paper

Preventing TLS Man-in-the-Middle Attacks in Real-time Video Communication Networks

  • Authors:

📜 Abstract

Man-in-the-middle (MITM) attacks pose a serious threat to real-time Voice-over-IP and video networks. Internet routers are frequently misconfigured, violating the assumptions of threat models that underly security protocols like TLS. As a result, these security protocols are often incorrectly implemented in domains like video capture, video mixing, party joining, video censorship, video mixing, and other web-based communication functionality. MITM attacks against routers can result in damage ranging from misconfigured routers to full interception and AES or TLS key leakage. We propose a method for detecting TLS MITM attacks over routers, based on incorporating real-time traffic analysis to detect key leakage or attempts to impersonate AES-GCM traffic, TLS ciphertext, and other video content. We precisely describe a resource-efficient means for configuring systems that detect MITM attempts in production communications environments, discussing lightweight mechanisms to detect attacks in real-time, and techniques to verify and alert on misconfigurations before they can be exploited. Our evaluations are performed on various routers, and we demonstrate our approaches in a variety of popular network configurations.

✨ Summary

This paper presents a novel approach to preventing TLS Man-in-the-Middle (MITM) attacks in real-time video communication networks by detecting vulnerabilities in routers’ configuration and their effect on the assumptions underlying security protocols like TLS. The authors detail several areas where the security implementations can fail, potentially leading to the interception and leakage of AES or TLS keys.

The paper outlines a method for conducting real-time traffic analysis to detect key leakage and attempts to impersonate video traffic encrypted with TLS. The approach is designed to identify and mitigate these vulnerabilities effectively and efficiently by using resource-light mechanisms to verify configurations before exploitation can occur. Evaluation is performed on various routers to demonstrate the effectiveness of the proposed detection strategies.

Although there are no specific citations of further research or industry application directly stemming from this paper, the topic is of growing concern in network security, particularly as real-time video communication becomes increasingly prevalent. Therefore, the insights and techniques proposed here have the potential to influence improvements in secure video communication.

For further reading on related security concerns in video communication, refer to the following literature: