A large-scale analysis of HTTPS deployments: Challenges, solutions, and recommendations

被引:7
|
作者
Hu, Qinwen [1 ]
Asghar, Muhammad Rizwan [1 ]
Brownlee, Nevil [1 ]
机构
[1] Univ Auckland, Sch Comp Sci, Auckland, New Zealand
关键词
HTTPS; TLS; SSL; vulnerabilities;
D O I
10.3233/JCS-200070
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
HTTPS refers to an application-specific implementation that runs HyperText Transfer Protocol (HTTP) on top of Secure Socket Layer (SSL) or Transport Layer Security (TLS). HTTPS is used to provide encrypted communication and secure identification of web servers and clients, for different purposes such as online banking and e-commerce. However, many HTTPS vulnerabilities have been disclosed in recent years. Although many studies have pointed out that these vulnerabilities can lead to serious consequences, domain administrators seem to ignore them. In this study, we evaluate the HTTPS security level of Alexa's top 1 million domains from two perspectives. First, we explore which popular sites are still affected by those well-known security issues. Our results show that less than 0.1% of HTTPS-enabled servers in the measured domains are still vulnerable to known attacks including Rivest Cipher 4 (RC4), Compression Ratio Info-Leak Mass Exploitation (CRIME), Padding Oracle On Downgraded Legacy Encryption (POODLE), Factoring RSA Export Keys (FREAK), Logjam, and Decrypting Rivest-Shamir-Adleman (RSA) using Obsolete and Weakened eNcryption (DROWN). Second, we assess the security level of the digital certificates used by each measured HTTPS domain. Our results highlight that less than 0.52% domains use the expired certificate, 0.42% HTTPS certificates contain different hostnames, and 2.59% HTTPS domains use a self-signed certificate. The domains we investigate in our study cover 5 regions (including ARIN, RIPE NCC, APNIC, LACNIC, and AFRINIC) and 61 different categories such as online shopping websites, banking websites, educational websites, and government websites. Although our results show that the problem still exists, we find that changes have been taking place when HTTPS vulnerabilities were discovered. Through this three-year study, we found that more attention has been paid to the use and configuration of HTTPS. For example, more and more domains begin to enable the HTTPS protocol to ensure a secure communication channel between users and websites. From the first measurement, we observed that many domains are still using TLS 1.0 and 1.1, SSL 2.0, and SSL 3.0 protocols to support user clients that use outdated systems. As the previous studies revealed security risks of using these protocols, in the subsequent studies, we found that the majority of domains updated their TLS protocol on time. Our 2020 results suggest that most HTTPS domains use the TLS 1.2 protocol and show that some HTTPS domains are still vulnerable to the existing known attacks. As academics and industry professionals continue to disclose attacks against HTTPS and recommend the secure configuration of HTTPS, we found that the number of vulnerable domain is gradually decreasing every year.
引用
收藏
页码:25 / 50
页数:26
相关论文
共 50 条
  • [1] Implementing Large-Scale Agile Frameworks: Challenges and Recommendations
    Conboy, Kieran
    Carroll, Noel
    [J]. IEEE SOFTWARE, 2019, 36 (02) : 44 - 50
  • [2] Congestion Control for Large-Scale RDMA Deployments
    Zhu, Yibo
    Eran, Haggai
    Firestone, Daniel
    Guo, Chuanxiong
    Lipshteyn, Marina
    Liron, Yehonatan
    Padhye, Jitendra
    Raindel, Shachar
    Yahia, Mohamad Haj
    Zhang, Ming
    [J]. SIGCOMM'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON SPECIAL INTEREST GROUP ON DATA COMMUNICATION, 2015, : 523 - 536
  • [3] Managing Large-Scale Heterogeneous Deployments for Cybersecurity
    Hurley, J. S.
    [J]. PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY ICCWS, 2023, : 145 - 151
  • [4] Congestion Control for Large-Scale RDMA Deployments
    Zhu, Yibo
    Eran, Haggai
    Firestone, Daniel
    Guo, Chuanxiong
    Lipshteyn, Marina
    Liron, Yehonatan
    Padhye, Jitendra
    Raindel, Shachar
    Yahia, Mohamad Haj
    Zhang, Ming
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2015, 45 (04) : 523 - 536
  • [5] Large-Scale House Lifting in Flood Risk Zones: Challenges and Recommendations
    Cassalia, Andrea
    Ybanez, Numer V.
    Elmorsi, Mostafa S.
    [J]. STRUCTURES CONGRESS 2019: BUILDINGS AND NATURAL DISASTERS, 2019, : 200 - 207
  • [6] OBDII Data Logger Design for Large-Scale Deployments
    Smith, Kristian
    Miller, Jeffrey
    [J]. 2013 16TH INTERNATIONAL IEEE CONFERENCE ON INTELLIGENT TRANSPORTATION SYSTEMS - (ITSC), 2013, : 670 - 674
  • [7] A Scalable Framework for Provisioning Large-Scale IoT Deployments
    Voegler, Michael
    Schleicher, Johannes M.
    Inzinger, Christian
    Dustdar, Schahram
    [J]. ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2016, 16 (02)
  • [8] A Large-Scale Study on the Security Vulnerabilities of Cloud Deployments
    Iosif, Andrei-Cristian
    Gasiba, Tiago Espinha
    Zhao, Tiange
    Lechner, Ulrike
    Pinto-Albuquerque, Maria
    [J]. UBIQUITOUS SECURITY, 2022, 1557 : 171 - 188
  • [9] Adoption of RFID in Large-Scale Organisation - A review of challenges and solutions
    Badru, Abdulbaqi
    Ajayi, Nurudeen
    [J]. 2017 IST-AFRICA WEEK CONFERENCE (IST-AFRICA), 2017,
  • [10] Large-Scale Encryption in the Hadoop Environment. Challenges and Solutions
    Parmar, Raj R.
    Roy, Sudipta
    Bhattacharyya, Debnath
    Bandyopadhyay, Samir Kumar
    Kim, Tai-Hoon
    [J]. IEEE ACCESS, 2017, 5 : 7156 - 7163