Researchers propose TLS extension to detect rogue SSL certificates
TACK TLS extension combines public key pinning with self-generated keys to validate SSL certificates
IDG News Service - A pair of security researchers have proposed an extension to the Transport Layer Security (TLS) protocol that would allow browsers to detect and block fraudulently issued SSL certificates.
Called TACK, short for Trust Assertions for Certificate Keys, the extension was developed by security researchers Trevor Perrin and Moxie Marlinspike and was submitted for consideration to the Internet Engineering Task Force (IETF), the body in charge of TLS, on Wednesday.
TACK tries to resolve the trust-related problems with the public key infrastructure that were highlighted by last year's security breaches at certificate authorities (CAs) Comodo and Diginotar.
Both of those breaches resulted in SSL certificates for high profile domains like google.com, hotmail.com or mail.yahoo.com, being issued fraudulently. In Diginotar's case, the certificates were even employed in active attacks against Google users in Iran.
At the moment, Web browsers trust over 600 organizations from around the world to issue SSL certificates. These organizations are known as certificate authorities and every one of them can technically issue a valid certificate for any domain on the Internet.
Several proposals to improve the current CA-based system have been put forward by Internet and security experts in the past 12 months, but there's no consensus regarding which one offers the best solution.
In November 2011, security engineers from Google proposed an HTTP extension called "public key pinning" that would allow websites to effectively tell browsers via an HTTP header which certificate authorities should be trusted to issue SSL certificates for their domain names.
The browsers would then remember (pin) this information and refuse to establish the connection if they receive a certificate signed by a different CA in the future. A more static implementation of this system already exists in Google Chrome for particular domain names, including Google's.
TACK is based on the same public key pinning concept, but instead of pinning CA public keys to particular domain names, it pins public keys generated by the domain owners themselves.
With TACK, the domain owner can generate a pair of private and public keys called TACK keys. The private key is used to sign the server's TLS public key, which is currently used by browsers to validate SSL certificates. The TACK public key is then shared with connecting browsers and is used to validate the TACK-signed TLS public key.
The browsers can pin a TACK public key to a domain name if they receive it from the server on several separate occasions. If an attacker attempts to use a rogue SSL certificate to spoof a secure connection to a domain name that already has a TACK key pinned to it, the browser will not authorize it because the TACK validation will fail.
- Mobile First: Securing Information Sprawl Learn how the partnership between Box and MobileIron can help you execute a "mobile first" strategy that manages and secures both mobile apps...
- Cybersecurity Imperatives: Reinvent your Network Security The Rise of CyberSecurity
- Surescripts Case Study- Securing Keys and Certificates Surescripts implemented Venafi's Trust Protection Platform™ to secure digital keys and certificates, ensure the privacy and confidentiality of electronic clinical information for its...
- Ponemon 2014 SSH Security Vulnerability Report According to research by the Ponemon Institute, 3 out of 4 enterprises have no security controls in place for SSH which leaves organizations...
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities.
- Deep Dive into Advanced Networking and Security with Hybrid Cloud Security and networking are among the top concerns when moving workloads to the cloud. VMware vCloud® Hybrid Service™ enables you to extend your... All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!