Research cooperation of CRoCS, Faculty of Informatics, Masaryk University and Red Hat.
- Authors: Martin Ukrop, Lydia Kraus, Vashek Matyas and Heider Wahsheh
- Conference: Annual Computer Security Applications Conference (ACSAC) 2019
- Paper details: Page with PDF and supplementary materials
Flawed TLS certificates are not uncommon on the Internet. While they signal a potential issue, in most cases they have benign causes (e.g., misconfiguration or even deliberate deployment). This adds fuzziness to the decision on whether to trust a connection or not. Little is known about perceptions of flawed certificates by IT professionals, even though their decisions impact high numbers of end users. Moreover, it is unclear how much does the content of error messages and documentation influence these perceptions.
To shed light on these issues, we observed 75 attendees of an industrial IT conference investigating, different certificate validation errors. Furthermore, we focused on the influence of re-worded error messages and redesigned documentation. We find that people working in IT have very nuanced opinions regarding the tested certificate flaws with trust decisions being far from binary. The self-signed and the name constrained certificates seem to be over-trusted (the latter also being poorly understood). We show that even small changes in existing error messages and documentation can positively influence resource use, comprehension, and trust assessment. Our conclusions can be directly used in practice by adopting the re-worded error messages and documentation.
Will You Trust This TLS Certificate? Perceptions of People Working in IT. Martin Ukrop, Lydia Kraus, Vashek Matyas and Heider Wahsheh, 35rd Annual Computer Security Applications Conference (ACSAC 2019), ACM, 2019.