2048-bit SSL. Best practices for implementing. www.citrix.com



Similar documents
Best practices for implementing

AppFlow: next-generation application performance monitoring.

Features of a comprehensive application security solution

NetScaler SQL Intelligent Load Balancing. Scaling the Data Tier with.

Executive summary. Introduction Trade off between user experience and TCO payoff

How To Install A Citrix Netscaler On A Pc Or Mac Or Ipad (For A Web Browser) With A Certificate Certificate (For An Ipad) On A Netscaler (For Windows) With An Ipro (For

Secure SSL, Fast SSL

Building a better branch office.

Cloud Networking Services

White paper. Microsoft and Citrix VDI: Virtual desktop implementation scenarios

Citrix XenDesktop with FlexCast technology. Citrix XenDesktop: Desktop Virtualization For All.

The complete solution for enabling BYO.

Microsoft SharePoint 2013 with Citrix NetScaler

Citrix OpenCloud Access. Accelerate cloud computing adoption and simplify identity management.

Simplicity is power.

Citrix Receiver for Enterprise Applications The technical detail

Citrix OpenCloud Access. Enabling seamless delivery of cloud-hosted applications.

Consolidation without compromise.

The Benefits of Virtualizing Citrix XenApp with Citrix XenServer

Advanced virtualization management for Hyper-V and System Center environments.

Citrix XenClient. Extending the benefits of desktop virtualization to mobile laptop users.

Five reasons why you need Citrix Essentials for Hyper-V now

Pay-As-You-Grow: investment protection and elasticity for your network.

NetScaler 2048-bit SSL Performance

Better virtualization of. XenApp and XenDesktop with XenServer

Citrix NetScaler and Microsoft SharePoint 2013 Hybrid Deployment Guide

Consolidation without compromise

Accelerating Microsoft Windows 7 migrations with Citrix XenApp

Citrix desktop virtualization and Microsoft System Center 2012: better together

Desktop virtualization and the branch office. Optimizing virtual desktops and applications to the branch office VDI.

Staying Ahead of the Hacker Curve Turn-key Web Application Security Solution

How To Use Netscaler As An Afs Proxy

Optimizing with Citrix NetScaler. Three keys to building the best front-end network for virtual desktop delivery.

DEPLOYMENT GUIDE XenApp, Avaya 1X Agent. Deployment Guide. Avaya 1X Agent. XenApp.

High availability and disaster recovery with Microsoft, Citrix and HP

Application Template Deployment Guide

Deployment Guide ICA Proxy for XenApp

Top 5 Reasons to Workshift

Microsoft Dynamics CRM 2015 with NetScaler for Global Server Load Balancing

Extending Microsoft Hyper-V with Advanced Automation and Management from Citrix

WHITE PAPER. Pay-as-You-Grow Licensing. Pay-as-You-Grow: Flexible Capacity in the Datacenter with On-Demand Licensing.

Advanced Service Desk Security

Using Vasco IDENTIKEY Server with NetScaler

Citrix Enterprise Mobility Report

Guide to Deploying Microsoft Exchange 2013 with Citrix NetScaler

8 reasons why Citrix NetScaler beats the competition.

White paper. Load balancing basics. Updated 12-07

BYO Rethinking your device strategy.

The falling cost and rising value of desktop virtualization

Virtual desktops: preparing the enterprise for growth.

Securing virtual desktop infrastructure with Citrix NetScaler

WHITE PAPER. Citrix XenDesktop. Cost savings with centralized virtual desktops.

NetScaler: A comprehensive replacement for Microsoft Forefront Threat Management Gateway

RSA Adaptive Authentication and Citrix NetScaler SDX Platform Overview

Application Security WHY NETWORK FIREWALLS AND INTRUSION PREVENTION SYSTEMS AREN T ENOUGH

8 reasons why Citrix NetScaler beats F5

Provisioning ShareFile on Microsoft Azure Storage

Citrix Solutions for Complying with PCI-DSS ENSURING PROTECTION OF WEB APPLICATIONS AND PRIVACY OF CARDHOLDER INFORMATION

Data Center Consolidation for Federal Government

A revolution in cloud networking: Citrix TriScale Technology

Securing virtual desktop infrastructure with Citrix NetScaler

Citrix ShareFile Enterprise: a technical overview citrix.com

Solution Brief. Deliver Production Grade OpenStack LBaaS with Citrix NetScaler. citrix.com

Achieving the lowest server virtualization TCO

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com

The Citrix guide to desktop virtualisation

Advanced virtualization management for Hyper-V and System Center environments

Deploying NetScaler Gateway in ICA Proxy Mode

Is your load balancer cloud ready? How NetScaler helps enterprises achieve cloud computing benefits.

Single Sign On for ShareFile with NetScaler. Deployment Guide

Citrix MetaFrame Password Manager 2.5

Solutions Guide. Deploying Citrix NetScaler with Microsoft Exchange 2013 for GSLB. citrix.com

How To Sell Hpliant Access To Small And Medium Sized Businesses

GoToMyPC Corporate Security FAQs

Modernize your business with Citrix XenApp 7.6

Cisco and Citrix: Building Application Centric, ADC-enabled Data Centers

Citrix Access Gateway

Top Three Reasons to Deliver Web Apps with App Virtualization

Optimizing service assurance for XenServer virtual infrastructures with Xangati

Benefits of Citrix NetScaler for Ajax Applications

Citrix NetScaler and e-gaming data centres

Deliver Enterprise Mobility with Citrix XenMobile and Citrix NetScaler

Windows XP Application Migration Checklist

Cisco and Citrix: Building Application Centric, ADC-enabled Data Centers

What is an application delivery controller?

TCO Savings with Desktop Virtualization

Citrix XenApp, MDOP, and Configuration Manager

White Paper. Optimizing the video experience for XenApp and XenDesktop deployments with CloudBridge. citrix.com

Citrix Password Manager 4.1

White Paper. Enhancing Website Security with Algorithm Agility

Configuring Citrix NetScaler for IBM WebSphere Application Services

KEYS TO ACCELERATING WEB APPLICATION DELIVERY

Desktop virtualization for all

Citrix Lifecycle Management

IT Organizations Embrace Bring-Your-Own Devices

Fullerton India enhances its employee productivity and efficiency with Citrix XenDesktop

White paper. Cutting datacenter costs with server and infrastructure offload A technical guide

Run Skype for Business as a Secure Virtual App with a Great User Experience

Transcription:

Best practices for implementing 2048-bit SSL www.citrix.com

Executive summary Secure sockets layer (SSL) technology continues to be essential to the growth of the web. With unabated increases in ecommerce traffic along with transmission of personal information, SSL is no longer just a nice to have capability; it is an absolute necessity. The requirement to protect information is further heightened by the universal availability of easy-touse hacking tools such as Firesheep. This has prompted application owners to adopt an SSL Everywhere or Always-On SSL posture, encrypting not only the sensitive components of the application such as the login page, but the entire application surface area. In addition to simply using SSL, the strength of encryption is also critical. Indeed, the security community has reached consensus that any application using SSL should migrate from the de facto standard of 1024-bit SSL key strength to 2048-bit (or larger) key sizes. Doubling key size from 1024-bit to 2048-bit offers an exponential increase in strength. From an infrastructure standpoint, however, the SSL processing power required with 2048-bit keys is 5 to 30 times greater than what is required for 1024-bit. 5x Lower Performance 2 32 Better Security Figure 1: Impact of 2048-bit keys To maintain application performance and availability, enterprises must upgrade their application delivery controller (ADC) and SSL infrastructure. Specifically, consideration should be given to selecting an ADC, like Citrix NetScaler, that is performance optimized for 2048-bit keys and that can provide dedicated SSL processing resources per application in a multi-tenant environment. Failure to consider these factors can lead to a degraded end user experience and result in expensive, unplanned infrastructure upgrades to handle the performance impact of 2048-bit keys. SSL usage becoming pervasive Industry transitioning to 2048-bit 2048-bit lowers performance 5x 2

2x Faster Performance 2048-bit SSL Transactions Per Sec Other Leading ADCs (max.) Citrix NetScaler 90,0000 40,0000 Figure 2: Pick an ADC optimized for 2048-bit SSL SSL everywhere (always-on SSL) Enterprises increasingly rely upon the web to reach and retain customers. At the same time, readily available hacking tools like Firesheep pose a serious security threat to online operations. To combat these threats, organizations should adopt an SSL Everywhere posture. Simply encrypting login and checkout pages is no longer sufficient. Enterprises must expand the use of SSL to cover the entire user session to better protect themselves and their customers against security threats. For example, Google Gmail is now 100% SSL encrypted, and Facebook offers their users the choice of encrypting every page using SSL. As more SSL protected applications are put into production and the SSL footprint for each application expands, the aggregate SSL processing requirements of a typical enterprise increase much faster than other aspects of the datacenter infrastructure. Security threats increasing Forcing broader SSL adoption Need 2048-bit optimized ADC 3

SSL Performance Demand Social Networks SSL Protected Apps Web Mail SaaS Enterprise Banking Log-in Transaction Full Session Entire Site Application Surface Area Protected by SSL Figure 3: Increase in SSL apps and SSL coverage Advent of stronger SSL Simply encrypting web application traffic, however, is only half the battle. If the encryption itself is not strong enough to withstand attack, it can be broken. What an attacker can do with a compromised private key The business impact of a private key being compromised would be dire. If someone manages to break a 1024-bit key and subsequently derives the corresponding session key used to encrypt and decrypt data, they will then be able to eavesdrop on all communications. For example, with the private key in hand, a hacker can silently observe someone logging in to their bank account or other password protected account, capture the user s credentials, and then masquerade as that user. This would completely compromise the security of the application and leave every user vulnerable. The hacker would have the proverbial keys to the castle. Encryption is first step Key size determines strength Smaller keys can be compromised Industry-wide move from 1024-bit to 2048-bit keys The strength of encryption is directly tied to key size. Key size is expressed in number of bits (e.g., 1024-bit keys). The larger the key size, the more computationally expensive it is for an attacker to use brute force to compromise the public key / private key infrastructure. Less than 10 years ago, 512-bit keys were considered sufficiently secure. When 512-bit keys were cracked in highly publicized demonstrations, IT organizations quickly upgraded to 1024-bit keys. Increasing availability of inexpensive computational resources, however, has now put 1024-bit SSL keys within striking distance of hackers. 4

With so much at stake, organizations need to consider the threat facing their businesses and operations today. Companies must migrate to 2048-bit keys to ensure the security of their SSL encrypted applications. In fact, the U.S. National Institute of Standards and Technology (NIST), a recognized authority on security practices, has issued a security notification (NIST Special Publication 800-131B) which recommends that organizations deprecate the use of 1024-bit keys between 2011 and 2013. It also explicitly warns against the use of 1024-bit keys beginning in 2014. From 2011 though 2013, the use of 1024-bit RSA keys to generate a digital signature is deprecated, and is disallowed beginning in 2014. NIST Special Publication 800-131B, February 2011 Further, leading browser vendors, such as Mozilla, with Firefox, and Microsoft, with Internet Explorer will soon require websites to use 2048- bit keys to protect browser users. These browser vendors require certificate authorities (CA) to ensure that certificates issued with a key size smaller than 2048-bit will expire before December 31, 2013. For these reasons, all organizations should begin using at least 2048-bit keys to secure their applications and application data, and to ensure that their infrastructure can readily support larger key sizes. Maintaining application performance with 2048-bit SSL While 2048-bit keys deliver greatly increased security, they also require significantly greater processing power than 1024-bit keys. This means in order to maintain application performance and availability organizations need to adopt new SSL infrastructure specifically designed for stronger SSL. Impact of larger key sizes on application and infrastructure performance In order to select SSL infrastructure that meets the demands of 2048-bit keys, it is important to understand how SSL works, as well as the factors that impact SSL performance. Every SSL session can be broken into two phases: 1) session negotiation and 2) bulk data encryption / decryption. In the session negotiation or SSL handshake phase, the initial connection is established, the cipher suite is negotiated (i.e., what encryption and authentication algorithms will be used), the session ID is assigned and the session keys are generated and exchanged. Once the session is actually established, the bulk data transfer, including encryption and decryption of data, between the client and server happens. Importantly, the bulk data transfer phase is substantially less computationally expensive than the SSL handshake phase. 1024-bit security at risk NIST recommends 2048-bit Larger key impacts performance 5

TCP Connection Client Server SSL Handshake Most Resource Intensive Transactions/sec is critical to SSL performance Bulk Encryption Figure 4: Anatomy of an SSL session Understanding the distinction between the SSL negotiation phase and bulk encryption / decryption phase is crucial to fully appreciating how SSL security can impact web application performance, as well as the ability of the data center infrastructure to keep pace with traffic growth. The performance overhead imposed during the SSL session negotiation phase dominates the overall performance dynamics of SSL sessions. For any given application or infrastructure, the number of new SSL sessions that can be supported over a given period of time commonly measured in SSL transactions per second (TPS) is a critical metric. SSL TPS performance is directly impacted by the size of SSL keys. Doubling key strength from 1024-bits to 2048-bits delivers an exponential increase in protection due to the sheer increase in mathematical computations required to break the larger keys. While better security is provided, the computational power required to process 2048-bit certificates is 5 to 30 times greater than what is required for 1024-bit certificates. 1024-bit SSL Transactions Per Second 80% Performance Drop SSL handshake consumes resources Transactions/sec key performance factor 2048-bit lowers TPS performance 80% Figure 5: Performance Impact of 2048-bit keys Security Strength 2048-bit SSL For example, an ADC appliance that is capable of handling 5,000 TPS for a 1024-bit certificate can only support approximately 1,000 TPS for a 2048-bit certificate. That means a web site operator would have to add 5 times more ADC appliances to provide the same SSL processing capacity the site had for 1024-bit certificates. The bottom line: enterprises need 6

to properly plan for the migration from 1024-bit to 2048-bit certificates or risk significant performance degradation and business impact to their operations. Specifically, enterprises need to consider that the infrastructure for SSL processing must be able to not only maintain high performance (i.e., no meaningfully induced latency) when negotiating SSL sessions, but must also have sufficient headroom to accommodate expected growth in the number of applications and amount of application traffic. While SSL throughput rates must still be taken into consideration, the most critical metric that needs to be considered for SSL performance is SSL transaction rate (i.e., SSL TPS). Best practices for planning 2048-bit SSL processing infrastructure In order to deliver appropriate levels of SSL TPS, best practices for building a scalable and efficient SSL network infrastructure must be understood. Unfortunately, off-the-shelf servers are inefficient for handling computationally intensive SSL tasks at high speed. While a newer generation of CPUs may provide native support for popular encryption algorithms (e.g., AES), these benefits are largely negated by the compute overhead first imposed during the session negotiation phase. Even if a server were able to support the SSL processing load, doing so would likely consume the available CPU and memory resources, impacting the server s ability to perform its primary role of running the application. To address this issue, manufacturers have developed specialized SSL processors that are highly efficient in performing both the repetitive and computationally intensive tasks involved in SSL processing. These specialized processors are integrated into ADCs which are deployed in front of web and application servers and act as a proxy in the communication between a client and server. Offloading SSL processing to an ADC frees servers to perform their intended functions and offers a logical point of consolidation for SSL processing in the datacenter. Another advantage of consolidating SSL processing with an ADC is SSL connection persistence. This is important in ecommerce transactions where the user needs to be connected to the same server until the session or transaction is complete. In SSL v3, a new SSL Session ID is used to establish client / server connection persistence. This Session ID is changed every two minutes in certain newer browsers. ADCs can be used to offload this frequent Session ID renegotiation and properly interpret the data to ensure connection persistence. 2048-bit migration requires planning Servers not optimized for SSL Use ADC for SSL acceleration 7

Best practices Preparing the infrastructure for 2048-bit SSL certificates 1. Offload SSL session set-up and bulk data encryption to an ADC that is optimized for 2048-bit SSL processing. High-performance ADCs integrate hardware-based SSL acceleration that is capable of handling far more SSL TPS than a general purpose server. Advanced ADCs can also rewrite client requests and application responses from clear text HTTP to SSL-secured HTTPS on the fly, automatically forcing the entire application to be SSL protected even if the application was not originally designed for SSL. 2. Take inventory of each infrastructure element that is terminating SSL traffic. Make sure that it has the processing capacity to support stronger levels of encryption without adding latency or dropping packets. 3. Complete an audit of SSL certificates currently in use. Those that expire soonest will need to be renewed first, and your certificate authority will likely mandate that the certificate renewal be at 2048-bit key strength. 4. Evaluate current SSL performance requirements of your network and applications. Beyond measuring current traffic capacities, extrapolate historical growth rates for at least an additional three years. The goal is to design the infrastructure to meet both present and future requirements. 5. Do not focus solely on SSL throughput metrics. It is SSL transactions per second (TPS) that matters most for proper infrastructure sizing. Make sure that each component is optimized for 2048-bit keys. 6. Start with evaluation certificates for less mission critical applications to gain familiarity with the technology and understand the new performance demands. Free trial development SSL certificates are available from Symantec (certificate evaluation). 7. Move to 2048-bit certificates first. 4096-bit or greater SSL keys will only be required in exceptional circumstances. 8. For highly sensitive applications, re-encrypt communications between the ADC and the back-end server infrastructure. This provides end-to-end encryption which may be required in some environments. All popular ADC solutions support SSL re-encryption. 9. Measure end-user application performance before, during and after the transition to 2048-bit SSL. Pay particular attention to SSL session negotiation times at various load conditions. There are a number of commercial services that offer detailed performance measurements. However, make sure they have the capability to measure end-to-end performance of SSL-secured HTTPS applications. In addition, many ADCs also offer application performance monitoring tools that can be used to assess overall impact. Prepare infrastructure for 2048-bit Measure application performance Scale infrastructure as appropriate 8

Pick the right ADC After deciding to offload SSL processing to an ADC, it is important to choose an ADC optimized to handle 2048-bit SSL traffic at high transaction rates and throughput levels. When evaluating the SSL performance of an ADC, keep in mind that SSL processing capabilities depend largely upon two factors: 1) the capability and capacity of integrated SSL processing hardware, and 2) finely-tuned software optimizations that maximize the performance of the integrated SSL chips or SSL acceleration cards. Understanding the first factor is typically straightforward. It is recommended that datacenter managers discover it by evaluating a vendor s more recent product offerings. These platforms are likely built with the latest SSL processors designed to handle the larger 2048-bit and 4096-bit key sizes, and will provide much greater performance than older processors designed for 1024-bit keys. The second factor, software optimization, requires a bit more research to identify the right ADC. Many ADC vendors actually use the same SSL processors. Therefore, aside from speed and the number of chips, SSL performance is dependent on how tightly coupled and intelligently the software is designed to extract maximum performance and utilization from those chips. Leading ADC vendors, like Citrix with NetScaler, have developed advanced technologies to optimize SSL performance for 2048-bit keys. These include: Intelligent load balancing of SSL chips SSL sessions are load balanced across SSL chips to provide the best processing performance and lowest latency. Multiple queues per SSL chip Multiple SSL operations can be queued per chip to optimize utilization of a chip s processing capabilities. SSL resource isolation In a multi-tenant ADC deployment, each tenant is assigned dedicated SSL resources, preventing one ADC instance from consuming a disproportionate processing capacity and, thus, degrading the performance of other tenants. The final consideration is whether to choose a hardware-based ADC or a software-based ADC virtual appliance. A hardware-based ADC with an integrated SSL ASIC processor is best suited for delivering applications with heavy SSL demands. For applications that do not require more than 50 to 100 SSL TPS, a virtual appliance ADC deployed on a modern datacenter class server should be sufficient. Pick the right ADC Not all ADCs are created equal NetScaler outperforms other ADCs 9

Citrix NetScaler 90,000 ssl tps 2x Faster Performance Other Leading ADCs (max.) 40,000 ssl tps Figure 6: Citrix outperforms other ADCs in 2048-bit SSL performance Conclusion All web applications must now be secured by SSL using 2048-bit or longer key lengths. The migration from 1024-bit SSL to 2048-bit SSL delivers an exponential increase in protection. However, there is a cost. The SSL processing power required by 2048-bit keys is 5 to 30 times greater than for 1024-bit keys. To maintain security and application performance, enterprises must upgrade their SSL infrastructure, particularly their ADCs. Evaluation of ADCs should focus on solutions optimized to process 2048-bit SSL certificates, such as Citrix NetScaler. Failure to properly upgrade the SSL infrastructure can lead to a degradation of the end user experience, and result in expensive, unplanned infrastructure expenditures to handle the performance impact of 2048-bit keys. 10

Worldwide Headquarters Citrix Systems, Inc. 851 West Cypress Creek Road Fort Lauderdale, FL 33309, USA T +1 800 393 1888 T +1 954 267 3000 Americas Citrix Silicon Valley 4988 Great America Parkway Santa Clara, CA 95054, USA T +1 408 790 8000 Europe Citrix Systems International GmbH Rheinweg 9 8200 Schaffhausen, Switzerland T +41 52 635 7700 Asia Pacific Citrix Systems Hong Kong Ltd. Suite 6301-10, 63rd Floor One Island East 18 Westland Road Island East, Hong Kong, China T +852 2100 5000 Citrix Online Division 6500 Hollister Avenue Goleta, CA 93117, USA T +1 805 690 6400 www.citrix.com About Citrix Citrix Systems, Inc. (NASDAQ:CTXS) is a leading provider of virtual computing solutions that help companies deliver IT as an on-demand service. Founded in 1989, Citrix combines virtualization, networking, and cloud computing technologies into a full portfolio of products that enable virtual workstyles for users and virtual datacenters for IT. More than 230,000 organizations worldwide rely on Citrix to help them build simpler and more cost-effective IT environments. Citrix partners with over 10,000 companies in more than 100 countries. Annual revenue in 2010 was $1.87 billion. 2011 Citrix Systems, Inc. All rights reserved. Citrix, Citrix XenDesktop, Citrix XenApp, Citrix XenClient, Citrix GoToMeeting and Citrix GoToAssist are registered trademarks of Citrix Systems, Inc. and/or one or more of its subsidiaries and may be registered in the U.S. Patent and Trademark Office and in other countries. All other trademarks and registered trademarks are property of their respective owners. 1011/PDF