Internet PKI to Integrate DNSSEC
We use digital certificates to secure our network communication, but have you ever considered that the issuance of the certificates themselves is essentially trust on first use (TOFU)? This acronym is commonly used to refer to a trust model that’s bootstrapped on the assumption that the first interaction is with the intended party, but this assumption is not fully validated.
You may be more familiar with TOFU from SSH, in which clients remember servers’ keys when they connect for the first time. This works because it’s normally very unlikely that someone will interfere with this very first connection. That’s because it usually happens immediately after a new server is booted for the first time, which is an event that’s under your control.
It’s less obvious that the entirety of internet PKI operates in the same way, because we normally interact with digital certificates and there is an assumption that they have been obtained securely. However, in practice, this is again TOFU. When a certificate is requested, behind the scenes, CAs use insecure communication to validate domain control. To be clear, this does help, because there is now only one initial insecure connection per certificate, after which the entire world can connect securely.
This trust model, on which internet PKI is based, works—until it is attacked. Any party that can intercept the communication between the CA and an IP address behind a domain name can get a fraudulent certificate. The attack vectors include man-in-the-middle attacks, BGP hijacking, and exploitation of dangling DNS issues.
Work has been under way to improve this situation, starting with Multi-Perspective Issuance Corroboration (MPIC), which has been adopted by the CA/Browser Forum and will become mandatory in September 2025. This technique raises the bar by enforcing multiple geographically dispersed vantage points for CAs’ DNS queries and validation traffic. Although it helps, MPIC is not a foolproof solution.
|