Encryption-The Dark Side:

Size: px
Start display at page:

Download "Encryption-The Dark Side:"

Transcription

1 Encryption-The Dark Side: Things to Worry About for 2014 September 30, 2014 Start Time: 9am US Pacific /12 noon US Eastern/ 5pm London Time 1

2 Welcome Conference Moderator Mathieu Gorge CEO and Founder VigiTrust September 30, 2014 Start Time: 9am US Pacific 12pm US Eastern/5pm London Time 3

3 AGENDA: Speaker Introduction Paul Williams Chief Technology Officer, White Badger Group Jason Sabin VP of Research & Development, DigiCert Kenny Paterson EPSRC Leadership Fellow & Professor of Information Security at Royal Holloway, University of London Open Panel with Audience Q&A Closing Remarks 4

4 Why Take Encryption Head On, When You Can Bypass It? Paul Williams Chief Technology Officer White Badger Group September 30,

5 Why Take Encryption Head On, When You Can Bypass It? o Endpoint Attacks Bypass Encryption o Application Attacks Don t Play Fair o Weak / Shared / Duplicative Passwords o Password Capture Defeats Encryption o Improperly Protected Backup & Recovery Keys o Vulnerable PKI Architecture o Attacking & Defeating Encryption Head On o Risk Management 101: Do Gains Exceed Total Cost of Deployment and Maintenance? 6

6 Endpoint Attacks Bypass Encryption 2. Administrator connects to network as per usual Encrypted VPN tunnel 1. Hacker targets network administrator protected with whole disk encryption, encrypted VPN, and more 3. Hacker negates use of multiple defense technologies, including encryption. 3

7 Application Attacks Don t Play Fair Application level attack intercepts sensitive data before SSL encryption Microsoft Windows Unix/Linux/BSD Win32 App Win32 Subsystem OS/2 App OS/2 Subsystem Posix App Posix Subsystem Linux App Win32 App Wine or Win4Lin Mac App Basilisk Games MAME Ntdll.dll Libc.so Executive Services Interface System call interface IO Mgr. File Sys. Security Ref. Monitor Device Drivers IPC Mgr. Object Manager Virtual Memory Mgr. Micro Kernel Process Mgr. Hardware Abstraction Layer GDI Window Mgr. Window Mgr. Graphics Device Drivers Scheduler Process Manager Virtual Memory Manager Memory Allocator VFS Interface Character Devices File Systems Block Devices Socket Manager Network Protocols Network Drivers Hardware Hardware 8

8 Weak / Shared / Duplicative Passwords June 2011: An app developer estimated that 15% of all iphone smartphones used one of these passcodes. 9

9 Password Capture Defeats Encryption 10

10 Improperly Protected Backup & Recovery Keys o Serious Insider Threat Risk from Rogue Network Administrators o Insecure Storage Allows Catastrophic Silent Data Compromise 11

11 Vulnerable PKI Architecture o Insider Threats o Internal Network Attacks o Computer Malware o Physical Facilities Break-ins 12

12 Attacking & Defeating Encryption Head On Weak Key Generation: Pseudo-random algorithm flaws Application level attacks Computer malware Weak Encryption Ciphers Hash Collision Attacks Man-In-The Middle Attacks on Key Exchanges Encryption Hardware & Software Implementation Flaws Brute Force Key Factoring 13

13 Risk Management 101: Do Gains Exceed Total Cost of Deployment and Maintenance? 2. The cost of deploying encryption may quickly outweigh any gain 3. In large scale enterprise IT networks, far higher returns on investment can typically be obtained with investments elsewhere 1. The Law of Diminishing Returns strongly affects the selection and deployment of encryption technology 14

14 Contact Info Paul Williams Chief Technology Officer White Badger Group LLC Direct: (281) Main: (888) ext Web: 15

15 Thank you! Paul Williams 16

16 Question and Answer Paul Williams Chief Technology Officer White Badger Group #ISSAWebConf 17

17 SSL & How to make sure it s good Jason Sabin VP of Research & Development DigiCert [email protected]

18 SSL: High Level View 51% of enterprises do not know all of the keys and certs on their network* 26% of websites support weak or insecure cipher suites** Still seeing 1024-bit key sizes or lower Only ~15% of SSL certificates on the web use SHA-2** Heartbleed in hardware and statically compiled applications Certificate Transparency * Based on research by Ponemon Institute ** Based on research by Trustworthy Internet Movement

19 Is your network secure? What is the one thing that most exploits have in common? They exploit improper SSL Implementation Encryption and SSL do work, but they must be implemented correctly

20 Improper SSL Implementation Heartbleed Goto Fail BEAST, CRIME, BREACH, etc Weak cipher suites Weak algorithms Weak private keys

21 <SSL Labs screenshot>

22

23

24 SHA-1 Transition Microsoft SHA-1 Deprecation Timeline January 1, 2016 Microsoft will end trust for SHA-1 Code Signing Certificates January 1, 2017 Microsoft will end trust for SHA-1 SSL Certificates Mozilla SHA-1 Deprecation Timeline Firefox early 2015 release SHA-1 certs expiring Jan 1, 2017 or later receive a security warning Firefox 2016 release Untrusted Connection error when a newly issued SHA-1 certificate is encountered Firefox 2017 release Untrusted Connection error whenever a SHA-1 certificate is encountered.

25 SHA-1 Transition Google SHA-1 Deprecation Timeline Chrome 37 current version Chrome 38 beta in progress Chrome 39 beta launch Sep 26, 2014 SHA-1 certs expiring Jan 1, 2017 or later receive yellow triangle warning Chrome 40 beta launch Nov 7, 2014 SHA-1 certs expiring between June 1, 2016-December 31, 2016 receive yellow triangle warning SHA-1 certs expiring after Jan 1, 2017 receive neutral warning (shows https in grey instead of green) Chrome 41 beta launch Q SHA-1 certs expiring Jan 1, > Dec 31, 2016 receive yellow triangle warning SHA-1 certs expiring Jan 1, 2017 or later receive red strike-through warning

26 DigiCert SHA-1Sunset Tool

27 Heartbleed still? Where is Heartbleed now? Statically compiled applications Hardware devices Mobile/Table devices Internal servers and infrastructure Companies response Tech giants started funding OpenSSL and other critical open source projects. Shellshock and BASH?

28 Always On SSL Refocused with HTTPS Everywhere Google SEO ranking Marketing cares and concerns Relative links vs absolute links

29 Whynopadlock screenshot

30 SSL best practices Always-On SSL Secure Cookies HSTS (Http Strict Transport Security) Disable Weak Cipher Suites Secure Renegotiation Disable TLS Compression Perfect Forward Secrecy Read Bulletproof SSL And TLS by Ivan Ristic

31 Future Concerns Internet of Things Internet of Everything billion devices by 2020

32 Thanks SSL Analysis Tools Jason Sabin Vice President of Research & Development

33 Thank you! Jason Sabin 34

34 Question and Answer Jason Sabin VP of Research and Development DigiCert #ISSAWebConf 35

35 The Dark Side of SSL/TLS Kenny Paterson Information Security Group Royal Holloway University of London

36 Agenda I plan to talk about some recent developments for SSL/TLS and extract some learning points as we go along. SSL/TLS Heartbleed Wrap-up 37

37 About The Speaker 38

38 About The Speaker Academic But spent 5 years in industrial research lab, Still involved in IPR, consulting, industry liaison. RHUL since 2001 You are teaching Network Security. Leading to research into how crypto is used in Network Security. EPSRC Leadership Fellow, Cryptography: Bridging Theory and Practice e.g. attacks on IPsec (2006, 2007,2010), SSH (2009), SSL/TLS (2011, 2013, 2013), WPA (2014), EMV (2012), MPPE (2014), 39

39 SSL/TLS Probably the world s most widely deployed cryptographic protocol. Almost ubiquitous, not just secure e-commerce. Increasing focus for analysis from research community. 40

40 Highly Simplified View of TLS Used by client and server to 1.Negotiate ciphersuite 2.Authenticate 3.Establish keys used in the Record Protocol Client Handshake Protocol Server Record Protocol Provides confidentiality and authenticity of application layer data using keys from Handshake Protocol 41 41

41 The TLS Ecosystem (1/3) Servers Clients Including managed service providers (CloudFlare, Akamai) Of all shapes and sizes Certification service providers Of all shapes, sizes and levels of security Software vendors From Google down to one-man open-source operations OpenSSL somewhere in-between Hardware vendors 42 42

42 The TLS Ecosystem (2/3) TLS versions: SSL 3.0, TLS 1.0, TLS 1.1, TLS 1.2 Many servers even still support SSL ciphersuites Some highly esoteric, e.g. TLS_KRB5_WITH_3DES_EDE_CBC_MD5 TLS extensions Too numerous to mention. DTLS 43

43 The TLS Ecosystem (3/3) IETF TLS Working Group Also IETF UTA Working Group (UTA = Using TLS in Applications) Growing community of researchers Blackhat or Crypto? Attacks or security proofs? Handshake Protocol, Record Protocol or both? Full protocol including session resumption, renegotiation, ciphersuite negotiation? Provable security or formal methods or something else? Game-based, UC or constructive cryptography? The TLS ecosystem has become very complex and vibrant

44 TLS Has Been in the News BEAST (2011) CRIME (2012) Lucky 13 and RC4 attacks (both 2013). Renegotiation attack (2009), triple Handshake attack (2014). Poor quality of implementations (particularly in certificate handling). Apple goto fail (2013) GnuTLS certificate processing bug (2013) OpenSSL CCS bug (2014) Frankencerts (2014) 45

45 Focus: Lucky 13 Key dates: We started work in December Key breakthrough in March 2012 (+4 months) Research paper completed November 2012 (+11 months). Attack disclosed in February 2013 (+15 months). Research paper presented in May 2013 (+18 months)

46 Focus: Lucky 13 Full plaintext recovery attack on CBC-mode encryption. Exploiting a timing side-channel introduced because of implementation advice in TLS specification. Hard to mount attack in practice semi-practical/semi-theoretical

47 Focus: Lucky 13 How do you disclose an attack on a protocol that has dozens of different implementations and millions of users? Coordination amongst all stakeholders. Risk of leakage and panic before agreed time. We opened up multiple channels of communication. Initially IETF OpenSSL, Mozilla, Cisco, Apple, Microsoft, Google, Oracle, Opera, BouncyCastle, F5, and numerous open source projects. NOT end users. Hundreds of s, December 2012 to February We helped a number of vendors with patch testing. Also building a website, preparing a press release, priming journalists and bloggers

48 Focus: Lucky 13 D-Day: February 4 th 2013 One week after expected paper notification. Significant media exposure. Viral spread of the story across Internet over a 72 hour period. Ars Technica, TheRegister, Slashdot, Wired, Most major vendors issued patches within a few days. Eventual presentation at academic conference in May 2013 was a damp squib by comparison! To read more:

49 The Changing Face of TLS 42.6% of Alexa top 200k servers now support TLS 1.2. Up from 17% one year ago and 5% two years ago. (source: ssl pulse, Sept. 2014) TLS 1.2 support in browsers: Chrome: since release 30. Firefox: since release 28. IE: since IE11. Safari: since ios5 and OS X (source: wikipedia, Nov. 2013) 50 50

50 The Changing Face of TLS Snapshot from ICSI Certificate Notary Project: 15.3% 1.6% 51

51 A Newsworthy Protocol TLS has really been in the news... the Heartbleed bug. What is it about Heartbleed that caught the wider media s imagination? Pressure built and the dam finally broke? Severity of the threat (leakage of private information, inc. server private keys)? Widespread use of OpenSSL. A good logo? 52

52 Heartbleed Heartbleed was not a crypto problem, per se. It was software bug that happens to affect one implementation of a cryptographic protocol. Classic problem of (un)safe handling of untrusted user input. Heartbeat = Secure ping for SSL/TLS Response to ping read beyond boundary of buffer assigned to incoming message. A memory leak. 53

53 Impact Only vulnerable if using a recent version of OpenSSL and if Heartbeat feature enabled. OpenSSL versions and 1.0.1a 1.0.1f affected, bug fixed in version 1.o.1g. Heartbeat enabled by default. Window of exposure: 14/3/2012 7/4/2014. Still, the Internet melted 54

54 Web Server Stats 55

55 Heartbleed Impact More than 80% of the Alexa top 1 million websites run on Apache or Nginx Both of these rely on OpenSSL for provision of SSL/TLS/HTTPS. About 45% of the top 1 million sites do run HTTPS. It was initially unclear how much and what types of sensitive data could be extracted from vulnerable servers. Usernames and passwords? SSL private keys? 56

56 CloudFlare Challenge Cloudflare host websites and manage certs for their 100k+ customers. They set a challenge 57

57 58

58 Consequently Cloudflare revoked all its certificates (134,000 of them). From SANS Internet Storm Center: 59

59 Impact Cloudflare is just one web hosting company (there are many others). They are clearly well-organised and responsive, and put a lot of information in the public domain. Others less so? 60

60 It Wasn t Just Webservers servers also vulnerable. Amazon Web Services had a major headache updating. Network appliance products from Cisco, Juniper also affected. Tor nodes. Heartbleed can also be applied to clients rather than servers. Including millions of smartphones running Android (which uses OpenSSL 1.0.1e). Netgear NAS devices. Two-factor authentication systems. OpenVPN. 61

61 It Wasn t Just Private Keys Mumsnet: a large UK online forum for parents. 1.5 million users. Patched within 48 hours of the OpenSSL vulnerability announcment. But 30+ accounts were hacked, including that of one of the site s founders... 62

62 How Many Sites Were Vulnerable? Data from Generated using IPv4 address space scans with zmap tool. On 16/4/2014, 5.2% of Alexa top 1 million sites were still vulnerable, 32% supported secure Heartbeat, 63% did not support Heartbeat. None of top 1000 sites vulnerable by 16/4/

63 Was Heartbleed Being Actively Exploited? Robin Seggelmann at OpenSSL has denied deliberate insertion of a backdoor. Bloomberg claimed NSA knew for at least two years about Heartbleed according to two people familiar with the matter. US government issued a denial. One would expect a large team at NSA to be searching for such vulnerabilities. Question is what do they then do with them use them in attacks or notify vendors? Ongoing debate in US about duty of NSA in such cases. 64

64 Heartbleed Disclosure First discovered (21/03) by Neel Mehta at Google. Rediscovered by Codenomicon and disclosed to Finnish NCSC (02/04). OpenSSL informed by Google (01/04) and Finnish NCSC (07/04). Cloudflare (31/03) and Akamai (04/04) patch their servers. 06/04: Redhat (on behalf of OpenSSL) notify (some) other Linux who requested details got them in time. 07/04 (or earlier): Facebook patch their servers. 65

65 Heartbleed Disclosure 07/04, 10:27: OpenSSL release v1.0.1g with Heartbleed patch and security advisory on website. 07/04, 10:49: OpenSSL advisory. 07/04, 11:00: CloudFlare blog entry goes live. 07/04, 12:23: CloudFlare tweet. 07/04, 12:37: Neel Mehta tweet. 07/04, 13:13: Codenomicon tweet with link to their heartbleed.com website. 66

66 Heartbleed Disclosure The disclosure process was particularly messy. This is not uncommon. Personal experience with Lucky 13: Tell one of the big boys and they will want to tell their friends. There are informal communication channels and formal information sharing agreements outside of CERT/CC and other official processes. Hard to contain leakage when many vendors are affected. Double discovery of Heartbleed complicated matters. 67

67 What next for OpenSSL? LibreSSL fork. Heartbleed was the straw that broke the camel s back for OpenBSD. Core Infrastructure Initiative: Will identify and fund critical open source projects that are in need of assistance. Founding backers of the initiative include Amazon Web Services, Cisco, Dell, Facebook, Fujitsu, Google, IBM, Intel, Microsoft, NetApp, Rackspace, VMware and The Linux Foundation. 68

68 Current Current Developments Developments in TLS Fresh algorithms are under active consideration in IETF TLS WG. Important for environments where AES is not available in hardware. Momentum behind ChaCha20 stream cipher plus Poly1305 MAC. Reform of TLS s encryption process to make CBCmode easier to implement securely. Recently published RFC Deployment via TLS extension, unclear how widely adopted it will become. 69

69 Current Developments in TLS TLS 1.3 now under active development in TLS WG Reducing latency in Handshake. Simplification of key exchange and authentication methods in Handshake. Reform of symmetric crypto algorithms. Development process is somewhat ad hoc. Active review of drafts needed by users and cryptographers

70 Current Closing Developments Remarks There is little diversity in the code-base of the web. Apache and Nginx, both reliant on OoenSSL. Critical vulnerabilities in that code-base will have major impacts. Shellshock only the latest example, there will be more. Disclosure and patching at these scales is messy. Many affected vendors. Different parties at different points in the foodchain. Informal information exchanges. Cryptography does not stand still. Attacks only get better over time. Large deployed base means TLS practices are slow to change. 71

71 Thank you! Kenny Paterson 72

72 Question and Answer Kenny Paterson Information Security Group Royal Holloway, University of London #ISSAWebConf 73

73 Open Panel with Audience Q&A Paul Williams Chief Technology Officer, White Badger Group Jason Sabin VP of Research & Development, DigiCert Kenny Paterson Information Security Group Royal Holloway, University of London #ISSAWebConf 74

74 Closing Remarks Generously supported by: Thank you Citrix for donating the Webcast service #ISSAWebConf 75

75 CPE Credit Within 24 hours of the conclusion of this webcast, you will receive a link via to a post Web Conference quiz. After the successful completion of the quiz you will be given an opportunity to PRINT a certificate of attendance to use for the submission of CPE credits. On-Demand Viewers Quiz Link information: Sept Encryption-The-Dark-Side #ISSAWebConf 76

Is Your SSL Website and Mobile App Really Secure?

Is Your SSL Website and Mobile App Really Secure? Is Your SSL Website and Mobile App Really Secure? Agenda What is SSL / TLS SSL Vulnerabilities PC/Server Mobile Advice to the Public Hong Kong Computer Emergency Response Team Coordination Centre 香 港 電

More information

SSL BEST PRACTICES OVERVIEW

SSL BEST PRACTICES OVERVIEW SSL BEST PRACTICES OVERVIEW THESE PROBLEMS ARE PERVASIVE 77.9% 5.2% 19.2% 42.3% 77.9% of sites are HTTP 5.2% have an incomplete chain 19.2% support weak/insecure cipher suites 42.3% support SSL 3.0 83.1%

More information

Cyber Analysis Tools:

Cyber Analysis Tools: Cyber Analysis Tools: The State of the Union August 26, 2014 Start Time: 9am US Pacific /12 noon US Eastern/ 5pm London Time 1 Generously sponsored by: #ISSAWebConf 2 Welcome Conference Moderator Matt

More information

SSL and Browsers: The Pillars of Broken Security

SSL and Browsers: The Pillars of Broken Security SSL and Browsers: The Pillars of Broken Security Ivan Ristic Wolfgang Kandek Qualys, Inc. Session ID: TECH-403 Session Classification: Intermediate SSL, TLS, And PKI SSL (or TLS, if you prefer) is the

More information

Implementation Vulnerabilities in SSL/TLS

Implementation Vulnerabilities in SSL/TLS Implementation Vulnerabilities in SSL/TLS Marián Novotný [email protected] ESET, spol. s r.o. Bratislava, Slovak Republic Abstract SSL/TLS protocol has become a standard way for establishing a secure communication

More information

Host-based Intrusion Prevention on Windows and UNIX. Dr. Rich Murphey White Oak Labs

Host-based Intrusion Prevention on Windows and UNIX. Dr. Rich Murphey White Oak Labs Host-based Intrusion Prevention on Windows and UNIX Dr. Rich Murphey White Oak Labs Acknowledgements Niels Provos OpenBSD s systrace DT suggested this thread last year Greg Hoglund insights md5 at da ghettohackers

More information

Chapter 7 Transport-Level Security

Chapter 7 Transport-Level Security Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell

More information

Network Security Essentials Chapter 5

Network Security Essentials Chapter 5 Network Security Essentials Chapter 5 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 5 Transport-Level Security Use your mentality Wake up to reality From the song, "I've Got

More information

SSL Report: ebfl.srpskabanka.rs (91.240.6.48)

SSL Report: ebfl.srpskabanka.rs (91.240.6.48) Home Projects Qualys.com Contact You are here: Home > Projects > SSL Server Test > SSL Report: (91.240.6.48) Assessed on: Sun, 03 Jan 2016 15:46:07 UTC HIDDEN Clear cache Scan Another» Summary Overall

More information

SSL Server Rating Guide

SSL Server Rating Guide SSL Server Rating Guide version 2009j (20 May 2015) Copyright 2009-2015 Qualys SSL Labs (www.ssllabs.com) Abstract The Secure Sockets Layer (SSL) protocol is a standard for encrypted network communication.

More information

A Study of What Really Breaks SSL HITB Amsterdam 2011

A Study of What Really Breaks SSL HITB Amsterdam 2011 A Study of What Really Breaks SSL HITB Amsterdam 2011 v1.0 Ivan Ristic Michael Small 20 May 2011 Agenda 1. State of SSL 2. Quick intro to SSL Labs 3. SSL Configuration Surveys 4. Survey of Actual SSL Usage

More information

Introduction. Purpose. Background. Details

Introduction. Purpose. Background. Details Introduction Recent media reports confirm that Secure Socket Layer (SSL) 3.0 is obsolete and insecure. This report provides guidance on how to ensure your communications use the more secure Transport Layer

More information

Specific recommendations

Specific recommendations Background OpenSSL is an open source project which provides a Secure Socket Layer (SSL) V2/V3 and Transport Layer Security (TLS) V1 implementation along with a general purpose cryptographic library. It

More information

Topics in Network Security

Topics in Network Security Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure

More information

HTTPS is Fast and Hassle-free with CloudFlare

HTTPS is Fast and Hassle-free with CloudFlare HTTPS is Fast and Hassle-free with CloudFlare 1 888 99 FLARE [email protected] www.cloudflare.com In the past, organizations had to choose between performance and security when encrypting their

More information

Real-Time Communication Security: SSL/TLS. Guevara Noubir [email protected] CSU610

Real-Time Communication Security: SSL/TLS. Guevara Noubir noubir@ccs.neu.edu CSU610 Real-Time Communication Security: SSL/TLS Guevara Noubir [email protected] CSU610 1 Some Issues with Real-time Communication Session key establishment Perfect Forward Secrecy Diffie-Hellman based PFS

More information

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1 Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions

More information

SSL implementieren aber sicher!

SSL implementieren aber sicher! SSL implementieren aber sicher! Karlsruher Entwicklertag 2014 21.05.2014 Dr. Yun Ding SSL in the news 2011 2012 2013 2014 BEAST CRIME Lucky 13 Compromised CAs RC4 biases BREACH DRBG Backdoor Apple goto

More information

Vulnerabilità dei protocolli SSL/TLS

Vulnerabilità dei protocolli SSL/TLS Università degli Studi di Milano Facoltà di Scienze Matematiche, Fisiche e Naturali Dipartimento di Informatica e Comunicazione Vulnerabilità dei protocolli SSL/TLS Andrea Visconti Overview Introduction

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

HTTPS:// Secure HTTP

HTTPS:// Secure HTTP The CRIME attack HTTPS:// Secure HTTP HTTPS provides: Confidentiality (Encryption), Integrity (Message Authentication Code), Authenticity (Certificates) CRIME decrypts HTTPS traffic to steal cookies and

More information

Secure Socket Layer (SSL) and Transport Layer Security (TLS)

Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Socket Layer (SSL) and Transport Layer Security (TLS) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available

More information

Installation and usage of SSL certificates: Your guide to getting it right

Installation and usage of SSL certificates: Your guide to getting it right Installation and usage of SSL certificates: Your guide to getting it right So, you ve bought your SSL Certificate(s). Buying your certificate is only the first of many steps involved in securing your website.

More information

DigiCert: Trusted Business for the Enterprise and Its Customers

DigiCert: Trusted Business for the Enterprise and Its Customers DigiCert: Trusted Business for the Enterprise and Its Customers A leading online trust provider, DigiCert offers multiple products to suit the security needs of enterprises within the finance, healthcare,

More information

Deploying iphone and ipad Security Overview

Deploying iphone and ipad Security Overview Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services

More information

SSL/TLS: The Ugly Truth

SSL/TLS: The Ugly Truth SSL/TLS: The Ugly Truth Examining the flaws in SSL/TLS protocols, and the use of certificate authorities. Adrian Hayter CNS Hut 3 Team [email protected] Contents Introduction to SSL/TLS Cryptography

More information

ipad in Business Security

ipad in Business Security ipad in Business Security Device protection Strong passcodes Passcode expiration Passcode reuse history Maximum failed attempts Over-the-air passcode enforcement Progressive passcode timeout Data security

More information

Securing the SSL/TLS channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs

Securing the SSL/TLS channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs OWASP AppSec APAC 2012 The OWASP Foundation http://www.owasp.org Securing the SSL/TLS channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs

More information

Overview SSL/TLS HTTPS SSH. TLS Protocol Architecture TLS Handshake Protocol TLS Record Protocol. SSH Protocol Architecture SSH Transport Protocol

Overview SSL/TLS HTTPS SSH. TLS Protocol Architecture TLS Handshake Protocol TLS Record Protocol. SSH Protocol Architecture SSH Transport Protocol SSL/TLS TLS Protocol Architecture TLS Handshake Protocol TLS Record Protocol HTTPS SSH SSH Protocol Architecture SSH Transport Protocol Overview SSH User Authentication Protocol SSH Connection Protocol

More information

iphone in Business Security Overview

iphone in Business Security Overview iphone in Business Security Overview iphone can securely access corporate services and protect data on the device. It provides strong encryption for data in transmission, proven authentication methods

More information

Network Test Labs (NTL) Software Testing Services for igaming

Network Test Labs (NTL) Software Testing Services for igaming Network Test Labs (NTL) Software Testing Services for igaming Led by committed, young and dynamic professionals with extensive expertise and experience of independent testing services, Network Test Labs

More information

Secure Socket Layer/ Transport Layer Security (SSL/TLS)

Secure Socket Layer/ Transport Layer Security (SSL/TLS) Secure Socket Layer/ Transport Layer Security (SSL/TLS) David Sánchez Universitat Pompeu Fabra World Wide Web (www) Client/server services running over the Internet or TCP/IP Intranets nets widely used

More information

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top

More information

Transport Layer Security Protocols

Transport Layer Security Protocols SSL/TLS 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally designed to by Netscape to secure HTTP Version 2 is being replaced by version 3 Subsequently became Internet Standard known

More information

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP) Security Protocols Security Protocols Necessary to communicate securely across untrusted network Provide integrity, confidentiality, authenticity of communications Based on previously discussed cryptographic

More information

Chapter 17. Transport-Level Security

Chapter 17. Transport-Level Security Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics

More information

Security Considerations for DirectAccess Deployments. Whitepaper

Security Considerations for DirectAccess Deployments. Whitepaper Security Considerations for DirectAccess Deployments Whitepaper February 2015 This white paper discusses security planning for DirectAccess deployment. Introduction DirectAccess represents a paradigm shift

More information

More on SHA-1 deprecation:

More on SHA-1 deprecation: Dear PTC Axeda Customer, This message specifies Axeda and IDM Agent upgrade requirements and timelines for transitioning Axeda Enterprise Server, Global Access Server (GAS), Policy Server, and Questra

More information

Network Security Testing

Network Security Testing Network Security Testing Are There Really Different Types of Testing? July 28, 2015 Start Time: 9 am US Pacific / 12 noon US Eastern / 5 pm London Time #ISSAWebConf WebCONFERENCES Network Security Testing

More information

Security Engineering Part III Network Security. Security Protocols (I): SSL/TLS

Security Engineering Part III Network Security. Security Protocols (I): SSL/TLS Security Engineering Part III Network Security Security Protocols (I): SSL/TLS Juan E. Tapiador [email protected] Department of Computer Science, UC3M Security Engineering 4th year BSc in Computer Science,

More information

Criteria for web application security check. Version 2015.1

Criteria for web application security check. Version 2015.1 Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-

More information

Acano solution. Security Considerations. August 2015 76-1026-01-E

Acano solution. Security Considerations. August 2015 76-1026-01-E Acano solution Security Considerations August 2015 76-1026-01-E Contents Contents 1 Introduction... 3 2 Acano Secure Development Lifecycle... 3 3 Acano Security Points... 4 Acano solution: Security Consideration

More information

What s Your HTTPS Grade? A Case Study of HTTPS/SSL at Mid Michigan Community College. Brandon Kish @kishba [email protected]

What s Your HTTPS Grade? A Case Study of HTTPS/SSL at Mid Michigan Community College. Brandon Kish @kishba bkish@midmich.edu What s Your HTTPS Grade? A Case Study of HTTPS/SSL at Mid Michigan Community College Brandon Kish @kishba [email protected] About Me Director of Programming Mid Michigan Community College ~4,500 students

More information

SSL GOOD PRACTICE GUIDE

SSL GOOD PRACTICE GUIDE SSL GOOD PRACTICE GUIDE VERSION: 1.2 DATE: 10/04/2014 TASK NUMBER: SSL_Whitepaper PREPARED FOR Paul Docherty Director Portcullis Computer Security Ltd The Grange Barn Pike s End Pinner Middlesex HA5 2EX

More information

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM [email protected]

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com Securely Yours LLC IT Hot Topics Sajay Rai, CPA, CISSP, CISM [email protected] Contents Background Top Security Topics What auditors must know? What auditors must do? Next Steps [Image Info]

More information

Secure Sockets Layer

Secure Sockets Layer SSL/TLS provides endpoint authentication and communications privacy over the Internet using cryptography. For web browsing, email, faxing, other data transmission. In typical use, only the server is authenticated

More information

Transport Level Security

Transport Level Security Transport Level Security Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/

More information

Citrix MetaFrame XP Security Standards and Deployment Scenarios

Citrix MetaFrame XP Security Standards and Deployment Scenarios Citrix MetaFrame XP Security Standards and Deployment Scenarios Including Common Criteria Information MetaFrame XP Server for Windows with Feature Release 3 Citrix Systems, Inc. Information in this document

More information

Low-Level TLS Hacking

Low-Level TLS Hacking Low-Level TLS Hacking Presented by Richard J. Moore E: [email protected] Presentation Outline An introduction to SSL/TLS Using pytls to create and decode TLS messages Fingerprinting TLS servers Fingerprinting

More information

TLS/SSL (Mis)Protecting our Connections Security

TLS/SSL (Mis)Protecting our Connections Security Intro Wrong Wrong2 Downgrade Summary TLS/SSL (Mis)Protecting our Connections Security Orr Dunkelman Computer Science Department University of Haifa 6 th September, 2015 Orr Dunkelman TLS/SSL (Mis)Protecting

More information

Overview Most of the documentation out there on the transition from SHA-1 certificates to SHA-2 certificates will tell you three things:

Overview Most of the documentation out there on the transition from SHA-1 certificates to SHA-2 certificates will tell you three things: SHA-1 Versus SHA-2 Overview Most of the documentation out there on the transition from SHA-1 certificates to SHA-2 certificates will tell you three things: - Breaking SHA-1 is not yet practical but will

More information

Security Protocols/Standards

Security Protocols/Standards Security Protocols/Standards Security Protocols/Standards Security Protocols/Standards How do we actually communicate securely across a hostile network? Provide integrity, confidentiality, authenticity

More information

Casper Suite. Security Overview

Casper Suite. Security Overview Casper Suite Security Overview JAMF Software, LLC 2015 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF Software 301 4th Ave S Suite

More information

Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison

Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation

More information

Project X Mass interception of encrypted connections

Project X Mass interception of encrypted connections Project X Mass interception of encrypted connections What? SSL/TLS interception TOR interception ...a thorny path Common Issues Public Key Pinning avoids rogue CA to sign certs Common Issues Google and

More information

Corporate VPN Using Mikrotik Cloud Feature. By SOUMIL GUPTA BHAYA Mikortik Certified Trainer

Corporate VPN Using Mikrotik Cloud Feature. By SOUMIL GUPTA BHAYA Mikortik Certified Trainer Corporate VPN Using Mikrotik Cloud Feature By SOUMIL GUPTA BHAYA Mikortik Certified Trainer What is a VPN? A virtual private network (VPN) is a method for the extension of a private network across a public

More information

Web Security Considerations

Web Security Considerations CEN 448 Security and Internet Protocols Chapter 17 Web Security Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University [email protected]

More information

Internet Banking System Web Application Penetration Test Report

Internet Banking System Web Application Penetration Test Report Internet Banking System Web Application Penetration Test Report Kiev - 2014 1. Executive Summary This report represents the results of the Bank (hereinafter the Client) Internet Banking Web Application

More information

LBSEC. http://www.liveboxcloud.com

LBSEC. http://www.liveboxcloud.com 2014 LBSEC http://www.liveboxcloud.com LiveBox Srl does not release declarations or guarantee regarding this documentation and its use and declines any expressed or implied commercial or suitability guarantee

More information

APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10)

APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10) APNIC elearning: Network Security Fundamentals 20 March 2013 10:30 pm Brisbane Time (GMT+10) Introduction Presenter/s Nurul Islam Roman Senior Training Specialist [email protected] Specialties: Routing &

More information

Michael Seltzer COMP 116: Security Final Paper. Client Side Encryption in the Web Browser Mentor: Ming Chow

Michael Seltzer COMP 116: Security Final Paper. Client Side Encryption in the Web Browser Mentor: Ming Chow Michael Seltzer COMP 116: Security Final Paper Client Side Encryption in the Web Browser Mentor: Ming Chow 1 Abstract Web service providers generally look to encryption as a means of ensuring data privacy

More information

Virtualization System Security

Virtualization System Security Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability

More information

SE 4472a / ECE 9064a: Information Security

SE 4472a / ECE 9064a: Information Security Western University Faculty of Engineering Department of Electrical and Computer Engineering SE 4472a / ECE 9064a: Information Security Course Outline 2015-16 Description: This course provides an introduction

More information

http://docs.trendmicro.com/en-us/enterprise/trend-micro-endpoint-applicationcontrol.aspx

http://docs.trendmicro.com/en-us/enterprise/trend-micro-endpoint-applicationcontrol.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Maximizing Performance with SPDY & SSL. Billy Hoffman [email protected] @zoompf

Maximizing Performance with SPDY & SSL. Billy Hoffman billy@zoompf.com @zoompf Maximizing Performance with SPDY & SSL Billy Hoffman [email protected] @zoompf What is SPDY? Massive Browser Support Massive Server Support Cast of Characters TCP HTTP SSL X.509 Certificate Cryptography

More information

Table of Contents. Chapter 1: Installing Endpoint Application Control. Chapter 2: Getting Support. Index

Table of Contents. Chapter 1: Installing Endpoint Application Control. Chapter 2: Getting Support. Index Table of Contents Chapter 1: Installing Endpoint Application Control System Requirements... 1-2 Installation Flow... 1-2 Required Components... 1-3 Welcome... 1-4 License Agreement... 1-5 Proxy Server...

More information

Analyzing the Security Schemes of Various Cloud Storage Services

Analyzing the Security Schemes of Various Cloud Storage Services Analyzing the Security Schemes of Various Cloud Storage Services ECE 646 Project Presentation Fall 2014 12/09/2014 Team Members Ankita Pandey Gagandeep Singh Bamrah Pros and Cons of Cloud Storage Services

More information

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009 16 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009 1 25 Organization Welcome to the New Year! Reminder: Structure of Communication Systems lectures

More information

Key & Data Storage on Mobile Devices

Key & Data Storage on Mobile Devices Key & Data Storage on Mobile Devices Advanced Computer Networks 2015/2016 Johannes Feichtner [email protected] Outline Why is this topic so delicate? Keys & Key Management High-Level Cryptography

More information

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications Learning objectives E-commerce Security Threats and Protection Mechanisms. This lecture covers internet security issues and discusses their impact on an e-commerce. Nov 19, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html

More information

INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang

INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang INF3510 Information Security University of Oslo Spring 2011 Lecture 9 Communication Security Audun Jøsang Outline Network security concepts Communication security Perimeter security Protocol architecture

More information

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https

More information

Network Security Fundamentals

Network Security Fundamentals APNIC elearning: Network Security Fundamentals 27 November 2013 04:30 pm Brisbane Time (GMT+10) Introduction Presenter Sheryl Hermoso Training Officer [email protected] Specialties: Network Security IPv6

More information

VPN Configuration Guide. Dell SonicWALL

VPN Configuration Guide. Dell SonicWALL VPN Configuration Guide Dell SonicWALL 2013 equinux AG and equinux USA, Inc. All rights reserved. Under copyright law, this manual may not be copied, in whole or in part, without the written consent of

More information

Requirements on terminals and network Telia Secure Remote User, TSRU (version 7.3 R6)

Requirements on terminals and network Telia Secure Remote User, TSRU (version 7.3 R6) Requirements on terminals and network Telia Secure Remote User, TSRU (version 7.3 R6) Content Page Introduction 2 Platform support 2 Cross Platform support 2 Web and file browsing 2 Client-side Applets

More information

Dashlane Security Whitepaper

Dashlane Security Whitepaper Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.

More information

Introduction. Haroula Zouridaki Mohammed Bin Abdullah Waheed Qureshi

Introduction. Haroula Zouridaki Mohammed Bin Abdullah Waheed Qureshi Introduction Haroula Zouridaki Mohammed Bin Abdullah Waheed Qureshi Introduction Comparing Secure Hypertext protocol (S-HTTP) to Secure Socket Layer (SSL) Agenda Waheed opens the presentation introduces

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For Secure Socket Layer Secure Socket Layer Introduction Overview of SSL What SSL is Useful For Introduction Secure Socket Layer (SSL) Industry-standard method for protecting web communications. - Data encryption

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure

More information

BYOD: End-to-End Security

BYOD: End-to-End Security BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited [email protected]

More information

The Misuse of RC4 in Microsoft Word and Excel

The Misuse of RC4 in Microsoft Word and Excel The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore [email protected] Abstract. In this report, we point out a serious security flaw in Microsoft

More information

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions

More information