TLS: avoiding dangers A presentation by Dmitry Belyavsky, TCI Business Internet Conference Kiev, Ukraine, December 2013.

Slides:



Advertisements
Similar presentations
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Advertisements

1 Lecture 17: SSL/TLS history, architecture basic handshake session initiation/resumption key computation negotiating cipher suites application: SET.
CS470, A.SelcukSSL/TLS & SET1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Security in Internet: what is it now? A presentation by Dmitry Belyavsky, TCI ENOG 6 / RIPE NCC Regional Meeting Kiev, Ukraine, October 2013.
Cryptography and Network Security
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
1 SSL/TLS 2 Web security Security requirements Secrecy to prevent eavesdroppers to learn sensitive information Entity authentication Message authentication.
COMP043-Cryptology Week 4 – Certs and Sigs. Digital Signatures Digital signatures provide –Integrity –Authenticity and –Non-repudiation How do they work?
More on SSL/TLS. Internet security: TLS TLS is one of the more prominent internet security protocols. TLS is one of the more prominent internet security.
An Introduction to Security Concepts and Public Key Infrastructure (PKI) Mary Thompson.
Cryptography and Network Security Chapter 17
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Encryption An Overview. Fundamental problems Internet traffic goes through many networks and routers Many of those networks are broadcast media Sniffing.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Chapter 8 Web Security.
Secure Sockets Layer (SSL) Fred Schank Kevin Wetter.
CSCI 6962: Server-side Design and Programming
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
How HTTPS Works J. David Giese. Hyper Text Transfer Protocol BrowserHTTP Server GET / HTTP/1.1 HOST: edge-effect.github.io HEADERS BODY HTTP/ OK.
Introduction to Information Security SSL & TLS Story of a protocol Itamar Gilad (infosec15 at modprobe dot net)
SSL/TLS after DigiNotar and BEAST
Introduction to Secure Sockets Layer (SSL) Protocol Based on:
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Logjam: new dangers for secure protocols Dmitry Belyavskiy, TCI ENOG 9, Kazan, June 9-10, 2015.
X.509 Topics PGP S/MIME Kerberos. Directory Authentication Framework X.509 is part of the ISO X.500 directory standard. used by S/MIME, SSL, IPSec, and.
Cryptography Three methods: Symmetric key Asymmetric key Hashing.
Cryptography 1 Three methods: Symmetric key Asymmetric key Hashing.
Can SSL and TOR be intercepted? Secure Socket Layer.
1 SSL/TLS. 2 Web security Security requirements Secrecy to prevent eavesdroppers to learn sensitive information Entity authentication Message authentication.
@Yuan Xue CS 285 Network Security Secure Socket Layer Yuan Xue Fall 2013.
1 Original Message Scrambled Message Public Key receiver Internet Scrambled+Signed Message Original Message Private Key receiver The Process of Sending.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
Web Security CS-431.
SSL/TLS configuration in OpenEdge
Basics of Cryptography
Security Outline Encryption Algorithms Authentication Protocols
Cryptography and Network Security
Public Key Cryptography
Apache Security with SSL Using FreeBSD
Secure Sockets Layer (SSL)
CIPHER SUITE Each name has an algorithm divided into four parts: protocol, key exchange algorithm, encryption algorithm, and checksum. For example, the.
Basic Network Encryption
IBM Certified WAS 8.5 Administrator
Originally by Yu Yang and Lilly Wang Modified by T. A. Yang
CSE 4095 Transport Layer Security TLS, Part II
Using SSL – Secure Socket Layer
کاربرد گواهی الکترونیکی در سیستمهای کاربردی (امضای دیجیتال)
Cryptography and Network Security
Chapter 7 STRENGTH OF ENCRYPTION & Public Key Infrastructure
CS 465 TLS Last Updated: Oct 31, 2017.
TLS 1.3: What has changed Dmitry Belyavskiy Cryptocom.
Cryptography and Network Security
Introduction to Symmetric-key and Public-key Cryptography
Nessus Vulnerability Assessment
Security at the Transport Layer: SSL and TLS
TLS and DLP Behind the green lock.
Encryption INST 346, Section 0201 April 3, 2018.
CS – E-commerce Technologies – Lecture 07
Transport Layer Security (TLS)
SSL/TLS.
Basic Network Encryption
Security at the Transport Layer
Cryptography and Network Security
TLS Encryption and Decryption
Review of Cryptography: Symmetric and Asymmetric Crypto Advanced Network Security Peter Reiher August, 2014.
Presentation transcript:

TLS: avoiding dangers A presentation by Dmitry Belyavsky, TCI Business Internet Conference Kiev, Ukraine, December 2013

TLS: history SSLv2 deprecated by RFC 6176 SSLv3 still widely supported TLS 1.0 in RFC 2246 (1999)TLS 1.1 in RFC 4346 (2006) TLS 1.2 in RFC 5246 (2008)

TLS: general overview

Check the server certificate Many trusted CAs The server certificate signed correctly by any of them? We warn the user Everything seems to be ok! YES NO

DigiNotar case OCSP requests for the fake *.google.com certificate Source: FOX-IT, Interim Report,

PKI: extra trust PKI Independent source Trusted certificate DANE (RFC 6698) Limited browsers support Certificate pinning Mozilla Certificate Patrol, Chrome cache for Google certificates Certificate transparency (RFC 6962) Inspired by Google (Support in Chrome appeared) One of the authors - Ben Laurie (OpenSSL Founder) CA support – Comodo

Use >= 2048 bit keys now Secret key size Elliptic curve cryptography RSA Factorization 576 bit bit bit 2009 Patent Restrictions

RSA key exchange Public key Private key Premaster secret in encrypted on server public key and sent to server So it can be decrypted when the attacker gets the server private key

Perfect Forward Secrecy ALICE BOB = = = = Common Paint Secret Colours Common Secret Public Transport SSL Best Practices

TLS encryption AES 128/192/256 Camellia 128/192/256 3DES, DES, MD2… RC4 No BEAST attack Key recovery attacks Block Ciphers Stream Ciphers BEAST Lucky 13

Recommendations - I Anonymous Diffie-Hellman (ADH) suites do not provide authentication NULL cipher suites provide no encryption Export key exchange suites use authentication that can easily be broken Suites with weak ciphers (typically of 40 and 56 bits) use encryption that can easily be broken X X X X

Recommendations - II SSLProtocol all -SSLv2 -SSLv3 SSLHonorCipherOrder on SSLCipherSuite EECDH+ECDSA+AESGCM EECDH+aRSA+AESGCM EECDH+ECDSA+SHA384 EECDH+ECDSA+SHA256 EECDH+aRSA+SHA384 EECDH+aRSA+SHA256 EECDH+aRSA+RC4 EECDH EDH+aRSA RC4 !aNULL !eNULL !LOW !3DES !MD5 !EXP !PSK !SRP !DSS”

Q&A Questions? Drop ‘em at: