Proceedings 2019 Network and Distributed System Security Symposium 2019
DOI: 10.14722/ndss.2019.23547
|View full text |Cite
|
Sign up to set email alerts
|

maTLS: How to Make TLS middlebox-aware?

Abstract: Middleboxes are widely deployed in order to enhance security and performance in networking. As communication over TLS becomes increasingly common, however, the end-to-end channel model of TLS undermines the efficacy of middleboxes. Existing solutions, such as 'SplitTLS', which intercepts TLS sessions, often introduce significant security risks by installing a custom root certificate or sharing a private key. Many studies have confirmed security vulnerabilities when combining TLS with middleboxes, which include… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(11 citation statements)
references
References 17 publications
0
11
0
Order By: Relevance
“…Fett et al [16]- [19] proved the security for a single signon (SSO) system. Lee et al [20] proposed middlebox-aware TLS, which allows middleboxes to participate in TLS in a visible and accountable fashion. These works are similar to our work in the sense that the web is modeled and verified in platform levels, but they do not consider a cache mechanism and they use different utilization tools and approaches.…”
Section: Related Work 1) Formal Methods For the Webmentioning
confidence: 99%
“…Fett et al [16]- [19] proved the security for a single signon (SSO) system. Lee et al [20] proposed middlebox-aware TLS, which allows middleboxes to participate in TLS in a visible and accountable fashion. These works are similar to our work in the sense that the web is modeled and verified in platform levels, but they do not consider a cache mechanism and they use different utilization tools and approaches.…”
Section: Related Work 1) Formal Methods For the Webmentioning
confidence: 99%
“…The use of middlebox certificates eliminates the insecure practice of installing custom root certificates or servers sharing their private keys with third parties. Furthermore, the middlebox-aware TLS (maTLS) protocol enables auditing the security behaviors of middleboxes [19].…”
Section: Tls Interceptionmentioning
confidence: 99%
“…In particular, if the user relies on a public DNS server (such as CloudFlare's 1.1.1.1 or Google's 8.8.8.8), and if one of the company operating the name server also operates map servers, then the privacy implications of fetching proofs directly are limited (assuming a secure channel is established between the client and the map server). Another approach would be to use a middlebox (instead of updating the web server) to staple proofs by having the middlebox detect new connections and append relevant data to the TLS handshake (which is in plain text) [58], [42].…”
Section: Fetching Via Dnsmentioning
confidence: 99%