Ssl/Tls Trends, Practices, and Futures: Brian A. Mchenry, Security Solutions Architect @bamchenry
Ssl/Tls Trends, Practices, and Futures: Brian A. Mchenry, Security Solutions Architect @bamchenry
Futures
Brian A. McHenry, Security Solutions Architect
[email protected]
@bamchenry
Agenda
1.
2.
3.
Solutions
4.
Whats Next?
F5 Networks, Inc.
F5 Networks, Inc.
3.5
Customer Trends:
3.0
2.5
E-Commerce
2.0
Privacy
Mobility
1.5
1.0
S
n
o
w
d
e
n
IoE
PFS/ECC Demanded
Emerging Standards:
0.5
0.0
1998
Source: Netcraft
F5 Networks, Inc.
2002
2006
2010
2014
Years
4
August
2009
F5 Networks, Inc.
RFC 5746
TLS extension for secure
renegotiation quickly
mainstreamed
February
2010
September
2011
Lucky 13
Another timing attack.
TIME
RC4 Attacks
Weakness in CBC cipher A refinement and
variation of CRIME
making plaintext
guessing possible
February
2013
March
2013
March
2013
Heartbleed
The end of the Internet
as we know it!
April
2014
F5 Networks, Inc.
F5 Networks, Inc.
F5 Networks, Inc.
F5 Networks, Inc.
10
F5 Networks, Inc.
12
13
F5 Networks, Inc.
14
AVAILABLE IN 12.0
F5 Networks, Inc.
15
F5 Networks, Inc.
16
F5 Networks, Inc.
17
F5 Networks, Inc.
18
TMOS
Feature
TMOS
TLS 1.2
10.2.3
10.2.3
ECC
11.4.0
Secure Renegotiation
(RFC 5746)
PFS
11.4.0
TLS_FALLBACK_SCSV
11.5.0
SHA256 (SHA2)
10.2.3
Network HSM
11.2.1
SPDY
11.2.0
Onboard HSM
HTTP 2.0*
11.6.0
SNI
11.1.0
11.5.0
HSTS
F5 Networks, Inc.
iRules/12.0
19
Client / Server
Client / Server
Web application
Web application
ASM
Application
Application
SWG
Session
Session
Network
Network
Physical
F5 Networks, Inc.
Physical
21
Data Center
Clients
BIG-IP Platform
Proxy Chain
T
C
P
S
S
L
H
T
T
P
P
R
O
X
Y
H
T
T
P
S
S
L
T
C
P
22
Data Center
Clients
BIG-IP Platform
Proxy Chain
T
C
P
S
S
L
H
T
T
P
P
R
O
X
Y
H
T
T
P
S
S
L
T
C
P
Each SSL filter handles connection to device on their side of the proxy.
Normally, the two SSL filters operate completely independently.
Between the two filters, all data is available unencrypted.
To fully offload the backend server, remove the server side SSL filter.
F5 Networks, Inc.
23
Data Center
Clients
BIG-IP Platform
Allows server to perform client cert auth
L7 content inspection after handshake
Certificate transparent to end user
Proxy Chain
T
C
P
S
S
L
H
T
T
P
P
R
O
X
Y
H
T
T
P
S
S
L
T
C
P
24
Data Center
Clients
BIG-IP Platform
Proxy Chain
T
C
P
S
S
L
H
T
T
P
P
R
O
X
Y
H
T
T
P
S
S
L
T
C
P
25
Whats Next?
AVAILABLE IN 11.6
F5 Networks, Inc.
27
Add up the time for each step and you'll see that over 30% of the SSL overhead
comes from checking whether the certificate has been revoked.
These checks are serial and block downloads.
F5 Networks, Inc.
28
29
F5 Networks, Inc.
30
F5 Networks, Inc.
31
F5 Networks, Inc.
32
SSL Everywhere
F5 Networks, Inc.
33