An Analysis of TLS Handshake Proxying
Nick Sullivan (@grittygrease)
Douglas Stebila (@dstebila)
IEEE TrustCom
August 20, 2015
CloudFlare Inc.
Queensland University of Technology
Two competing goals on the web
• Performance
• Security & Privacy
2
Performance on the Web
Improving performance by reducing latency
3
Web performance
• Fundamentally bound by the speed of light
• Content Delivery Networks (CDNs) provide distributed global load
balancing and caching
4
Reverse Proxy
5
Traditional traffic routing
6
Routing with reverse proxy
7
Security & Privacy on the Web
HTTPS and key compromise risks
8
HTTPS/TLS
• Point-to-point authentication and encryption
• Visualized in lock icon in your browser address bar
9
HTTPS/TLS
• client-server model
• Private key operation in handshake proves
ownership of the certificate
• Client validates certificate via PKI
• Handshake establishes session keys
10
Private key compromise risks
• Most cryptography is written in memory-unsafe languages like C
• Private keys are read from disk, used in memory
• Web servers (nginx, Apache) use OpenSSL
11
12
HEARTBLEED
Private key compromise consequences
• Private key disclosure breaks TLS trust model
• Server impersonation
• Retroactive decryption of sessions with RSA handshake
13
Keys on the edge
Combining HTTPS and Reverse Proxies
14
TLS with reverse proxies
• TLS needs to be terminated at caching layer
• Private keys need to be distributed to the edge
• Financial institutions are highly regulated — no sharing with third parties
• This is why banks do not use CDNs — yet
15
Reverse Proxy With HTTPS
🔒 🔑
🔒
Private Key
Location of TLS Terminators
17
Two contradictory goals
• Global load balancing of TLS
• Reducing private key attack surface
18
Keyless SSL
19
Private Key
TLS Handshake Proxying
Combining HTTPS and Reverse Proxies
20
TLS Handshake Proxying
• Compromise between key security and performance
• Split the handshake geographically
• Private key operation performed at site owner’s facility (in HSM, etc)
• Rest of handshake performed at the edge
• Communicate to key server over secure tunnel
21
TLS in RSA mode
22
Private Key
TLS in RSA mode with remote private key
23
Private Key
TLS Handshake Proxying
• Private key stored in trusted location
• Mutually-authenticated TLS tunnel from edge
• TLS session resumption
• All static assets served over TLS from the edge
• Dynamic assets served from origin through reverse proxy
24
Also…
• Fully implemented and live!
25
Performance Analysis
26
Geography of TLS
27
28
Geography of TLS With Proxy
29
Geography of TLS Handshake Proxy
Performance estimate
• Triangle inequality for the internet topology
30
Performance measurement
31
Additional Performance Notes
• Persistent connection between Edge and Key Server is already established
• Otherwise the first connection will be slower
• Session resumption is even more improved
• No need to connect to key server if resumption data is present
32
Security Analysis
33
Security goals of TLS
• Server-to-client authentication
• Channel security
34
Security goals of TLS Handshake Proxying
• Key-server-to-client authentication
• Edge-server-to-client authentication
• Channel security
• Optional: Forward Security
35
Security of the key server
• Dedicated TLS connection between key server and edge
• TLS client authentication with Private CA
• Timing side-channel protection
• Message size side-channel protection
36
Security of the edge server
• Session ID-based resumption
• no claims about shared local session state
• sessions expiry determines forward secrecy
• Session Ticket-based resumption
• sharing state among all edge servers can result in confusion (rely on Host header)
• sessions ticket decryption secret lifetime determines forward-secrecy
37
Conclusions
38
TLS Handshake Proxying
• Balances two contradictory goals
• Global load balancing of TLS
• Private key security
• Improved performance
• Strong security guarantees
39
An Analysis of TLS Handshake Proxying
Nick Sullivan (@grittygrease)
Douglas Stebila (@dstebila)
IEEE TrustCom
August 20, 2015
CloudFlare Inc.
Queensland University of Technology

More Related Content

PDF
Bringing Elliptic Curve Cryptography into the Mainstream
PDF
CFSSL 1.1: The Evolution of a PKI toolkit - DEF CON 23
PDF
What's New in Go Crypto - Gotham Go
PDF
Virus Bulletin 2012
PDF
Sullivan randomness-infiltrate 2014
PDF
Sullivan handshake proxying-ieee-sp_2014
PDF
Sullivan red october-oscon-2014
PDF
Sullivan heartbleed-defcon22 2014
Bringing Elliptic Curve Cryptography into the Mainstream
CFSSL 1.1: The Evolution of a PKI toolkit - DEF CON 23
What's New in Go Crypto - Gotham Go
Virus Bulletin 2012
Sullivan randomness-infiltrate 2014
Sullivan handshake proxying-ieee-sp_2014
Sullivan red october-oscon-2014
Sullivan heartbleed-defcon22 2014

What's hot (20)

PDF
Sullivan white boxcrypto-baythreat-2013
PDF
TLS 1.3 and Other New Features in NGINX Plus R17 and NGINX Open Source EMEA
PDF
DockerCon Live 2020 - Securing Your Containerized Application with NGINX
PDF
Heartache and Heartbleed - 31c3
PDF
Running Secure Server Software on Insecure Hardware Without Parachute
PDF
Scaling Push Messaging for Millions of Devices @Netflix
PPTX
The 3 Models in the NGINX Microservices Reference Architecture
PPTX
Botconf ppt
PPTX
MRA AMA Part 7: The Circuit Breaker Pattern
PDF
Serverless for the Cloud Native Era with Fission
PDF
DEFCON 28: 21 Jump Server: Going Bastionless in the Cloud
PPTX
TLS 1.3 and Other New Features in NGINX Plus R17 and NGINX Open Source
PDF
Bridges and Tunnels: A Drive Through OpenStack Networking
PDF
NATS vs HTTP
PDF
GopherCon 2017 - Writing Networking Clients in Go: The Design & Implementati...
PDF
Monitoring Highly Dynamic and Distributed Systems with NGINX Amplify
PDF
Overview of SSL: choose the option that's right for you
PDF
Managing secrets at scale
PPTX
RSK sidechain
PPTX
Surviving A DDoS Attack: Securing CDN Traffic at CloudFlare
Sullivan white boxcrypto-baythreat-2013
TLS 1.3 and Other New Features in NGINX Plus R17 and NGINX Open Source EMEA
DockerCon Live 2020 - Securing Your Containerized Application with NGINX
Heartache and Heartbleed - 31c3
Running Secure Server Software on Insecure Hardware Without Parachute
Scaling Push Messaging for Millions of Devices @Netflix
The 3 Models in the NGINX Microservices Reference Architecture
Botconf ppt
MRA AMA Part 7: The Circuit Breaker Pattern
Serverless for the Cloud Native Era with Fission
DEFCON 28: 21 Jump Server: Going Bastionless in the Cloud
TLS 1.3 and Other New Features in NGINX Plus R17 and NGINX Open Source
Bridges and Tunnels: A Drive Through OpenStack Networking
NATS vs HTTP
GopherCon 2017 - Writing Networking Clients in Go: The Design & Implementati...
Monitoring Highly Dynamic and Distributed Systems with NGINX Amplify
Overview of SSL: choose the option that's right for you
Managing secrets at scale
RSK sidechain
Surviving A DDoS Attack: Securing CDN Traffic at CloudFlare
Ad

Viewers also liked (20)

PPT
Metric and Dashboard
PPT
Secure Socket Layer
PDF
Aplication and Transport layer- a practical approach
PDF
Advanced Crypto Service Provider – cryptography as a service
PPTX
SSL TLS Protocol
PPTX
SSL/TLS
DOCX
SSL-image
PDF
Recover A RSA Private key from a TLS session with perfect forward secrecy
PDF
TLS/SSL MAC security flaw
PPTX
Unified log-meetup-20160420
PPTX
3429 How to transform your messaging environment to a secure messaging envi...
PDF
Kubernetes в Avito - Евгений Ольков
PDF
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
PDF
Automation and ansible
PDF
An introduction to MQTT - Pub / Sub for the masses
PPTX
Best Practice TLS for IBM Domino
PPT
PPTX
CCNA RS_NB - Chapter 5
PPTX
Docker ansible-make-chef-puppet-unnecessary-minnihan
PPT
Wireshark
Metric and Dashboard
Secure Socket Layer
Aplication and Transport layer- a practical approach
Advanced Crypto Service Provider – cryptography as a service
SSL TLS Protocol
SSL/TLS
SSL-image
Recover A RSA Private key from a TLS session with perfect forward secrecy
TLS/SSL MAC security flaw
Unified log-meetup-20160420
3429 How to transform your messaging environment to a secure messaging envi...
Kubernetes в Avito - Евгений Ольков
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
Automation and ansible
An introduction to MQTT - Pub / Sub for the masses
Best Practice TLS for IBM Domino
CCNA RS_NB - Chapter 5
Docker ansible-make-chef-puppet-unnecessary-minnihan
Wireshark
Ad

Similar to An analysis of TLS handshake proxying (20)

PDF
CNIT 141: 13. TLS
PPTX
All you need to know about transport layer security
PDF
CNIT 141 13. TLS
PDF
CNIT 141: 13. TLS
PDF
020618 Why Do we Need HTTPS
PPT
SecureSocketLayer.ppt
PDF
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
PDF
Network Security Applications
PPSX
Secure socket layer
PPSX
Secure socket layer
PPT
cryptography and network security thid.ppt
PPTX
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
PPTX
SECURE SOCKET LAYER ( WEB SECURITY )
PPTX
Data Security Essentials for Cloud Computing - JavaOne 2013
PDF
Network Security_Module_2_Dr Shivashankar
PDF
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
PPTX
Webservice security considerations and measures
PDF
The Trusted Cloud Transfer Protocol (TCTP)
PDF
Webinar SSL English
PPTX
Secure Socket Layer (SSL)
CNIT 141: 13. TLS
All you need to know about transport layer security
CNIT 141 13. TLS
CNIT 141: 13. TLS
020618 Why Do we Need HTTPS
SecureSocketLayer.ppt
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
Network Security Applications
Secure socket layer
Secure socket layer
cryptography and network security thid.ppt
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
SECURE SOCKET LAYER ( WEB SECURITY )
Data Security Essentials for Cloud Computing - JavaOne 2013
Network Security_Module_2_Dr Shivashankar
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
Webservice security considerations and measures
The Trusted Cloud Transfer Protocol (TCTP)
Webinar SSL English
Secure Socket Layer (SSL)

Recently uploaded (20)

PDF
Getting Started with Data Integration: FME Form 101
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
STKI Israel Market Study 2025 version august
PPTX
Tartificialntelligence_presentation.pptx
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
A review of recent deep learning applications in wood surface defect identifi...
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
Five Habits of High-Impact Board Members
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Getting Started with Data Integration: FME Form 101
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
observCloud-Native Containerability and monitoring.pptx
STKI Israel Market Study 2025 version august
Tartificialntelligence_presentation.pptx
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
A review of recent deep learning applications in wood surface defect identifi...
Group 1 Presentation -Planning and Decision Making .pptx
O2C Customer Invoices to Receipt V15A.pptx
1 - Historical Antecedents, Social Consideration.pdf
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Hindi spoken digit analysis for native and non-native speakers
Enhancing emotion recognition model for a student engagement use case through...
Five Habits of High-Impact Board Members
Univ-Connecticut-ChatGPT-Presentaion.pdf
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...

An analysis of TLS handshake proxying