Software Open Access

Security of Alerting Authorities in the WWW: Measuring Namespaces, DNSSEC, and Web PKI

Pouyan Fotouhi Tehrani; Eric Osterweil; Jochen H. Schiller; Thomas C. Schmidt; Matthias Wählisch


MARC21 XML Export

<?xml version='1.0' encoding='UTF-8'?>
<record xmlns="http://www.loc.gov/MARC21/slim">
  <leader>00000nmm##2200000uu#4500</leader>
  <datafield tag="041" ind1=" " ind2=" ">
    <subfield code="a">eng</subfield>
  </datafield>
  <controlfield tag="005">20210208225634.0</controlfield>
  <controlfield tag="001">4300947</controlfield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">George Mason University</subfield>
    <subfield code="a">Eric Osterweil</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Freie Universtiät Berlin</subfield>
    <subfield code="a">Jochen H. Schiller</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">HAW Hamburg</subfield>
    <subfield code="a">Thomas C. Schmidt</subfield>
  </datafield>
  <datafield tag="700" ind1=" " ind2=" ">
    <subfield code="u">Freie Universtiät Berlin</subfield>
    <subfield code="a">Matthias Wählisch</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
    <subfield code="s">164468</subfield>
    <subfield code="z">md5:2c500f374e852a945b511fe917623aaa</subfield>
    <subfield code="u">https://zenodo.org/record/4300947/files/1_aa-dns-webpki--source.zip</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
    <subfield code="s">643463</subfield>
    <subfield code="z">md5:6cf6309f3dd30139a53ffe127024d2fd</subfield>
    <subfield code="u">https://zenodo.org/record/4300947/files/2_aa-dns-webpki--measurements.zip</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
    <subfield code="s">31165712</subfield>
    <subfield code="z">md5:7d78a85d9e327ae3431aa5a91b3273d2</subfield>
    <subfield code="u">https://zenodo.org/record/4300947/files/3_aa-dns-webpki--raw.zip</subfield>
  </datafield>
  <datafield tag="542" ind1=" " ind2=" ">
    <subfield code="l">open</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="c">2020-12-01</subfield>
  </datafield>
  <datafield tag="909" ind1="C" ind2="O">
    <subfield code="p">software</subfield>
    <subfield code="o">oai:zenodo.org:4300947</subfield>
  </datafield>
  <datafield tag="100" ind1=" " ind2=" ">
    <subfield code="u">Weizenbaum Institute / Fraunhofer FOKUS</subfield>
    <subfield code="a">Pouyan Fotouhi Tehrani</subfield>
  </datafield>
  <datafield tag="245" ind1=" " ind2=" ">
    <subfield code="a">Security of Alerting Authorities in the WWW: Measuring Namespaces, DNSSEC, and Web PKI</subfield>
  </datafield>
  <datafield tag="540" ind1=" " ind2=" ">
    <subfield code="u">https://creativecommons.org/licenses/by/4.0/legalcode</subfield>
    <subfield code="a">Creative Commons Attribution 4.0 International</subfield>
  </datafield>
  <datafield tag="650" ind1="1" ind2="7">
    <subfield code="a">cc-by</subfield>
    <subfield code="2">opendefinition.org</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
    <subfield code="a">&lt;p&gt;&lt;strong&gt;Security of Alerting Authorities in the WWW: Measuring Namespaces, DNSSEC, and Web PKI&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This repository contains the toolchain to measure DNS and Web PKI characteristics of&amp;nbsp;&lt;a href="https://www.fema.gov/emergency-managers/practitioners/integrated-public-alert-warning-system/public-safety-officials/alerting-authorities"&gt;Alerting Authorities&lt;/a&gt;&amp;nbsp;(AA) in the US as well as our measurements and raw data (e.g., collected certificates).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;NOTE:&lt;/strong&gt; If you use our data or tools, please cite &lt;a href="https://doi.org/10.1145/3442381.3450033"&gt;our paper&lt;/a&gt; us as follows:&lt;/p&gt;

&lt;pre&gt;&lt;em&gt;Pouyan Fotouhi Tehrani, Eric Osterweil, Jochen H. Schiller, Thomas C.
Schmidt, and Matthias W&amp;auml;hlisch. Security of Alerting Authorities 
in the WWW: Measuring Namespaces, DNSSEC, and Web PKI. In Proceedings
of the WebConference 2021 (WWW&amp;rsquo;21), ACM, New York, NY, USA&lt;/em&gt;&lt;/pre&gt;

&lt;p&gt;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Abstract&lt;/strong&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;During disasters, crisis, and emergencies the public relies on online services provided by official authorities to receive timely alerts, trustworthy information, and access to relief programs. It is therefore crucial for the authorities to reduce risks when accessing their online services. This includes catering to secure identification of service, secure resolution of name to network service, and content security and privacy as a minimum base for trustworthy communication.&lt;/p&gt;

&lt;p&gt;In this paper, we take a first look at Alerting Authorities (AA) in the US and investigate security measures related to trustworthy and secure communication. We study the domain namespace structure, DNSSEC penetration, and web certificates. We introduce an integrative threat model to better understand whether and how the online presence and services of AAs are harmed. As an illustrative example, we investigate 1,388 Alerting Authorities, backed by the United States Federal Emergency Management Agency (US FEMA). We observe partial heightened security relative to the global Internet trends, yet find cause for concern as about 80% of service providers fail to deploy measures of trustworthy service provision. Our analysis shows two major shortcomings. First, how the DNS ecosystem is leveraged: about 50% of organizations do not own their dedicated domain names and are dependent on others, 55% opt for unrestricted-use namespaces, which simplifies phishing, and less than 0.4% of unique AA domain names are secured by DNSSEC, which can lead to DNS poisoning and possibly to cer tificate misissuance. Second, how Web PKI certificates are utilized: 15% of all hosts provide none or invalid certificates, thus cannot cater to confidentiality and data integrity, 64% of the hosts provide domain validation certification that lack any identity information, and shared certificates have gained on popularity, which leads to fate-sharing and can be a cause for instability.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;Repository structure&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Toolchain&lt;/strong&gt; (&lt;code&gt;1_aa-dns-webpki-source.zip&lt;/code&gt;): the source code used for our data collection. For more information see the included&amp;nbsp;&lt;code&gt;README.md&lt;/code&gt;&amp;nbsp;and the manual under&amp;nbsp;&lt;code&gt;docs&lt;/code&gt;&amp;nbsp;in the archive.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Measurements&lt;/strong&gt; (&lt;code&gt;2_aa-dns-webpki-measurements.zip&lt;/code&gt;):
	&lt;ul&gt;
		&lt;li&gt;&lt;code&gt;auths-filtered-dns-merged.csv&lt;/code&gt;: table containing information about each AA with respective DNS characteristics.&lt;/li&gt;
		&lt;li&gt;&lt;code&gt;auths-active-certs.csv&lt;/code&gt;: table containing information about current (at the time of study) information about SSL/TLS characteristics of AA hosts.&lt;/li&gt;
		&lt;li&gt;&lt;code&gt;auths-active-certs-analyzed.csv&lt;/code&gt;: table containing detailed information about active certificates in use by AA hosts.&lt;/li&gt;
		&lt;li&gt;auths-ct-logged-certs-analyzed.csv: table containing detailed information about CT-logged certificates use by AA hosts.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Raw data&lt;/strong&gt; (&lt;code&gt;3_aa-dns-webpki-raw.zip&lt;/code&gt;):
	&lt;ul&gt;
		&lt;li&gt;&lt;code&gt;active-certs.gz&lt;/code&gt;: current certificates in use by AA hosts.&lt;/li&gt;
		&lt;li&gt;&lt;code&gt;ct-certs.gz&lt;/code&gt;: CT-logged certificates used by AA hosts.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
&lt;/ul&gt;</subfield>
  </datafield>
  <datafield tag="773" ind1=" " ind2=" ">
    <subfield code="n">doi</subfield>
    <subfield code="i">isSupplementTo</subfield>
    <subfield code="a">10.1145/3442381.3450033</subfield>
  </datafield>
  <datafield tag="773" ind1=" " ind2=" ">
    <subfield code="n">doi</subfield>
    <subfield code="i">isVersionOf</subfield>
    <subfield code="a">10.5281/zenodo.4300946</subfield>
  </datafield>
  <datafield tag="024" ind1=" " ind2=" ">
    <subfield code="a">10.5281/zenodo.4300947</subfield>
    <subfield code="2">doi</subfield>
  </datafield>
  <datafield tag="980" ind1=" " ind2=" ">
    <subfield code="a">software</subfield>
  </datafield>
</record>
131
19
views
downloads
All versions This version
Views 131131
Downloads 1919
Data volume 222.5 MB222.5 MB
Unique views 106106
Unique downloads 1111

Share

Cite as