HSM4SSL: Leveraging HSMs for Enhanced Intra-Domain Security †
Abstract
:1. Introduction
2. Current Security Mechanisms and Implementations
- HTTP: Initially, HTTP did not prioritize encryption, which became problematic as sensitive data increased. This led to the creation of HTTPS, which uses TLS/SSL to encrypt and authenticate exchanged communication, making most domains and servers prefer HTTPS connections [11]. In 2022, over 79% of websites defaulted to HTTPS [12]. Web browsers enforce HTTPS usage through two main methods. The former is HTTPS redirection, which is utilized when a website undergoes updates or transitions to a new URL or when a server forcefully redirects communication from HTTP to HTTPS. All browsers inform users about secure channel establishment issues, allowing users to decide whether to continue interacting with the server despite potential security concerns [13]. However, depending solely on user decisions, using “Click Through” security measures introduces security vulnerabilities [14,15]. The latter is HTTP Strict Transport Security (HSTS); HSTS acts as a mechanism for websites to declare themselves accessible only via secure connections. It mitigates SSL stripping attacks by enforcing the use of SSL/TLS in web browsers. Web servers declare HSTS by using HTTP response headers [16,17].
- SMTP: Initially, SMTP communication was sent in clear text, posing security risks. To address this, implicit TLS was introduced. However, it was deprecated for SMTP, and STARTTLS emerged as an alternative protocol for initiating a TLS session. However, it introduces potential vulnerabilities such as STARTTLS stripping attacks [18].
- TCPCrypt: Was developed to ensure end-to-end encrypted communication between applications using TCP. TCPCrypt initiates a secure channel by starting a TCP connection, similar to SSL. However, it lacks the guarantee of authenticity provided by X.509 certificates or passwords, making it susceptible to opportunistic encryption if one endpoint does not support TCPCrypt [19,20].
- Kerberos: This is one of the most widely used software-based key distribution services. However, it mainly relies on a KDC server that must be available and operating appropriately for security services to succeed. This means that any point of failure will disturb the availability of the whole process. Moreover, root-level access to the KDC server provides the attacker with unrestricted access to the whole system, leading to the compromise of the entire Kerberos database. Plus, Kerberos is not SSL-based, and it does not achieve end-to-end encryption between two clients by itself, which is the basis for secure intra-domain communication [23,24].
3. HSM4SSL Architecture
3.1. Inspiration from the Previous Work
- Security: HSMs provide a high level of security by adhering to the FIPS 140-2 standard, thus making them more reliable. Conversely, a recent exploitation of a vulnerability in Amazon’s KMS by Thai Duong [29] resulted in the leakage of clients’ private information, among other risks.
- Flexibility: KMS systems are generally easily integrated with software programs and services on servers. In contrast, HSMs necessitate the use of vendor-specific libraries for operation, significantly limiting flexibility when substituting an HSM from one vendor for another.
- Cost: KMS systems operate on a pay-as-you-go model, often proving to be a cost-effective alternative compared to the deployment of HSMs, which typically entail upfront costs or long-term commitments.
3.2. HSM4SSL: High-Level Architecture
- Secure storage initialization.
- Key pair generation.
- Digital certificate generation.
- Data encryption/decryption.
- Access control and authorization.
3.3. HSM4SSL: Low-Level Architecture
3.3.1. HSM4SSL Application Layer
3.3.2. HSM4SSL Management Layer
- Base Service Functions:The base service functions are employed to provide the primary services required to properly operate the HSM4SSL. The base service functions include the following:
- Topology Manager: Stores information about the HSMs and organizes HSMs with their physical and logical connections in a hierarchical structure. The topology manager monitors newly added and removed HSMs to construct this structure dynamically.
- Statistics Manager: Collects statistical information from the underlying HSMs, such as request counts and error rates. It stores and maintains this information to comprehensively generate reports based on the collected statistics.
- Flow Manager: Creates policy sets that guide the request routing process. These policy sets define the rules and criteria for determining the appropriate destination for each incoming request. By configuring these policies, the flow manager guides the HAL, enabling it to determine the specific HSM to which a request should be sent. These policies can consider various factors, such as security requirements, load balancing, the availability of HSM resources, and other relevant considerations.
- Host Manager: Manages and stores connected endpoint hosts’ information. It maintains a repository that stores crucial details about each host, including their MAC addresses and IP addresses.
- HSM Manager: Manages and stores the underlying HSMs’ information. It maintains a centralized repository of HSM-related data, including their statuses and configurations. This information includes details about the available HSMs, their connectivity, operational status, and any relevant configuration settings.
- Security Manager: Analyzes the HSMs’ states and incoming data to identify anomalies. Maservice managerlearning-based anomaly detection systems can be employed in the security manager to continuously scan incoming requests and detect threats.
- Event Manager: Collaborates closely with the security manager. Its primary role is to monitor critical events within the HSMs. By continuously monitoring various aspects of the system, such as performance and security indicators, in any critical event, such as a security breach or system failure, the event manager generates reports and alerts. Moreover, in case of an HSM failure error generated by the security manager, the event manager communicates with the flow manager with a specific error code requiring it to update the policy set. This allows the HAL to route incoming requests to available HSMs until the error is handled.
- Database Manager: Manages and backs up data storage and generates statistics about saved data, such as certificates and audit logs.
- Operation Service Functions: On the other hand, operation service functions contain managers oriented to perform specific cryptographic and HSM-related tasks, such as the following:
- Authorization Manager: Performs host authentication and authorization and determines which hosts can access HSM resources. It is responsible for validating the identity and credentials of connecting hosts and determining their level of access to HSM resources. By enforcing access control policies and rules, the authorization manager ensures that only authorized hosts can utilize the HSM resources and perform cryptographic operations.
- Cryptography Manager: Performs cryptographic operations, such as encryption and decryption, and secure storage initialization within the HSMs to store cryptographic objects.
- Keys Manager: Handles key generation and retrieves cryptographic keys for hosts for encryption and decryption processes.
- Certificate Manager: Manages the validation and revocation of digital certificates used for secure communication and authentication purposes. It maintains a repository of trusted root certificates and intermediate certificates, enabling the validation of certificates within the system. The certificate manager also handles the revocation of certificates in case of compromised or expired certificates.
3.3.3. Hardware Abstraction Layer
3.3.4. Adaptive Driver Communication Protocol (ADCP)
3.3.5. ADCP Assignment Policy Set
3.3.6. HSM4SSL Physical Layer
- HSMs: The physical layer includes tamper-resistant HSMs that provide cryptographic services. HSM4SSL relies on the security of those HSMs as they adhere to strict security standards such as FIPS 140-2, which are engineered to protect sensitive data and manage cryptographic keys with unmatched security, thereby strengthening the SSL operations, which are crucial for secure intra-domain communication. Plus, to accommodate various needs and requirements and to allow for greater flexibility, HSM4SSL supports an array of HSMs from multiple vendors. This multi-vendor approach ensures that organizations are not locked into a single provider, thereby reducing the risk of vendor lock-in and allowing for a customized security fit. The integration process is streamlined, ensuring that adding a new HSM to the environment is as simple as possible. Moreover, in light of the evolving landscape of cybersecurity threats due to the arrival of quantum computers, HSM4SSL must evolve at a comparable pace. Of note is that the National Institute of Standards and Technology (NIST) has selected four cryptographic algorithms covering key exchange and digital signatures that are pending standardization. However, the development of post-quantum safe HSMs is considered a hot topic by leading HSM manufacturers, such as Thales and Crypto4A [30,31], as building a post-quantum safe HSM requires completely different cryptographic frameworks compared to those employed in contemporary HSMs. Moreover, as HSM4SSL is designed for quick adaptability, we are certain that as these post-quantum safe algorithms and HSMs are standardized and developed, HSM4SSL will be able to incorporate these HSMs into the architecture.
- Databases: For supplementary storage capacity, the physical layer may include databases that store cryptographic elements, such as keys, certificates, and audit logs. These databases can be located either on the same server as the HSMs or on a separate server.
- Virtual HSM: In addition to physical HSMs, the physical layer supports the virtual HSM, also known as a HSM simulator. It is important to note that the HSM4SSL architecture has been developed and thoroughly tested in the SoftHSM simulator environment. SoftHSM provides a software-based emulation of an HSM and offers a controlled environment for cryptographic operations and secure storage [32].
3.3.7. HSM4SSL CLI Tool
- -name: Specifies the name associated with the certificate; this name can either be manually entered or can be modified by administrators to remain consistent for repeated usage of the command.
- -default: An option that can be used with the “-gen_cert” command to indicate default certificate generation settings. Default parameters include key type set to RSA, key length set to 2048, encryption set to AES, and hash set to SHA256.
- -manual: An option that can be used with the “-gen_cert” command to enable manual configuration of certificate generation settings.
- -key_type: Specifies the type of private key when manually configuring certificate generation settings.
- -key_length: Specifies the desired length of the private key when manually configuring certificate generation settings.
- -encryption: Specifies the encryption method to be used for private keys when manually configuring certificate generation settings.
- -hash: Specifies the hashing algorithm for cryptographic operations when manually configuring certificate generation settings.
- -label: Specifies a label or name for the generated key pair, so the public key can be saved in the HSM4SSL database.
- -key_type: Specifies the type of cryptographic key to be generated.
- -length: Specifies the desired length of the key.
4. HSM4SSL Performance
4.1. Testing Scenarios and Metrics
4.2. Results and Discussion
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Zhang, M. On the State of the Inter-Domain and Intra-Domain Routing Security; University of Oregon: Eugene, OR, USA, 2016; p. 23. [Google Scholar]
- Schulze, H. 2020 Insider Threat Report. Available online: https://www.cybersecurity-insiders.com/wp-content/uploads/2019/11/2020-Insider-Threat-Report-Gurucul.pdf (accessed on 22 April 2024).
- Bourke, T. Server Load Balancing, 1st ed.; O’Reilly: Beijing, China; Sebastopol, CA, USA, 2001. [Google Scholar]
- Membrey, P.; Hows, D.; Plugge, E. SSL Load Balancing. In Practical Load Balancing; Apress: Berkeley, CA, USA, 2012. [Google Scholar] [CrossRef]
- SectigoStore. SSL Certificate for IP Address—An Expert Guide on SSL for IP Address. Available online: https://sectigostore.com/page/ssl-certificate-for-ip-address/ (accessed on 22 April 2024).
- Sectigostorepages. Google Announces Intentions to Limit TLS Certificates to 90 Days: Why Automated CLM Is Crucial. Available online: https://www.sectigo.com/resource-library/google-announces-intentions-to-limit-tls-certificates-to-90-days-why-automated-clm-is-crucial (accessed on 22 April 2024).
- Aref, Y.; Ouda, A. Still Computers Networking is Less Secure Than It should be, Causes and Solution. In Proceedings of the 2023 International Symposium on Networks, Computers and Communications (ISNCC), Doha, Qatar, 23–26 October 2023; pp. 1–8. [Google Scholar] [CrossRef]
- Herzberg, A.; Hollick, M.; Perrig, A. Secure Routing for Future Communication Networks (Dagstuhl Seminar 15102). Dagstuhl Rep. 2015, 5, 28–40. [Google Scholar] [CrossRef]
- Shue, C.A.; Kalafut, A.J.; Gupta, M. A Unified Approach to Intra-domain Security. In Proceedings of the 2009 International Conference on Computational Science and Engineering, Vancouver, BC, Canada, 29–31 August 2009. [Google Scholar] [CrossRef]
- Boisrond, P.D. To Terminate or Not to Terminate Secure Sockets Layer (SSL) Traffic at the Load Balancer. arXiv 2020, arXiv:2011.09621. [Google Scholar]
- Rescorla, E. RFC2818; HTTP over TLS. Available online: https://www.rfc-editor.org/info/rfc2818 (accessed on 22 April 2024).
- W3Techs. Usage Statistics of Default Protocol Https for Websites. Available online: https://w3techs.com/technologies/details/ce-httpsdefault (accessed on 22 April 2024).
- Chordiya, A.R.; Majumder, S.; Javaid, A.Y. Man-in-the-Middle (MITM) Attack Based Hijacking of HTTP Traffic Using Open Source Tools. In Proceedings of the 2018 IEEE International Conference on Electro/Information Technology (EIT), Rochester, MI, USA, 3–5 May 2018. [Google Scholar] [CrossRef]
- Fung, A.P.H.; Cheung, K.W. SSLock: Sustaining the trust on entities brought by SSL. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security—ASIACCS ’10, Beijing, China, 13–16 April 2010. [Google Scholar] [CrossRef]
- Chang, L.; Hsiao, H.C.; Jeng, W.; Kim, T.H.J.; Lin, W.H. Security Implications of Redirection Trail in Popular Websites Worldwide. In Proceedings of the 26th International Conference on World Wide Web, Perth, Australia, 3–7 April 2017. [Google Scholar] [CrossRef]
- Hodges, J.; Jackson, C.; Barth, A. HTTP Strict Transport Security (HSTS). RFC 6797 (Proposed Standard). Available online: https://www.rfc-editor.org/info/rfc6797 (accessed on 22 April 2024).
- Dolnak, I.; Litvik, J. Introduction to HTTP security headers and implementation of HTTP strict transport security (HSTS) header for HTTPS enforcing. In Proceedings of the 2017 15th International Conference on Emerging eLearning Technologies and Applications (ICETA), Stary Smokovec, Slovakia, 26–27 October 2017. [Google Scholar] [CrossRef]
- Poddebniak, D.; Ising, F.; Böck, H.; Schinzel, S. Why TLS is better without STARTTLS: A Security Analysis of STARTTLS in the Email Context. In Proceedings of the 30th USENIX Security Symposium (USENIX Security 21), Virtual Event, 11–13 August 2011. [Google Scholar]
- Bittau, A.; Hamburg, M.; Handley, M.; Boneh, D. The case for ubiquitous transport-level encryption. In Proceedings of the 19th USENIX Security Symposium (USENIX Security 10), Washington, DC, USA, 9 August 2010. [Google Scholar]
- Nikolidakis, S.A.; Giotsas, V.; Georgakakis, E.; Vergados, D.D. Towards Utilizing Tcpcrypt in Mobile Healthcare Applications. In Proceedings of the Wireless Mobile Communication and Healthcare, Paris, France, 21–23 November 2012; Springer: Berlin/Heidelberg, Germany, 2012. [Google Scholar]
- Bhushan, B.; Sahoo, G.; Rai, A.K. Man-in-the-middle attack in wireless and computer networking — A review. In Proceedings of the 2017 3rd International Conference on Advances in Computing, Communication & Automation (ICACCA) (Fall), Dehradun, Indian, 15–16 September 2017. [Google Scholar] [CrossRef]
- Odom, W. Ccna 200-301 Official Cert Guide, 1st ed.; Pearson Education, Inc.: Hoboken, NJ, USA, 2019; Volume 2. [Google Scholar]
- Motero, C.; Higuera, J.R.; Bermejo, J.; Montalvo, J.A.; Gomez, N. On Attacking Kerberos Authentication Protocol in Windows Active Directory Services: A Practical Survey. IEEE Access 2021, 9, 109289–109319. [Google Scholar] [CrossRef]
- Deland-Han. Kerberos Authentication Troubleshooting Guidance—Windows Server. Available online: https://learn.microsoft.com/en-us/troubleshoot/windows-server/windows-security/kerberos-authentication-troubleshooting-guidance (accessed on 22 April 2024).
- SerdarSoysal. Authentication Overview for SharePoint Server—SharePoint Server. Available online: https://learn.microsoft.com/en-us/sharepoint/security-for-sharepoint-server/authentication-overview (accessed on 22 April 2024).
- Han, J.; Kim, S.; Kim, T.; Han, D. Toward Scaling Hardware Security Module for Emerging Cloud Services. In Proceedings of the 4th Workshop on System Software for Trusted Execution, Huntsville, ON, Canada, 27–30 October 2019. [Google Scholar] [CrossRef]
- Hupp, W.; Hasandka, A.; de Carvalho, R.S.; Saleem, D. Module-OT: A Hardware Security Module for Operational Technology. In Proceedings of the 2020 IEEE Texas Power and Energy Conference (TPEC), College Station, TX, USA, 6–7 February 2020. [Google Scholar] [CrossRef]
- Vereecke, A. Koninklijke Militaire School: Amazon-KMS. Available online: https://aws.amazon.com/kms/ (accessed on 22 April 2024).
- NIST. CVE-2020-8897 Detail. Available online: https://nvd.nist.gov/vuln/detail/CVE-2020-8897 (accessed on 22 April 2024).
- Group, T. Post-Quantum Cryptography Solutions. Available online: https://cpl.thalesgroup.com/encryption/post-quantum-crypto-agility (accessed on 22 April 2024).
- Crypto4A. Available online: https://crypto4a.com/news/quantum-safe-secure-manufacturing/ (accessed on 22 April 2024).
- OpenDNSSEC. SoftHSM. Available online: https://www.opendnssec.org/softhsm/ (accessed on 22 April 2024).
- Tomita, C.; Takita, M.; Fukushima, K.; Nakano, Y.; Shiraishi, Y.; Morii, M. Extracting the Secrets of OpenSSL with RAMBleed. Sensors 2022, 22, 3586. [Google Scholar] [CrossRef] [PubMed]
- Walden, J. The Impact of a Major Security Event on an Open Source Project: The Case of OpenSSL. Available online: http://arxiv.org/abs/2005.14242 (accessed on 22 April 2024).
- NPM. “loadtest” Linux Tool. Available online: https://www.npmjs.com/package/loadtest (accessed on 22 April 2024).
Protocol | Security Mechanism/Solution | Peer-to-Peer | Achieves Encryption | SSL-Based | Forces Encryption |
---|---|---|---|---|---|
HTTP | HTTPS | Yes | Yes | Yes | No |
HTTPS/HSTS | No | Yes | Yes | Yes | |
SMTP | STARTTLS | Yes | Yes | Yes | No |
TCP | TCPCrypt | Yes | Yes | No | No |
Kerberos | Kerberos | No | No | No | No |
DHCP | DHCP snooping | No | No | No | No |
Shue et al. [9] | Yes | No | No | No | |
- | Microsoft [25] | Yes | Yes | Yes | Yes |
- | Module-OT [26] | Yes | Yes | No | No |
Specification | Details |
---|---|
Operating System | Ubuntu 22.04 |
Processor | AMD Ryzen 7 |
Memory | 16 GB |
Hard Drive | 1 TB SSD |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Aref, Y.; Ouda, A. HSM4SSL: Leveraging HSMs for Enhanced Intra-Domain Security. Future Internet 2024, 16, 148. https://doi.org/10.3390/fi16050148
Aref Y, Ouda A. HSM4SSL: Leveraging HSMs for Enhanced Intra-Domain Security. Future Internet. 2024; 16(5):148. https://doi.org/10.3390/fi16050148
Chicago/Turabian StyleAref, Yazan, and Abdelkader Ouda. 2024. "HSM4SSL: Leveraging HSMs for Enhanced Intra-Domain Security" Future Internet 16, no. 5: 148. https://doi.org/10.3390/fi16050148
APA StyleAref, Y., & Ouda, A. (2024). HSM4SSL: Leveraging HSMs for Enhanced Intra-Domain Security. Future Internet, 16(5), 148. https://doi.org/10.3390/fi16050148