Security of Alerting Authorities in the WWW: Measuring Namespaces, DNSSEC, and Web PKI

Publikation: Beitrag in Buch/Konferenzbericht/Sammelband/GutachtenBeitrag in KonferenzbandBeigetragenBegutachtung

Beitragende

  • Pouyan Fotouhi Tehrani - , Weizenbaum Institute, Fraunhofer-Institut für Offene Kommunikationssysteme (Autor:in)
  • Eric Osterweil - , George Mason University (Autor:in)
  • Jochen H. Schiller - , Freie Universität (FU) Berlin (Autor:in)
  • Thomas C. Schmidt - , Hochschule fur Angewandte Wissenschaften Hamburg (HAW) (Autor:in)
  • Matthias Wählisch - , Professur für Distributed and Networked Systems, Freie Universität (FU) Berlin (Autor:in)

Abstract

During disasters, crisis, and emergencies the public relies on online
services provided by official authorities to receive timely alerts,
trustworthy information, and access to relief programs. It is therefore crucial for the authorities to reduce risks when accessing their
online services. This includes catering to secure identification of
service, secure resolution of name to network service, and content
security and privacy as a minimum base for trustworthy communication.

In this paper, we take a first look at Alerting Authorities (AA) in
the US and investigate security measures related to trustworthy and
secure communication. We study the domain namespace structure,
DNSSEC penetration, and web certificates. We introduce an integrative threat model to better understand whether and how the online
presence and services of AAs are harmed. As an illustrative example, we investigate 1,388 Alerting Authorities. We observe partial
heightened security relative to the global Internet trends, yet find
cause for concern as about 78% of service providers fail to deploy
measures of trustworthy service provision. Our analysis shows two
major shortcomings. First, how the DNS ecosystem is leveraged:
about 50% of organizations do not own their dedicated domain
names and are dependent on others, 55% opt for unrestricted-use
namespaces, which simplifies phishing, and less than 4% of unique
AA domain names are secured by DNSSEC, which can lead to DNS
poisoning and possibly to certificate misissuance. Second, how Web
PKI certificates are utilized: 15% of all hosts provide none or invalid
certificates, thus cannot cater to confidentiality and data integrity,
64% of the hosts provide domain validation certification that lack
any identity information, and shared certificates have gained on
popularity, which leads to fate-sharing and can be a cause for instability.

Details

OriginalspracheEnglisch
TitelWWW '21: Proceedings of the Web Conference 2021
Herausgeber (Verlag)ACM New York, NY, USA
Seiten2709-2720
Seitenumfang12
ISBN (elektronisch)9781450383127
PublikationsstatusVeröffentlicht - 19 Apr. 2021
Peer-Review-StatusJa

Konferenz

TitelACM The Web Conference
KurztitelWWW
Veranstaltungsnummer30
Dauer19 - 23 April 2021
Webseite
BekanntheitsgradInternationale Veranstaltung

Externe IDs

Scopus 85107994636
ORCID /0000-0002-3825-2807/work/168720731

Schlagworte

Forschungsprofillinien der TU Dresden

Fächergruppen, Lehr- und Forschungsbereiche, Fachgebiete nach Destatis

Schlagwörter

  • DNSSEC, DNS, Emergency Management, Web PKI