Security of Alerting Authorities in the WWW: Measuring Namespaces, DNSSEC, and Web PKI

Research output: Contribution to book/Conference proceedings/Anthology/ReportConference contributionContributedpeer-review

Contributors

  • Pouyan Fotouhi Tehrani - , Weizenbaum Institute, Fraunhofer Institute for Open Communication Systems (Author)
  • Eric Osterweil - , George Mason University (Author)
  • Jochen H. Schiller - , Free University of Berlin (Author)
  • Thomas C. Schmidt - , Hamburg University of Applied Sciences (Author)
  • Matthias Wählisch - , Chair of Distributed and Networked Systems, Free University of Berlin (Author)

Abstract

During disasters, crisis, and emergencies the public relies on online
services provided by official authorities to receive timely alerts,
trustworthy information, and access to relief programs. It is therefore crucial for the authorities to reduce risks when accessing their
online services. This includes catering to secure identification of
service, secure resolution of name to network service, and content
security and privacy as a minimum base for trustworthy communication.

In this paper, we take a first look at Alerting Authorities (AA) in
the US and investigate security measures related to trustworthy and
secure communication. We study the domain namespace structure,
DNSSEC penetration, and web certificates. We introduce an integrative threat model to better understand whether and how the online
presence and services of AAs are harmed. As an illustrative example, we investigate 1,388 Alerting Authorities. We observe partial
heightened security relative to the global Internet trends, yet find
cause for concern as about 78% of service providers fail to deploy
measures of trustworthy service provision. Our analysis shows two
major shortcomings. First, how the DNS ecosystem is leveraged:
about 50% of organizations do not own their dedicated domain
names and are dependent on others, 55% opt for unrestricted-use
namespaces, which simplifies phishing, and less than 4% of unique
AA domain names are secured by DNSSEC, which can lead to DNS
poisoning and possibly to certificate misissuance. Second, how Web
PKI certificates are utilized: 15% of all hosts provide none or invalid
certificates, thus cannot cater to confidentiality and data integrity,
64% of the hosts provide domain validation certification that lack
any identity information, and shared certificates have gained on
popularity, which leads to fate-sharing and can be a cause for instability.

Details

Original languageEnglish
Title of host publicationWWW '21: Proceedings of the Web Conference 2021
PublisherACM New York, NY, USA
Pages2709-2720
Number of pages12
ISBN (electronic)9781450383127
Publication statusPublished - 19 Apr 2021
Peer-reviewedYes

Conference

TitleACM The Web Conference
Abbreviated titleWWW
Conference number30
Duration19 - 23 April 2021
Website
Degree of recognitionInternational event

External IDs

Scopus 85107994636
ORCID /0000-0002-3825-2807/work/168720731

Keywords

Research priority areas of TU Dresden

DFG Classification of Subject Areas according to Review Boards

Subject groups, research areas, subject areas according to Destatis

Keywords

  • DNSSEC, DNS, Emergency Management, Web PKI