It is notoriously difficult to securely configure HTTPS, and poor server configurations have contributed to several attacks including the FREAK, Logjam, and POODLE attacks. In this work, we empirically evaluate the TLS security posture of popular websites and endeavor to understand the configuration decisions that operators make. We correlate several sources of influence on sites' security postures, including software defaults, cloud providers, and online recommendations. We find a fragmented web ecosystem: while most websites have secure configurations, this is largely due to major cloud providers that offer secure defaults. Individually configured servers are more often insecure than not. This may be in part because common resources available to individual operators -- server software defaults and online configuration guides -- are frequently insecure. Our findings highlight the importance of considering SaaS services separately from individually-configured sites in measurement studies, and the need for server software to ship with secure defaults.
翻译:众所周知,很难安全地配置 HTTPS, 并且服务器配置差也促成了几次袭击, 包括Frechy、 Logjam 和 POODLE 袭击。 在这项工作中, 我们从经验上评估了广受欢迎的网站的 TLS 安全态势, 并努力理解操作者作出的配置决定。 我们对网站安全态势的一些影响来源进行了关联, 包括软件默认、 云源提供商 和在线建议。 我们发现网络生态系统支离破碎: 虽然大多数网站都有安全配置, 这在很大程度上是由于提供安全默认的主要云源提供商造成的。 个人配置的服务器往往不安全, 部分原因可能是单个操作者可用的共同资源( 服务器软件默认和在线配置指南) 经常不安全。 我们的发现突出表明,在测量研究中, SaaS 服务与单个配置的站点分开考虑的重要性, 以及服务器软件需要安全默认地运行。