Challenges in Adapting ECH in TLS for Privacy Enhancement over the Internet

07/05/2022
by   Vinod S. Khandkar, et al.
0

Security and Privacy are crucial in modern Internet services. Transport Layer Security (TLS) has largely addressed the issue of security. However, information about the type of service being accessed goes in plain-text in the initial handshakes of vanilla TLS, thus potentially revealing the activity of users and compromising privacy. The “Encrypted ClientHello” or ECH overcomes this issue by extending TLS 1.3 where all of the information that can potentially reveal the service type is masked, thus addressing the privacy issues in TLS 1.3. However, we notice that Internet services tend to use different versions of TLS for application data (primary connection/channel) and supporting data (side channels) such as scheduling information etc.. TLS 1.3, we notice that it is only true for the primary connections which do benefit from TLS 1.3, while the side-channels continue to use lower version of TLS (e.g., 1.2) accessed. We demonstrate that privacy information leaked from the side-channels can be used to affect the performance on the primary channels, like blocking or throttling specific service on the internet. Our work demonstrates that adapting ECH on primary channels alone is not sufficient to prevent the privacy leaks and attacks on primary channels. Further, we demonstrate that it is necessary for all of the associated side-channels also to migrate to TLS 1.3 and adapt ECH extension in order to offer complete privacy preservatio

READ FULL TEXT

page 1

page 7

page 8

research
04/11/2019

Privacy protocols

Security protocols enable secure communication over insecure channels. P...
research
11/01/2017

Internet of Cloud: Security and Privacy issues

The synergy between the cloud and the IoT has emerged largely due to the...
research
01/03/2020

Privacy in Data Service Composition

In modern information systems different information features, about the ...
research
11/10/2022

Network Security Roadmap

Users may already have some perception of provided security based on exp...
research
10/21/2019

Constructing Privacy Channels from Information Channels

Data privacy protection studies how to query a dataset while preserving ...
research
01/12/2023

LZR: Identifying Unexpected Internet Services

Internet-wide scanning is a commonly used research technique that has he...
research
03/24/2018

To overlap or not to overlap: Enabling Channel Bonding in High Density WLANs

Wireless local area networks (WLANs) are the most popular kind of wirele...

Please sign up or login with your details

Forgot password? Click here to reset