During disasters, crisis, and emergencies the public relies on online services provided by official authorities to receive timely alerts, trustworthy information, and access to relief programs. It is therefore crucial for the authorities to reduce risks when accessing their online services. This includes catering to secure identification of service, secure resolution of name to network service, and content security and privacy as a minimum base for trustworthy communication. In this paper, we take a first look at Alerting Authorities (AA) in the US and investigate security measures related to trustworthy and secure communication. We study the domain namespace structure, DNSSEC penetration, and web certificates. We introduce an integrative threat model to better understand whether and how the online presence and services of AAs are harmed. As an illustrative example, we investigate 1,388 Alerting Authorities. We observe partial heightened security relative to the global Internet trends, yet find cause for concern as about 78% of service providers fail to deploy measures of trustworthy service provision. Our analysis shows two major shortcomings. First, how the DNS ecosystem is leveraged: about 50% of organizations do not own their dedicated domain names and are dependent on others, 55% opt for unrestricted-use namespaces, which simplifies phishing, and less than 4% of unique AA domain names are secured by DNSSEC, which can lead to DNS poisoning and possibly to certificate misissuance. Second, how Web PKI certificates are utilized: 15% of all hosts provide none or invalid certificates, thus cannot cater to confidentiality and data integrity, 64% of the hosts provide domain validation certification that lack any identity information, and shared certificates have gained on popularity, which leads to fate-sharing and can be a cause for instability.
翻译:在灾害、危机和紧急情况期间,公众依靠官方当局提供的在线服务来及时获得警报、可信赖的信息和救济方案的准入。因此,当局在获得其在线服务时减少风险至关重要。这包括确保识别服务、安全解决网络服务的名称,以及将内容安全和隐私作为可信赖通信的最起码基础。在本文件中,我们首先审视美国的警戒当局(AA),并调查与可信和安全通信有关的安全措施。我们研究了域名空间结构、DNSSEC渗透和网络证书。我们采用了综合威胁模型,以更好地了解AA的在线存在和服务是否和如何受到损害。举例而言,我们调查了1 388个提醒当局。我们观察到与全球互联网趋势相比,部分安全有所加强,但令人担心的是,大约78%的服务提供者未能采取可信赖服务提供的措施。我们的分析表明两大缺陷。首先,DNS的生态系统是如何利用:约50 %的组织不能拥有其专用域名,并且依赖于其他组织,55 %的组织选择了无限制使用域域域名和DNS的验证,因此,SIS的域域域标不能提供唯一或唯一域标的DAS。