Abstract
Major web sites use Secure Sockets Layer (SSL) or its updated version name called Transport Layer Security (TLS) to secure all communications between their servers and web browsers. It is very important to analyze the security of this protocol because the compromise of the banking accounts, health care directories, information of national importance, even vital information about business competitors is unacceptable.
SSL/TLS is not a simple encryption or hashing algorithm. It is a protocol which consists of bunch of cryptographic primitives which aim to provide secure communication. Moreover, this protocol has a long history of attacks and it needs to be revised since security field is changing. This paper presents the most commonly used configurations of this protocol among web servers, highlighting issues where it is insecure and areas where it can be improved. Specifically, parameters used in cryptographic primitives and certificates used by the web servers have been reported. The approach was to probe all web servers using a tool - TestSSLServer. There were sets of two experiments carried out. One in which top 500 most popular websites in India were probed and other in which 50 banking sites in India were probed. Some of the surprising results were that servers still posses SSLv2 and v3 despite of its insecurity. Also, banking sites were found not to support forward secrecy.
Keywords
- Elliptic Curve
- Forward Secrecy
- Pseudo Random Function
- Secure Socket Layer
- Protocol Version
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, access via your institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Wikipedia, Transport Layer Security. https://en.wikipedia.org/wiki/Transport_Layer_Security
Ristic, I.: Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications
Wikipedia, CRIME. https://en.wikipedia.org/wiki/CRIME
Wikipedia, Public Key Infrastructure. https://en.wikipedia.org/wiki/Public_key_infrastructure
DROWN. https://drownattack.com/
POODLE. https://blog.qualys.com/ssllabs/2014/10/15/ssl-3-is-dead-killed-by-the-poodle-attack
Wagner, D., Schneier, B.: Analysis of the SSL 3.0 Protocol
Rescorla, E.: SSL and TLS: Designing and Building Secure Systems. Addison-Wesley, Boston (2001)
BEAST. https://blog.qualys.com/ssllabs/2013/09/10/is-beast-still-a-threat
Bhargavan, K., Delignat-Lavaud, A., Fournet, C., Pironti, A., Strub, P.-Y.: Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS
LOGJAM. https://weakdh.org/
TLS Working Group Draft. https://tools.ietf.org/html/draft-ietf-tls-negotiated-ff-dhe-10
The Transport Layer Security (TLS) Protocol Version 1.2 - RFC 5246. https://tools.ietf.org/html/rfc5246
Transport Layer Security (TLS) Renegotiation Indication Extension - RFC 5746. https://tools.ietf.org/html/rfc5746
Alexa top 500. http://www.alexa.com/topsites/countries/IN
Directories of Banks in India. http://www.banknetindia.com/banklinks.htm
Pornin, T.: TestSSLServer. pornin@bolet.org, http://www.bolet.org/TestSSLServer/
Davies, J.: Implementing SSL/TLS Using Cryptography and PKI
Lee, H.K., Malkin, T., Nahum, E.: Cryptographic Strength of SSL/TLS Servers: Current and Recent Practices
Boneh, D.: Coursera, Cryptography I
Katz, J.: Coursera, Cryptography
Schneier, B.: Applied Cryptography
Buchmann, J.A., Karatsiolis, E., Wiesmaier, A.: Introduction to Public Key Infrastructures
JSON Parser - cJSON. https://github.com/DaveGamble/cJSON
Source Code for Parsing JSON. https://github.com/prakhs123/Parsing-TestSSLServer-Jsons
Prohibiting Secure Sockets Layer (SSL) Version 2.0 - RFC 6176. https://tools.ietf.org/html/rfc6176
Deprecating Secure Sockets Layer Version 3.0 - RFC 7568. https://tools.ietf.org/html/rfc7568
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Jain, P., Shukla, K.K. (2016). Cryptographic Assessment of SSL/TLS Servers Popular in India. In: Mueller, P., Thampi, S., Alam Bhuiyan, M., Ko, R., Doss, R., Alcaraz Calero, J. (eds) Security in Computing and Communications. SSCC 2016. Communications in Computer and Information Science, vol 625. Springer, Singapore. https://doi.org/10.1007/978-981-10-2738-3_10
Download citation
DOI: https://doi.org/10.1007/978-981-10-2738-3_10
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-2737-6
Online ISBN: 978-981-10-2738-3
eBook Packages: Computer ScienceComputer Science (R0)