TLS hardening

نویسنده

  • Emmanuel Dreyfus
چکیده

This document presents TLS and how to make it secure enough as of 2014 Spring. Of course all the information given here will rot with time. Protocols known as secure will be cracked and will be replaced with better versions. Fortunately we will see that there are ways to assess the current security of your setup, but this explains why you may have to read further from this document to get the up to date knowledge on TLS security. We will first introduce the TLS protocol and its underlying components: X.509 certificates, ciphers, and protocol versions. Next we will have a look at TLS hardening for web servers, and how to plug various vulnerabilities: CRIME, BREACH, BEAST, session renegotiation, Heartbleed, and others. We will finally see how the know-how acquired on hardening web servers can be used for other protocols and tools such as Dovecot, Sendmail, SquirrelMail, RoundCube, and OpenVPN. We assume you already maintain services that use TLS, and have basic TCP/IP network knowledge. Some information will also be useful for the application developer. 1 An introduction to TLS TLS stands for Transport Layer Security. It is an encryption and authentication layer that fits between transport and application level in the TCP/IP network stack. It got specified by IETF in 1999 as an enhancement over Netscape’s Secure Socket Layer (SSL), which is why we often see the SSL term used instead of TLS. TLS is easy to add on top of any TCP service, and this is why it grown so popular, and it became available for many protocols. For instance, HTTP can be used over TLS, using well-known https:// URL. It works the same way for SMTP(S), IMAP(S), POP(S), LDAP(S), and so on. 1.1 X.509 certificates The main goal of TLS is enforcing confidentiality and integrity. This cannot happen if the remote peer is not properly authenticated: who cares about having a secure channel if we do not know who we are speaking to? Attacks where an intruder slips between the two legitimate parties are known as Man In The Middle (MITM or MiM) attacks. In such a setup, a secure channel exists between one legitimate party and the intruder, and there is another secure channel between the intruder and the second legitimate party. The legitimate parties talk to each others, and the intruder sees all the traffic. TLS attempts to authenticate the remote party using a Public Key Infrastructure (PKI). The idea is to use asymmetric cryptography, where each party has a private key capable of performing cryptographic signatures, and a public key, which can be used to verify a signature done by the associated private key. If a remote party is able to produce a public key validated signature for a nonce it was given, that proves it has the private key. ∗Reprinted with permission

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hardening Persona - Improving Federated Web Login

Federated login protocols for the Web are intended to increase user security by reducing the proliferation of passwords that users are expected to remember and use on a day to day basis, however these protocols are vulnerable to recent attacks against TLS that allow attackers to extract session cookies and other such authentication tokens from within TLS sessions. A recent technique, TLS-OBC (o...

متن کامل

Identification of children with acute lymphoblastic leukemia at low risk for tumor lysis syndrome

Background and Objective: Tumor lysis syndrome (TLS) could occur before, during or after the initiation of chemotherapy in patients with cancers especially those with hematologic malignancies. This study was designed to determine the prevalence and predictors of TLS in children with Acute Lymphoblastic Lymphoma (ALL) and to develop a sensitive prediction rule to identify patients at low risk of...

متن کامل

Spice Compatible Model for Multiple Coupled Nonuniform Transmission Lines Application in Transient Analysis of VLSI Circuits

An SPICE compatible model for multiple coupled nonuniform lossless transmission lines (TL's) is presented. The method of the modeling is based on the steplines approximation of the nonuniform TLs and quasi-TEM assumptions. Using steplines approximation the system of coupled nonuniform TLs is subdivided into arbitrary large number of coupled uniform lines (steplines) with different characteristi...

متن کامل

Detecting Bot Networks Based On HTTP And TLS Traffic Analysis

Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...

متن کامل

The Efficacy of Single Dose Rasburicase in Prevention or Treatment of Tumor Lysis Syndrome in Children

Background: Tumor lysis syndrome (TLS) is a major metabolic complication in patients with malignancy after initiation of chemotherapy or spontaneously without treatment. The role of Rasburicase (a recombinant urate-oxidase enzyme) in prevention and treatment of TLS has been demonstrated in recent years. We aimed to investigate the efficacy of a single dose of rasburicase in reducing the risk of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1407.2168  شماره 

صفحات  -

تاریخ انتشار 2014