【24h】

When TLS Meets Proxy on Mobile

机译:TLS在移动设备上遇到代理时

获取原文

摘要

Increasingly more mobile browsers are developed to use proxies for traffic compression and censorship circumvention. While these browsers can offer such desirable features, their security implications are, however, not well understood, especially when tangled with TLS in the mix. Apart from vendor-specific proprietary designs, there are mainly 2 models of using proxies with browsers: TLS interception and HTTP tunneling. To understand the current practices employed by proxy-based mobile browsers, we analyze 34 Android browser apps that are representative of the ecosystem, and examine how their deployments are affecting communication security. Though the impacts of TLS interception on security was studied before in other contexts, proxy-based mobile browsers were not considered previously. In addition, the tunneling model requires the browser itself to enforce certain desired security policies (e.g., validating certificates and avoiding the use of weak cipher suites), and it is preferable to have such enforcement matching the security level of conventional desktop browsers. Our evaluation shows that many proxy-based mobile browsers downgrade the overall quality of TLS sessions, by for example allowing old versions of TLS (e.g., SSLv3.0 and TLSvl.O) and accepting weak cryptographic algorithms (e.g., 3DES and RC4) as well as unsatisfactory certificates (e.g., revoked or signed by untrusted CAs), thus exposing their users to potential security and privacy threats. We have reported our findings to the vendors of vulnerable proxy-based browsers and are waiting for their response.
机译:越来越多的移动浏览器被开发为使用代理来进行流量压缩和审查。虽然这些浏览器可以提供这些理想的功能,但是,它们的安全性含义还没有得到很好的理解,尤其是当与TLS混合使用时。除了特定于供应商的专有设计外,主要还有两种将代理与浏览器一起使用的模型:TLS拦截和HTTP隧道。为了了解基于代理的移动浏览器当前采用的做法,我们分析了代表该生态系统的34个Android浏览器应用程序,并研究了它们的部署如何影响通信安全。尽管以前曾在其他情况下研究过TLS拦截对安全性的影响,但以前并未考虑基于代理的移动浏览器。另外,隧道模型要求浏览器本身执行某些期望的安全策略(例如,验证证书并避免使用弱密码套件),并且优选具有与常规桌面浏览器的安全级别相匹配的这种执行。我们的评估表明,许多基于代理的移动浏览器通过允许使用旧版本的TLS(例如SSLv3.0和TLSv1.0)并接受弱加密算法(例如3DES和RC4)来降低TLS会话的整体质量。以及不令人满意的证书(例如,由不受信任的CA吊销或签名),从而使他们的用户面临潜在的安全和隐私威胁。我们已将发现的结果报告给有漏洞的基于代理的浏览器供应商,正在等待他们的回应。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号