The Transport Layer Security (TLS) interceptors are applications running on client devices or on separate machines that filter TLS-protected traffic between two endpoints. They split the original TLS channel into two TLS channels and they might significantly impact the security obtained. They are increasingly used and installed by numerous end users or network administrators. It is necessary to assess X.509 certificate processing in TLS interceptors since flaws or problems in performing this task correctly and completely may weaken the client’s communication security. We define X.509-related tests, which are divided into five categories based on which part(s) of the X.509 certificate fields or extensions get analyzed. We propose a method for automatically generating wrong, malformed, or unusual X.509 certificates (and chains) and configuration files suitable for the most common web servers, like Apache or Nginx. We deploy the generated configuration files on the TLS-aware web servers in an experimental testbed set up to test the behavior of four selected TLS interceptors, two antivirus programs, and two proxy applications running on different operating systems. We report the results obtained, underlining the need to test such applications so that they would not decrease the security levels achieved by the clients.
On the Evaluation of X.509 Certificate Processing in Transport Layer Security Interceptors / Berbecaru, Diana Gratiela; Sisinni, Silvia; Simone, Matteo. - ELETTRONICO. - (2024), pp. 1-6. (Intervento presentato al convegno 2024 IEEE Symposium on Computers and Communications (ISCC) tenutosi a Paris (FRA) nel 26 - 29 June 2024) [10.1109/ISCC61673.2024.10733685].
On the Evaluation of X.509 Certificate Processing in Transport Layer Security Interceptors
Berbecaru,Diana Gratiela;Sisinni,Silvia;
2024
Abstract
The Transport Layer Security (TLS) interceptors are applications running on client devices or on separate machines that filter TLS-protected traffic between two endpoints. They split the original TLS channel into two TLS channels and they might significantly impact the security obtained. They are increasingly used and installed by numerous end users or network administrators. It is necessary to assess X.509 certificate processing in TLS interceptors since flaws or problems in performing this task correctly and completely may weaken the client’s communication security. We define X.509-related tests, which are divided into five categories based on which part(s) of the X.509 certificate fields or extensions get analyzed. We propose a method for automatically generating wrong, malformed, or unusual X.509 certificates (and chains) and configuration files suitable for the most common web servers, like Apache or Nginx. We deploy the generated configuration files on the TLS-aware web servers in an experimental testbed set up to test the behavior of four selected TLS interceptors, two antivirus programs, and two proxy applications running on different operating systems. We report the results obtained, underlining the need to test such applications so that they would not decrease the security levels achieved by the clients.File | Dimensione | Formato | |
---|---|---|---|
On_the_evaluation_of_X.509_certificate_processing_in_Transport_Layer_Security_interceptors.pdf
accesso riservato
Tipologia:
2a Post-print versione editoriale / Version of Record
Licenza:
Non Pubblico - Accesso privato/ristretto
Dimensione
179.86 kB
Formato
Adobe PDF
|
179.86 kB | Adobe PDF | Visualizza/Apri Richiedi una copia |
2024149511.pdf
accesso aperto
Tipologia:
2. Post-print / Author's Accepted Manuscript
Licenza:
Pubblico - Tutti i diritti riservati
Dimensione
149.73 kB
Formato
Adobe PDF
|
149.73 kB | Adobe PDF | Visualizza/Apri |
Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.
https://hdl.handle.net/11583/2991441