Weak Keys Remain Widespread in Network Devices
- 14 November 2016
- conference paper
- conference paper
- Published by Association for Computing Machinery (ACM) in Proceedings of the 2016 Internet Measurement Conference
Abstract
In 2012, two academic groups reported having computed the RSA private keys for 0.5% of HTTPS hosts on the internet, and traced the underlying issue to widespread random number generation failures on networked devices. The vulnerability was reported to dozens of vendors, several of whom responded with security advisories, and the Linux kernel was patched to fix a boottime entropy hole that contributed to the failures. In this paper, we measure the actions taken by vendors and end users over time in response to the original disclosure. We analyzed public internet-wide TLS scans performed between July 2010 and May 2016 and extracted 81 million distinct RSA keys. We then computed the pairwise common divisors for the entire set in order to factor over 313,000 keys vulnerable to the aw, and fingerprinted implementations to study patching behavior over time across vendors. We find that many vendors appear to have never produced a patch, and observed little to no patching behavior by end users of affected devices. The number of vulnerable hosts increased in the years after notification and public disclosure, and several newly vulnerable implementations have appeared since 2012. Vendor notification, positive vendor responses, and even vendor-produced public security advisories appear to have little correlation with end-user security.Keywords
Funding Information
- Cisco Systems
- National Science Foundation (CNS-1513671, CNS-1408734)
This publication has 18 references indexed in Scilit:
- Security Metrics for the Android EcosystemPublished by Association for Computing Machinery (ACM) ,2015
- A Search Engine Backed by Internet-Wide ScanningPublished by Association for Computing Machinery (ACM) ,2015
- The Matter of HeartbleedPublished by Association for Computing Machinery (ACM) ,2014
- Analysis of the HTTPS certificate ecosystemPublished by Association for Computing Machinery (ACM) ,2013
- Factoring RSA Keys from Certified Smart Cards: Coppersmith in the WildLecture Notes in Computer Science, 2013
- The Menlo Report: Ethical Principles Guiding Information and Communication Technology ResearchSSRN Electronic Journal, 2012
- An Empirical Analysis of Software Vendors' Patch Release Behavior: Impact of Vulnerability DisclosureInformation Systems Research, 2010
- Factorization of a 768-Bit RSA ModulusLecture Notes in Computer Science, 2010
- Analysis of end user security behaviorsComputers & Security, 2005
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978