An Analysis of TLS Handshake Proxying

被引:0
|
作者
Sullivan, Nick [1 ]
Stebila, Douglas [2 ]
机构
[1] CloudFlare Inc, San Francisco, CA 94107 USA
[2] Queensland Univ Technol, Brisbane, Qld, Australia
基金
澳大利亚研究理事会;
关键词
cryptographic protocols; network topology; content distribution networks; secure outsourcing; TLS; proxy; SECURITY;
D O I
10.1109/Trustcom-2015.385
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Content delivery networks (CDNs) are an essential component of modern website infrastructures: edge servers located closer to users cache content, increasing robustness and capacity while decreasing latency. However, this situation becomes complicated for HTTPS content that is to be delivered using the Transport Layer Security (TLS) protocol: the edge server must be able to carry out TLS handshakes for the cached domain. Most commercial CDNs require that the domain owner give their certificate's private key to the CDN's edge server or abandon caching of HTTPS content entirely. We examine the security and performance of a recently commercialized delegation technique in which the domain owner retains possession of their private key and splits the TLS state machine geographically with the edge server using a private key proxy service. This allows the domain owner to limit the amount of trust given to the edge server while maintaining the benefits of CDN caching. On the performance front, we find that latency is slightly worse compared to the insecure approach, but still significantly better than the domain owner serving the content directly. On the security front, we enumerate the security goals for TLS handshake proxying and identify a subtle difference between the security of RSA key transport and signed-Diffie-Hellman in TLS handshake proxying; we also discuss timing side channel resistance of the key server and the effect of TLS session resumption.
引用
收藏
页码:279 / 286
页数:8
相关论文
共 50 条
  • [1] The TLS Handshake Protocol: A Modular Analysis
    Morrissey, P.
    Smart, N. P.
    Warinschi, B.
    [J]. JOURNAL OF CRYPTOLOGY, 2010, 23 (02) : 187 - 223
  • [2] The TLS Handshake Protocol: A Modular Analysis
    P. Morrissey
    N. P. Smart
    B. Warinschi
    [J]. Journal of Cryptology, 2010, 23 : 187 - 223
  • [3] A Cryptographic Analysis of the TLS 1.3 Handshake Protocol
    Dowling, Benjamin
    Fischlin, Marc
    Gunther, Felix
    Stebila, Douglas
    [J]. JOURNAL OF CRYPTOLOGY, 2021, 34 (04)
  • [4] A Cryptographic Analysis of the TLS 1.3 Handshake Protocol
    Benjamin Dowling
    Marc Fischlin
    Felix Günther
    Douglas Stebila
    [J]. Journal of Cryptology, 2021, 34
  • [5] A Modular Security Analysis of the TLS Handshake Protocol
    Morrissey, P.
    Smart, N. P.
    Warinschi, B.
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2008, 2008, 5350 : 55 - 73
  • [6] A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates
    Dowling, Benjamin
    Fischlin, Marc
    Guenther, Felix
    Stebila, Douglas
    [J]. CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1197 - 1210
  • [7] A Formal Treatment of Accountable Proxying over TLS
    Bhargavan, Karthikeyan
    Boureanu, Ioana
    Delignat-Lavaud, Antoine
    Fouque, Pierre-Alain
    Onete, Cristina
    [J]. 2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2018, : 799 - 816
  • [8] Proving the TLS Handshake Secure (As It Is)
    Bhargavan, Karthikeyan
    Fournet, Cedric
    Kohlweiss, Markulf
    Pironti, Alfredo
    Strub, Pierre-Yves
    Zanella-Beguelin, Santiago
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT II, 2014, 8617 : 235 - 255
  • [9] An Improved TLS handshake protocol
    Li Xian-Zhu
    Liu Jun
    [J]. PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 35 : 130 - 136
  • [10] ISAKMP handshake for SSL/TLS
    Hajjeh, I
    Serhrouchni, A
    Tastet, F
    [J]. GLOBECOM'03: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-7, 2003, : 1481 - 1485