create your own exercise
GUESS THE CORRECT LOG – CT INSIGHTS
Berkay Kozan, Jan Krol Group 202
1
GUESS THE CORRECT LOG CT INSIGHTS 1 2 3 4 5 Content TLS + - - PowerPoint PPT Presentation
create your own exercise Berkay Kozan, Jan Krol Group 202 GUESS THE CORRECT LOG CT INSIGHTS 1 2 3 4 5 Content TLS + Vulnerabilities CA + Black Tulip How Certificate Transparency Works SCT delivering methods Merkle
Berkay Kozan, Jan Krol Group 202
1
2
3
4
5
⚫ TLS + Vulnerabilities ⚫ CA + Black Tulip ⚫ How Certificate Transparency Works ⚫ SCT delivering methods ⚫ Merkle Tree
6
⚫ Cryptographic protocol ⚫ Secures website-browser connection ⚫ Main cryptographic system that underlies
7
⚫ Cryptographic protocol ⚫ Secures website-browser connection ⚫ Main cryptographic system that underlies
7
How can we be sure that we are really connecting to the lab system?
Certificate = public key + domain name
⚫ Cryptographic protocol ⚫ Secures website-browser connection ⚫ Main cryptographic system that underlies
7
How can we be sure that we are really connecting to the lab system?
Certificate = public key + domain name
⚫ Structural flaws ⚫ Vulnerabilities:
⚫
Domain validation
⚫
End-to-end encryption
⚫
Chains of trust set up by certificate authorities
⚫ CT is used to make CAs accountable
8
⚫ Website spoofing ⚫ Server impersonation ⚫ Man-in-the-middle attacks.
9
⚫ WE TRUST CAs to issue digital
10
11
11
12
12
12
12
12
YOU
12
YOU
12
YOU
12
YOU
12
YOU
12
YOU
12
YOU
12
YOU
13
13
Log Server
13
Log Server Every new certifacte will be uploaded to the Log Server Watch for:
⚫ CT log = network service which maintains
⚫ Logs are independent ⚫ Qualities:
− Append-only − Cryptographically assured − Publicly auditable
14
⚫ CT log = network service which maintains
⚫ Logs are independent ⚫ Qualities:
− Append-only − Cryptographically assured − Publicly auditable
14
thou shalt not hack – RFC 69:62
15
15
Log Server
15
Log Server Certificate Authority
15
Log Server Certificate Submission Certificate Authority
15
SCT Log Server Certificate Submission Certificate Authority
15
SCT Log Server Certificate Submission Certificate Authority Promise that the cert will be appended to the log.
15
SCT Log Server Certificate Submission Certificate Authority Promise that the cert will be appended to the log. Maximum Merge Delay (Appending musst happen within a reasonable time frame)
15
SCT Log Server Certificate Submission Certificate Authority Promise that the cert will be appended to the log. Maximum Merge Delay (Appending musst happen within a reasonable time frame)
16
16
Client (browser)
16
fingernails4cash.com Client (browser)
16
Certificate Authority fingernails4cash.com Client (browser)
16
Log Server Certificate Authority fingernails4cash.com Client (browser)
16
Log Server Certificate Submission (Precertificate) Certificate Authority fingernails4cash.com Client (browser)
16
Log Server Certificate Submission (Precertificate) Certificate Authority fingernails4cash.com Client (browser) SCT
16
Log Server Certificate Submission (Precertificate) Certificate Authority fingernails4cash.com Client (browser) SCT Certificate Issuance (SSL cert w/SCT)
16
Log Server Certificate Submission (Precertificate) Certificate Authority fingernails4cash.com Client (browser) SCT Certificate Issuance (SSL cert w/SCT) TLS handshake (SCT embedded cert)
16
Log Server Certificate Submission (Precertificate) Certificate Authority fingernails4cash.com Client (browser) SCT Certificate Issuance (SSL cert w/SCT) TLS handshake (SCT embedded cert)
17 a b c d s t c1 c2 c3 c4
Merkle Tree Hash Node Hash Leaf Hash Certificate
18 a b c d s t c1 c2 c3 c4
Audit Proof
19
The Following Learning Goals are Covered in the Lecture PreLab Lab Students understand CT operation X X X Students understand the vulnerabilities of SSL. X X Students understand how log proof works X X Students will fetch SCTs from TLS extension and analyze it X X Students write code to do an InclusionProof that verifies that a cert is logged based on SCT X Students write code to perform an Merkle Audit Proof X
20
Team
21
⚫
https://upload.wikimedia.org/wikipedia/commons/thumb/2/22/Symantec_logo10.svg/20 00px-Symantec_logo10.svg.png
⚫
https://upload.wikimedia.org/wikipedia/commons/7/7d/Comodo-Secure-DNS.jpg
⚫
https://upload.wikimedia.org/wikipedia/commons/thumb/4/48/DigiCert_logo.svg/2000p x-DigiCert_logo.svg.png
⚫
https://pixabay.com/de/jesus-christus-religion-christentum-1340401/
⚫
https://www.certificate-transparency.org/how-ct-works
⚫
https://www.certificate-transparency.org/log-proofs-work
⚫
Microsoft Office inbuilt Pictograms
⚫
Unsplash.com (License: All photos published on Unsplash can be used for free. You can use them for commercial and noncommercial purposes. You do not need to ask permission from or provide credit to the photographer or Unsplash, although it is appreciated when possible.)
⚫ TLS + Vulnerabilities ⚫ CA + Black Tulip ⚫ How Certificate Transparency Works ⚫ SCT delivering methods ⚫ Merkle Tree
22