© GlobalSign. A GMO Internet Inc group company. Authentication. Security. Trust. A tutorial on how you can host multiple SSL Certificates on a single IP.

Slides:



Advertisements
Similar presentations
3.02H Publishing a Website 3.02 Develop webpages..
Advertisements

Enabling Secure Internet Access with ISA Server
Network Security.
ARP Cache Poisoning How the outdated Address Resolution Protocol can be easily abused to carry out a Man In The Middle attack across an entire network.
Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Lesson 4: Web Browsing.
HTTPS Hypertext Transfer Protocol Secure Marcela López Hurtado.
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
By: Hassan Waqar.  A PROTOCOL for securely transmitting data via the internet.  NETWORK LAYER application.  Developed by NETSCAPE.
Secure Sockets Layer eXtended (SSLX) Next Generation Internet Security Overview Presentation April 2011.
DNS and HTTPs ACN Presentation. Domain Names We refer to computers on the Internet (Internet hosts), by names like: sharda.ac.in These are called domain.
Lesson 4: Web Browsing.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Introduction to the Secure SMTP Server service. Secure SMTP server is a secure, reliable SMTP mail relay server for your outgoing mail. Secure SMTP service.
SSL (Secure Socket Layer) and Secure Web Pages Rob Sodders, University of Florida CIS4930 “Advanced Web Design” Spring 2004
TLS/SSL Review. Transport Layer Security A 30-second history Secure Sockets Layer was developed by Netscape in 1994 as a protocol which permitted persistent.
APACHE SERVER By Innovationframes.com »
Mohammed Saiyeedur Rahman.  E-commerce is buying and selling goods over the internet. This could include selling/buying mobile phones, clothes or DVD’s.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Managing Client Access
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
Course 201 – Administration, Content Inspection and SSL VPN
Test Review. What is the main advantage to using shadow copies?
Guide to Operating System Security Chapter 9 Web, Remote Access, and VPN Security.
Internet Business Foundations © 2004 ProsoftTraining All rights reserved.
Chapter 7: Using Windows Servers to Share Information.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Digital Certificates Made Easy Sam Lutgring Director of Informational Technology Services Calhoun Intermediate School District.
© GlobalSign. A GMO Internet Inc group company. Authentication. Security. Trust. Code Signing Distributing trustworthy software over the Internet.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
Grid Chemistry System Architecture Overview Akylbek Zhumabayev.
Data Encryption using SSL Topic 5, Chapter 15 Network Programming Kansas State University at Salina.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
OCSP
Saphe surfing! 1 SAPHE Secure Anti-Phishing Environment Presented by Uri Sternfeld.
Measures to prevent MITM attack and their effectiveness CSCI 5931 Web Security Submitted By Pradeep Rath Date : 23 rd March 2004.
Web Browsing *TAKE NOTES*. Millions of people browse the Web every day for research, shopping, job duties and entertainment. Installing a web browser.
Encryption protocols Monil Adhikari. What is SSL / TLS? Transport Layer Security protocol, ver 1.0 De facto standard for Internet security “The primary.
 authenticated transmission  secure tunnel over insecure public channel  host to host transmission is typical  service independent WHAT IS NEEDED?
Novell iFolder Novell Academy QuickTrain. What is iFolder? Novell iFolder lets users’ files follow them anywhere A simple and secure way to access, organize.
Visibook is instant, simple, and dynamic appointment booking We're headquartered in San Francisco, California "Visibook is awesome. My entire studio was.
Chapter 7: Using Windows Servers
BUILD SECURE PRODUCTS AND SERVICES
    Customer Profile: If you have tech savvy customers, having your site secured for mobile users is recommended. Business Needs: With the growing number.
Data Virtualization Tutorial… SSL with CIS Web Data Sources
3.02H Publishing a Website 3.02 Develop webpages..
Virtual Private Network (VPN)
Apache web server Quick overview.
CONNECTING TO THE INTERNET
Lesson 4: Web Browsing.
Warm Handshake with Websites, Servers and Web Servers:
Practical Censorship Evasion Leveraging Content Delivery Networks
Client Client 4) Hello , please give me the website
What’s New in Fireware v12.1.1
X-Road as a Platform to Exchange MyData
A Programmer’s Guide to Secure Connections
4.02 Develop web pages using various layouts and technologies.
Lesson 4: Web Browsing.
Cengage Learning: Computer Networking from LANs to WANs
Unit 8 Network Security.
System Center Configuration Manager Cloud Services – Cloud Distribution Point Presented By: Ginu Tausif.
Q/ Compare between HTTP & HTTPS? HTTP HTTPS
Presentation transcript:

© GlobalSign. A GMO Internet Inc group company. Authentication. Security. Trust. A tutorial on how you can host multiple SSL Certificates on a single IP address without losing any backward compatibility Paul van Brouwershaven Business Development Director EMEA, on Twitter

Authentication. Security. Trust. Paul van Brouwershaven

Authentication. Security. Trust. Netherlands

Authentication. Security. Trust. Business Development Director  Business Development Director for GlobalSign  Previously CTO of a European hosting company  Over 10 years of experience in the hosting industry  Expert in digital certificate solutions  Dedicated to increasing awareness of the requirements for online security  Thinking out of the box, detecting problems and providing solutions

Authentication. Security. Trust. Multiple SSL Certificates on a single IP address

Authentication. Security. Trust. More demands and requirements for SSL Article 17 of Directive 95/46/EC of the European Parliament Security of processing Member States shall provide that the controller must implement appropriate technical and organizational measures to protect personal data against accidental or unlawful destruction or accidental loss, alteration, unauthorized disclosure or access, in particular where the processing involves the transmission of data over a network, and against all other unlawful forms of processing. Having regard to the state of the art and the cost of their implementation, such measures shall ensure a level of security appropriate to the risks represented by the processing and the nature of the data to be protected.

Authentication. Security. Trust. Each SSL Certificate needs its own IP

Authentication. Security. Trust. Why do I need a dedicated IP address?

Authentication. Security. Trust. Request on a non-secure connection Client HTTP Request: Can you please send me /contact.html on Server HTTP Reply: Here is the content you requested.

Authentication. Security. Trust. Host:

Authentication. Security. Trust. Request on a secure connection Client (TLS Handshake) Hello, I support XYZ Encryption. Server (TLS Handshake) Hi there, here is my public certificate, let’s use this encryption algorithm. Client (TLS Handshake) Sounds good to me. Client (Encrypted) HTTP Request: Can you please send me /contact.html on Server (Encrypted) HTTP Reply: Here is the content you requested.

Authentication. Security. Trust. Server Name Indication (SNI) Client (TLS Handshake) Hello, I support XYZ Encryption, and I am trying to connect to ’ Server (TLS Handshake) Hi there, here is my public Certificate for and let’s use this encryption algorithm. Client (TLS Handshake) Sounds good to me. Client (Encrypted) HTTP Request: Can you please send me /contact.html on Server (Encrypted) HTTP Reply: Here is the content you requested.

Authentication. Security. Trust. Request on a secure connection :

Authentication. Security. Trust. Testing SNI with OpenSSL

Authentication. Security. Trust. The SSL/TLS handshake

Authentication. Security. Trust.  All versions of Internet Explorer on Windows XP  Android 2.x [Gingerbread] default browser (other browsers like Opera do support SNI on Android)  BlackBerry Browser  Windows Mobile up to 6.5 Applications with no SNI Support

Authentication. Security. Trust. Windows XP with SNI

Authentication. Security. Trust. Operating System Usage - Win XP – per continent

Authentication. Security. Trust. Worldwide Operating System Usage - Win XP: 21%

Authentication. Security. Trust. Internet Explorer market share – Per continent

Authentication. Security. Trust. Worldwide Internet Explorer market share – 25%

Authentication. Security. Trust. 25% of 21% = 5.3% Internet Explorer Windows XP + mobile traffic = Or 8% of your world wide visitors? 8% of World Wide internet users do not support Server Name Indication (SNI)

Authentication. Security. Trust.  There is no problem when you need to secure a website or portal that is used by a closed community or business that has no Windows XP users.  Provide SNI support for free with an SSL Certificate − Users can decide to provide an unsecure connection and a warning to visitors with an outdated system.  Calculate an additional fee for users that want to have full compatibility and thus a dedicated IP number Should I use/offer SNI for SSL sites?

Authentication. Security. Trust. Should I use/offer SNI for SSL sites?

Authentication. Security. Trust. What are the alternative solutions?

Authentication. Security. Trust.  One SSL Certificate for multiple domain names from different organisations.  The certificate contains the hosting company’s details.  Domain control is verified for each domain. A multi-domain SSL Certificate

Authentication. Security. Trust. Multi-domain certificates

Authentication. Security. Trust.  A multi-domain certificate usually runs on shared hosting server or reversed proxy DN  Domain control is validated for each SAN  SSL Certificate accessible by server or network administrator with root permissions  Information of the company that is responsible for the private key is listed in the certificate contents. Control of the Private Key

Authentication. Security. Trust.  Test results based on number of SANs and characters  Note: Average number of characters in a domain – 13/14* *Source: Nominet  Certificate size limit is browser dependent Certificate Size

Authentication. Security. Trust. Certificate Growth

Authentication. Security. Trust.  Google Chrome, Mozilla Firefox & Opera have a limit of 174K. Maximum Certificate Size

Authentication. Security. Trust.  Internet Explorer on Windows XP SP3 till Windows 7 has a certificate size limit of 44k.  Windows XP without any service packs is limited to 22k.  An average OCSP stapling response is about 1k  Other TLS overhead is about 0.5k Maximum Certificate Size

Authentication. Security. Trust. Performance of multi-domain certificates  750 names: 716 ms  450 names: 518 ms  1 name: 198 ms

Authentication. Security. Trust. Every 100ms delay costs 1% of sales

Authentication. Security. Trust.  No support for OV, EV  One certificate shared by many websites  Many hostnames are visible in the certificate  Visitor needs to download a bigger certificate (slower) The disadvantages of multi-domain certs

Authentication. Security. Trust. What if we could use the best of both solutions? 92% SNI / 8% CloudSSL

Authentication. Security. Trust. SNI combined with CloudSSL User requests website Secure website delivered

Authentication. Security. Trust. With SNI support

Authentication. Security. Trust. Windows XP (has no SNI support)

Authentication. Security. Trust. How Google Implemented this

Authentication. Security. Trust.  No additional costs  Sites can use all types of certificates (including EV)  One SSL Certificate installed via the regular way, a second SSL Certificate (one per IP) can be updated automatically. Two SSL Certificates for one site!

Authentication. Security. Trust. Environment and Platform independent

Authentication. Security. Trust. How does it work?

Authentication. Security. Trust. Lets create a few sites in DirectAdmin

Authentication. Security. Trust. Completely Automated Process

Authentication. Security. Trust. Automated domain control validation

Authentication. Security. Trust. User Agent Redirect

Authentication. Security. Trust. Same site, Different content

Authentication. Security. Trust. Using meta-tag authentication

Authentication. Security. Trust. Using meta-tag authentication

Authentication. Security. Trust. Thank you Paul van