Uploaded by wild

tyab025

advertisement
Journal of Cybersecurity, 2021, 1–17
https://doi.org/10.1093/cybsec/tyab025
Research paper
Research paper
Hilda Hadan
*
, Nicolas Serrano and L. Jean Camp
Luddy School of Informatics, Computing, and Engineering, Indiana University Bloomington, 919 E 10th St,
Bloomington, IN 47408, USA
∗
Correspondence address. Luddy School of Informatics, Computing, and Engineering, Indiana University Bloomington, 919
E 10th St, Bloomington, IN 47408, USA. Tel: +1-812-856-1865; Email: hhadan@iu.edu; ljcamp@indiana.edu
Received 24 May 2021; revised 21 September 2021; accepted 21 November 2021
Abstract
Public key infrastructure (PKI) is the foundation of secure and trusted transactions across the Internet. This paper presents an evaluation of web-based PKI incidents in two parts. We began with
a qualitative study where we captured security and policy experts’ perceptions of PKI in a set of
interviews. We interviewed 18 experts in two conferences who include security academics and
practitioners. We describe their perceptions of PKI failures. To evaluate whether perceived failures
match real documented failures, we conducted a quantitative analysis of real-world PKI incidents
on the web since 2001. Our data comprise reports from Bugzilla, root program operators, academic
literature, security blogs, and the popular press. We determined the underlying causes of each and
reported the results. We identified a gap between experts’ perceptions and real-world PKI incidents. We conclude that there are significant sources of failures of PKI that neither the usability nor
traditional computer security community is engaging, nor can arguably engage separately. Specifically, we found incidents illustrate systematic weaknesses of organizational practices that create
risks for all who rely upon PKI. More positively, our results also point to organizational and configuration choices that could avoid or mitigate some of these risks. Thus, we also identify immediate
mitigation strategies (where feasible).
Key words: public key infrastructure (PKI), digital certificates, certificate authorities, Bugzilla, CA noncompliance, baseline requirements
Introduction
The public key infrastructure (PKI) underlying HTTPS, X.509, was
designed as the foundation for secure online transactions. PKI allows verified parties to digitally bind their identities to domain
names, code distributions, and other digital artifacts. The resulting attestations can be used to verify messages, sign documents,
authenticate and authorize users, and distribute trustworthy code
[1].
This research aimed to determine to what extent the concerns of
security and policy experts aligned with actual failures in the field.
This required both qualitative and quantitative investigations. To do
this, we first documented PKI risk perceptions from qualitative in-
terviews with 18 security and policy experts. We also implemented a
quantitative analysis of data comprising the results of a comprehensive compilation of real-world incidents.
While there is significant research on developing improved PKI
warnings and specific coding errors, there has been less research on
the larger patterns of failures in the system. Thus, in this project,
we collected real-world PKI incidents from 2001 to January 2020
from reliable sources. In these reports, we categorized major types
of PKI incidents according to the cause and the type of incident, the
party responsible, and the public disclosure practices of the entity at
fault. We document numerous cases of failures, compiling a dataset
of incidents identifying trusted but untrustworthy certificates.
C The Author(s) 2021. Published by Oxford University Press. This is an Open Access article distributed under the terms of the Creative Commons Attribution-NonCommercial 1
License (https://creativecommons.org/licenses/by-nc/4.0/), which permits non-commercial re-use, distribution, and reproduction in any medium, provided the original work is
properly cited. For commercial re-use, please contact journals.permissions@oup.com
Downloaded from https://academic.oup.com/cybersecurity/article/7/1/tyab025/6470936 by guest on 17 October 2023
A holistic analysis of web-based public key
infrastructure failures: comparing experts’
perceptions and real-world incidents
2
Hadan et al.
Motivation
Public key certificates are issued and validated by CAs, which have
their trust-of-anchor certificates in RPOs’ stores. These CAs provide
certificates that attest to the integrity of the ownership of domain
names on the web and enable secure communications. Failures or
flaws in these are communicated to the individuals in the form of
browser warnings, shifting the final risk decision to the person browsing. With current interaction technologies, these have proven only
moderately efficacious. One can argue if these warnings support informed decision-making in the context of the web. Further, there are
increasing numbers of devices and applications, such as the Internet
of things (IoT), with limited user interaction. In these cases, the decision to trust a CA is not made by those who interact with the remote
services. It is made by RPOs and device manufacturers. Yet the Root
Programs were designed for a very different environment, as reflected
by the name of the governance body: the CA Browser Forum. There
is an increasing need to understand the patterns of PKI operation failures on the web as the web-based PKI’s scope expands into IoT, smart
cities, transportation, and even medical devices. Whatever solutions
are adopted in the pervasive and ubiquitous spaces will depend on
1
For the most recent Baselines Requirement, see: https://cabforum.org/basel
ine-requirements-documents.
the current underlying cryptographic infrastructure (e.g. DNSSEC
[2], DOH [3], RPKI [4], BGPSEC [5]) as with these standards, domain names are used as resource locators and X.509 will likely
be included. Even without the inclusion by direct reference in the
standard, understanding these failures can inform risk mitigation in
future trust infrastructures.
We developed our research questions to identify the differences
between experts’ perceptions and the causes of real-world PKI failures. The specific research questions follow, and together we use these
to answer more significant questions. Are the types and causes of failures embedded in these warnings an accurate reflection of experts’
perceptions and ongoing research on underlying risks? Consider the
uniform warnings for PKI failures on the Internet [6]. Do these warnings reflect actual risks? Are they aligned with the modes of failure
observed in the past?
RQ1. What do experts perceive as the challenges in PKI?
A workshop on risks addressing the gaps in research needed to secure the IoT identified seven failure modes in PKI [7], and provided
a foundation for this research. In our study, we began with these
failure modes as the baseline to design the interview questionnaire.
(These are enumerated in the “PKI failure modes” section.) We interviewed 18 policymakers and cryptographers, selecting those with at
least 10 years of experience working in relevant fields. We captured
participants’ perceptions of the scope and challenges of failures of
the attestations embedded in public key certificates. We detail interview results in the “Findings: overview of experts’ perception of PKI
failures” section.
RQ2. What are the actual causes of PKI failures?
Concurrently with conducting interviews with experts, we compiled a comprehensive dataset of over 1800 real-world PKI incidents.
We began by collecting the failures documented on Bugzilla from
2001, examined security blogs from the RPOs, and included media
reports. The goal was to understand the patterns of PKI failures by
examining two decades of incidents. We implemented a metadata
analysis of the nature and the reported causes of incidents. We describe the detailed results in the “Data Analysis of Real-world PKI
Failures” section.
RQ3. What is the gap between the perceptions and real-world PKI
failures?
While describing the results from RQ2, we compared our findings between the interviews (RQ1) and metadata analysis (RQ2) to
identify the existing gaps between real cases of PKI incidents and
the perceptions of risks and failures in PKI by the experts. We find a
significant disconnection between these two. We detail these comparative results in the “Data Analysis of Real-world PKI Failures” section along with our metadata analysis of real-world PKI incidents.
We provide recommend paths forward in the “Discussion” section
and conclude in the “Conclusion” section.
Related Work
This section summarizes previously identified PKI failures in problems with CA practices, recognizing that these overlap. For example, technical failures are often artifacts that embed the failures of
human developers or organization choices. Failures due to organizational decisions are human decision failures. The decision errors resulting from chronic usability challenges of warnings are also design
failures. We provide a rough classification of previous research and
Downloaded from https://academic.oup.com/cybersecurity/article/7/1/tyab025/6470936 by guest on 17 October 2023
We found that experts identified weak cryptography and software bugs as the major and well-known sources of error. However, in
reality, the primary cause of certificate failures is CAs’ misinterpretation of baseline requirement (BR).1 BRs are the standards set by the
operators of PKI on the web, aptly named the root program operators (RPOs). RPOs are the entities that manage the root programs
that define the policies and processes a provider uses to decide which
certificate authorities (CAs) their software or platforms should trust.
We found that violation of the BRs is the cause of 57% of realworld incidents. Other major sources of failure include systematic
organizational flaws, business practices, individual operator errors,
and simply lack of proper auditing. Our results indicate that PKI has
systematic problems that create risks for all who rely upon it. More
positively, our results also point to organizational and configuration
choices that could avoid or mitigate some of these risks.
This work identifies such a significant gap between perceptions
and reality of PKI failures that we close with more questions than we
answer. The core of this work is an examination of PKI failures to
evaluate its vulnerabilities in holistic terms that include code, cryptography, as well as organizational and human dimensions. Based on
the outcome of this research, we propose specific improvements and
countermeasures that can solve common failures that negatively impact the welfare of PKI users. We also identify large challenges that
neither policymakers nor technologies can overcome independently.
We illustrate our motivations and research questions (RQs) in the
“Motivation” section. In the “Related Work” section, we include PKI
failures identified in previous works. We then explain our qualitative interview design and give an overview of experts’ perceptions of
PKI failures in the “Experts’ Perceptions of PKI Failures” section. In
the “Data Analysis of Real-world PKI Failures” section, we describe
our metadata analysis of 1800 reported PKI incidents and compare
the analysis results with experts’ perceptions. We identify where the
perceptions of PKI failures do and do not align with the causes of
real-world incidents. These incidents are analyzed in terms of their
primary cause, root CA, and incident type. Based on that, we develop
recommendations for a more trustworthy PKI ecosystem in the “Discussion” section and conclude in the “Conclusion” section.
3
A holistic analysis of web-based public key infrastructure failures
tinuous) quality control. These are flaws that occur in applicationlevel code.
A significant contributor to these failures is the insecure “reusable
code” from Stack Overflow and search results [26]. It is particularly
hazardous when flawed evaluation software can also result in accepting certificates known to be noncompliant or even untrustworthy. For
example, the study by Brubaker et al. illustrated that various incorrect certificates would be accepted by one SSL/TLS implementation
but rejected by another [22].
Often, errors in TLS/SSL result from the complexity of deploying HTTPS locally. Deployments and configuration create problems
even for professional network operators. The study by Krombholz et
al. indicates that even professionals prefer easy-to-use solutions. [27]
This result highlights the need for a user-friendly HTTPS configuration tool for people at a wide range of security skills levels [28]. Our
work supports this finding as well.
Technical issues
Human factors in daily use
A well-known example of technical issue is the “GOTO FAIL” logical failure in the OpenSSL library [13–15]. As a consequence, every
valid certificate would be accepted for any claimed domain. The core
requirement of matching the key holder with the domain name did
not occur.
In another example of a software failure, the code to evaluate the
validity of a request for Let’s Encrypt certificate only verified the correctness of the request for the first domain when receiving a batched
request. For example, when a certificate for a host is used for many
subdomains or multiple hosted domains (e.g. coolthings.com, coolsmallthings.com, coolmediumthings.com). Again, an attacker could
have used it to masquerade as any trusted entity. With the Let’s
Encrypt code failure, any number of invalid requests would be accepted if the first one were valid (e.g. coolthings.com, microsoft.com,
google.com) [16].
Similarly, a Windows 10 CryptoAPI failure enabled any website
to masquerade as any other [17]. This vulnerability was announced at
an unusual press conference by the NSA and included an illustration
that rickrolled nsa.gov.
Another cryptographic example of software vulnerability is the
usage of vulnerable keys resulted from a flaw in the key generation algorithm (i.e. shared nontrivial common factors due to entropy problems). As a result, RSA private keys for some TLS hosts and SSH
hosts are subject to mathematically tractable attacks [18].
In addition, and well beyond the domain of human errors, cryptographic algorithms depend on the underlying yet unproven mathematical robustness of various constructions. Cryptographic research
can identify new weaknesses in hash and encryption algorithms; advances in hardware or software may make previously intractable and
secure choices straight-forward to defeat. These changes can result
in vulnerabilities. A well-known example is the Flame malware that
leveraged the weakness of MD5 hash function [19,20]. Chosen-prefix
collisions were also used in the creation of rogue CA certificates in
2009 [21].
Another common failure well documented by previous studies is considered a usability failure. This type of failure refers to when the people are presented with an untrustworthy certificate and ignore the
warnings, as opposed to the case where the untrustworthy certificate does not result in warnings. Here, we also include the fact that
the common perceptions about the meaning of digital certificates are
very different from the assurance they are designed to provide.
The study by Rajivan et al. of people’s perception of certificates
reveals that participants were very optimistic about the scope of security and privacy indicated by a lock icon [29]. Common beliefs were
that certificates convey legal accountability of the website, certify that
a website is secure from hacking and has no vulnerabilities, or that it
has reliable data protection and privacy policies. Clearly, this is very
different from the assurances actually intended by compliance with
the CA/Browser Forum and RPO requirements.
In Park’s study of PKI adoption in South Korean, he concludes
that technical excellence was not what led to the success of creating
widespread trust. Rather, the concentration of root authority and the
use of a single, widely trusted platform enabled widespread adoption
of a national infrastructure [30].
Human failures by developers
Software vulnerabilities, which can also be known as human failures
by developers, have been well documented [22–25]. We differentiate
these from the technical failures above. These are failures in small
projects with individual developers rather than flaws in infrastructure
that could have reasonably been expected to have complete (and con-
Organizational decisions
Previous research has documented that organizations do not necessarily take action when vulnerabilities are identified. For example,
the response to the massive exposure of private keys resulting from
HeartBleed was underwhelming. Few certificates were renewed before they expired. Some of the ones that were renewed were downgraded to less secure algorithms, and some organizations paid the
CAs to simply resign certificates associated with potentially exposed
keys [31].
A particularly mendacious example of failure to address a known
problem is discussed in Mozilla’s research of WoSign and StartCom
[32]. In 2016, the weakness of SHA-1, a core hash algorithm, led
to its removal from those that were acceptable to RPOs. All issuers
identified by the RPOs and CA/Browser Forum as trustworthy were
required to stop issuing SHA-1 certificates. Perversely, WoSign found
a business opportunity for issuing backdated SHA-1 certificates. As
a result, in September 2017, the RPOs removed WoSign and its purchased company, StartCom, from trusted CA lists, yet it still remains
in business and consumers may rely upon its attestations in embedded systems.
Downloaded from https://academic.oup.com/cybersecurity/article/7/1/tyab025/6470936 by guest on 17 October 2023
close with a set of predefined PKI failure modes in the “PKI failure
modes” section.
The risks of globally approved and centrally administered CAs
have long been recognized. An early criticism of PKI was by Abadi et
al., who proposed a local governance system that allowed individuals and organizations to define their own trusted roots [8]. Schneier
and Ellison identified the risks of the hierarchical model of trust less
than a year after the IETF2000 released the internet protocol standard that supports X.509-based PKI [9]. Fox and LaMacchia argued
for greater transparency and discourse about the development of revocation policies [10]. Camp and Nissenbaum argued that the design
of the PKI architecture was in opposition with human trust behaviors [11]. Much more recently, Ferreira et al. proposed a model that
tackles the challenges of TLS using sociotechnical solutions [12]. Beyond this early discourse, there has been limited work on large-scale
PKI governance, particularly considering sociotechnical factors.
4
Hadan et al.
In 2017, Symantec, which managed several CAs, including
GeoTrust, RapidSSL, Equifax, and VeriSign, was also found to be untrustworthy after issuing over 30 000 certificates that did not comply
with the BRs [33–36]. As a result, Symantec was required to sell its
PKI business to DigiCert. This was criticized by those who thought
the patterns of organizational behavior by Symantec were a result
of market power and concentration (e.g. too big to fail), and thus
simply shifting to DigiCert would not be a solution. In our evaluation of PKI failure incidents, we found that the purchase of Symantec
corresponded with an increase in the incidents of flawed certificates
released by DigiCert, illustrating that the transfer of ownership did
not resolve the underlying issues.
We used this set of failure modes as the baseline to design our
interview questionnaire. We describe our interviews questionnaires
and findings in the next section.
Experts’ Perceptions of PKI Failures
In this section, we first explain the development and the deployment
of interview instrument. We then give an overview of our findings—
the experts’ perceptions of PKI failures. The goal is to answer our
RQ1: what do experts perceive as the challenges in PKI?
Problems in CA practices
The hazards of global trust are exacerbated by the fact that digital certificates can fail in issuance and authentication. Previous empirical evaluations of the ecosystem have been strictly quantitative,
using large-scale sampling. An early survey that highlighted systematic problems in CA practices, particularly the existence of digital
certificates not compliant with the BRs, was done by researchers of
INRIA and Microsoft [37]. Further, cryptographically attested but incorrect facts and flawed cryptography were found to be common in
banking certificates [24]. Kumar et al. illustrated that some CAs have
been issuing erroneous digital certificates for the entire lifetime of the
CA [38]. Numerous misconfigured digital certificates were found by
Gasser et al. in their research [39]. These certificates were collected
by network scanning and querying of Certificate Transparency logs.
Our analysis of incidents includes all those documented in the Certificate Transparency logs. Like Dong two years earlier [24], Kumar
[38] found certificates with false information and flawed cryptography. Their targeted analysis showed that these were more common
in banking certificates than in nonbanks.
Known CAs incidents such as CA liability problem and technical
weakness were also discussed by S. Roosa et al. [40]. We return later
to how their conclusions are echoed with our reported analysis of
PKI incidents.
PKI failure modes
A Chatham House rule workshop held in August 2017 in Seattle,
WA, focused on identifying a path toward a trustworthy IoT [11].
This workshop included at least one senior security professional from
each organization that operates a Root Program and senior cryptographers from three organizations. In addition, there were privacy
and security experts from academia, industry, and government. The
workshop included discussions about cryptography, secure coding,
isolation, recovery after subversion, market transparency, usability,
and the roles of industry, government, and consumer advocates in
each of these domains. The discussions on recovery and cryptography identified failure modes in PKI. The set of failure modes identified
is as follows:
r no certificate
r expired but semantically correct and secure cryptography
r valid certificates with invalid facts (either issued incorrectly or
r
r
r
r
based on facts that have changed)
corrupted certificate authority (i.e. rogue certificates)
software failures accepting invalid certificates
lack of agile, strong cryptography (e.g. weak cryptography)
usability failures
We began our work with a literature review to investigate previously
documented PKI failures. In addition, we integrated a set of failures
modes developed from the discussion in the Chatham House rule
workshop [7] (see the “PKI failure modes” section).
We interviewed experts at two security conferences: 46th Research Conference on Communications, Information and Internet
Policy (46th TPRC) and the Real World Crypto (RWC). The goal
of the interviews was to capture experts’ perceptions of the current
scope and challenges in PKI. We obtained approval from the University Institutional Review Board (IRB) in May 2018. Then we held
the interviews in the 46th TPRC conference in September 2018 and
in the RWC 2019 symposium in January 2019.
We sought a heterogeneous set of participants, combining participants with high technical expertise and some policy literacy with
participants with high policy expertise and some technical literacy.
The goal was to generate a consensus document informed by the literature noted based partly on previous successes in combining such
populations [7, 41–43]. In addition, we observed disagreements between the policymakers and applied technologists at the previous
Chatham House rule workshop, particularly about the frequency and
modes of failure [7]. For example, the proposal of disposing all IoT
devices upon failure or vulnerability was embraced by policymakers.
However, this solution was rejected by cryptographers and consumer
advocates as the policymakers assumed that failures were infrequent
and isolated. The fact that the policy community identified some concerns as technical problems while the technologists identified these as
policy issues reifies the need for participants of both types. Thus, we
sought to identify the intersection of the concerns of the two communities.
We recruited our participants using a snowball selection method.
We began by talking to conference attendees who we knew had at
least 10-year experience working in information security or information policy. The participants were then asked to introduce other
potential participants with similar work experiences. In the end, we
interviewed one policy journalist, nine policy researchers, two advanced doctoral researchers who attended the 46th TPRC conference
in September 2018, and six expert technologists who attended the
RWC 2019 symposium.
In our interviews, we asked participants to identify failure modes
of PKI, the role of domain names in IoT, and possible solutions as
PKI evolves. We queried their opinions on the current PKI and their
advice on improving PKI in the future. We also asked about their
personal experience with certificate warnings and malicious websites.
We closed with questions about building a trustworthy Internet without assumptions about user interfaces and device capabilities. Each
interview took 30–45 min. All interviews were audio-recorded, transcribed, and coded. We stored the transcripts anonymously with only
a participant ID in our database. We destroyed the audio records as
the voices are identifiable. We include the semi-structured interview
Downloaded from https://academic.oup.com/cybersecurity/article/7/1/tyab025/6470936 by guest on 17 October 2023
Interview development and deployment
A holistic analysis of web-based public key infrastructure failures
Findings: overview of experts’ perception of PKI
failures
Here, we present an overview of the findings from the interviews with
policy experts from the 46th TPRC conference and applied cryptographers from the RWC 2019 symposium. Among the participants’
responses, most participants agreed that the worst-case failure mode
is when an untrustworthy certificate is treated as trustworthy. The
major causes of PKI failures mentioned by participants were: weak
cryptography, cryptographic verification of invalid facts with the extreme case being rogue certificates, software that incorrectly classifies
an invalid certificate as valid, and ineffective warnings (i.e. usability
issues). Below we detail the PKI failures that our participant experts
well discussed in the interviews. In the “Findings: comparing realworld PKI failures vs experts’ perceptions” section, we enumerate
real-world PKI incidents, and then compare.
Missing certificate
In our interview, missing certificate was seen as an apparent vulnerability. Without certificates, authenticating credentials would not be
kept secure, privacy is not provided, and data transactions could be
compromised. Individuals submitting credentials into insecure forms
and over insecure channels occurs, and this may not be visible to
the user. Note that the HTTPS Everywhere effort addresses this risk,
among others [45]. This risk is being exacerbated by the lack of inclusion of security or attestations in standards for IoT authentication
and software update information [46].
Certificate expired
The second type of failure discussed by experts was expired certificates with unchanged facts. In this situation, the certificate is expired
but the associated facts, such as certificate ownership and basic business information, are still valid. In this case, the entity is still trustworthy, but warnings are generated nonetheless.
Most participants had experienced this situation along with the
other false positive warnings. Some of the participants reported that
they faced warnings on expired certificates frequently. Policymakers
tended to believe that the warnings were due to maintenance errors
or the laziness of maintainers. In this case, they managed to ignore
the warnings and thought the site they visited was legitimate based
on their familiarity. Technologists also noted server configuration issues, inconsistency between platforms, and inconsistency between
browsers in addition to maintenance errors. As opposed to policymakers, half of the technologists would assume that the site was
compromised, not because the certificate itself is incorrect but because expiration is seen as a sign of bad management. Despite that,
instead of leaving, they would be curious and explore the site to determine the cause of the warning. This may be inadvisable for those
with less technical expertise. It drove the requirement for improving
warnings and negative indicators.
Valid certificates with invalid facts
The third type of failure mentioned in our interviews was valid certificates with changed facts. In this situation, a valid certificate was
issued, but the associated facts are changed. By using a valid certificate, an untrustworthy entity is recognized as trustworthy. The
reason could be that the certificate’s issuer did not correctly verify
the requester or due to a rogue certificate issuance. Half of the participants reported having connected to malicious websites without
receiving any warnings. These responses argued for improvement
in warnings and negative indicators. Many participants, primarily
technologists with a few policymakers, believed they had experienced this situation but were uncertain. One technologist pointed
out that the certificate on a site does not tell people the intent of
the site operator. Having a valid certificate only means the certificate matches the domain the user attempts to visit. This observation
has been supported by quantitative research on the use of HTTPS
in fraud [47–49]. One step toward addressing (at least) malicious
reregistration was to link certificates more closely to the domain registration process although none of the participants explicitly mentioned DNSSEC [2]. If a domain owner changes, the reregistered
certificates should expire before or concurrently with the domain
registration.
Corrupted certificate authorities
The fourth type of failure discussed in the interviews was corrupted
certificate authorities. This type of failure drove recommendations
for people, organizations, and devices to have as a default fewer
trusted CAs. This recommendation was supported by analysis by
Perl, Fahl, and Smith, who identified hundreds of trusted by unneeded
certificates in an analysis of organizational PKI policies [50]. It also
identified the critical need for more efficacious responses to rogue incidents. Rogue CAs were seen as a severe and dreadful but rare threat
by the interviewees in general. There are significant research efforts
to improve speed and accuracy of identification of rogue certificates
that was noted by one participant [24], and Transparency seeks to
make these failures public [51].
Experts’ recommendations
We closed each interview by asking for participants’ recommendations to improve PKI. One policymaker recommended creating a
process of verification of principles in practice with improved auditing. The goal was to create a transitive relationship where a group
of manufacturers and technology providers can trust each other because they have all made verified commitments to the same principles
and are audited by the same parties. That, in turn, could be communicated to customers, including decision-makers in a smart city or
safety-critical domains, in the manner that attestations about other,
physical safety-critical components are validated. This is similar to
Downloaded from https://academic.oup.com/cybersecurity/article/7/1/tyab025/6470936 by guest on 17 October 2023
protocol in Appendix 1. These questions were used to open the discussion in our interviews.
We analyzed interview responses using inductive qualitative coding [44], a ground-up approach where researchers derive codes
(i.e. themes) from the data. This approach enables the systematic
repeatable extraction of conclusions from structured qualitative data.
Three doctoral researchers and two undergraduate researchers analyzed the seventeen responses. We eliminated the response from one
participant because the policy expert answered every question with
some hostility (e.g. every answer was “I do not know”). Each of the
five researchers read the transcripts separately and developed an initial list of themes. We then synchronously and in-person met to create, discuss, revise, and expand codes. In the end, we developed two
codebooks, one for the 46th TPRC conference and one for the RWC
2019 symposium. We calculated the Cohen’s Kappa coefficient of
each codebook to ensure inter-coder reliability [44]. Cohen’s Kappa is
used to measure the agreement between multiple coders. The Kappa
coefficients for the resulting codebooks differed but were both over
75% (TPRC Kappa = 0.751, RWC Kappa = 0.842), indicating
a substantial inter-coder agreement. We include the codebooks in
Appendix 2.
The interviews combined questions from two research projects,
setting standards in the IoT and perceptions of resilience in PKI. In
this paper, we focus on perceptions of resilience of PKI.
5
6
(i) Improvements in warnings, particularly negative indicators
(ii) Linking certificates more closely to the hosting or manufacturing process
(iii) Lifetimes that do not exceed the life of the domain name.
(iv) Fewer roots of trust.
(v) Quicker and more effective identification of and responses to
rogue incidents.
(vi) Audit to support positive indicators and increase compliance
with requirements.
(vii) Increased collaboration between cryptographers and policymakers.
The roots of trust (i.e. CA) failure mode was associated with rogue
certificates. Those that mentioned having fewer roots of trust indicated that rogues were a small but critical problem. Having fewer
roots decreases the exposure of individual users to failures in the
infrastructure. The codebook for each question in the qualitative
coding of the interviews is included as an appendix (Appendix 2,
Table A1).
All participants highlighted the importance of transparency, especially in IoT, where there is no opportunity for traditional user
interaction. Improved transparency is needed to ensure that people
(and devices) connections are made only to servers or services with
compliance attestations. The standards that are built on PKI depend
upon this assurance. Beyond standards such as DNSSEC, [2] DOH
[3], RPKI [4], and BGPSEC [5], the emergence of Manufacturer Usage Description (MUD) standard [52] in the IoT space can meet this
requirement depend on the widespread adoption of a trustworthy
PKI.
Data Analysis of Real-world PKI Failures
Concurrently with the qualitative team interviews, the quantitative
lead compiled a comprehensive dataset of real-world PKI incidents.
We first explain our methodology and data sources. In the “Findings:
comparing real-world PKI failures vs experts’ perceptions” section,
we enumerate the details of the findings and compare these with the
experts’ perceptions. The goal was to answer RQ2: what are the actual causes of PKI failures by analyzing PKI incident reports. And
we aim to answer RQ3: What is the gap between the perceptions
and real-world PKI failures? by comparing the data analysis with
experts’ perceptions.
Metadata collection, compilation, and analysis
This section describes how our data were compiled, including the
specific fields in the dataset, and discusses the coding process. We then
compare these results with the qualitative coding of the interviews of
the experts.
Data collection
To evaluate the failures and challenges of real-world PKI incidents,
we analyzed the metadata of incident reports using quantitative data
analysis.
Our data sources had to be public, reliable, impartial, and trustworthy. These requirements eliminated incidents published in media
without proper sources, e.g. medium blog posts. The backbone of
our incident collection was Mozilla’s Bugzilla.2 This source met the
requirements and offered a database of public incidents related to
PKI. After an analysis of over 1800 reported “bugs” in the platform, we collected 557 unique and unrepeated incidents; 474 came
from this data source. To assure comprehensive coverage and check
the consistency of the information on Bugzilla, we relied on other
sources of complementary information. Specifically, we read the discussions on the ‘mozilla.dev.security.policy’ Google Group3 (a channel for bug discussions), and crt.sh where further information about
a particular digital certificate can be found (information that is directly taken from “Certificate Transparency” logs). Beyond this, we
reviewed the Google Security Blog,4 Mozilla Security Blog,5 and incidents reported on Microsoft’s Security Response Center.6 Other data
sources included the academic literature [21], industry research reports [53], technical reports from SANS [54], and CA self-disclosures
[55]. When there were multiple reports of a same incident, we used
additional sources to confirm the information in the Bugzilla reports.
We then implemented the qualitative analysis on Bugzilla, treating it
as authoritative because of its consistency in reporting format. The
resulting data covers 2001 to January 2020 and includes 557 incidents, many reported in multiple information sources.
Quantitative data compilation
We compiled the metadata into a comprehensive dataset of PKI incidents. For each incident, we include the following data fields:
r The year in which the incident was reported. This value equals
the year the incident happened; however, this is not always true,
especially where incidents lasted over a year.
2 Bugzilla: https://bugzilla.mozilla.org.
3 mozilla.dev.security.policy’ Google Group: https://groups.google.com/foru
m/#!forum/mozilla.dev.security.policy.
4 Google Security Blog: https://security.googleblog.com/.
5 Mozilla Security Blog: https://blog.mozilla.org/security/.
6 Microsoft Security Response Center: https://msrc-blog.microsoft.com/.
Downloaded from https://academic.oup.com/cybersecurity/article/7/1/tyab025/6470936 by guest on 17 October 2023
the CA Browser Forum and could be informed by the results of this
work.
In contrast, more than one technologist proposed that government bodies or NGOs should be involved in the PKI process to eliminate the occurrence of rogue certificates and problematic CAs.
At a minimum, these discussions and responses drove the recommendation of audits to support meaningful positive indicators and
reify the need for improvement in warnings and negative indicators.
Neither policymakers nor technologists could provide a clear list
of requirements for CAs. Technologists pointed out that trust is not
a problem that technology can solve. Therefore, they suggested that
creators using PKI in their products should prepare clear public statements about which principles they rely on. Policymakers indicated
that this is a technical problem of usability and risk communication
of attestation. One policymaker said, “be careful not to create more
problems while innovating.” One cryptographer said nearly the same
when asked if he wanted to communicate to policymakers: “Be careful!”
Each group brought a more complete understanding of the limits of their sector to address the underlying problem. Both groups
sought action from the other, indicating a need for greater collaboration and improved communication work between the cryptographic
and policy-making communities.
After developing codebooks, we sought the similarities between
the technologists and policymakers. There was nontrivial disagreement, as noted above, where each had recommendations for the others. However, after having coded the interviews, the results were
seven suggestions that were mentioned multiple times and for which
there was no disagreement. Rather than a statistical analysis, this represents a summary consensus of the experts. The suggestions for future development are as follows:
Hadan et al.
A holistic analysis of web-based public key infrastructure failures
r The responsible entity in the incident, which in almost every case
r
r
r
Data analysis
We used iterative qualitative coding to classify each incident.
The incident reports were first read by a primary doctoral researcher who developed a codebook of possible causes. This codebook and at least one example of an incident with each cause were
reviewed by the other authors (two doctoral researchers and one
faculty member). In the next step, the codebook was evaluated by
a focus group of eight researchers using selected incidents to determine if the codebook was usable and understandable. At this point
in the qualitative process, each incident had been classified at least
once. The codebook was complete and had been further validated in
a focus group that consisted of graduate researchers and faculty in
information and computing science departments. As the final step,
one undergraduate computer science researcher classified every incident report using the codebook, while three additional undergraduate researchers categorized two-thirds of the incident reports (∼370
reports out of 557 reports). Each researcher categorized the incident
reports separately. Any causes that did not fit obviously into the set
of causes identified in the codebook were discussed at weekly meetings. Every incident has been read and classified at least five times,
with every incident having at least one identified cause. Multiple incidents have a set of causes, in which case coders identified a dominant
cause.
The codes from the interpretation of incident reports were directly derived from metadata. These results are used to identify patterns and trends in incidents, which we will discuss next.
We created multiple graphs to help us better understand the data.
Our quantitative exploration of the gathered data allowed the identification of latent unclear phenomena that have been undermining the
trustworthiness in PKI for many years. The result was a macro-study
of responsible Root CAs and other entities, the most common types
of incidents and their primary causes, and the practices of public disclosure of these incidents. It was also a yearly comparison of incidents
(from different perspectives) and a survey related to the issuance of
rogue certificates.
After detailing the analysis of the incident reports, we compare
these with the results of the interviews.
Findings: comparing real-world PKI failures vs experts’
perceptions
Our results illustrate that the failure types from the interview and
a dozen core causes in a few CAs are responsible for the majority
of these. Here, we summarize our findings of metadata analysis as
compared with the interview results.
The findings are presented in terms of the frequency of incidents
across CAs, type of incident, and causes. We initially sought to weigh
the harm done by each incident but found this infeasible. It is because
not all failures are equally harmful. For example, backdating a certificate is somewhat trivial for operational purposes but is dangerous
when used to keep weak cryptography in the field. Similarly, failure
to confirm compliance with agreements with trademark owners may
be harmless or may underpin a global fraud operation [56].
In Fig. 1, we show the frequency of each type of incidents, their
causes, and the relationship between them. Again, we include the explanation of each incident type and cause with examples of bug reports in Appendices 3 and 4.
Common type of incidents
First, we classified incident types. We found that the most common
type of incident is the existence of Fields in certificates noncompliant
to the BR (see Table 1). This type of incident leads to any other by a
wide margin. It is also easy to trivialize; however, most of these noncompliant fields were issues of semantics and syntax. The other three
leading incident types are Audit report failures, Non-BR-compliant
revocation info, and Serial number failures. These incidents reflect
serious issues: an inability to identify and revoke a flawed certificate,
a failure in the fundamentals, and a lack of entropy. The first subversion of TLS was based on the lack of entropy. It remains an issue
in 2020, suggesting that the advances in the PKI ecosystem have not
yet resolved all the underlying problems [57]. Note that the lack of
an audit report reflects a recommendation that was identified in the
qualitative component of the research, specifically the need for highly
trustworthy audits and corresponding indicators.
Overall, we only found one incident related to IoT devices. In this
incident, a major IoT vendor used SHA-1 for its long-lived IoT hub.
On the contrary, in our interviews, experts believed that the current
PKI mode is marginally acceptable for the web but is not adequate for
the IoT in terms of providing good enough security. Experts generally
believed that IoT devices offered lower usability for communicating
warnings and PKI errors than other devices.
Common causes of incidents
Here, we enumerate the different causes of PKI incidents to answer
our RQ2: What are the real cases of PKI failures? The common
causes of incidents are summarized in Table 2. Again, for incidents
with multiple causes, we list the most deterministic and hazardous
cause.
The interviews indicated an intense focus on the endpoint at the
critical failure mode. Our experts argued that the likely cause of incidents originated in the local management of websites they visited. Recall that the failure types mentioned in interviews primarily focused
on the missing or validity of the certificates. Both policymakers and
technologists perceive that failures are most likely to originate in the
internet browser or server associated with a specific visit or service
request. However, most parties assumed that the corresponding CAs
correctly issued certificates to begin with. This assumption appears
unduly optimistic.
Downloaded from https://academic.oup.com/cybersecurity/article/7/1/tyab025/6470936 by guest on 17 October 2023
r
was a CA; however, there were cases where the incident was generated in Intermediate CAs, Resellers, Registration Authorities,
or Auditors.
For each incident the related Root CA, whose root digital certificates are included in the Root Programs.
Which party disclosed the incident is a Boolean variable identifying if incident was disclosed by the responsible entity.
The type of incident, meaning the problem that was identified in
the disclosure. The detailed explanation of codes for incident type
with example bug reports can be found in appendix (Appendix
3, Table A2).
The cause of the incident. When multiple causes are identified,
we list the deterministic and hazardous cause based on the interviews, research, and potential harm. For example, when software bug and BR misinterpretation are identified, we select software bug given the existence of it is more certain. When weak key
and lack of revocation information are both identified, we select
weak key as the cause given it is the primary cause to the certificate failure. The detailed explanation of codes for incident causes
with example bug reports can be found in appendix (Appendix 4,
Table A3).
7
8
Hadan et al.
Table 1: Most repeated types of incidents, number of reported incidents by an entity other than the CA, number of reported incidents by
the CA, and percentage of CA self-reported incidents compared with the total.
Incident
Third-party reported
Self reported
Total
Self reporting rate
Fields in Certificates not compliant to BR
Audit report failures
Non-BR-compliant revocation info
Serial number failures
513/1024 bits key
Possible rogue certificates
Undisclosed SubCA
Failure to revoke certificates in a timely manner
CAAa misissuance
Verified rogue certificate
Insecure hashing (SHA-1/MD5)
CA/RA/SubCA/reseller hacked
Otherb
123
47
32
11
24
11
13
5
11
11
8
7
49
91
17
8
29
1
6
4
9
2
0
3
3
32
214
64
40
40
25
17
17
14
13
11
11
10
81
42.52%
39.41%
20.00%
72.50%
4.00%
35.29%
23.52%
64.29%
15.38%
0%
27.27%
30.00%
39.51%
Total
352
205
557
36.80%
a
b
DNS Certification Authority Authorization (CAA) Resource Record, RFC 6844.
Other includes incident types that occurred ≤5 times.
In fact, our metadata analysis indicates that the most common
cause of real-world failure is CAs’ misinterpretation/unawareness of
BR. It was identified as the primary cause of 111 out of 557 incidents.
The high percentage illustrates either a lack of policies or a lack of
process to ensure these are followed. The same trend also showed up
in the interviews. The policymakers could not list any requirements
that should be implemented to regulate PKI and CAs in the future.
The second most common cause was Software Bugs, which was
identified as the primary cause of 87 incidents. Software failures are
a focus of vulnerability disclosures (e.g. [31, 13, 17, 14, 15]), tra-
Downloaded from https://academic.oup.com/cybersecurity/article/7/1/tyab025/6470936 by guest on 17 October 2023
Figure 1: Types of PKI incidents and their causes. Note that Y-axis includes the incident types and X-axis includes the causes. We listed the top 12 types of PKI
incidents in this graph. Notes: 1, ’Other’ includes incident types that occurred ≤5 times; 2, ’Other’ includes causes that occurred ≤5 times; 3, No data includes
reports without detailed information about the cause at the time of coding.
9
A holistic analysis of web-based public key infrastructure failures
Table 2: Most repeated cause of incident, number of reported incidents by an entity other than the CA, number of reported incidents by
the CA, and percentage of CA self-reported incident compared with the total. Recall that when multiple causes are identified, we list the
most deterministic and hazardous cause.
Third-party reported
Self reported
Total
Self reporting rate
Believed to be compliant/misinterpretation/unaware
Software bugs
Operational error
Human error
Business model/CA decision/testing
Nonoptimal request check
Change in baseline requirements
Improper security controls
Inadequate audit compliance
Organizational constraints
Othera
No datab
65
41
41
41
58
17
13
7
4
5
14
46
46
46
35
32
11
8
8
4
4
2
4
5
111
87
76
73
69
25
21
11
8
7
18
51
41.44%
52.87%
46.05%
43.84%
15.94%
32.00%
38.10%
36.36%
50.00%
28.57%
22.22%
9.80%
Total
352
205
557
36.80%
a
Other includes causes that occurred ≤5 times. No data includes reports without detailed information about the cause at the time of coding.
b
ditional computer security research [22, 18], and research into usability focused on developers (e.g. [26, 58]). We acknowledge that
errors, bugs, and vulnerabilities may be present in every system or
application. It is a major challenge that is both a component of ongoing research and indicated in the interviews (see Appendix 2 for
interview codes).
Another severe cause worth mentioning is Business model/CA decision, which was identified as the primary cause of 69 incidents. In
this situation, the CAs decide not to comply with the requirements
set by the RPOs and the CA/Browser Forum. Often there is an obvious profit motive aligned with the decision to violate these guidelines.
However, none of the experts mentioned this cause in our interviews,
reflecting the importance of auditing and verification. More interview
participants identified end-users and network engineers than CAs as
bad judgment sources (e.g. ‘lazy’ site maintainers).
As a major point of agreement, our metadata analysis shows that
the issuance of rogue certificates is an unsolved problem. We found
28 incidents related to the possible or actual issuance of rogue certificates, linked to 12 Root CAs, and distributed over the range of
time studied (2001–January 2020). On the contrary, experts in our
interviews expected PKI to play a more significant role in preventing
phishing attacks or fraudulent and malicious sites. The same perception was also shown in a previous phishing resilience test. Participants assumed that they have a “secure connection” with a malicious
domain if it allows HTTPS connections [59].
Top problematic root CAs
Third, we classified the responsible entities of problematic certificates. We found that the top 15 Root CAs with the most public incidents registered were present in 51.71% of the total incidents studied.
(see Fig. 2) The other 48.29% of the incidents occurred due to the
other 83 CAs. In addition, the number of problematic Root CAs are
increasing over the year (see Fig. 3)
Incidents caused by the Problematic Root CAs were more numerous and more likely to be associated with subCAs and intermediate
CAs than other incidents. Note that the most problematic CAs with
problematic certificates are not merely the most prolific nor the ones
with the largest customer base. CAs with a history of being systematically unreliable should not receive the same indicator and default
inclusion as CAs with histories of excellence. Familiar and unfamiliar CAs should be identified differently. Jurisdiction of CA may be
a valuable indicator in addition to the history of the CA. More nuanced indicators can provide levels of warnings, and such customized
warnings should be a focus of research. Now indicators are binary:
the certificate checks out, or it does not.
Experts argued that CAs providing digital certificates for free is a
significant source of rogue certificates. Their opinions were that these
CAs had been associated with the issuance of certificates with malicious motivations behind them. However, in our metadata analysis,
we identified 0 rogue certificate incidents associated with those CAs,
which means they are not more unreliable than other CAs. For example, only 10 out of 557 incidents were associated with Let’s Encrypt,
which has a very high self-reporting rate (70%). Within these 10 incidents, only 1 of them possibly resulted in a rogue certificate. All the
other 27 rogue certificate incidents were generated by misbehaving
for-profit companies, hacked for-profit companies, and governmental
agencies. Thus, free CAs appear more reliable than other CAs. Examining the certificates that are legitimate but associated with malicious
domains (such as phishing sites) is a subject of ongoing data compilation and future analysis.
Evolution of self-reporting rate
Our analysis showed a trend of increasing transparency and selfreporting. Such disclosures are arguably a positive externality of the
mandated use of “Certificate Transparency” in the issuance of digital
certificates. Issued certificates are now publicly logged and monitored
by third parties. The discovery of faulty certificates has been made
both more likely and easier, particularly with the inclusion of different tools tailored to the analysis of the logs platforms (i.e. lints). Annual disclosures are shown in Fig. 4. The figure ends in January 2020
not only because it is necessarily the case that disclosure lags issuance
and detection but also because disclosure may be delayed for remediation. For example, the Let’s Encrypt error that allows misissuance
of certificates in bulk requests was not reported until remediation to
prevent abuse [16].
Even with increased transparency, the lack of disclosure practices
by CAs remains an important contributor to reasons not to trust
the current. Only 52 out of 98 Problematic Root CAs (53.06%) had
made at least one incident disclosure despite dominating in a number
of incidents. Further, incident disclosures do not always correspond
to immediate and effective revocation. See Fig. 4 for the self-reporting
rate by year.
Downloaded from https://academic.oup.com/cybersecurity/article/7/1/tyab025/6470936 by guest on 17 October 2023
Causes
10
Hadan et al.
Figure 3: The chart shows the distribution of incidents across CAs by year. This illustrates both the overall increase and the increasing number of CAs
associated with an incident. This illustrates that there are few CAs that have chronic issues with incidents.
Figure 4: Incidents per year, indicating which of these were self-reported by the CA (orange) and those identified by a third party (blue). Note that third-party
disclosures dominate every year, with an improvement in that ratio in 2019.
Discussion
Our results indicate a clear mismatch between experts’ perceptions
and the causes of real-world PKI failures. Experts primarily focused
on the endpoint (e.g. website warnings, missing certificates), assuming that corresponding CAs behaved correctly. On the contrary, the
metadata analysis of real-world incidents indicated that the major cause of PKI failures is the systematic problems with CAs. For
example, the misinterpretation of BR and CAs’ decision to fail to be
compliant. Arguably, the CAs are not as trustworthy as expected. The
particular areas of disconnect reify the need for more collaboration
and communication in PKI governance.
Table 3 shows a more precise comparison between the experts’
perceptions and the metadata analysis of real-world PKI incidents.
Notice that we neither include end-user comprehension of certificates
nor include the lack of usability of current warnings. We only indicate that these warnings do not align with the underlying failures.
Downloaded from https://academic.oup.com/cybersecurity/article/7/1/tyab025/6470936 by guest on 17 October 2023
Figure 2: Count of incidents by Problematic Root CAs. The top 15 Root CAs accounted for 51.71% of the total incidents.
11
A holistic analysis of web-based public key infrastructure failures
Table 3: Differences between perceptions and real cases of PKI failures. Note that this study did not include user misconceptions and
usability issues, thus the asterisk. Usability concerns and understanding of certificates is an area of active research, e.g. (Krombholz et al.
2019 [60]; [6])
Element
Incident types
Causes
Real-world incidents
r
r
r
r
No certificates
Expired certificates with valid facts
Valid certificates with invalid facts
Corrupted CAs result in rogue certificates
r
r
r
r
Incorrect certificates
CA security incidents (hacked)
Noncompliant CAs
Only a few corrupted CAs
r
r
r
r
r
r
Maintenance error
Untrustworthy CAs (generate certificates for free)
Key management
Inconsistency between browsers/devices
Server configuration issues
malicious website operators
r
r
r
r
r
r
CAs’ misinterpretation/unawareness of BR
Software Bugs
Human or operational error
CA decision to not compliant with BR
CA with improper security control
Free CAs are trustworthy than other CAs
r
r
r
Problematic PKI model
False-positive warnings
Loss of data confidentiality
r
r
r
Rogue certificates
Untrustworthy CAs
Unreliable audits, low self-report rate
The lack of comprehension and usability of standard TLS/SSL warnings is well known in the usable security community, including a wide
range of technologies, and social scientists from the public and private sectors.
In our interview, experts expected PKI to play a significant role
in preventing phishing attacks. However, our metadata analysis indicated that the issuance of misleading certificates is one of the least
solvable problems. Since the interviews, phishing sites have adopted
to HTTPS Everywhere, and the majority of phishing sites are now
SSL enabled according to the Anti Phishing Working Group (APWG)
[61]. The purpose of certificates on the web was to authenticate
domain names when they were considered critical signposts in cyberspace (to quote the title of the National Academies report [62]).
Now, with HTTPS Everywhere, web certificates play less of a role
in distinguishing legitimate sites due to the misconception of HTTPS
Everywhere. The green or gray “lock” icon does not imply the domain is not malicious. It is not an effective strategy for distinguishing
miscreants.
All experts reported having visited malicious sites where no warnings appeared, and all participants visited legitimate websites that
generated warnings. This result reflects that effective communication
to users requires the differentiation of types of risk posed by the certificate. The collapse of all possible risks of legitimate or miscreant
certificates into a single interaction is a major weakness in the current system. Addressing this requires significant reconsideration and
improvement in warnings, including personalization of warnings and
risk communication [63].
Given the high number of noncompliant certificates (214 out of
557 incidents), we recommend that warnings distinguish between an
expired certificate, an otherwise noncompliant certificate, certificates
from an unknown root, unfamiliar root, or a new CA for a familiar site under the recommendation for more effective, more nuanced
warnings. Note that other fields where there is noncompliance do not
necessarily generate warnings even when these are more dangerous,
specifically lack of revocation information.
Our metadata analysis identified CA’s Misinterpretation/Unawareness of BR as the most common cause of real-world
failures, which experts did not realize in the interviews. The dramatic changes in the security of Microsoft code from the nineties
to recent times show the potential of organizational commitment,
such as an internal cryptography review board. Thus it is reasonable
to assert that both policies and practices need to be improved
in the CAs that repeatedly report these incidents. In addition, it
is also concerning that a major cause of incidents is the CAs’
self-admitted unawareness of their commitments to comply with
standards.
Although Software bugs may be present in every system or application, having it as the second most repeated cause of incidents is a
signal that some practices could be improved in the CAs and libraries
commonly used to validate certificates (see Table 2).
While Extended Validation (EV) certificates were intended to improve verification in the requester verification process, there is no
consensus that their benefits are widespread, significant, or even extant. In our interviews, more than one participant suggested that EV
certificates correspond to the original expectation of basic certificates
in that they provide some indication of the legitimacy of the holder.
This confirms previous research by Gutmann on the lack of verification associated with EV certificates [64].
In addition, it seems that the current structure for digital certificates issuance and CAs’ operations is not transparent, clear, nor accessible. All certificates appear equal to any but the expert. Some experts in our study said that there is not enough reputation information in the CA market. Different participants were concerned about
different jurisdictions or the provision of free certificates. Our study
did not include the revocation of certificates used for phishing domains, so the concern in the second case cannot be addressed in these
conclusions.
Our perceptions study also found that the actual requirements for
CAs are not very well understood. When asked about what requirements should be implemented to regulate PKI and CAs in the future,
none of our participants could provide a path forward. We found that
CA governance is mainly defined by RPOs and the CA/Browser Forum. The latter regulates and publishes the BRs for digital certificates
and CA practices, which can be considered as the de facto standard
for PKI. Entities in the former group define a corpus of requirements
that CAs must comply with to have their root certificates in the different root programs.
In addition, we consider two additional sources of CA governance. First, CAs’ operations may need to meet certain restrictions based on specific countries’ laws and regulations. For example,
WoSign issued a statement that it was forced by the Chinese government to issue digital certificates using the elliptic curve SM2 al-
Downloaded from https://academic.oup.com/cybersecurity/article/7/1/tyab025/6470936 by guest on 17 October 2023
Consequences
Experts’ perception
12
Hadan et al.
Conclusion
We offer this work as a contribution to the understanding of the
scope and limits of PKI governance model. One core and unexpected challenge was while the failure modes were the subject of
much agreement, resolving these failures was identified as a technical challenge by policymakers and a regulatory challenge by technical
experts.
The use of PKI to support secure communications and implement
key exchange is an immense success. It is well understood that the
use of PKI for authentication and communicating information about
the degree to which a site is trustworthy has not been so successful.
Based on the comparison of interviews and metadata analysis, we
found that the frequency of Certificate Authority noncompliance is
a more significant source of vulnerability than generally documented
and discussed. Such noncompliance is not limited to rogue certificates
and hacked CAs but rather standard operating procedures dominate
the creation of risks. However, as PKI is being used in IoT and CyberPhysical Systems (CPS), problems that were arguably reasonable as
standard operating procedure are now less so. A decision to accept
risk in web commerce should be treated as distinct from a decision
to accept risk in CPS.
Our interviews and metadata analysis result in the following recommendations, which align with current research. Note that all of
these are sociotechnical requiring interdisciplinary and cross-domain
efforts.
7
Baseline Requirement Section 6.1.5: https://wiki.mozilla.org/CA:WoSign_I
ssues#Issue_P:_Use_of_SM2_Algorithm_.28Nov_2015.29.
r HTTPS Everywhere should differentiate invalid certificates and
lack of a certificate.
r There should be faster blocking of rogue certificates.
r There should be investments in improved software development.
r There should be a clear strategy to address the requirement for
more agile cryptography.
Other recommendations result from the metadata analysis. These
are arguably a component of usability failures, as warnings are now
frequent and frequently meaningless. We did not include usability in
our inquiry. Yet that both sets of participants consistently raised it
indicates both its importance and the awareness of its importance.
r fewer or easily rejected warnings for cases with expired certificates previously accepted by the use, with likely valid facts
r stronger warnings for valid certificates with invalid facts (such as
a potential rogue or after a website changes ownership)
r lack of revocation information for an otherwise compliant and
r
r
correct certificate should result in a specific indicator expressing
uncertainty
fewer trusted roots by default
disincentives for software that accepts invalid certificates, which
complements the requirement for investments in improvements
in open code
In addition, our results found that there are a few systematically
responsible CAs. These are in direct opposition to current practice:
r provide interactions that distinguish between consistently rer
sponsible CAs and others, and between chronically irresponsible
CAs
provide interactions that identify CAs with legal requirements
that violate standard CA requirements (i.e. mandatory weak
cryptography, law enforcement copies of private keys)
Future research includes evaluating simple but more precise
warnings that differentiate: certificates that might have been revoked,
certifications from a remote and unfamiliar CA, cryptographically
weak certificates, certificates from chronically responsible CAs, and
other less common causes. While it would be unreasonable to expect an average person to understand cryptographic strength and entropy concepts, communication of relative toxicity and volatility of
chemicals has proven relatively feasible and is arguably no more complex. The identification of repeated identical warnings, many incorrect and all lacking nuance, combined with the distribution of causes
and types of incidents, argues for more customization in warnings.
The prevalence of software errors may be a result of our primary data source. Alternatively, we searched widely for incident reports and found that the incidents reported elsewhere were contained
in Bugzilla. Thus, the argument for completeness must be balanced
against an argument for bias.
Based on our combined findings, there is a need for improvement
in PKI at the moment, and this need will only increase as the interaction space for warnings and indicators decreases with IoT and embedded systems. No single party can improve the PKI’s resilience and
security independently. Interdisciplinary research and cross-industry
collaboration are needed.
Acknowledgments
We would like to acknowledge graduate researchers Jacob Abbott
and Shakthidhar Gopavaram and undergraduate researchers Andrew
Kim and HyeonJung “Julie” Lee for assistance with qualitative coding. We would also like to thank undergraduate researchers Jack
Downloaded from https://academic.oup.com/cybersecurity/article/7/1/tyab025/6470936 by guest on 17 October 2023
gorithm, which is not accepted by the BR (see BR Section 6.1.5).7
However, the BR recognizes that conflicts like these inherently occur; so, in BR Section 9.16.3, they address the discrepancies between
the governance requirements of the BR and a country/jurisdiction
regulation. Yet, there is no indicator or guidance for the individual
operator either seeking a certificate or relying upon one. Second, intermediate and subordinate CAs may be under the direct governance
of a parent root CA. In these cases, CAs in subordinate positions of
the CA chain-of-trust must operate under root CAs’ guidelines and
follow any stipulated requirement. Again, there are no clear indicators of this.
Our study of incidents of PKI identified both international business intrigue and blithe malpractice. The tale of backdated certificates by WoSign in 2016 after the rejection of the SHA-1 algorithm
reads like fiction, particularly as Mozilla discovered that WoSign (a
Chinese company) had purchased StartCom (an Israeli company) in
April 2016 through two Hong Kong subsidiaries, and in 2016 this
was not known by StartCom customers [32]. In terms of mundane
quotidian malpractice, Symantec was forced to sell the PKI business
to DigiCert after the steady misissuance of SSL certificates [33, 34].
Yet even after embracing an ethos of noncompliance, it was still thriving in the market because it was too large a component of the infrastructure to remove completely.
Finally, it is interesting that no experts felt web pages without
certificates (not using HTTPS) were a major problem. For example,
Google Chrome marked “Not Secure” http-accessed web pages and
the growth in free certificates usage as the ones provided by “Let’s
Encrypt.” Recent research has shown that almost 60% of the most
visited sites automatically redirect to https (if not accessed using the
secure protocol in the first place) [65]. That figure has increased from
∼7% near the end of 2015.
A holistic analysis of web-based public key infrastructure failures
Ruocco, Joshua Johnson, Zora Streiff, and Trevor Cutshall for assistance with the metadata collection of PKI incident reports.
Supplementary data
Supplementary data available at Cybersecurity Journal online.
Funding
Conflict of interest statement. None declared.
References
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
Braun J, Volk F, Classen J. et al. CA trust management for the Web PKI.
J Comput Secur 2014;22:913–59.
Arends R, Austein R, Larson M. et al. Resource Records for the DNS
Security Extensions. RFC Editor. 2005. https://doi.org/10.17487/RFC40
34.
Hoffman P, McManus P. DNS Queries over HTTPS (DoH). RFC Editor.
2018. https://doi.org/10.17487/RFC8484.
Bush R, Austein R. The Resource Public Key Infrastructure (RPKI) to
Router Protocol. RFC Editor. 2013. https://doi.org/10.17487/RFC6810.
Lepinski M, Sriram K (eds). BGPsec Protocol Specification. RFC Editor.
2017. https://doi.org/10.17487/RFC8205.
Reeder RW, Felt AP, Consolvo S. et al. An experience sampling study of
user reactions to browser warnings in the field. In: Conference on Human
Factors in Computing Systems – Proceedings, 2018-April. 2018. https:
//doi.org/10.1145/3173574.3174086.
Camp J, Henry R, Kohno T. et al. Toward a secure internet of things:
directions for research. IEEE Secur Priv 2020;18:28–37.
Abadi M, Birrell A, Mironov I. et al. Global authentication in an untrustworthy world. In: Proceedings of the 14th USENIX Conference on Hot
Topics in Operating Systems. 2013.
Ellison C, Bruce S. Ten risks of PKI: What you’re not being told about
public key infrastructure. Comput Secur J (2000);16(1):1–7.
Fox B, LaMacchia B. Certificate revocation: mechanics and meaning. Lect
Notes Comput Sci 1998;1465:158–164.
Camp LJ, Nissenbaum H, McGrath C. Trust: a collision of paradigms.
In: International Conference on Financial Cryptography. 2001, 91–105.
https://doi.org/10.1007/3-540-46088-8_10.
Ferreira A, Giustolisi R, Huynen JL. et al. Studies in socio-technical security analysis: authentication of identities with TLS certificates. Proceedings – 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. TrustCom 2013, 2013, 1553–8.
https://doi.org/10.1109/TRUSTCOM.2013.190.
Langley A. ImperialViolet: Apple’s SSL/TLS bug. 2014. https://www.im
perialviolet.org/2014/02/22/applebug.html.
Synopsys Editorial Team. Understanding the Apple ‘goto fail;’ Vulnerability | Synopsys. 2014. https://www.synopsys.com/blogs/software-securi
ty/understanding-apple-goto-fail-vulnerability-2/.
Wheeler DA. The Apple goto fail Vulnerability: Lessons Learned. 2014.
https://dwheeler.com/essays/apple-goto-fail.html.
Bugzilla. 1619047: Let’s Encrypt: CAA Rechecking Bug. 2020. https://bu
gzilla.mozilla.org/show_bug.cgi?id=1619047.
17. Microsoft. CVE-2020-0601 – Security Update Guide – Microsoft – Windows CryptoAPI Spoofing Vulnerability. 2020. https://msrc.microsoft.c
om/update-guide/en-US/vulnerability/CVE-2020-0601.
18. Heninger N, Durumeric Z, Wustrow E. et al. Mining Your Ps
and Qs: Detection of widespread weak keys in network devices. In: 21st Usenix Security Symposium. Bellevue, WA, 2012.
https://www.cs.bham.ac.uk/∼garciaf/publications/Gone_in_360_seconds
_Hijacking_with_Hitag2_poster_2012.pdf.
19. Fillinger M, Stevens M. Reverse-engineering of the cryptanalytic attack
used in the flame super-malware. Lect Notes Comput Sci 2015;9453:
586–611.
20. sKyWIper Analysis Team. sKyWIper (a.k.a. Flame a.k.a. Flamer): a complex malware for targeted attacks. Laboratory of Cryptography and System Security (CrySyS Lab). 2021. https://www.crysys.hu/publications/fil
es/skywiper.pdf.
21. Stevens M, Sotirov A, Appelbaum J. et al. Short chosen-prefix collisions
for MD5 and the creation of a rogue CA certificate. Lect Notes Comput
Sci 2009;5677:55–69.
22. Brubaker C, Jana S, Ray B. et al. Using frankencerts for automated adversarial testing of certificate validation in SSL/TLS implementations. In:
2014 IEEE Symposium on Security and Privacy. 2014.
23. Chen Y, Su Z. Guided differential testing of certificate validation in
SSL/TLS implementations. In: 2015 10th Joint Meeting of the European
Software Engineering Conference and the ACM SIGSOFT Symposium on
the Foundations of Software Engineering, ESEC/FSE 2015 – Proceedings.
2015, 793–804. https://doi.org/10.1145/2786805.2786835.
24. Dong Z, Kane K, Camp LJ. Detection of rogue certificates from trusted
certificate authorities using deep neural networks. ACM Trans Priv Secur
(TOPS) 2016;19:31.
25. Kaloper-Meršinjak D, Mehnert H, Madhavapeddy A. et al. Not-quiteso-broken TLS: lessons in re-engineering a security protocol specification
and implementation. In: 24th USENIX Security Symposium (USENIX
Security 15). 2015, 223–38. https://www.usenix.org/conference/usenixse
curity15/technical-sessions/presentation/nan.
26. Acar Y, Backes M, Fahl S. et al. You get where you’re looking for:
the impact of information sources on code security. In: Proceedings
– 2016 IEEE Symposium on Security and Privacy, SP 2016. 2016,
289–305.
27. Krombholz K, Mayer W, Schmiedecker M. et al. “I Have No
Idea What I’m Doing” – on the usability of deploying HTTPS. In:
26th USENIX Security Symposium (USENIX Security 17). 2017,
1339–56. https://www.usenix.org/conference/usenixsecurity17/technical
-sessions/presentation/krombholz.
28. Tiefenau C, von Zezschwitz E, Häring M. et al. A usability evaluation of
Let’s Encrypt and Certbot: usable security done right. In: Proceedings of
the 2019 ACM SIGSAC Conference on Computer and Communications
Security. 2019. https://doi.org/10.1145/3319535.
29. Rajivan P, Moriano P, Kelley T. et al. Factors in an end user security
expertise instrument. Inf Comput Secur 2017;25:190–205.
30. Park D. Social life of PKI: sociotechnical development of Korean publickey infrastructure. IEEE Ann Hist Comput 2015;37:59–71.
31. Chen S, Kelley T, Dong Z. et al. The Effects of HeartBleed on Certificate
Change. Poster Presented at ACSAC(Los Angeles, CA) 7 –11 December
2015. 2015. http://www.ljean.com/files/meh.pdf.
32. Gervase M. WoSign and StartCom – Google Docs. Mozilla. 2016.
https://docs.google.com/document/d/1C6BlmbeQfn4a9zydVi2UvjBGv6
szuSB4sMYUcVrR8vQ/edit.
33. Google Groups. Misissued/Suspicious Symantec Certificates. 2017. https:
//groups.google.com/g/mozilla.dev.security.policy/c/fyJ3EK2YOP8.
34. O’Brien D, Sleevi R, Stark E, Chrome security team. Google Online Security Blog: Distrust of the Symantec PKI: Immediate action needed by
site operators. 2018. https://security.googleblog.com/2018/03/distrust-o
f-symantec-pki-immediate.html.
35. O’Brien D, Sleevi R, Whalley A, Chrome Security team. Google Online
Security Blog: Chrome’s Plan to Distrust Symantec Certificates. Google
Security Blog. 2017. https://security.googleblog.com/2017/09/chromes-pl
an-to-distrust-symantec.html.
Downloaded from https://academic.oup.com/cybersecurity/article/7/1/tyab025/6470936 by guest on 17 October 2023
This research was supported in part by the National Science Foundation
awards CNS 1565375 and CNS 1814518, the National Security Agency
#H8230-19-1-0310, Cisco Research Support, Google Research, the Comcast
Innovation Fund, and the Indiana University Ostrom Workshop Fellowship.
Any opinions, findings, and conclusions, or recommendations expressed in this
material are those of the author(s) and do not necessarily reflect the views of
the US Government, the National Science Foundation, the National Security
Agency, Cisco, Comcast, Google and Indiana University Ostrom Workshop.
13
14
58. Naiakshina A, Danilova A, Tiefenau C. et al. Why do developers get password storage wrong? A qualitative usability study. In: Proceedings of the
2017 ACM SIGSAC Conference on Computer and Communications Security. 2017. https://doi.org/10.1145/3133956.
59. Kelley T, Bertenthal BI. Attention and past behavior, not security knowledge, modulate users’ decisions to login to insecure websites. Inf Comput
Secur 2016;24:164–76.
60. Krombholz K, Busse K, Pfeffer K. et al. “If HTTPS Were Secure, I Wouldn’t
Need 2FA”- End User and Administrator Mental Models of HTTPS. In
2019 IEEE Symposium on Security and Privacy (SP). IEEE 2019;246–63.
61. Anti Phishing Working Group (APWG). Phishing activity trends report
1st quarter 2021. APWG, 2021. https://docs.apwg.org/reports/apwg_tre
nds_report_q1_2021.pdf.
62. Front Matter. Signposts in Cyberspace: tHe Domain Name System and Internet Navigation. Washington, DC: The National Academies Press, 2005,
1–391. https://doi.org/10.17226/11258.
63. Blythe J, Camp J, Garg V. Targeted risk communication for computer
security. In: International Conference on Intelligent User Interfaces, Proceedings IUI. 2011, 295–8. https://doi.org/10.1145/1943403.1943449.
64. Scheffler TD. Engineering security. In: Military Engineer, Vol. 108. Book
Draft. 2016. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.4
15.5998.
65. Helme S. Alexa Top 1 Million Analysis – February 2019. 2019. https:
//scotthelme.co.uk/alexa-top-1-million-analysis-february-2019/.
Appendix 1: Interview protocol
The interviews combined questions from two research projects, setting standards in the IoT and perceptions of resilience in PKI. In this paper, we focus on
perceptions of resilience of PKI.
Q1. How would you define or differentiate the IoT?
Q2. When an IoT device connects from inside to outside of the home what
kind of trust information is needed?
Q3. How do you trust a website now. Do you think the current web trust
model of public key certificates will work in IoT?
Q4. Have you ever had a false negative, where you knew a site was valid
but received a warning when trying to connect? In what context can
you describe that experience? Do you know what failed?
Q5. Do you think you have ever had a false positive, where a site was malicious but there was no warning? Can you describe the context? Do
you know what failed?
Q6. If the model for CAs and trust as built on the web (X.509) models what
should we learn and do differently in the IoT?
Q7. Can nontechnical people know their devices are trustworthy? If so,
how?
Q8. Based on what we have learned from malicious activities on the Web,
what are the requirements that you need as a stakeholders and a (technologist or a user) to certify trustworthiness of devices and connections?
Q9. How would this protect you and others by preventing malicious activities?
Q10. How can devices be updated when the manufacturer has gone out of
business or no longer supports the device?
Q11. Is this a case for exceptional access?
Q12. What do you see as the role of domain names in the IoT? What have
we learned and what should be change?
Q13. What are the roles of the marketplace, technologists, and policy makers
in resolving the failure models we discussed?
Q14. If you could tell a policy maker one thing, what would it be?
Q15. If you could communicate one thing to users about trust in IoT, what
would it be?
Q16. Do you have any other comments for usability scholars or technologists about the need for action?
Q17. What questions have I failed to ask about trust in IoT?
Downloaded from https://academic.oup.com/cybersecurity/article/7/1/tyab025/6470936 by guest on 17 October 2023
36. SSLShopper. Symantec sells its CA business to DigiCert. SSL Certificate
Comparison and Reviews. 2017. https://www.sslshopper.com/symantecsells-ca-business-to-digicert.html.
37. Delignat-Lavaud A, Abadi M ´, Birrell A. et al. Web PKI: closing the gap
between guidelines and practices – NDSS Symposium. Proceedings of the
ISOC, Network and Distributed System Security Symposium (NDSS ’14).
2014. https://www.ndss-symposium.org/ndss2014/programme/web-pkiclosing-gap-between-guidelines-and-practices/.
38. Kumar D, Wang Z, Hyder M. et al. Tracking certificate misissuance in the
wild. In: Proceedings – IEEE Symposium on Security and Privacy, 2018May, 2018, 785–98. https://doi.org/10.1109/SP.2018.00015.
39. Gasser O, Hof B, Helm M. et al. In log we trust: revealing poor security
practices with certificate transparency logs and internet measurements.
Lect Notes Comput Sci 2018;10771:173–85.
40. Roosa SB, Schultze S. Trust darknet: control and compromise in the internet’s certificate authority model. IEEE Internet Comput 2013;17:18–25.
41. Camp LJ. Identity the civic scenario. In: Proceedings of the 2004 Annual
National Conference on Digital Government Research. 2004. https://dl.a
cm.org/doi/10.5555/1124191.1124331.
42. Camp LJ, Bowman W, Friedman A. Voting, vote capture & vote counting
symposium. In: Proceedings of the 2005 National Conference on Digital
Government Research. 2005, 198–9. https://dl.acm.org/doi/10.5555/106
5226.1065282.
43. Camp LJ, Cranor L, Feamster N. et al. Data for Cybersecurity Research:
Process and “Wish List” – Reports & Papers – CERIAS: Purdue University. Purdue University. 2009. http://www.cc.gatech.edu/fac/feamster/pap
ers/data-wishlist.pdf.
44. Bernard HR, Harvey R, Ryan GW. et al. Analyzing Qualitative
Data: Systematic Approaches. Thousand Oaks, CA: SAGE Publications,
2016.
45. Electronic Frontier Foundation. HTTPS Everywhere FAQ | Electronic Frontier Foundation. https://www.eff.org/https-everywhere/faq
(21 November 2021, date last accessed).
46. Lear E, Rose S. SBOM Extension for MUD. IETF. 2020. https://datatrac
ker.ietf.org/doc/html/draft-lear-opsawg-mud-sbom-00.
47. Almishari M, de Cristofaro E, el Defrawy K. et al. Harvesting SSL certificate data to identify web-fraud. Int J Netw Secur 2009;14:324–338.
48. Dacosta I, Ahamad M, Traynor P. Trust no one else: detecting MITM
attacks against SSL/TLS without third-parties. Lect Notes Comput Sci
2012;7459:199–216. https://doi.org/10.1007/978-3-642-33167-1_12.
49. Huang LS, Rice A, Ellingsen E. et al. Analyzing forged SSL certificates
in the wild. In: Proceedings – IEEE Symposium on Security and Privacy.
2014, 83–97. https://doi.org/10.1109/SP.2014.13.
50. Perl H, Fahl S, Smith M. You won’t be needing these any more: on
removing unused certificates from trust stores. Lect Notes Comput Sci
2014;8437:307–15.
51. Gustafsson J, Overier G, Arlitt M. et al. A first look at the CT landscape: Certificate transparency logs in practice. Lect Notes Comput Sci
2017;10176:87–99.
52. Lear E, Droms R, Romascanu D. Manufacturer Usage Description Specification. RFC Editor. 2019. https://doi.org/10.17487/RFC8520.
53. European Union Agency. Certificate Authorities: The Weak Link of Internet Security. 2016. https://www.enisa.europa.eu/publications/info-notes/
certificate-authorities-the-weak-link-of-%0A internet-security.
54. Gomes F. Security Alert: Fraudulent Digital Certificates | SANS Institute.
SANS. 2001. https://www.sans.org/white-papers/679/.
55. Comodo. Comodo Report of Incident: Comodo detected and thwarted
an intrusion on 26-MAR-2011. Comodo. 2011. https://www.comodo.c
om/Comodo-Fraud-Incident-2011-03-23.html.
56. Cimpanu C. Microsoft takes control of 17 domains used by West
African BEC gang – The Record by Recorded Future. 2021.
https://therecord.media/microsoft-takes-control-of-17-domains-us
ed-by-west-african-bec-gang/.
57. Bard Gv. The vulnerability of SSL to chosen plaintext attack. IACR Cryptol. ePrint Arch 2004;2004:111.
Hadan et al.
15
A holistic analysis of web-based public key infrastructure failures
Appendix 2: Codebooks of interview about
experts’ perceptions of PKI failures
Table A1: Interview codebooks.
TPRC conference interview codebook
RWC conference interview codebook
Q1
electronic devices, connection/communication, software/application,
hardware, example/anecdote, public, privacy, data collection, smart
home, infrastructure, ambiguity, nonsense/dismissal, ubiquity/broad
scope, Internet of things
level of trust, unsure/don’t know, level of consequences, seek advice,
identity, decentralized, centralized, limited access, application
component, data handling, context-dependent, data sharing, data
collection
trust, privacy, untrusted CA, scope down, stakeholders, untrusted, failure,
too heavyweight, key management, transparency, secure data
transmission, hacks, uncertain, not just IoT
need more time to think, ambiguity, agreed with solutions, audit CAs,
corrupted CAs, self-signed certificates, invalid facts, comprehensive, no
certificates, expired certificate
idiot/lazy, expired certificates, ignore warning, risk-averse, frequent,
maintenance error, valid certificate, risk calculation, familiarity, hard to
determine
not detectable, CAs, untrustworthy network, risk-averse, unknowable,
frequency, context-dependent, attack, yes, no
identity validation, responsible/liability, data control, awareness,
user-centered, regulations, undisclosed collection, strengthen trust
model, confusion (trust model), transparency, privacy, scale, hidden
risks, sensitive info, best practice, yes, no, don’t know
standard/regulation, data collection/privacy, user can’t know, user
shouldn’t know, third party brand trust, user education/training,
security
don’t know, trust environment, DNS, no requirements, some
requirements, regulations/standards, audit
discard/throw away, recovery/repair/isolate, regulations, incentives,
responsibility/liability, white-hat hacking
electronic devices, connection/communication
over Internet, data handling, functions, broad
scope
Q2
Q3
Q4
Q5
Q6
Q7
Q8
Q9
Q10
Q11
Q12
no backdoor, add backdoor, security risks, context-based, user rights,
repair escrow
DNS for people, IP address for machines, no role, new system, yes
Q13
market failures, lost trust, communication risk, cooperation,
regulation/policy, self-regulation, restrict enforcement, willingness to
pay, abuse of information/data
Q14
identity validation, privacy, consumer education, nontechnical solution,
developer education, design modification
privacy, externalities, vulnerability, usability, standards/regulations, risk
awareness, risk acceptance
key management, marketplace, consumer protection, human centered
design, tool management, third party control
definitions, precision, open ended, examples, clarification, too technical
Q15
Q16
Q17
authorization manufacturer, data handling,
certificate, policy, trustworthy, network,
isolation
credential, CAs, relationship, verify, different
solution, trustworthiness
insecure, expired certificates, algorithm issue,
curiosity, server configuration
informal CA, insecure page, accident
(unexpected), typo, no single solution, certified
website, PKI is not a solution
secure out of the box, value return, usability,
trust model, user control
manufacturer responsibility, indicator, trust
relationship, policies, secure out of the box,
self-certificate, government body
indication, protocols, no answer, trustworthy CA,
social problem, equivalent, some requirements,
unknown requirements
authority, validation, device dependent,
trustworthy, no answer, didn’t answer
update system (building prior), “brick” device,
open-source, escrow code, legal regulations,
warranty, government or organizations, device
dependent, paradox, attack resistance
no, law enforcement, context-dependent, no
answer
no trusted, same as in internet, disclosure,
identity of device creator, risk shift
Market failure, combination of technologies,
generation gap, uncertain roles, regulation,
early adopters, lack of attention, uneven
involving speed
regulation, indicator, escrow, consumer right,
privacy protection, security
trade-offs, user accommodation, buyer beware,
generation gap, isolation
usability workflow, user accommodation,
resilient against failure, no comment
goal, environment-dependent, no answer
Downloaded from https://academic.oup.com/cybersecurity/article/7/1/tyab025/6470936 by guest on 17 October 2023
Questions
16
Hadan et al.
Appendix 3: Incident type codes classification
Table A2: Code classification: incident types.
Description
Example
Noncompliant info in
other fields
Fields in certificates (not OCSP or CRL) are not compliant to
Baseline Requirements (BRs). This option is selected when the
incident is not associated with OCSP responder or CRL, or when
the bug report only has a general description of the noncompliant
issue with no details.
The OCSP responder or CRL is not compliant to BR. BR page 5
specify the requirements for OCSP responder
SAN or CN field was not included8 ;
invalid date format9
Non-BR-compliant or
problematic
responder or CRL
Audit report failures
Serial number failures
Undisclosed SubCA
513\1024 bits key
Possible rogue
certificates
Insecure hashing
(SHA-1/MD5)
CAA misissuance
Verified rogue certificate
CA/RA/SubCA/reseller
hacked
Other
8
Having errors, delay, or completely missing audit reports. BR page
52 details the requirements for “compliance audit.”
Certificates have repetitive or inappropriate serial numbers. BR
page 5 details the requirements for serial number. Any certificates
issued after 9/30/2016 are required to have a serial number
containing at least 64 bits generated from a Cryptographically
Secure Pseudorandom Number Generator (CSPRNG).
Mozilla requires all its participating root CAs fully disclose their
hierarchy. This category includes the undisclosed SubCAs
BR requires certificates issued after 12/31/2010 use 2048 bits key.
This category includes certificates issued/renewed after 2010 with
513/1024 bits key.
Incidents possibly involve the issuance of rogue certificates
Certificate with SHA-1/MD5 hashing algorithm
OCSP responder returns “good” status
for unissued certificates10 ; OCSP
responders do not support GET
method11
lack of appropriate audit12 ; insufficient
audit statements13
serial number less than 64-bit entropy14
undisclosed intermediates15
1024 bits key16 ; 512 bits key17
DV certificate for possible fraudulent
use18
For example19
CAA resource record allows a DNS domain name holder to specify
CAs to issue certificates to that domain. The DNS CAA record is
specified by20 . This category includes incidents where CAs failed
to follow the CAA rules.
This describes the incidents where rogue certificates are certainly
involved.
CA, RA, SubCA, or resellers are hacked
CA issued a certificate for a domain,
which it should not have21 ; CAA tags
that were not lowercase being
ignored during CAA validation22
Certificates issued for MITM attempts23
all other less frequent incidents such as backdating SHA-1
certificates, delayed certificate revocations, certificates issued for
nonexistent domains
–
For example24
Bug 1017138: https://bugzilla.mozilla.org/show_bug.cgi?id=1017138. 9 Bug 1266501: https://bugzilla.mozilla.org/show_bug.cgi?id=1266501.10 Bug 1398233:
https://bugzilla.mozilla.org/show_bug.cgi?id=1398233.11 Bug 1426233: https://bugzilla.mozilla.org/show_bug.cgi?id=1426233.12 Bug 1145270: https://bugzilla.m
ozilla.org/show_bug.cgi?id=1145270.13 Bug 1425805: https://bugzilla.mozilla.org/show_bug.cgi?id=1425805.14 Bug 1390998: https://bugzilla.mozilla.org/show_b
ug.cgi?id=1390998, and Bug 1397951: https://bugzilla.mozilla.org/show_bug.cgi?id=1397951.15 Bug 1417771: https://bugzilla.mozilla.org/show_bug.cgi?id=14
17771, and Bug 1455132: https://bugzilla.mozilla.org/show_bug.cgi?id=1455132.16 Bug 1015772: https://bugzilla.mozilla.org/show_bug.cgi?id=1015772.17 Bug
1034949: https://bugzilla.mozilla.org/show_bug.cgi?id=1034949.18 Bug report: Symantec DV Certificate Issuance System Improperly Handled Domain Email Address Special Characters. See https://support.symantec.com/en_US/article.SYMSA1345.html.19 Bug 1313872: https://bugzilla.mozilla.org/show_bug.cgi?id=1313
872, and Bug 1315019: https://bugzilla.mozilla.org/show_bug.cgi?id=1315019.20 RFC 6844: DNS Certification Authority Authorization (CAA) Resource Record.
https://datatracker.ietf.org/doc/html/rfc6844.21 Bug 1409766: https://bugzilla.mozilla.org/show_bug.cgi?id=1409766.22 Bug 1462735: https://bugzilla.mozilla.org
/show_bug.cgi?id=1462735.23 Bug report: Maintaining digital certificate security. See https://security.googleblog.com/2015/03/maintaining-digital-certificate-secu
rity.html.24 Bug report: Maintaining digital certificate security. See https://security.googleblog.com/2014/07/maintaining-digital-certificate-security.html.
Downloaded from https://academic.oup.com/cybersecurity/article/7/1/tyab025/6470936 by guest on 17 October 2023
Incident types (Codes)
17
A holistic analysis of web-based public key infrastructure failures
Appendix 4: Incident cause codes classification
Table A3: Code classification: causes.
Description
Example
Software bugs
The cause is a software error or flaw that generated an incident in
the PKI ecosystem. The bugs may produce faulty certificates,
problems in OCSP responders, or erroneous check in a request
There is a lack of awareness or failed to comply with updates of the
BR or the Root Program Requirements, or misunderstood the
concepts or regulations behind these requirements.
CA is aware of BR or Root Program Requirements but places its
own business strategies over compliance
OCSP signed by wrong certificate
because the MXR query has error
codes25
misunderstood the BR, did not include
SAN field, RFC 612526
Requirements unknown
by CA
CA business decision
Single Certificate human
error
Operational error
Nonoptimal request
check
Improper security
controls
Change in Baseline
Requirements
Infrastructure problem
Organizational
constrains
Other
No data
25
One specific unique employee makes an error in a process. The
error is caused by human mistakes in manual entry of data for
certificate requests, or forgetting steps in the setup of a new
intermediate CA.
The incidents are generated because of an internal faulty procedure
in the CA or a related entity. This does not include errors resulted
from a specific identifiable employee’s manual error, but includes
errors in the operational processes of the organization.
The checks for an applicant for a certificate were not performed
correctly, and can potentially enable the issuance of rogue
certificates, non-verified EV certificates, or simply improper
digital certificates. This does not include includes caused by
“software bugs” or “human error” but only certificate requests
that were not performed properly.
CAs or other entities were hacked, with the possible or actual
outcome of rogue certificates being generated and used in the
wild as a result
a sudden change in the Baseline Requirements made the CAs change
their certificate issuance. Here, the CAs were not compliant until
they updated.
problems in the hardware or technical components that support the
business of the CA
incidents caused by constraints in the environments where the CAs
operated, such as national legal requirements. Some countries
require government agencies domains to have certificates
provided by a national public CA. This CA is obligated to follow
governmental requirements (e.g. ,using encryption algorithms
that are not compliant to BR)
all other less frequent causes and incidents that were not closed at
the time of writing this work
here, we include incidents that do not have detailed information
about the causes. In this case, the detailed information was
written in an attachment which became unavailable after incident
closed.
backdating SHA-1 certificates in order
to evade its prohibition, charging for
the revocation of certificates, selling
certificates for MITM attempts.
RA administrator manually selected an
incorrect EV policy27
mistakes in audit reports, not disclosing
subCAs, and delayed revocation of
compromised certificates
no technical control about the
DNSName input field in the request
form28
ISP KPN hacked29
no enough time to make certificate
replacement30 ; certificates approved
before BR change but issued after BR
change due to delayed payment31
unavailable servers, defective networks
Spain law requirements resulted in
non-BR-compliant certificates32
misconfigured software, misissuance not
in the sample provided to auditors
–
Bug 1007892: https://bugzilla.mozilla.org/show_bug.cgi?id=1007892.26 Bug 1261919: https://bugzilla.mozilla.org/show_bug.cgi?id=1261919.27 Bug 1266230:
https://bugzilla.mozilla.org/show_bug.cgi?id=1266230.28 Bug 1390977: https://bugzilla.mozilla.org/show_bug.cgi?id=1390977.29 Dutch ISP KPN hacked, credentials and personal information leaked. See https://nakedsecurity.sophos.com/2012/02/11/dutch-isp-kpn-hacked-credentials-and-personal-information-leaked
/.30 Bug 1516545: https://bugzilla.mozilla.org/show_bug.cgi?id=1516545.31 Bug 1449371: https://bugzilla.mozilla.org/show_bug.cgi?id=1449371.32 Bug 1267049:
https://bugzilla.mozilla.org/show_bug.cgi?id=1267049.
Downloaded from https://academic.oup.com/cybersecurity/article/7/1/tyab025/6470936 by guest on 17 October 2023
Incident causes (Codes)
Download