable to attack [13,24].…”
Section: Anti-virusmentioning
confidence: 99%
“…Worryingly, recent studies of such proxies uncovered a plethora of serious security issues, from inappropriate or inexistent certification validation and ciphersuite downgrades, to the execution of completely invalid TLS handshakes [15], [34]. A typical example of what can go wrong is the Superfish scandal of 2015 [18] where the private key of the CA certificate used by a client-side proxy was leaked, allowing attackers to impersonate any website to any client who used the proxy.…”
Section: Introductionmentioning
confidence: 99%