revcast fast private certificate revocation over fm radio
play

RevCast : Fast, Private Certificate Revocation over FM radio Aaron - PowerPoint PPT Presentation

RevCast : Fast, Private Certificate Revocation over FM radio Aaron Schulman Stanford University Dave Levin Neil Spring University of Maryland University of Maryland Authentication in the PKI Authentication in the PKI I want an


  1. RevCast : Fast, Private Certificate Revocation over FM radio Aaron Schulman Stanford University Dave Levin Neil Spring 
 University of Maryland University of Maryland

  2. Authentication in the PKI

  3. Authentication in the PKI I want an encrypted connection.

  4. Authentication in the PKI I want an encrypted connection. Certificate #12 Signed by CA:

  5. Authentication in the PKI I want an encrypted connection. The CA ( ) Certificate #12 attests that is controlled by Signed by CA:

  6. Authentication in the PKI Is bound to ? The CA ( ) Certificate #12 attests that is controlled by Signed by CA:

  7. Authentication in the PKI Is bound to ? The CA ( ) Certificate #12 attests that Trusted 
 Root CAs is controlled by Signed by CA:

  8. Authentication in the PKI Is bound to ? The CA ( ) Certificate #12 attests that Trusted 
 Root CAs ✔ is controlled by Signed by CA:

  9. Revocation in the PKI Certificate #12 Trusted 
 Root CAs Signed by CA: C

  10. Revocation in the PKI Trusted 
 Certificate #12 Root CAs Signed by CA: C

  11. Revocation in the PKI Trusted 
 Certificate #12 Root CAs Signed by CA: C

  12. Revocation in the PKI Trusted 
 Certificate #12 Root CAs Signed by CA: C

  13. Revocation in the PKI Trusted 
 Certificate #12 Root CAs Signed by CA: C

  14. Revocation in the PKI Trusted 
 Certificate #12 Root CAs Signed by CA: C

  15. Revocation in the PKI Trusted 
 Certificate #12 Root CAs Signed by CA: C

  16. Revocation in the PKI Revocation Trusted 
 Certificate #12 Certificate #12 Root CAs Signed by CA: Signed by CA: C

  17. Revocation in the PKI Revocation Trusted 
 The CA ( ) breaks Certificate #12 Certificate #12 Root CAs the binding of with Signed by CA: Signed by CA: C

  18. Revocation in the PKI Revocation Trusted 
 The CA ( ) breaks Certificate #12 Certificate #12 Root CAs the binding of with ✔ Signed by CA: Signed by CA: C

  19. Revocation in the PKI Revocation Trusted 
 ❌ The CA ( ) breaks Certificate #12 Certificate #12 Root CAs the binding of with ✔ Signed by CA: Signed by CA: C

  20. Revocation in the PKI Revocation Trusted 
 ❌ The CA ( ) breaks Certificate #12 Certificate #12 Root CAs the binding of with ✔ Signed by CA: Signed by CA: C

  21. Revocation in the PKI One revocation every 1.1 seconds for all CAs on the Internet Revocation Trusted 
 ❌ The CA ( ) breaks Certificate #12 Certificate #12 Root CAs the binding of with ✔ Signed by CA: Signed by CA: C

  22. Every device needs revocations Revocation Certificate #12 Signed by CA: C

  23. Every device needs revocations Revocation Certificate #12 Signed by CA: C

  24. Properties of revocation systems

  25. Properties of revocation systems 10s Timeliness Clients’ revocation 
 state should be 
 up-to-date, ideally 
 within 10s of seconds

  26. Properties of revocation systems $ $ 10s $ $ $ $ Timeliness Low-cost dissemination The distribution 
 Clients’ revocation 
 mechanism must scale 
 state should be 
 with CAs, certificates, up-to-date, ideally 
 and clients within 10s of seconds

  27. Properties of revocation systems $ $ 10s $ $ $ $ Timeliness Privacy Low-cost dissemination The distribution 
 Clients’ revocation 
 Users’ browsing 
 mechanism must scale 
 state should be 
 habits should not 
 with CAs, certificates, up-to-date, ideally 
 have to be revealed and clients within 10s of seconds

  28. Properties of revocation systems It is generally regarded that no system can possibly achieve all three. $ $ 10s $ $ $ $ Timeliness Privacy Low-cost dissemination The distribution 
 Clients’ revocation 
 Users’ browsing 
 mechanism must scale 
 state should be 
 habits should not 
 with CAs, certificates, up-to-date, ideally 
 have to be revealed and clients within 10s of seconds

  29. Properties of revocation systems It is generally regarded that no system can possibly achieve all three. $ $ 10s $ $ $ $ Timeliness Privacy Low-cost dissemination ✔ ✔ ✔ The distribution 
 Clients’ revocation 
 Users’ browsing 
 mechanism must scale 
 state should be 
 habits should not 
 with CAs, certificates, up-to-date, ideally 
 have to be revealed RevCast and clients within 10s of seconds

  30. Existing revocation systems Certificate CRL CA Revocation Lists 
 Client 124, 24 21, 2521 (CRL) Online Certificate Revocation CA Certificate #12 Status Protocol Client Signed by CA: (OCSP) Certificate #12 Certificate #12 CA Org Short lived certs Client Signed by CA: Signed by CA: Still ok Still ok CA OCSP Stapling Org Client Certificate #12 Certificate #12 Signed by CA: Signed by CA:

  31. CRL CA Client 124, 24 21, 2521 Revocation CA Certificate #12 Client Signed by CA: Certificate #12 Certificate #12 CA Org Client Signed by CA: Signed by CA: Still ok Still ok CA Org Client Certificate #12 Certificate #12 Signed by CA: Signed by CA:

  32. Existing revocation systems ❌ ❌ ✔ CRL CA CRLs Client 124, 24 21, 2521 ❌ ❌ ✔ Revocation CA OCSP Certificate #12 Client Signed by CA: ❌ ✔ * ✔ Certificate #12 Certificate #12 CA Short lived Client Org Signed Signed ❌ ✔ ✔ Still ok Still ok Stapling CA Org Certificate #12 Certificate #12 Client Signed Signed

  33. Existing revocation systems ❌ ❌ ✔ CRL CA CRLs Client 124, 24 21, 2521 ❌ ❌ ✔ Revocation CA OCSP Certificate #12 Client Signed by CA: ❌ ✔ * ✔ Certificate #12 Certificate #12 CA Short lived Client Org Signed Signed ❌ ✔ ✔ Still ok Still ok Stapling CA Org Certificate #12 Certificate #12 Client Signed Signed All of these protocols rely on unicast transmission of revocations

  34. Unicast is not well suited for distributing revocations Doesn’t scale to distributing to every device on the Internet Failures are benign indication of connectivity issues (soft-fail) Multicast revocation is also flawed (Sybils, MITM, DoS)

  35. RevCast We propose broadcasting revocations over FM RDS Revocation Certificate #12 Signed by CA: Tower: http://cityspottercards.com/

  36. RevCast We propose broadcasting revocations over FM RDS Revocation Certificate #12 Signed by CA: Tower: http://cityspottercards.com/

  37. FM RDS coverage is ideal for disseminating revocations 200,000 150,000 100,000 50,000 0 • Transmitters are where people are • Up to 10 million people per tower

  38. Properties of revocation systems $ $ $ $ $ $ Low-cost dissemination Privacy One transmission Radio broadcasts covers up to 10 million 
 are inherently & Under-monotized receiver anonymous

  39. Properties of revocation systems $ $ $ $ $ $ Low-cost dissemination Privacy One transmission Radio broadcasts covers up to 10 million 
 are inherently & Under-monotized receiver anonymous

  40. Properties of revocation systems Solved . Let’s go party like it’s 1989! $ $ $ $ $ $ Low-cost dissemination Privacy One transmission Radio broadcasts covers up to 10 million 
 are inherently & Under-monotized receiver anonymous

  41. 10s Timeliness? One tiny problem. RDS has an effective bitrate of 421.8 bps .

  42. Rest of the talk RevCast protocol - fitting revocations in 421.8 bps 
 Evaluate RevCast with 2 months of revocations

  43. Revoking over FM RDS Radio CAs Receivers station

  44. Revoking over FM RDS Radio CAs Receivers station 1 R 2 R 3 R

  45. Revoking over FM RDS Radio CAs Receivers station 1 R 3 2 2 1 R R R R 3 R

  46. Losses can go undetected Radio CAs Receivers station 1 R 2 R 3 2 1 R R R 3 R

  47. Losses can go undetected Radio CAs Receivers station 1 R 2 R 3 2 1 R R R ❌ 3 R

  48. Losses can go undetected Radio CAs Receivers station 1 R ❌ 2 R 3 2 1 R R R ❌ 3 R

  49. Losses can go undetected Radio CAs Receivers station 1 R ❌ 2 R 3 2 1 R R R ❌ 3 R GoDaddy didn’t revoke

  50. Making losses detectible with “nothing now” Radio CAs Receivers station 1 R 3 2 2 1 R Nn R R 3 Nn

  51. Making losses detectible with “nothing now” Radio CAs Receivers station 1 R 3 2 2 1 R Nn R R 3 Nn GoDaddy says they didn’t revoke

  52. Making losses detectible with “nothing now” Radio CAs Receivers station 1 R 3 2 2 1 R Nn R R ❌ 3 Nn GoDaddy says they didn’t revoke

  53. Making losses detectible with “nothing now” Radio CAs Receivers station 1 R ❌ 3 2 2 1 R Nn R R ❌ 3 Nn GoDaddy says they didn’t revoke

  54. Making losses detectible with “nothing now” Radio CAs Receivers station 1 R ❌ 3 2 2 1 R Nn R R ❌ 3 Nn Danger!!! I am not up- to-date with GoDaddy

  55. Sleeping receivers can lose synchronization Radio CAs Receivers station 1 R 3 2 2 1 R Nn R R Z Z Z 3 Nn Z

  56. Sleeping receivers can lose synchronization Radio CAs Receivers station 1 R 3 2 2 1 R Nn R R 3 Nn What did I miss?

Recommend


More recommend