SSL BEST PRACTICES OVERVIEW



Similar documents
SSL Report: ebfl.srpskabanka.rs ( )

Is Your SSL Website and Mobile App Really Secure?

SSL and Browsers: The Pillars of Broken Security

SSL/TLS: The Ugly Truth

SSL Server Rating Guide

A Study of What Really Breaks SSL HITB Amsterdam 2011

SSL: Paved With Good Intentions. Richard Moore

HTTPS is Fast and Hassle-free with CloudFlare

Installation and usage of SSL certificates: Your guide to getting it right

Certificate Management. PAN-OS Administrator s Guide. Version 7.0

WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services

OpenADR 2.0 Security. Jim Zuber, CTO QualityLogic, Inc.

Criteria for web application security check. Version

SSL implementieren aber sicher!

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Implementation Vulnerabilities in SSL/TLS

DigiCert: Trusted Business for the Enterprise and Its Customers

Cryptography for Software and Web Developers

How To Understand And Understand The Security Of A Key Infrastructure

Walking The Security & Privacy Talk Moving from Compliance to Stewardship

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Bugzilla ID: Bugzilla Summary:

Where every interaction matters.

Chapter 17. Transport-Level Security

Scan Report Executive Summary. Part 2. Component Compliance Summary IP Address :

Complete Website Security

SSL Report: okidirect.co.uk ( )

Chapter 7 Transport-Level Security

Real-Time Communication Security: SSL/TLS. Guevara Noubir CSU610

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

SSL Interception Proxies. Jeff Jarmoc Sr. Security Researcher Dell SecureWorks. and Transitive Trust

More on SHA-1 deprecation:

ALTERNATIVES TO CERTIFICATION AUTHORITIES FOR A SECURE WEB

EXECUTIVE BRIEF. IT and Business Professionals Say Website Attacks are Persistent and Varied. In this Paper

White Paper. Enhancing Website Security with Algorithm Agility

Microsoft Trusted Root Certificate: Program Requirements

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

SSL: A False Sense of Security? How the Tenable Solution Restores SSL Effectiveness and Mitigates Related Threats

Securing the SSL/TLS channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs

Internet SSL Survey 2010! Black Hat USA 2010

2014 IBM Corporation

Secure Socket Layer (SSL) and Transport Layer Security (TLS)

Joe St Sauver, Ph.D. or Manager, InCommon Cer;ficate Program and Manager, Internet2 Na;onwide Security Programs

Secure Sockets Layer

Analyzing DANE's Response to Known DNSsec Vulnerabilities

ENTRUST CLOUD. SSL Digital Certificates, Discovery & Management entrust@entrust.com entrust.com

Transport Level Security

Proto Balance SSL TLS Off-Loading, Load Balancing. User Manual - SSL.

Basics of SSL Certification

Network Security Essentials Chapter 5

What s Your HTTPS Grade? A Case Study of HTTPS/SSL at Mid Michigan Community College. Brandon bkish@midmich.edu

Vulnerabilità dei protocolli SSL/TLS

Public Key Infrastructure (PKI)

Integrated SSL Scanning

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Overview. SSL Cryptography Overview CHAPTER 1

COMODO CERTIFICATE MANAGER. Simplify SSL Certificate Management Across the Enterprise

PCI Compliance Considerations

Certificates, Revocation and the new gtld's Oh My!

present the complete guide to ssl and seo

Our Key Security Features Are:

Security Protocols/Standards

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

Transport Layer Security Protocols

Should You Trust the Padlock? Web Security and the HTTPS Value Chain. Keeping Current 20 November 2013 Ken Calvert

[SMO-SFO-ICO-PE-046-GU-

Maximizing Performance with SPDY & SSL. Billy Hoffman

Leveraging Symantec CIC and A10 Thunder ADC to Simplify Certificate Management

Security + Certification (ITSY 1076) Syllabus

CERTIFICATION PRACTICE STATEMENT UPDATE

Network Security Web Security and SSL/TLS. Angelos Keromytis Columbia University

Web Security. Introduction: Understand applicable laws, legal issues and ethical issues regarding computer crime

Wildcard and SAN: Understanding Multi-Use SSL Certificates

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

StartCom Certification Authority

POODLE. Yoshiaki Kasahara Kyushu University 2015/3/3 APAN 39th in Fukuoka 1

Secure Web Appliance. SSL Intercept

Web Security: Encryption & Authentication

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Configuring Digital Certificates

Credit Card Security

Configuring Secure Socket Layer HTTP

Certificates. Noah Zani, Tim Strasser, Andrés Baumeler

Integrated SSL Scanning

Introduction. Purpose. Background. Details

Public Key Infrastructures

Web Security Considerations

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace

Symantec Complete Website Security

Protocol Rollback and Network Security

Apache Partial HTTP Request Denial of Service Vulnerability - Zero Day. SSL Certificate - Subject Common Name Does Not Match Server FQDN

Secure Sockets Layer (SSL) / Transport Layer Security (TLS)

LBSEC.

Configuring SSL Termination

Domino and Internet. Security. IBM Collaboration Solutions. Ask the Experts 12/16/2014

Topics in Network Security

Bit Chat: A Peer-to-Peer Instant Messenger

Transcription:

SSL BEST PRACTICES OVERVIEW

THESE PROBLEMS ARE PERVASIVE 77.9% 5.2% 19.2% 42.3% 77.9% of sites are HTTP 5.2% have an incomplete chain 19.2% support weak/insecure cipher suites 42.3% support SSL 3.0 83.1% 5.5% 36.7% https://www.trustworthyinternet.org/ssl-pulse/ 83.1% vulnerable to BEAST attack 5.5% vulnerable to CRIME attack 36.7% do not support Forward Secrecy 2015 Entrust Datacard Corporation. All rights reserved.

YOU ARE RESPONSIBLE! SSL/TLS Protocol Protocol Implementation CA Implementation Defense Evolving Standards Defense Bug free deployment Defense Evolving CA Rqmts Ex. POODLE Ex. Heartbleed Ex. DigiNotar Responsibility IETF Responsibility Server Browser vendors Responsibility CA Browser Forum, Browsers and CA s SERVER IMPLEMENTATION Responsibility=YOU 2015 Entrust Datacard Corporation. All rights reserved.

2015 Entrust Datacard Corporation. All rights reserved.

2015 Entrust Datacard Corporation. All rights reserved. Private Key Protection Key Size Signing Algorithm Self-signed Certificates

Private Keys Private Key Public Key Used to compute secure session If compromised, session could be compromised or identity can be forged Best Practice: Keysize 2048 bit RSA Keys Elliptic Curve P-256 or P-384 > 2048 bit keys are not necessary Best Practice: Private Key Protection Password protect private keys Restrict access to private keys Mark keys as non exportable Create new keys when renewing/replacing certificates Revoke compromised keys Consider storing high value keys on hardware 1 Key per device, avoid private key duplication Entrust, Inc. All rights reserved.

Certificate Signing Algorithms Best Practice: Signing Algorithms Use SHA-2 for all new certificates Replace SHA-1 certificates with SHA-2 SHA-1 is a secure hashing algorithm that puts a unique identity in the signature for a certificate that cannot be duplicated for another certificate SHA-1 is showing weakness and is being replaced with SHA-2 Chrome V41 will deprecate usage of SHA-1 on certs expiring 2016 and beyond SHA-1 will be fully deprecated in 2017 Entrust, Inc. All rights reserved.

2015 Entrust Datacard Corporation. All rights reserved. Secure Protocols Secure Cipher Suites Valid Certificate Chains Renegotiation TLS Compression Session Resumption

Root Issuing CA End Entity Certificate Chains All Public Certificate Authorities are required to issue certificates from a subordinate CA, leaving the root offline The chain certificate is not embedded in client devices The server must present the certificate chain to the client Certificate Chains are commonly misconfigured, resulting in a certificate not trusted dialogue for end users Best Practices: Certificate Chains Follow your vendors device specific chain installation instructions Use SSL Checkers to verify that the complete chain is presented by your server do not rely on browser testing! Entrust, Inc. All rights reserved.

Protocols Protocol for secure session is negotiated between what the server and client support Accepted protocols can be controlled at the server level SSL/TLS Protocol List: SSL v2 - Insecure SSL v3 - Insecure when used with HTTP, should be avoided TLS 1.0 Largely insecure, should be avoided TLS 1.1 - Secure TLS 1.2 - Secure Best Practices: Protocols TLS 1.2 should be the main protocol used Enable TLS 1.0 and 1.1 for maximum client support, using other configuration to mitigate potential vulnerabilities Entrust, Inc. All rights reserved.

Cipher Suites In SSL/TLS, Ciphers Suites are used to define how secure communication and encryption takes places Collection of encryption algorithms if one is found to be weak, switch to another Ciphers configured at the server level client must support ciphers enabled by server Best Practices: Cipher Suites Caesar Cipher One of the oldest ciphers ever used Only use suites that support authentication, encryption of 128 bits or higher Avoid suites with weak ciphers (40 & 56 bits) Avoid CBC encryption mode RC4 is considered weak and it should be disabled consider interoperability impact first as this is widely used by clients Use Validation Tools such as SSL Labs to check to see if your server is accepting insecure ciphers. Entrust, Inc. All rights reserved.

2015 Entrust Datacard Corporation. All rights reserved. Mixed Content Third party Trust Secure Cookies Cross-site Scripting (XSS) Malware

2015 Entrust Datacard Corporation. All rights reserved. Perfect Forward Secrecy OCSP Stapling HTTP Strict Transport Security (HSTS)

HTTP Strict Transport Security (HSTS) Best Practices: HSTS Enable HSTS for all secure web pages, as an extension of SSL Always-ON According to Ivan Ristic, this it the single most important improvement you can make for the TLS security of your websites Extension of Always-On SSL concept Can be used for websites that only allow HTTPS Convey to HSTS supported browsers that your site is only available via HTTPS, by sending HSTS value header Supporting browsers automatically change HTTP queries to HTTPS Browsers that do not support HSTS header will simply ignore Used to mitigate sslstrip vulnerability In the case of MTM, HSTS does not allow the user to override the invalid certificate error Entrust, Inc. All rights reserved. 14 9/29/2015

Certificate Transparency Certificate Reputation HTTP Public Key Pinning (HPKP) Certification Authority Authorization (CAA) 2015 Entrust Datacard Corporation. All rights reserved.

Multi-SAN Certificates Extended Validation (EV) Elliptic Curve Cryptography (ECC) Private Trust 2015 Entrust Datacard Corporation. All rights reserved.

Certificate Validation Models Best Practices: Certificates Use EV for high traffic or value websites OV should be used for public sites when EV is not required DV should only be used when Identity is not required (internal use or for non browser based applications) Entrust, Inc. All rights reserved.

Advanced Certificate Types Multi-SAN Certificates Single Certificate that support multiple URLs or public IP Addresses Use on Load Balancers and Firewalls Wildcard Certificates Dynamically support unlimited number of sub domains (*.abc.com) Domain coverage is wide, making the certificate and private key high value Use on Load Balancer and Firewalls for environments that are constantly changing ECC Certificates 256 bit EC private key offers better security and performance than RSA 2048 bit keys Limited client side support Private Trust SSL Certificates Used internally, not publicly trusted On premise PKI or hosted PKI service Are required November 2015 for certificate issued to Non-Fully Qualified Domain Names Entrust, Inc. All rights reserved. 18 9/29/2015

SSL on all Websites Mitigates HTTP attacks Increases Security Provides User Privacy Deploy HSTS 2015 Entrust Datacard Corporation. All rights reserved.

Security Partner Certificate Management Certificate Discovery Variety of Certificates Certificate/Website Scan Responsive CRL/OCSP 2015 Entrust Datacard Corporation. All rights reserved.

Choosing a Certificate Authority Security Posture, History, and Compliance Certificate Policies Root Embedding Services Offered (CRL/OCSP,Cert Types, ECC) Certificate Management Tools Support Entrust, Inc. All rights reserved. 21 9/29/2015

Tools and Resources SSL Labs Server Test SSL Chain Checkers Open SSL Certificate Discovery Certificate Management Tool Malware Scanner Bulletproof SSL Certificate Management Entrust, Inc. All rights reserved. 22 9/29/2015

SSL/TLS SERVER TEST 2015 Entrust Datacard Corporation. All rights reserved.

BULLETPROOF SSL AND TLS Written by SSL Expert, Ivan Ristic Most comprehensive guide to SSL Best Practices on the market Recommended reading for any IT Security professional dealing with SSL and certificates Available at Feisty Duck or on Amazon Included free of charge with Entrust Cloud SSL Enterprise 2015 Entrust Datacard Corporation. All rights reserved.

Thank you! Questions? 25 2015 Entrust Datacard Corporation. All rights reserved.