On the Feasibility of Fine-Grained TLS Security Configurations in Web Browsers Based on the Requested Domain Name

09/15/2018
by   Eman Salem Alashwali, et al.
0

Most modern web browsers today sacrifice optimal TLS security for backward compatibility. They apply coarse-grained TLS configurations that support (by default) legacy versions of the protocol that have known design weaknesses, and weak ciphersuites that provide fewer security guarantees (e.g. non Forward Secrecy), and silently fall back to them if the server selects to. This introduces various risks including downgrade attacks such as the POODLE attack [15] that exploits the browsers silent fallback mechanism to downgrade the protocol version in order to exploit the legacy version flaws. To achieve a better balance between security and backward compatibility, we propose a mechanism for fine-grained TLS configurations in web browsers based on the sensitivity of the domain name in the HTTPS request using a whitelisting technique. That is, the browser enforces optimal TLS configurations for connections going to sensitive domains while enforcing default configurations for the rest of the connections. We demonstrate the feasibility of our proposal by implementing a proof-of-concept as a Firefox browser extension. We envision this mechanism as a built-in security feature in web browsers, e.g. a button similar to the Bookmark button in Firefox browsers and as a standardised HTTP header, to augment browsers security.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/15/2018

DSTC: DNS-based Strict TLS Configurations

Most TLS clients such as modern web browsers enforce coarse-grained TLS ...
research
11/16/2018

The 5G-AKA Authentication Protocol Privacy

We study the 5G-AKA authentication protocol described in the 5G mobile c...
research
05/31/2022

IFCIL: An Information Flow Configuration Language for SELinux (Extended Version)

Security Enhanced Linux (SELinux) is a security architecture for Linux i...
research
06/15/2019

Does "www." Mean Better Transport Layer Security?

Experience shows that most researchers and developers tend to treat plai...
research
06/15/2020

The EMV Standard: Break, Fix, Verify

EMV is the international protocol standard for smartcard payment and is ...
research
05/12/2013

Practical Fine-grained Privilege Separation in Multithreaded Applications

An inherent security limitation with the classic multithreaded programmi...

Please sign up or login with your details

Forgot password? Click here to reset