The Struggle is Real: Analyzing Ground Truth Data of TLS (Mis-)Configurations

09/24/2018
by   Christian Tiefenau, et al.
0

As of today, TLS is the most commonly used protocol to protect communication content. To provide good security, it is of central importance, that administrators know how to configure their services correctly. For this purpose, services like, e.g., Qualys SSL Server Test can be leveraged to test the correctness of a given web server configuration. We analyzed the utilization of this service over a period of 2.5 months and found two major usage-patterns. In addition, there is a relation between the number of test-runs and the resulting quality (i.e., security) of a TLS configuration.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/01/2021

An Empirical Analysis of HTTPS Configuration Security

It is notoriously difficult to securely configure HTTPS, and poor server...
research
01/13/2019

Implementing DMZ in Improving Network Security of Web Testing in STMIK AKBA

The aims of this research are to design and to implement network securit...
research
12/23/2020

Soap serialization effect on communication nodes and protocols

Although serialization improves the transmission of data through utiliza...
research
10/19/2018

DigiLock: User-controlled and Server-aware Digital Locker System

The growing popularity of digital systems have paved the way for digital...
research
03/03/2023

Exploiting Input Sanitization for Regex Denial of Service

Web services use server-side input sanitization to guard against harmful...
research
05/02/2022

HTTPA/2: a Trusted End-to-End Protocol for Web Services

We received positive feedback and inquiries on the previous work of HTTP...

Please sign up or login with your details

Forgot password? Click here to reset