Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3372297.3417252acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Talking with Familiar Strangers: An Empirical Study on HTTPS Context Confusion Attacks

Published: 02 November 2020 Publication History
  • Get Citation Alerts
  • Abstract

    HTTPS is principally designed for secure end-to-end communication, which adds confidentiality and integrity to sensitive data transmission. While several man-in-the-middle attacks (e.g., SSL Stripping) are available to break the secured connections, state-of-the-art security policies (e.g., HSTS) have significantly increased the cost of successful attacks. However, the TLS certificates shared by multiple domains make HTTPS hijacking attacks possible again.
    In this paper, we term the HTTPS MITM attacks based on the shared TLS certificates as HTTPS Context Confusion Attack (SCC Attack). Despite a known threat, it has not yet been studied thoroughly. We aim to fill this gap with an in-depth empirical assessment of SCC Attack. We find the attack can succeed even for servers that have deployed current best practice of security policies. By rerouting encrypted traffic to another flawed server that shares the TLS certificate, attackers can bypass the security practices, hijack the ongoing HTTPS connections, and subsequently launch additional attacks including phishing and payment hijacking. Particularly, vulnerable HTTP headers from a third-party server are exploitable for this attack, and it is possible to hijack an already-established secure connection.
    Through tests on popular websites, we find vulnerable subdomains under 126 apex domains in Alexa top 500 sites, including large vendors like Alibaba, JD, and Microsoft. Meanwhile, through a large-scale measurement, we find that TLS certificate sharing is prominent, which uncovers the high potential of such attacks, and we summarize the security dependencies among different parties. For responsible disclosure, we have reported the issues to affected vendors and received positive feedback. Our study sheds light on an influential attack surface of the HTTPS ecosystem and calls for proper mitigation against MITM attacks.

    Supplementary Material

    MOV File (Copy of CCS2020_fp188_MingmingZhang - Brian Hollendyke.mov)
    Presentation video

    References

    [1]
    [n.d.]. CVE-2011--3389: BEAST Attack. https://nvd.nist.gov/vuln/detail/CVE-2011--3389.
    [2]
    [n.d.]. Danami: Port/IP Redirection. https://docs.danami.com/juggernaut/user-guide/port-ip-redirection. Accessed: Nov 3, 2019.
    [3]
    [n.d.].Google Chrome engineers want to block some HTTP file down-loads. https://www.zdnet.com/article/google-chrome-engineers-want-to-block-some-http-file-downloads/. April 10, 2019.
    [4]
    [n.d.]. Google: HSTS Preload List. https://opensource.google.com/projects/hstspreload.
    [5]
    [n.d.]. Google Transparency Report: HTTPS encryption on the web. https://transparencyreport.google.com/https/overview.
    [6]
    [n.d.]. HTTPS usage statistics on top 1M websites. https://statoperator.com/research/https-usage-statistics-on-top-websites/. Accessed: Dec 14, 2019.
    [7]
    [n.d.]. Man-in-the-Middle TLS Protocol Downgrade Attack. https://www.praetorian.com/blog/man-in-the-middle-tls-ssl-protocol-downgrade-attack. Accessed:Auguset 23, 2019.
    [8]
    [n.d.]. MDN Web Docs: Mixed content. https://developer.mozilla.org/en-US/docs/Web/Security/Mixed_content.
    [9]
    [n.d.]. MDN Web Docs: Redirections in HTTP. https://developer.mozilla.org/en-US/docs/Web/HTTP/Redirections.
    [10]
    [n.d.]. No More Mixed Messages About HTTPS. https://blog.chromium.org/2019/10/no-more-mixed-messages-about-https.html. October 3, 2019.
    [11]
    [n.d.]. OWASP Secure Headers Project. https://www.owasp.org/index.php/OWASP_Secure_Headers_Project. Accessed: Dec 2, 2019.
    [12]
    [n.d.]. Preventing Mixed Content. https://developers.google.com/web/fundamentals/security/prevent-mixed-content/what-is-mixed-content.
    [13]
    [n.d.]. SSLStrip2. https://github.com/LeonardoNve/sslstrip2.
    [14]
    [n.d.]. TLS Redirection (and Virtual Host Confusion). https://github.com/GrrrDog/TLS-Redirection#intro.
    [15]
    [n.d.]. Trying to take the dum-dum out of Security. https://web.archive.org/web/20150921195009/http://sign0f4.blogspot.com/2014/10/mitmf-v07-released-sslstrip-integration.html.
    [16]
    [n.d.]. Usage statistics of HTTP Strict Transport Security for websites. https://w3techs.com/technologies/details/ce-hsts/all/all. Accessed: Dec 13, 2019.
    [17]
    2016. Mixed Content (W3C Candidate Recommendation). https://www.w3.org/TR/2016/CR-mixed-content-20160802/.
    [18]
    2019. Mixed Content (W3C Editor's draft). https://w3c.github.io/webappsec-mixed-content/.
    [19]
    Nadhem J Al Fardan and Kenneth G Paterson. 2013. Lucky thirteen: Breaking the TLS and DTLS record protocols. In 2013 IEEE Symposium on Security and Privacy.IEEE, 526--540.
    [20]
    Eman Salem Alashwali and Kasper Rasmussen. 2018. What's in a downgrade? A taxonomy of downgrade attacks in the TLS protocol and application protocols using TLS. In International Conference on Security and Privacy in Communication Systems. Springer, 468--487.
    [21]
    Stefano Calzavara, Alvise Rabitti, Alessio Ragazzo, and Michele Bugliesi. 2019.Testing for integrity flaws in web sessions. In European Symposium on Research in Computer Security. Springer, 606--624.
    [22]
    Stefano Calzavara, Alvise Rabitti, Alessio Ragazzo, and Michele Bugliesi. 2019. Testing for Integrity Flaws in Web Sessions.
    [23]
    Fuqing Chen, Haixin Duan, Xiaofeng Zheng, Jian Jiang, and Jianjun Chen. 2018. Path Leaks of HTTPS Side-Channel by Cookie Injection. In International Work-shop on Constructive Side-Channel Analysis and Secure Design. Springer, 189--203.
    [24]
    Jianjun Chen. [n.d.]. Host of Troubles Vulnerabilities. https://hostof troubles.com/.
    [25]
    Jianjun Chen, Jian Jiang, Haixin Duan, Tao Wan, Shuo Chen, Vern Paxson, and Min Yang. 2018. We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of{CORS}. In 27th USENIX Security Symposium (USENIX Security 18). 1079--1093.
    [26]
    Jianjun Chen, Jian Jiang, Haixin Duan, Nicholas Weaver, Tao Wan, and Vern Paxson. 2016. Host of troubles: Multiple host ambiguities in http implementations. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 1516--1527.
    [27]
    Shuo Chen, Ziqing Mao, Yi-Min Wang, and Ming Zhang. 2009. Pretty-bad-proxy: An overlooked adversary in browsers' https deployments. In 2009 30th IEEE Symposium on Security and Privacy. IEEE, 347--359.
    [28]
    Taejoong Chung, David Choffnes, and Alan Mislove. 2016. Tunneling for transparency: A large-scale analysis of end-to-end violations in the internet. In Proceedings of the 2016 Internet Measurement Conference. ACM, 199--213.
    [29]
    David Cooper, Stefan Santesson, S Farrell, Sharon Boeyen, Rusell Housley, and W Polk. 2008. RFC 5280: Internet X. 509 public key infrastructure certificate and certificate revocation list (CRL) profile. IETF, May(2008).
    [30]
    X de Carné de Carnavalet and Mohammad Mannan. 2016. Killed by proxy: Analyzing client-end TLS interception software. In Network and Distributed System Security Symposium.
    [31]
    Antoine Delignat-Lavaud and Karthikeyan Bhargavan. 2015. Network-based origin confusion attacks against HTTPS virtual hosting. In Proceedings of the24th International Conference on World Wide Web. International World Wide Web Conferences Steering Committee, 227--237.
    [32]
    Zakir Durumeric, Zane Ma, Drew Springall, Richard Barnes, Nick Sullivan, Elie Bursztein, Michael Bailey, J Alex Halderman, and Vern Paxson. 2017. The Security Impact of HTTPS Interception. In NDSS.
    [33]
    Leonardo Nve Egea. [n.d.]. dns2proxy. https://github.com/LeonardoNve/dns2proxy.
    [34]
    Leonardo Nve Egea. 2015. sslstrip+. https://github.com/LeonardoNve/sslstrip2.
    [35]
    Adrienne Porter Felt, Richard Barnes, April King, Chris Palmer, Chris Bentzel, and Parisa Tabriz. 2017. Measuring HTTPS Adoption on the Web. In 26th USENIX Security Symposium (USENIX Security 17). 1323--1338.
    [36]
    Steve Gibson. Dec 11, 2005. ARP Cache Poisoning: How one bad machineon your Ethernet Local Area Network (LAN) can ruin your whole day. https://www.grc.com/nat/arp.htm.
    [37]
    Jeff Hodges, Collin Jackson, and Adam Barth. 2012. RFC 6797: Http strict transport security (hsts). URL: http://tools.ietf.org/html/draft-ietf-websec-strict-transport-sec-04(2012).
    [38]
    Ralph Holz, Lothar Braun, Nils Kammenhuber, and Georg Carle. 2011. The SSL landscape: a thorough analysis of the x. 509 PKI using active and passive measurements. In Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference. ACM, 427--444.
    [39]
    Ralph Holz, Yaron Sheffer, and Peter Saint-Andre. 2015. RFC 7457: Summarizing Known Attacks on Transport Layer Security (TLS) and Datagram TLS (DTLS).(2015).
    [40]
    P Johnston and R Moore. [n.d.]. Multiple browser cookie injection vulnerabilities(2004).
    [41]
    David Keeler. 2012. Preloading HSTS. Mozilla Security Blog(2012).
    [42]
    Michael Kranch and Joseph Bonneau. 2015. Upgrading HTTPS in Mid-Air: An Empirical Study of Strict Transport Security and Key Pinning. NDSS.
    [43]
    Deepak Kumar, Kelly Shen, Benton Case, Deepali Garg, Galina Alperovich, Dmitry Kuznetsov, Rajarshi Gupta, and Zakir Durumeric. 2019. All things considered: ananalysis of IoT devices on home networks. In 28th USENIX Security Symposium(USENIX Security 19). 1169--1185.
    [44]
    Arturs Lavrenovs and F Jesús Rubio Melón. 2018. Http security headers analysis of top one million websites. In2018 10th International Conference on Cyber Conflict(CyCon). IEEE, 345--370.
    [45]
    Olivier Levillain. 2016.A study of the TLS ecosystem. Ph.D. Dissertation. Institut National des Télécommunications.
    [46]
    Xurong Li, Chunming Wu, Shouling Ji, Qinchen Gu, and Raheem Beyah. 2017. HSTS Measurement and an Enhanced Stripping Attack Against HTTPS. In International Conference on Security and Privacy in Communication Systems. Springer, 489--509.
    [47]
    Jinjin Liang, Jian Jiang, Haixin Duan, Kang Li, Tao Wan, and Jianping Wu. 2014. When HTTPS meets CDN: A case of authentication in delegated service. In 2014 IEEE Symposium on Security and Privacy. IEEE, 67--82.
    [48]
    Meng Luo, Pierre Laperdrix, Nima Honarmand, and Nick Nikiforakis. 2019. Time Does Not Heal All Wounds: A Longitudinal Analysis of Security-Mechanism Support in Mobile Browsers. In NDSS.
    [49]
    Moxie Marlinspike. 2002. SSLSniff Attack. https://moxie.org/software/sslsnif f/. Accessed: Nov 4, 2019.
    [50]
    Moxie Marlinspike. 2009. More tricks for defeating SSL in practice. Black Hat USA(2009).
    [51]
    Moxie Marlinspike. 2009. SSL Strip Attack. https://moxie.org/software/sslstrip/. Accessed: Nov 4, 2019.
    [52]
    Abner Mendoza, Phakpoom Chinprutthiwong, and Guofei Gu. 2018. Uncovering http header inconsistencies and the impact on desktop/mobile websites. In Proceedings of the 2018 World Wide Web Conference. International World Wide Web Conferences Steering Committee, 247--256.
    [53]
    Marlingspike Moixe. 2009. New tricks for defeating ssl in practice. In Black Hat Conference, USA.
    [54]
    Ivan Petrov, Denis Peskov, Gregory Coard, Taejoong Chung, David Choffnes, Dave Levin, Bruce M Maggs, Alan Mislove, and Christo Wilson. [n.d.]. Measuring the Rapid Growth of HSTS and HPKP Deployments. ([n. d.]).
    [55]
    Abbas Razaghpanah, Arian Akhavan Niaki, Narseo Vallina-Rodriguez, Srikanth Sundaresan, Johanna Amann, and Phillipa Gill. 2017. Studying TLS usage in Android apps. In Proceedings of the 13th International Conference on emerging Networking EXperiments and Technologies. ACM, 350--362.
    [56]
    Eric Rescorla. 2000. RFC 2818: Http over tls. (2000).
    [57]
    Ivan Ristic. 2013.Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications. Feisty Duck.
    [58]
    Peter Saint-Andre and Jeff Hodges. 2011. RFC 6125: Representation and Verification of Domain-Based Application Service Identity within Internet Public Key Infrastructure Using X. 509 (PKIX) Certificates in the Context of Transport Layer Security (TLS). Internet Engineering Task Force (IETF), RFC(2011).
    [59]
    Jose Selvi. [n.d.]. Bypassing HTTP strict transport security. ([n. d.]).
    [60]
    Suphannee Sivakorn, Angelos D Keromytis, and Jason Polakis. 2016. That's the Way the Cookie Crumbles: Evaluating HTTPS Enforcing Mechanisms. In Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society. ACM, 71--81.
    [61]
    Suphannee Sivakorn, Iasonas Polakis, and Angelos D Keromytis. 2016. The cracked cookie jar: HTTP cookie hijacking and the exposure of private information. In 2016 IEEE Symposium on Security and Privacy (SP). IEEE, 724--742.
    [62]
    Christopher Soghoian and Sid Stamm. 2011. Certified lies: Detecting and defeating government interception attacks against SSL (short paper). In International Conference on Financial Cryptography and Data Security. Springer, 250--259.
    [63]
    speedguide. [n.d.]. Port 8443 Details. howpub=https://www.speedguide.net/port.php?port=8443.
    [64]
    Joe Stewart. 2003. DNS cache poisoning--the next generation.
    [65]
    Paul Vixie. 1995. DNS and BIND Security Issues. In Usenix Security Symposium.
    [66]
    Xiaofeng Zheng, Jian Jiang, Jinjin Liang, Haixin Duan, Shuo Chen, Tao Wan, and Nicholas Weaver. 2015. Cookies lack integrity: Real-world implications. In 24th USENIX Security Symposium (USENIX Security 15). 707--721.

    Cited By

    View all
    • (2024)Unveiling Vulnerabilities of Web Attacks Considering Man in the Middle Attack and Session HijackingIEEE Access10.1109/ACCESS.2024.335044412(6365-6375)Online publication date: 2024
    • (2024)A systematic review of cybersecurity assessment methods for HTTPSComputers and Electrical Engineering10.1016/j.compeleceng.2024.109137115:COnline publication date: 1-Apr-2024
    • (2023)Longitudinal Analysis of Wildcard Certificates in the WebPKI2023 IFIP Networking Conference (IFIP Networking)10.23919/IFIPNetworking57963.2023.10186356(1-9)Online publication date: 12-Jun-2023
    • Show More Cited By

    Index Terms

    1. Talking with Familiar Strangers: An Empirical Study on HTTPS Context Confusion Attacks

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        CCS '20: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security
        October 2020
        2180 pages
        ISBN:9781450370899
        DOI:10.1145/3372297
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 02 November 2020

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. https hijacking attack
        2. tls certificate sharing

        Qualifiers

        • Research-article

        Funding Sources

        • BNRist Network and Software Security Research Program
        • The Joint Funds of the National Natural Science Foundation of China
        • Beijing Nova Program of Science and Technology
        • National Natural Science Foundation of China

        Conference

        CCS '20
        Sponsor:

        Acceptance Rates

        Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)129
        • Downloads (Last 6 weeks)8

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Unveiling Vulnerabilities of Web Attacks Considering Man in the Middle Attack and Session HijackingIEEE Access10.1109/ACCESS.2024.335044412(6365-6375)Online publication date: 2024
        • (2024)A systematic review of cybersecurity assessment methods for HTTPSComputers and Electrical Engineering10.1016/j.compeleceng.2024.109137115:COnline publication date: 1-Apr-2024
        • (2023)Longitudinal Analysis of Wildcard Certificates in the WebPKI2023 IFIP Networking Conference (IFIP Networking)10.23919/IFIPNetworking57963.2023.10186356(1-9)Online publication date: 12-Jun-2023
        • (2023)Trusted Delivery Mechanisms for Software Supply Chains Based on Trusted Execution EnvironmentProceedings of the 2023 13th International Conference on Communication and Network Security10.1145/3638782.3638786(19-25)Online publication date: 6-Dec-2023
        • (2023)Investigating Package Related Security Threats in Software Registries2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179332(1578-1595)Online publication date: May-2023
        • (2022)Investigating Influencer VPN Ads on YouTube2022 IEEE Symposium on Security and Privacy (SP)10.1109/SP46214.2022.9833633(876-892)Online publication date: May-2022
        • (2022)Verify-Pro: A Framework for Server Authentication using Communication Protocol DialectsMILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)10.1109/MILCOM55135.2022.10017675(743-750)Online publication date: 28-Nov-2022
        • (2022)Verify-Pro: A Framework for Server Authentication Using Communication Protocol DialectsMILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)10.1109/MILCOM55135.2022.10017649(450-457)Online publication date: 28-Nov-2022
        • (2022)Heterogeneous Vulnerability Report Traceability Recovery by Vulnerability Aspect Matching2022 IEEE International Conference on Software Maintenance and Evolution (ICSME)10.1109/ICSME55016.2022.00024(175-186)Online publication date: Oct-2022
        • (2022)Ethics in Security Research: Visions, Reality, and Paths Forward2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)10.1109/EuroSPW55150.2022.00064(538-545)Online publication date: Jun-2022
        • Show More Cited By

        View Options

        Get Access

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media