Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

A First Look at Certification Authority Authorization (CAA)

Published: 01 May 2018 Publication History

Abstract

Shaken by severe compromises, the Web’s Public Key Infrastructure has seen the addition of several security mechanisms over recent years. One such mechanism is the Certification Authority Authorization (CAA) DNS record, that gives domain name holders control over which Certification Authorities (CAs) may issue certificates for their domain. First defined in RFC 6844, adoption by the CA/B forum mandates that CAs validate CAA records as of September 8, 2017. The success of CAA hinges on the behavior of three actors: CAs, domain name holders, and DNS operators. We empirically study their behavior, and observe that CAs exhibit patchy adherence in issuance experiments, domain name holders configure CAA records in encouraging but error-prone ways, and only six of the 31 largest DNS operators enable customers to add CAA records. Furthermore, using historic CAA data, we uncover anomalies for already-issued certificates. We disseminated our results in the community. This has already led to specific improvements at several CAs and revocation of mis-issued certificates. Furthermore, in this work, we suggest ways to improve the security impact of CAA. To foster further improvements and to practice reproducible research, we share raw data and analysis tools.

References

[1]
ACM. Result and Artifact Review and Badging. http://acm.org/publications/policies/artifact-review-badging, Jan. 18 2017.
[2]
J. Amann, O. Gasser, Q. Scheitle, L. Brent, G. Carle, and R. Holz. Mission Accomplished? HTTPS Security after DigiNotar. In IMC'17.
[3]
J. Amann, M. Vallentin, S. Hall, and R. Sommer. Extracting Certificates from Live Traffic: A Near Real-Time SSL Notary Service. In TR-12-014, 2012.
[4]
Andrew Ayer. CAA Test Suite. https://caatestsuite.com/, Sep. 12, 2017.
[5]
H. Birge-Lee, Y. Sun, A. Edmundson, J. Rexford, and P. Mittal. Using BGP to Acquire Bogus TLS Certificates. HotPETS'17.
[6]
Bugzilla. Comodo CAA Mis-Issuance. https://bugzilla.mozilla.org/show_bug.cgi?id=1420873, Jan. 3, 2018.
[7]
Bugzilla. SSL.com/Comodo Mis-Issuance. https://bugzilla.mozilla.org/show_bug.cgi?id=1410834, Oct- 23, 2017.
[8]
Bugzilla. Camerfirma CAA Mis-Issuance. https://bugzilla.mozilla.org/show_bug.cgi?id=1420871, Oct. 18, 2017.
[9]
Bugzilla. Certum CNAME Flag Mis-Issuance. https://bugzilla.mozilla.org/show_bug.cgi?id=1409766, Oct. 18, 2017.
[10]
Bugzilla. Certum Critical Flag Mis-Issuance. https://bugzilla.mozilla.org/show_bug.cgi?id=1409764, Oct. 18, 2017.
[11]
Bugzilla. StartCom CNAME Flag Mis-Issuance. https://bugzilla.mozilla.org/show_bug.cgi?id=1409760, Oct. 18, 2017.
[12]
Bugzilla. Comodo: CAA Misissuance. https://bugzilla.mozilla.org/show_bug.cgi?id=1398545, Sep. 12, 2017.
[13]
CA/BrowserForum. CABF Meeting Minutes. https://cabforum.org/pipermail/public/2013-January/001125.html, Jan. 10, 2013.
[14]
CA/BrowserForum. Ballot 214. https://cabforum.org/2017/09/27/ballot-214-caa-discovery-cname-errata/, Nov. 10, 2017.
[15]
CA/BrowserForum. Ballot 125. https://cabforum.org/2014/10/14/ballot-125-caa-records/, Oct. 14, 2014.
[16]
CA/BrowserForum. Baseline Requirements v1.5.4, Oct. 4, 2017.
[17]
CA/BrowserForum. Baseline Requirements v1.5.2, Sep. 20, 2017.
[18]
CA/BrowserForum. Ballot 187. https://cabforum.org/2017/03/08/ballot-187-make-caa-checking-mandatory/, Sep. 7, 2017.
[19]
CA/BrowserForum. Ballot 195. https://cabforum.org/2017/04/17/ballot-195-caa-fixup/, Sep. 7, 2017.
[20]
Cali Dog Security. Certsteam. https://certstream.calidog.io/, Feb. 1, 2018.
[21]
Chrome Team. Chrome v4.0.249.78 Release Notes. https://chromereleases.googleblog.com/2010/01/stable-channel-update_25.html, Jan. 25, 2010.
[22]
T. Chung, Y. Liu, D. Choffnes, D. Levin, B. M. Maggs, A. Mislove, and C. Wilson. Measuring and Applying Invalid SSL Certificates: The Silent Majority. In IMC'16.
[23]
T. Chung, R. van Rijswijk-Deij, B. Chandrasekaran, D. R. Choffnes, D. Levin, B. M. Maggs, A. Mislove, and C. Wilson. A Longitudinal, End-to-End View of the DNSSEC Ecosystem. In USENIX SEC'17.
[24]
T. Chung, R. van Rijswijk-Deij, D. Choffnes, D. Levin, B. M. Maggs, A. Mislove, and C. Wilson. Understanding the Role of Registrars in DNSSEC Deployment. In IMC'17.
[25]
J. Clark and P. C. van Oorshot. SoK: SSL and HTTPS: Revisiting Past Challenges and Evaluating Certificate Trust Model Enhancements. In IEEE S&P'13.
[26]
D. Dagon, M. Antonakakis, P. Vixie, T. Jinmei, and W. Lee. Increased DNS Forgery Resistance Through 0x20-bit Encoding: SecURItY viA LeET QueRieS. In CCS'08.
[27]
J. DeBlasio, S. Savage, G. M. Voelker, and A. C. Snoeren. Tripwire: Inferring Internet Site Compromise. In IMC'17.
[28]
D. Dittrich and E. Kenneally. The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research. US Department of Homeland Security, 2012.
[29]
Z. Durumeric, D. Adrian, A. Mirian, M. Bailey, and J. A. Halderman. A Search Engine Backed by Internet-Wide Scanning. In CCS'15.
[30]
Z. Durumeric, E. Wustrow, and J. A. Halderman. ZMap: Fast Internet-wide Scanning and Its Security Applications. In USENIX SEC'13.
[31]
Entrust Blog. What Happened with live.fi. https://www.entrustdatacard.com/blog/2015/march/what-happened-with-livefi, Sep 15, 2017.
[32]
O. Gasser, Q. Scheitle, S. Gebhard, and G. Carle. Scanning the IPv6 Internet: Towards a Comprehensive Hitlist. In TMA'16.
[33]
Google. Certificate Transparency Enforcement in Google Chrome. https://groups.google.com/a/chromium.org/d/msg/ct-policy/wHILiYf31DE/iMFmpMEkAQAJ, Feb. 2018.
[34]
Google Chrome. Extended Validation in Google Chrome. https://www.certificate-transparency.org/ev-ct-plan, Feb. 07, 2018.
[35]
Google Security Blog. Sustaining Digital Certificate Security. https://security.googleblog.com/2015/10/sustaining-digital-certificate-security.html, 2015.
[36]
P. Hallam-Baker and R. Stradling. RFC6844 – DNS Certification Authority Authorization (CAA) Resource Record, January, 2013.
[37]
P. Hallam-Baker, R. Stradling, and B. Laurie. DNS Certification Authority Authorization (CAA) Resource Record. https://datatracker.ietf.org/doc/draft-hallambaker-donotissue/, Oct. 2010.
[38]
P. Hoffman, A. Sullivan, and K. Fujiwara. DNS Terminology. RFC 7719 (Informational), Dec. 2015.
[39]
Ivan Ristic. TLS and PKI History. https://www.feistyduck.com/ssl-tls-and-pki-history/, 2017.
[40]
B. Krebs. Turkish Registrar Enabled Phishers to Spoof Google. https://krebsonsecurity.com/2013/01/turkish-registrar-enabled-phishers-to-spoof-google/, 2013.
[41]
D. Kumar, M. Bailey, Z. Wang, M. Hyder, J. Dickinson, G. Beck, D. Adrian, J. Mason, Z. Durumeric, and J. A. Halderman. Tracking Certificate Misissuance in the Wild. In IEEE S&P'18.
[42]
T. N. Le, R. van Rijswijk-Deij, L. Allodi, and N. Zannone. Economic Incentives on DNSSEC Deployment: Time to Move from Quantity to Quality. In NOMS'18.
[43]
G. Markham. Equifax not conforming to Mozilla CA Certificate Policy. https://bugzilla.mozilla.org/show_bug.cgi?id=477783#c19, 2009.
[44]
Mozilla. Firefox v4 Release Notes. https://www.certificate-transparency.org/ev-ct-plan, Mar. 22, 2011.
[45]
Mozilla. Public Suffix List: commit 85fa8fb. https://github.com/publicsuffix/list/commit/85fa8fbdf, Oct. 28, 2017.
[46]
Mozilla NSS. Mozilla January 2018 CA Communication. https://ccadb-public.secure.force.com/mozillacommunications/CACommResponsesOnlyReport?CommunicationId=a051J00003mqMFN&QuestionId=Q00056,Q00057, Feb. 08, 2018.
[47]
Mozilla Security Policy. CAA Anomalies. https://groups.google.com/d/topic/mozilla.dev.security.policy/QpSVjzrj7T4, 2017.
[48]
Mozilla Security Policy. Misissued/Suspicious Symantec Certificates. https://groups.google.com/forum/#!topic/mozilla.dev.security.policy/fyJ3EK2YOP8, 2017.
[49]
Mozilla Security Policy. ROCA certificate in CT. https://groups.google.com/forum/#!msg/mozilla.dev.security.policy/4RqKdD0FeF4/s5mV8NiqAAAJ, 2017.
[50]
Mozilla Security Policy. .tg certificates. https://groups.google.com/forum/#!topic/mozilla.dev.security.policy/4kj8Jeem0EU, 2017.
[51]
Mozilla Security Policy. Feedback to CAA Study. https://groups.google.com/forum/#!topic/mozilla.dev.security.policy/mqNk9udMwvE, Jan. 10, 2018.
[52]
E. Nigg. Unbelievable! https://groups.google.com/d/msg/mozilla.dev.tech.crypto/nAzIKSBEh78/7GEZ4f57F-cJ, Dec. 22, 2008.
[53]
C. Partridge and M. Allman. Ethical Considerations in Network Measurement Papers. Communications of the ACM, 2016.
[54]
Paul Hoffman. IETF 80 SAAG Minutes. https://www.ietf.org/proceedings/80/minutes/saag.txt, Mar. 31, 2011.
[55]
Payment Card Industry. Data Security Standard. https://www.pcisecuritystandards.org, Feb. 20, 2018.
[56]
R. Prins. DigiNotar Certificate Authority Breach “Operation Black Tulip”. https://www.rijksoverheid.nl/binaries/rijksoverheid/documenten/rapporten/2011/09/05/diginotar-public-report-version-1/rapport-fox-it-operation-black-tulip-v1-0.pdf, Sep. 5, 2012.
[57]
Q. Scheitle. AlphaSSL/Globalsign: CAA Mis-Issuance on mix of wildcard and non-wildcard DNS names in SAN. https://bugzilla.mozilla.org/show_bug.cgi?id=1420766, 2017.
[58]
Q. Scheitle. Comodo/cPanel: Potential Mis-Issuance based on CAA records (Sep 28, 2017). https://bugzilla.mozilla.org/show_bug.cgi?id=1420873, 2017.
[59]
Q. Scheitle. DigiCert/Thawte: CAA Mis-Issuance on mix of wildcard and non-wildcard DNS names in SAN. https://bugzilla.mozilla.org/show_bug.cgi?id=1420861, 2017.
[60]
Q. Scheitle, O. Gasser, P. Sattler, and G. Carle. HLOC: Hints-Based Geolocation Leveraging Multiple Measurement Frameworks. In TMA'17.
[61]
Q. Scheitle, M. Wachs, J. Zirngibl, and G. Carle. Analyzing Locality of Mobile Messaging Traffic using the MATAdOR Framework. In PAM'16, Heraklion, Greece.
[62]
Q. Scheitle, M. Wählisch, O. Gasser, T. C. Schmidt, and G. Carle. Towards an Ecosystem for Reproducible Research in Computer Networking. In ACM SIGCOMM Reproducibility'17.
[63]
Scott Helme. Tracking CAA Usage. https://scotthelme.co.uk/tracking-caa-usage/, Dec. 15, 2017.
[64]
K. Seifried. Breach of trust. http://www.linux-magazine.com/Issues/2010/114/Security-Lessons-Spoofed-Browsers, May, 2010.
[65]
R. Sleevi. Sustaining Digital Certificate Security. Google blog post: https://googleonlinesecuritys.blogspot.com/2015/12/sustaining-digital-certificate-security.html, Oct. 28, 2015.
[66]
SSLMate. CAA Generator. https://sslmate.com/caa/, Sep. 12, 2017.
[67]
E. Stark. Expect-CT Extension for HTTP. https://datatracker.ietf.org/doc/html/draft-ietf-httpbis-expect-ct, Feb. 26, 2018.
[68]
P. Szalachowski and A. Perrig. Short Paper: On Deployment of DNS-based Security Enhancements. 2017.
[69]
R. van Enst. How I got a valid SSL certificate for my ISP's main domain, xs4all.nl. https://raymii.org/s/blog/How_I_got_a_valid_SSL_certificate_for_my_ISPs_main_website.html, 2017.
[70]
R. van Rijswijk-Deij, M. Jonker, A. Sperotto, and A. Pras. A High-Performance, Scalable Infrastructure for Large-Scale Active DNS Measurements. IEEE JSAC, 2016.
[71]
B. VanderSloot, J. Amann, M. Bernhard, Z. Durumeric, M. Bailey, and J. A. Halderman. Towards a Complete View of the Certificate Ecosystem. In IMC'16.
[72]
T. Vissers, T. Barron, T. Van Goethem, W. Joosen, and N. Nikiforakis. The Wolf of Name Street: Hijacking Domains Through Their Nameservers. In CCS'17.
[73]
W3Techs. Historical trends in the usage of SSL certificate authorities for websites. https://w3techs.com/technologies/history_overview/ssl_certificate/all, Sep. 14, 2017.
[74]
M. Wachs, Q. Scheitle, and G. Carle. Push Away Your Privacy: Precise User Tracking Based on TLS Client Certificate Authentication. In TMA'17, Dublin, Ireland.
[75]
Wayne Thayer. AC Camerfirma Chambers of Commerce and Global Chambersign 2016 Root Inclusion Request. https://groups.google.com/d/msg/mozilla.dev.security.policy/skev4gp_bY4/snIuP2JLAgAJ, March, 2018.
[76]
A. Whalley and D. O'Brien. Google Security Blog: https://security.googleblog.com/2017/07/final-removal-of-trust-in-wosign-and.html, July 20, 2017.
[77]
WhichSSL. Top 10 SSL Certificate Providers. https://www.whichssl.com/top-10-ssl-certificate-providers.php, Sep. 12, 2017.
[78]
K. Wilson. Bug 653543—comodo subca. https://bugzilla.mozilla.org/show_bug.cgi?id=653543, April 28, 2011.
[79]
K. Wilson. Revoking Trust in one ANSSI Certificate. https://blog.mozilla.org/security/2013/12/09/revoking-trust-in-one-anssi-certificate/, Dec. 9, 2013.
[80]
K. Wilson. alicdn.com Misissuance. https://wiki.mozilla.org/CA:WoSign_Issues, June 2016.
[81]
K. Wilson. Revoking Trust in one CNNIC Intermediate Certificate. https://blog.mozilla.org/security/2015/03/23/revoking-trust-in-one-cnnic-intermediate-certificate/, Mar. 23, 2015.
[82]
K. Wilson. Mozilla blog post: https://blog.mozilla.org/security/2016/10/24/distrusting-new-wosign-and-startcom-certificates/, Oct. 24, 2016.
[83]
T. Zimmermann, J. Rüth, B. Wolters, and O. Hohlfeld. How HTTP/2 Pushes the Web: An Empirical Study of HTTP/2 Server Push. In IFIP Networking'17.
[84]
M. Zusman. Domain validated SSL certificates. http://schmoil.blogspot.de/2008/08/domain-validated-ssl-certificates.html, Aug. 25, 2008.

Cited By

View all
  • (2024)Do CAA, CT, and DANE Interlink in Certificate Deployments? A Web PKI Measurement Study2024 8th Network Traffic Measurement and Analysis Conference (TMA)10.23919/TMA62044.2024.10559089(1-11)Online publication date: 21-May-2024
  • (2024)Article 45 of the eIDAS Directive Unveils the need to implement the X.509 4-cornered trust model for the WebPKIProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670900(1-11)Online publication date: 30-Jul-2024
  • (2023)An LLM-based Framework for Fingerprinting Internet-connected DevicesProceedings of the 2023 ACM on Internet Measurement Conference10.1145/3618257.3624845(478-484)Online publication date: 24-Oct-2023
  • Show More Cited By

Index Terms

  1. A First Look at Certification Authority Authorization (CAA)

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM SIGCOMM Computer Communication Review
    ACM SIGCOMM Computer Communication Review  Volume 48, Issue 2
    April 2018
    51 pages
    ISSN:0146-4833
    DOI:10.1145/3213232
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 May 2018
    Published in SIGCOMM-CCR Volume 48, Issue 2

    Check for updates

    Badges

    Author Tags

    1. CAA
    2. HTTPS Security
    3. Web PKI

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)74
    • Downloads (Last 6 weeks)8
    Reflects downloads up to 16 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Do CAA, CT, and DANE Interlink in Certificate Deployments? A Web PKI Measurement Study2024 8th Network Traffic Measurement and Analysis Conference (TMA)10.23919/TMA62044.2024.10559089(1-11)Online publication date: 21-May-2024
    • (2024)Article 45 of the eIDAS Directive Unveils the need to implement the X.509 4-cornered trust model for the WebPKIProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670900(1-11)Online publication date: 30-Jul-2024
    • (2023)An LLM-based Framework for Fingerprinting Internet-connected DevicesProceedings of the 2023 ACM on Internet Measurement Conference10.1145/3618257.3624845(478-484)Online publication date: 24-Oct-2023
    • (2023)Blockchain-Based Transparency Framework for Privacy Preserving Third-Party ServicesIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.317969820:3(2302-2313)Online publication date: 1-May-2023
    • (2023)How Ready is DNS for an IPv6-Only World?Passive and Active Measurement10.1007/978-3-031-28486-1_22(525-549)Online publication date: 21-Mar-2023
    • (2023)A First Look at Brand Indicators for Message Identification (BIMI)Passive and Active Measurement10.1007/978-3-031-28486-1_20(479-495)Online publication date: 21-Mar-2023
    • (2022)HammurabiProceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security10.1145/3548606.3560594(1857-1870)Online publication date: 7-Nov-2022
    • (2022)ZDNSProceedings of the 22nd ACM Internet Measurement Conference10.1145/3517745.3561434(33-43)Online publication date: 25-Oct-2022
    • (2022)DET: Enabling Efficient Probing of IPv6 Active AddressesIEEE/ACM Transactions on Networking10.1109/TNET.2022.314504030:4(1629-1643)Online publication date: Aug-2022
    • (2022)Addressing the challenges of modern DNS a comprehensive tutorialComputer Science Review10.1016/j.cosrev.2022.10046945(100469)Online publication date: Aug-2022
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media