GUESS THE CORRECT LOG CT INSIGHTS 1 2 3 4 5 Content TLS + - - PowerPoint PPT Presentation

guess the correct log ct insights
SMART_READER_LITE
LIVE PREVIEW

GUESS THE CORRECT LOG CT INSIGHTS 1 2 3 4 5 Content TLS + - - PowerPoint PPT Presentation

create your own exercise Berkay Kozan, Jan Krol Group 202 GUESS THE CORRECT LOG CT INSIGHTS 1 2 3 4 5 Content TLS + Vulnerabilities CA + Black Tulip How Certificate Transparency Works SCT delivering methods Merkle


slide-1
SLIDE 1

create your own exercise

GUESS THE CORRECT LOG – CT INSIGHTS

Berkay Kozan, Jan Krol Group 202

1

slide-2
SLIDE 2

2

slide-3
SLIDE 3

3

slide-4
SLIDE 4

4

slide-5
SLIDE 5

5

slide-6
SLIDE 6

Content

⚫ TLS + Vulnerabilities ⚫ CA + Black Tulip ⚫ How Certificate Transparency Works ⚫ SCT delivering methods ⚫ Merkle Tree

6

slide-7
SLIDE 7

TLS

⚫ Cryptographic protocol ⚫ Secures website-browser connection ⚫ Main cryptographic system that underlies

all HTTPS connections

7

slide-8
SLIDE 8

TLS

⚫ Cryptographic protocol ⚫ Secures website-browser connection ⚫ Main cryptographic system that underlies

all HTTPS connections

7

How can we be sure that we are really connecting to the lab system?

Certificate = public key + domain name

slide-9
SLIDE 9

TLS

⚫ Cryptographic protocol ⚫ Secures website-browser connection ⚫ Main cryptographic system that underlies

all HTTPS connections

7

How can we be sure that we are really connecting to the lab system?

Certificate = public key + domain name

slide-10
SLIDE 10

Vulnerabilites of SSL

⚫ Structural flaws ⚫ Vulnerabilities:

Domain validation

End-to-end encryption

Chains of trust set up by certificate authorities

⚫ CT is used to make CAs accountable

8

slide-11
SLIDE 11

Security Attacks

⚫ Website spoofing ⚫ Server impersonation ⚫ Man-in-the-middle attacks.

9

slide-12
SLIDE 12

Certificate Authorities

⚫ WE TRUST CAs to issue digital

  • certificates. But should we?

10

slide-13
SLIDE 13

Black Tulip

11

YOU

slide-14
SLIDE 14

Black Tulip

11

YOU

slide-15
SLIDE 15

CA handshake

12

slide-16
SLIDE 16

CA handshake

12

slide-17
SLIDE 17

CA handshake

12

slide-18
SLIDE 18

CA handshake

12

slide-19
SLIDE 19

CA handshake

12

YOU

slide-20
SLIDE 20

CA handshake

12

YOU

slide-21
SLIDE 21

CA handshake

12

YOU

slide-22
SLIDE 22

CA handshake

12

YOU

slide-23
SLIDE 23

CA handshake

12

YOU

slide-24
SLIDE 24

CA handshake

12

YOU

slide-25
SLIDE 25

CA handshake

12

YOU

slide-26
SLIDE 26

CA handshake

12

YOU

slide-27
SLIDE 27

How CT Works

13

slide-28
SLIDE 28

How CT Works

13

Log Server

slide-29
SLIDE 29

How CT Works

13

Log Server Every new certifacte will be uploaded to the Log Server Watch for:

  • suspicious certificates
  • unauthorized certificates
  • unusual certificate extensions
  • certificates with strange permissions
slide-30
SLIDE 30

CT logs

⚫ CT log = network service which maintains

entries of SSL certificates

⚫ Logs are independent ⚫ Qualities:

− Append-only − Cryptographically assured − Publicly auditable

14

slide-31
SLIDE 31

CT logs

⚫ CT log = network service which maintains

entries of SSL certificates

⚫ Logs are independent ⚫ Qualities:

− Append-only − Cryptographically assured − Publicly auditable

14

thou shalt not hack – RFC 69:62

slide-32
SLIDE 32

SCT

15

slide-33
SLIDE 33

SCT

15

Log Server

slide-34
SLIDE 34

SCT

15

Log Server Certificate Authority

slide-35
SLIDE 35

SCT

15

Log Server Certificate Submission Certificate Authority

slide-36
SLIDE 36

SCT

15

SCT Log Server Certificate Submission Certificate Authority

slide-37
SLIDE 37

SCT

15

SCT Log Server Certificate Submission Certificate Authority Promise that the cert will be appended to the log.

slide-38
SLIDE 38

SCT

15

SCT Log Server Certificate Submission Certificate Authority Promise that the cert will be appended to the log. Maximum Merge Delay (Appending musst happen within a reasonable time frame)

slide-39
SLIDE 39

SCT

15

SCT Log Server Certificate Submission Certificate Authority Promise that the cert will be appended to the log. Maximum Merge Delay (Appending musst happen within a reasonable time frame)

slide-40
SLIDE 40

SCT Delivering Methods: X.509v3 Extension

16

slide-41
SLIDE 41

SCT Delivering Methods: X.509v3 Extension

16

Client (browser)

slide-42
SLIDE 42

SCT Delivering Methods: X.509v3 Extension

16

fingernails4cash.com Client (browser)

slide-43
SLIDE 43

SCT Delivering Methods: X.509v3 Extension

16

Certificate Authority fingernails4cash.com Client (browser)

slide-44
SLIDE 44

SCT Delivering Methods: X.509v3 Extension

16

Log Server Certificate Authority fingernails4cash.com Client (browser)

slide-45
SLIDE 45

SCT Delivering Methods: X.509v3 Extension

16

Log Server Certificate Submission (Precertificate) Certificate Authority fingernails4cash.com Client (browser)

slide-46
SLIDE 46

SCT Delivering Methods: X.509v3 Extension

16

Log Server Certificate Submission (Precertificate) Certificate Authority fingernails4cash.com Client (browser) SCT

slide-47
SLIDE 47

SCT Delivering Methods: X.509v3 Extension

16

Log Server Certificate Submission (Precertificate) Certificate Authority fingernails4cash.com Client (browser) SCT Certificate Issuance (SSL cert w/SCT)

slide-48
SLIDE 48

SCT Delivering Methods: X.509v3 Extension

16

Log Server Certificate Submission (Precertificate) Certificate Authority fingernails4cash.com Client (browser) SCT Certificate Issuance (SSL cert w/SCT) TLS handshake (SCT embedded cert)

slide-49
SLIDE 49

SCT Delivering Methods: X.509v3 Extension

16

Log Server Certificate Submission (Precertificate) Certificate Authority fingernails4cash.com Client (browser) SCT Certificate Issuance (SSL cert w/SCT) TLS handshake (SCT embedded cert)

slide-50
SLIDE 50

Merkle Tree

  • Simple binary tree
  • Once an hour a log server

appends all new certs to its log

  • Consistency Proof
  • Merkle Audit Proof

17 a b c d s t c1 c2 c3 c4

Merkle Tree Hash Node Hash Leaf Hash Certificate

slide-51
SLIDE 51

Merkle Audit Proof

18 a b c d s t c1 c2 c3 c4

Audit Proof

slide-52
SLIDE 52

Learning Goals

19

The Following Learning Goals are Covered in the Lecture PreLab Lab Students understand CT operation X X X Students understand the vulnerabilities of SSL. X X Students understand how log proof works X X Students will fetch SCTs from TLS extension and analyze it X X Students write code to do an InclusionProof that verifies that a cert is logged based on SCT X Students write code to perform an Merkle Audit Proof X

slide-53
SLIDE 53

Teaser Practical Part

20

Team

slide-54
SLIDE 54

References

21

https://upload.wikimedia.org/wikipedia/commons/thumb/2/22/Symantec_logo10.svg/20 00px-Symantec_logo10.svg.png

https://upload.wikimedia.org/wikipedia/commons/7/7d/Comodo-Secure-DNS.jpg

https://upload.wikimedia.org/wikipedia/commons/thumb/4/48/DigiCert_logo.svg/2000p x-DigiCert_logo.svg.png

https://pixabay.com/de/jesus-christus-religion-christentum-1340401/

https://www.certificate-transparency.org/how-ct-works

https://www.certificate-transparency.org/log-proofs-work

Microsoft Office inbuilt Pictograms

Unsplash.com (License: All photos published on Unsplash can be used for free. You can use them for commercial and noncommercial purposes. You do not need to ask permission from or provide credit to the photographer or Unsplash, although it is appreciated when possible.)

slide-55
SLIDE 55

Summary

⚫ TLS + Vulnerabilities ⚫ CA + Black Tulip ⚫ How Certificate Transparency Works ⚫ SCT delivering methods ⚫ Merkle Tree

22