200 likes | 223 Views
Explore the global trends in SSL/TLS encryption, best practices for implementation, and upcoming advancements in the field. Gain insights into the growth of encryption, emerging standards, and the three pillars of effective SSL/TLS encryption. Learn about the importance of key and certificate management, hardware security modules, and encryption optimization. Discover the latest developments in TLS 1.3 and HTTP/2.
E N D
SSL/TLS Trends, Practices, and Futures Brian A. McHenry, Security Solutions Architect bam@f5.com @bamchenry
Agenda • Global SSL Encryption Trends and Drivers • A Few “Best” Practices • Solutions • What’s Next?
Gartner Says Worldwide Information Security Spending Will Grow Almost 8 Percent in 2014 • Worldwide spending on information security will reach $71.1 billion in 2014 • Data loss prevention segment recording the fastest growth at 18.9 percent, • By 2015, roughly 10% of overall IT security enterprise product capabilities will be delivered in the cloud • Regulatory pressure will increase in Western Europe and Asia/Pacific from 2014
Trajectory and Growth of Encryption SSL growing ~30% annually. Entering the Fifth wave of transition (IoE) E-Commerce Privacy Mobility IoE Snowden Market AMPLIFIERS • Customer Trends: • PFS/ECC Demanded • SSL Labs Application Scoring • Emerging Standards: • TLS 1.3, HTTP 2.0/SPDY • RSA -> ECC • Thought Leaders and Influence: • Google: SHA2, SPDY, Search Ranking by Encryption • Microsoft: PFS Mandated Millions of Certificates (CA) Source: Netcraft Years
Timeline of SSL Vulnerabilities & Attacks Heartbleed The end of the Internet as we know it! TIME A refinement and variation of CRIME BEAST & CRIME Client-side or MITB attacks leveraging a chosen-plaintext flaw in TLS 1.0 and TLS compression flaws Lucky 13 Another timing attack. August 2009 Insecure renegotiation vulnerability exposes all SSL stacks to DoS attack RFC 5746 TLS extension for secure renegotiation quickly mainstreamed RC4 Attacks Weakness in CBC cipher making plaintext guessing possible TLS August 2009 September 2011 February 2010 … February 2013 March 2013 March 2013 April 2014
The Three Pillars of Effective SSL/TLS Encryption • SSL Intelligence and Visibility (Full Proxy) • Enterprise key & Certificate Management • Hardware Security Modules • Fully Automated Key and Certificate Management: • For all BIG-IP platforms • For all vendor platforms • 3rd Party Integration for best-in-class key encryption: Venafi, Symantec/ VeriSign • PKI Supported Environments • Flexible & Scalable Encryption: • Optimized SSL in Hardware and Software • Cipher Diversity (RSA, ECC, DSA) • SSL Visibility: Proxy SSL & Forward Proxy • SSL Traffic Intelligence: • HSTS, HTTP 2.0/SPDY, OCSP Stapling, TLS Server Session Ticket • Advance HSM Support: • High Performing HSM options • Virtualized low-bandwidth options • Market Leading HSM Vendor Support
If You Thought Encryption was confusing…ECC, PFS and Curves Not all curves are considered equal Different Authorities: • US NIST (US National Institute of Standards) with 186-2 (recently superseded in 2009 by the new186-3) • US ANSI (American National Standard Institute) with X9.62 • US NSA (National Security Agency) Suite-B Cryptography for TOP SECRET information exchange • International SACG (Standards for efficient cryptography group) with Recommended Elliptic Curve Domain Parameters • German ECC BrainpoolwithECC Brainpool with their Strict Security Requirements • ECC Interoperability Forum composed by Certicom, Microsoft, Redhat, Sun, NSA
If You Thought Encryption was confusing…ECC, PFS and Curves Not all curves are considered equal Different Names: • Secp246r1, Prime256v1, NIST P-256 Different Kinds of Curves: • ECC over Prime Field (Elliptic Curve) • ECC over Binary Field (Koblitz Curve) Other Curves: • Curve25519 (Google) • Mumford (Microsoft) • Brainpool
SSL: Not Just for Security • Google has begun adjusting page rank based on SSL implementations • F5 customers have third-party/B2B requirements for strong encryption • SSL Labs’ Pulse tool has made testing easy • Users and businesses are choosing services based on Pulse grades
Achieving A+ Grades on SSLLabs.com • Require Secure Renegotiation • Disable SSLv2 and SSLv3 Use an explicit, strong cipher string, such as: • !SSLv3:!TLSv1:!EXPORT:!DH:!MD5:!RC4:RSA+AES:RSA+3DES:ECDHE+AES:ECDHE+3DES:ECDHE+RSA:@STRENGTH • Prefer Perfect Forward Secrecy (PFS) • Done via prioritizing Ephemeral (DHE, ECDHE) ciphers in the string above • Enable HTTP Strict Transport Security (HSTS) • RFC 6797
HSTS is enabled by the “Strict-Transport-Security” HTTP header e.g.: Strict-Transport-Security: max-age=10886400; includeSubDomains; preload When received, browsers will: Automatically convert HTTP references to HTTPS references Disallow certificate exemptions (self-signed, etc.) Cache HSTS information and reuse stored values for new sessions More detail: HTTP Strict Transport Security Available in 12.0
TLS 1.3 and HTTP/2 Update HTTP/2 ratified this month. • RFC due soon • ALPN integrates application protocol negotiation into the TLS handshake • TLS encrypted by default TLS 1.3 RFC expected in April 2016 • Remove renegotiation • AEAD ciphers only
A Quick Primer on Certificate Revocation If a SSL certificate is stolen or compromised, sites need a way to revoke the certificate so it will no longer be trusted. Revocation is handled by either CRL or OCSP. CRL: Certificate Revocation List The browser retrieves the list of all revoked certificates from the CA. The browser then parses the whole list looking for the certificate in question. OCSP: Online Certificate Status Protocol The browser sends the certificate to the CA for validation. The CA responds that the certificate is good, revoked, or unknown. OCSP is more efficient than CRL, but there’s room for improvement! New Feature: OCSP Stapling
OCSP and CRL checks add significant overhead: DNS (1334ms) TCP handshake (240ms) SSL handshake (376ms) Follow certificate chain (1011ms) DNS to CA (300ms) TCP to CA (407ms) OCSP to CA #1 (598ms) TCP to CA #2 (317ms) OCSP to CA #2 (444ms) Finish SSL handshake (1270ms) <TOTAL: 6.3 Seconds> Add up the time for each step and you'll see that over 30% of the SSL overhead comes from checking whether the certificate has been revoked. These checks are serial and block downloads. OCSP & CRL Checks Hurt Performance This portion is revocation check overhead.
OCSP Stapling allows the server to attach CA signed information regarding the certificates validity. Processing with OCSP enabled: DNS (1334ms) TCP handshake (240ms) SSL handshake (376ms) Follow certificate chain (1011ms) Process OCSP Data (10ms) Finish SSL handshake (1270ms) <TOTAL: 4.2 Seconds> OCSP Stapling also eliminates communication with a third party during certificate validation. This may be considered better security since it prevents information leakage. OCSP Stapling to the Rescue