Web services commonly employ Content Distribution Networks (CDNs) for performance and security. As web traffic is becoming 100% HTTPS, more and more websites allow CDNs to terminate their HTTPS connections. This practice may expose a website's user sensitive information such as a user's login password to a third-party CDN. In this paper, we measure and quantify the extent of user password exposure to third-party CDNs. We find that among Alexa top 50K websites, at least 12,451 of them use CDNs and contain user login entrances. Among those websites, 33% of them expose users' passwords to the CDNs, and a popular CDN may observe passwords from more than 40% of its customers. This result suggests that if a CDN infrastructure has a vulnerability or an insider attack, many users' accounts will be at risk. If we assume the attacker is a passive eavesdropper, a website can avoid this vulnerability by encrypting users' passwords in HTTPS connections. Our measurement shows that less than 17% of the websites adopt this countermeasure.
翻译:通常使用内容发布网络(CDN)来进行性能和安全。 随着网络流量正在达到100%的 HTTPS, 越来越多的网站允许CDN终止 HTPS 连接。 这种做法可能会暴露网站用户敏感信息, 如用户登录密码到第三方 CDN 。 在本文中, 我们测量并量化用户密码接触第三方 CDN 的程度。 我们发现, Alexa 前50K 网站中至少有12, 451个网站使用 CDN 并包含用户登录入口。 在这些网站中, 33% 将用户密码显示到 CDN, 受欢迎的CDN 可能观察40%以上的客户的密码。 这个结果显示, 如果 CDN 基础设施存在弱点或内幕攻击, 许多用户的账户将面临风险。 如果我们假设攻击者是被动的 Eavesdroper, 一个网站可以通过在 HTTPS 连接中加密用户密码来避免这种脆弱性。 我们的测量显示, 不到17%的网站会采取反制衡。