TLS is an end-to-end protocol designed to provide confidentiality and integrity guarantees that improve end-user security and privacy. While TLS helps defend against pervasive surveillance of intercepted unencrypted traffic, it also hinders several common beneficial operations typically performed by middleboxes on the network traffic. Consequently, various methods have been proposed that "bypass" the confidentiality goals of TLS by playing with keys and certificates essentially in a man-in-the-middle solution, as well as new proposals that extend the protocol to accommodate third parties, delegation schemes to trusted middleboxes, and fine-grained control and verification mechanisms. We first review the use cases expecting plain HTTP traffic and discuss the extent to which TLS hinders these operations. We retain 19 scenarios where access to unencrypted traffic is still relevant and evaluate the incentives of the stakeholders involved. Second, we survey 30 schemes by which TLS no longer delivers end-to-end security, and by which the notion of an "end" changes, including caching middleboxes such as Content Delivery Networks. Finally, we compare each scheme based on deployability and security characteristics, and evaluate their compatibility with the stakeholders' incentives. Our analysis leads to a number of key findings, observations, and research questions that we believe will be of interest to practitioners, policy makers and researchers.
翻译:TLS是一项端对端协议,旨在提供保密和完整性保障,改善最终用户安全和隐私。TLS帮助防范对被拦截的未加密交通进行普遍监视,但也阻碍网络交通中层箱通常执行的若干共同有益行动。因此,建议采用各种方法“绕过”TLS的保密目标,主要在中间人解决方案中玩钥匙和证书,以及将议定书的修改概念扩大到包括第三方、代表团计划到信任的中间箱以及精密的控制和核查机制。我们首先审查预期普通 HTTP交通的使用情况,并讨论TLS阻碍这些行动的程度。我们保留19种情景,在这些情景中,对未加密交通的准入仍然相关,并评估所涉利益攸关方的激励因素。第二,我们调查30种计划,即TLS不再提供终端到终端的安全,根据这些计划将“结束”的理念扩大到第三方,包括缓存中等箱,以及精密的控制和核查机制。最后,我们根据可部署性和安全性特性对每个计划进行比较,讨论TLS的通信量,并评估其关键和一致性,我们相信研究人员将相信其政策分析。