%0 Conference Proceedings %T Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services %+ SBA Research %+ Vienna University of Technology = Technische Universität Wien (TU Wien) %A Merzdovnik, Georg %A Falb, Klaus %A Schmiedecker, Martin %A Voyiatzis, Artemios, G. %A Weippl, Edgar %Z Part 7: Trust and Zero-Day Vulnerabilities %< avec comité de lecture %( Lecture Notes in Computer Science %B 30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec) %C Trento, Italy %Y Silvio Ranise %Y Vipin Swarup %I Springer International Publishing %3 Data and Applications Security and Privacy XXX %V LNCS-9766 %P 331-346 %8 2016-07-18 %D 2016 %R 10.1007/978-3-319-41483-6_23 %Z Computer Science [cs]Conference papers %X TLS is currently the most widely-used protocol on the Internet to facilitate secure communications, in particular secure web browsing. TLS relies on X.509 certificates as a major building block to establish a secure communication channel. Certificate Authorities (CAs) are trusted third parties that validate the TLS certificates and establish trust relationships between communication entities. To counter prevalent attack vectors - like compromised CAs issuing fraudulent certificates and active man-in-the-middle (MitM) attacks - TLS notary services were proposed as a solution to verify the legitimacy of certificates using alternative communication channels.In this paper, we are the first to present a long-term study on the operation of TLS notary services. We evaluated the services using active performance measurements over a timespan of one year and discuss the effectiveness of TLS notary services in practice. Based on our findings, we propose the usage of multiple notary services in conjunction with a semi-trusted centralized proxy approach, so as to protect arbitrarily-sized networks on the network level without the need to install any software on the client machines. Lastly, we identify multiple issues that prevent the widespread use of TLS notary services in practice and propose steps to overcome them. %G English %Z TC 11 %Z WG 11.3 %2 https://inria.hal.science/hal-01633686/document %2 https://inria.hal.science/hal-01633686/file/428203_1_En_23_Chapter.pdf %L hal-01633686 %U https://inria.hal.science/hal-01633686 %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-WG %~ IFIP-TC11 %~ IFIP-WG11-3 %~ IFIP-DBSEC %~ IFIP-LNCS-9766