首页> 外文会议>IEEE Symposium on Security and Privacy >Tracking Certificate Misissuance in the Wild
【24h】

Tracking Certificate Misissuance in the Wild

机译:野外追踪证书误发

获取原文

摘要

Certificate Authorities (CAs) regularly make mechanical errors when issuing certificates. To quantify these errors, we introduce ZLint, a certificate linter that codifies the policies set forth by the CA/Browser Forum Baseline Requirements and RFC 5280 that can be tested in isolation. We run ZLint on browser-trusted certificates in Censys and systematically analyze how well CAs construct certificates. We find that the number errors has drastically reduced since 2012. In 2017, only 0.02% of certificates have errors. However, this is largely due to a handful of large authorities that consistently issue correct certificates. There remains a long tail of small authorities that regularly issue non-conformant certificates. We further find that issuing certificates with errors is correlated with other types of mismanagement and for large authorities, browser action. Drawing on our analysis, we conclude with a discussion on how the community can best use lint data to identify authorities with worrisome organizational practices and ensure long-term health of the Web PKI.
机译:颁发证书时,证书颁发机构(CA)经常会出现机械错误。为了量化这些错误,我们引入了ZLint,这是一个证书夹,它对CA / Browser论坛基准要求和RFC 5280提出的策略进行了编纂,这些策略可以单独进行测试。我们在Censys中的受浏览器信任的证书上运行ZLint,并系统地分析CA构造证书的程度。我们发现自2012年以来,错误数量已大幅度减少。2017年,只有0.02%的证书有错误。但是,这在很大程度上是由于少数几个大型机构始终如一地颁发正确的证书。小型机构定期签发不合格证书的地方还很长。我们进一步发现,签发有错误的证书与其他类型的管理不善有关,对于大型授权机构来说,与浏览器操作有关。根据我们的分析,我们以社区如何最好地使用皮棉数据来识别具有令人担忧的组织实践的权威机构并确保Web PKI的长期健康的讨论作为结尾。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号