Proceedings 2016 Network and Distributed System Security Symposium 2016
DOI: 10.14722/ndss.2016.23055
|View full text |Cite
|
Sign up to set email alerts
|

TLS in the Wild: An Internet-wide Analysis of TLS-based Protocols for Electronic Communication

Abstract: Email and chat still constitute the majority of electronic communication on the Internet. The standardisation and acceptance of protocols such as SMTP, IMAP, POP3, XMPP, and IRC has allowed to deploy servers for email and chat in a decentralised and interoperable fashion. These protocols can be secured by providing encryption with TLS-directly or via the STARTTLS extension. X.509 PKIs and ad hoc methods can be leveraged to authenticate communication peers. However, secure configuration is not straight-forward … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
34
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
3
2

Relationship

3
7

Authors

Journals

citations
Cited by 58 publications
(35 citation statements)
references
References 41 publications
(50 reference statements)
1
34
0
Order By: Relevance
“…For example, Durumeric et al found that the long tail of SMTP servers largely fail to deploy encryption and authentication, leaving users vulnerable to downgrade attacks, which are widespread in the wild [15]. Holz et al also found that email is poorly secured in transit, often due to configuration errors [21]. We study an orthogonal problem.…”
Section: Related Workmentioning
confidence: 99%
“…For example, Durumeric et al found that the long tail of SMTP servers largely fail to deploy encryption and authentication, leaving users vulnerable to downgrade attacks, which are widespread in the wild [15]. Holz et al also found that email is poorly secured in transit, often due to configuration errors [21]. We study an orthogonal problem.…”
Section: Related Workmentioning
confidence: 99%
“…3) Cryptographic Assurance with SSL/TLS: We use a final strong filter that is based on our regular Internet-wide scans of SSL/TLS protocols (refer to [23] for further details). For any given hijacking alarm concerning a certain IP prefix, we verify if affected SSL/TLS hosts present the same public key before and during the event.…”
Section: B Filtering Methodologymentioning
confidence: 99%
“…Today, 7 years later, we find that same cipher is selected in only 0.001% of connections, and offered by clients in only 8.4% of connections. Later, Holz et al studied the use of TLS in email clients [28]. Lee et al performed active scans of a sample of TLS/SSL servers in order to study ciphers supported and certificates in 2007 [36].…”
Section: A Passive Tls Measurementsmentioning
confidence: 99%