论文标题
在www中提醒当局的安全性:测量名称空间,DNSSEC和Web PKI
Security of Alerting Authorities in the WWW: Measuring Namespaces, DNSSEC, and Web PKI
论文作者
论文摘要
在灾难,危机和紧急情况下,公众依赖于官方当局提供的在线服务,以接收及时的警报,值得信赖的信息和访问救济计划。因此,当局在访问其在线服务时降低风险至关重要。这包括餐饮,以确定服务的确定,将名称的安全解析到网络服务以及内容安全和隐私作为值得信赖的通信的最低基础。 在本文中,我们首先考虑在美国提醒当局(AA),并调查与可信赖和安全沟通有关的安全措施。我们研究域名空间结构,DNSSEC渗透和网络证书。我们介绍了一个综合威胁模型,以更好地了解AAS的在线形象和如何受到伤害。作为说明性的例子,我们调查了1,388个警报当局。我们观察到相对于全球互联网趋势的局部安全性提高,但由于大约78%的服务提供商未能部署可信赖的服务提供的措施,因此发现了令人担忧的原因。我们的分析显示了两个主要缺点。首先,如何利用DNS生态系统:大约50%的组织不拥有其专用领域名称并依赖于其他组织,55%的组织选择不受限制地使用的命名空间,这简化了网络钓鱼,并且不到4%的独特AA域名被DNSSEC确保了DNSSEC,这可能会导致DNS中毒和可能误解了证书和可能的误差。其次,如何利用Web PKI证书:所有主机中有15%都没有提供或无效的证书,因此无法符合机密性和数据完整性,有64%的主机提供了缺乏任何身份信息的域验证证书,共享证书已经获得了受欢迎程度,这会导致命运分散,并可能导致不稳定。
During disasters, crisis, and emergencies the public relies on online services provided by official authorities to receive timely alerts, trustworthy information, and access to relief programs. It is therefore crucial for the authorities to reduce risks when accessing their online services. This includes catering to secure identification of service, secure resolution of name to network service, and content security and privacy as a minimum base for trustworthy communication. In this paper, we take a first look at Alerting Authorities (AA) in the US and investigate security measures related to trustworthy and secure communication. We study the domain namespace structure, DNSSEC penetration, and web certificates. We introduce an integrative threat model to better understand whether and how the online presence and services of AAs are harmed. As an illustrative example, we investigate 1,388 Alerting Authorities. We observe partial heightened security relative to the global Internet trends, yet find cause for concern as about 78% of service providers fail to deploy measures of trustworthy service provision. Our analysis shows two major shortcomings. First, how the DNS ecosystem is leveraged: about 50% of organizations do not own their dedicated domain names and are dependent on others, 55% opt for unrestricted-use namespaces, which simplifies phishing, and less than 4% of unique AA domain names are secured by DNSSEC, which can lead to DNS poisoning and possibly to certificate misissuance. Second, how Web PKI certificates are utilized: 15% of all hosts provide none or invalid certificates, thus cannot cater to confidentiality and data integrity, 64% of the hosts provide domain validation certification that lack any identity information, and shared certificates have gained on popularity, which leads to fate-sharing and can be a cause for instability.