maTLS: How to Make TLS Middlebox-aware?

Network Distributed System Security '19

Home

maTLS aims to make middleboxes securely participate into the TLS session in an auditable fashion.
Your comments and suggestions are always welcomed


Paper Summary

▸ Abstract

    Middleboxes are widely deployed in order to enhance security and performance in networking. As communication over TLS becomes increasingly common, however, the end-to-end channel model of TLS undermines the efficacy of middleboxes. Existing solutions, such as ‘SplitTLS’, which intercepts TLS sessions, often introduce significant security risks by installing a custom root certificate or sharing a private key. Many studies have confirmed security vulnerabilities when combining TLS with middleboxes, which include certificate validation failures, use of obsolete ciphersuites, and unwanted content modification. To address the above issues, we introduce a middlebox-aware TLS protocol, dubbed maTLS, which allows middleboxes to participate in the TLS session in a visible and auditable fashion. Every participating middlebox now splits a session into two segments with their own security parameters in collaboration with the two endpoints. The maTLS protocol is designed to authenticate the middleboxes to verify the security parameters of segments, and to audit the middleboxes’ write operations. Thus, security of the session is ensured. We prove the security model of maTLS by using Tamarin, a state-of-the-art security verification tool. We also carry out testbed-based experiments to show that maTLS achieves the above security goals with marginal overhead.

▸ Summary

    Introduction
    Auditable Middleboxes
    Middlebox-aware TLS
    Security Verification
    Evaluation

Paper & Source Codes

Author: Hyunwoo Lee