SlideShare a Scribd company logo
Is	Your	Security	Blind	to	SSL/TLS?	
November	17,	2016
2	
Presenters	
Jerry	Daugherty	
Prac2ce	Manager	
NSS	Labs,	Inc.	
jdaugherty@nsslabs.com	
Michael	Lynge	
Sr.	Product	Marke2ng	Manager	
NSS	Labs,	Inc.	
mlynge@nsslabs.com	
Bhaarath	Venkateswaran	
Director	of	Product	Management	
NSS	Labs,	Inc.	
bvenkateswaran@nsslabs.com
3	
Who	is	NSS	Labs?	
Research	&	Advisory	
•  Solu2on	trends	
•  Best	prac2ce	solu2on	
architecture	guidance	
•  Analyst	inquiries	
•  Security	advisory	days	
•  Webinars/educa2on	
Objec@ve	Purchase	
Insight	
•  Product	modeling	
•  RFP	templates	
•  TCO	modeling	kits	
Security	Vendor	Tes@ng	
•  Security	efficacy	
•  Solu2on	performance	
•  Cost	of	ownership	
Cyber	Advanced		
Warning	System™	
•  Con2nuous	exploit	visibility	
•  Con2nuous	target	asset	
iden2fica2on	
•  Con2nuous	security	
measurement	
•  Product	compara2ves	
•  SaaS	or	API
4	
SSL/TLS	Overview	
•  Secure	Socket	Layer/Transport	Layer	
Security	(SSL/TLS)	
o  1994	SSL	1.0	(Netscape	–	Never	released)	
o  1995	SSL	2.0	(Netscape	–	Security	flaws)	
o  1996	SSL	3.0	(Netscape	–	Rewrite)	
o  1999	TLS	1.0	(IETF	–	Became	RFC)	
o  2006	TLS	1.1	(IETF	–	Cipher-block	chaining)	
o  2008	TLS	1.2	(IETF	–	Mul2ple	enhancements)	
o  2016	TLS	1.3	(IETF	–	Current	working	draa)	
•  HTTP	over	TLS	(HTTPS)		
o  En2re	HTTP	protocol	is	encrypted	
Client	 Server	
Client	hello	
Server	hello	
Client	key	exchange	
Change	cipher	spec	
Client	finished	
Change	cipher	spec	
Server	finished	
Cer2ficate	
ServerKeyExchange	
ServerHelloDone	
Cer2ficateRequest	
Verify	cer2ficate	
Cer2ficateVerify	
Verify	cer2ficate	
Applica2on	data	Applica2on	data	 Encrypted
5	
Business	vs.	Technology	Impact	
•  40.5%	of	the	Internet’s	140,132	most	popular	websites	have	HTTPS	by	default	
•  	Encryp2on	technologies	implemented	in	enterprises	today:	
o  Data	in	mo&on	(e.g.,	virtual	private	networks,	web	communica2ons	between	browser	and	
webservers)	
o  Data	at	rest	(e.g.,	databases,	whole	disk	encryp2on	for	servers,	desktops,	mobile	devices)		
o  Encrypted	web	communica2on	(u2lizing	HTTPS)
6	
Business	vs.	Technology	Impact	
Business	drivers	and	impact:	
•  Control	access	to—and	maintain	the	integrity	of—intellectual	property	
•  Maintain	confiden2ality	of	financial	transac2ons	(PCI-DSS),	personally	iden2fiable	
informa2on	(PII),	etc.	
•  Improve	ranking	for	Google	search	engine	results	
•  Reduce	exposure	to	protocol-specific	ajacks	(e.g.,	Heartbleed)	
•  Reduce	risk	from	increased	wireless	access	points	
•  Enterprise	employees	consume	encrypted	content	for	personal	reasons	(Gmail,	
banking,	etc..)	
•  Enterprise	content	is	hosted	internally
7	
Business	vs.	Technology	Impact	
Technology	impact:	
•  Enterprise’s	ability	to	scale	and	implement	SSL	
•  Technology	suppor2ng	SSL	relies	on	server	certs,	protocol	support,	key	exchange,	
cipher	strength	
•  Understanding	SSL	impact	with	tradi2onal	layers	of	defense	
•  Encryp2on	/	decryp2on	/	hybrid	–	a	constant	challenge	
•  Performance	impact	–	SSL	securely	exchanges	all	data	over	a	network		
(e.g.,	file	transfers,	VPN	connec2ons,	instant	messaging,	content	transac2ons,	VoIP)		
•  Balancing	SSL	security	and	legacy	applica2on	support	(backward	compa2bility)
8	
Current	Challenges	
•  SSL	performance	for	appliances	is	typically	lower	than	network	appliance	
performance	
•  Evalua2ng	appliance-based	network	performance	is	easier	than	evalua2ng	SSL	
performance	
•  NSS	research	indicates	majority	of	threats	using	SSL	as	a	transport	fall	into	
targeted	persistent	ajack	(TPA)	category	
•  Cer2fica2on	authori2es	(CAs)	–	weakest	link	
•  Privacy	and	confiden2ality	vs.	visibility	against	threats/data	exfiltra2on	
•  Security	flaws	with	SSL-TLS	protocols			
•  Enterprise	compliance,	segmenta2on,	zoning-based	implementa2on/	
deployment	challenges
9	
SSL/TLS	Vendor	Landscape	Overview	
•  Hardware-based	security	appliance	vendors	
o  On-BOX	inspec2on	vendors	(perimeter,	internal	enterprise	
networks)	
o  Offloading–primarily	decryp2on—vendors	(server-side/data	
center	infrastructure)	
o  VPN-based	vendors	(only	VPN	support)	
•  Soaware-based	SSL	security	vendors	are	not	in	scope	
for	this	version
10	
SSL/TLS	Vendor	Landscape	Overview
11	
The	Need	for	SSL	Testing	
•  Enterprise-based	breaches	over	SSL	are	on	the	rise	
•  Enterprise	visibility:	Iden2fying	and	decryp2ng	SSL/TLS	connec2ons	and	applica2on	
traffic	across	the	network	is	cri2cal	(threats	and	data	loss)	
•  SSL/TLS-based	security	appliances	are	proving	to	be	ineffec2ve			
o  Mul2ple	cipher	suites	are	not	supported	by	the	security	appliance	vendors	
o  SSL/TLS	communica2ons	occurring	over	non-standard	ports	–	not	visible	
o  Unable	to	decrypt	traffic	even	at	50%	of	their	adver2sed	SSL/TLS-based	throughput	(due	to	
processor,	computa2onal	algorithm	metrics)	
o  Fast-pathing	connec2ons	at	high	rates	without	decryp2on	
•  Understanding	and	ra2ng	SSL/TLS	network-based	security	appliances	on	decryp2on	
performance,	latency,	maximum	connec2on	rates	becomes	extremely	important	
•  NSS	Labs’	first	foray	into	tes2ng	SSL/TLS	for	enterprises
12	
NSS	Labs	Methodology	
•  Use	of	SSL	and	its	newer	itera2on,	TLS,	has	been	on	the	rise	with	ever-
increasing	need	for	privacy	online	
•  Modern	cyber	campaigns	frequently	focus	on	ajacking	users	through	
most	common	web	protocols	and	applica2ons	
•  	NSS	con2nues	to	receive	inquiries	from	enterprise	customers	during	
their	assessments	of	vendors	that	provide	SSL/TLS	decryp2on	and	
protec2on	technologies	
•  NSS	has	developed	a	methodology	to	test	capabili2es	and	performance	
of	devices	providing	SSL/TLS	protec2on
13	
Deployment	Scenarios	
•  Our	test	methodology	is	intended	to	support	and	test	various	deployment	
methods,	including:	
o  Man-in-the-middle	
o  Forward	proxy	
o  Reverse	proxy	
o  Pure	decryp2on	offload
14	
Methodology	Overview	
•  NSS	Test	Methodologies	are	designed	to	address	challenges	faced	by	
enterprise	security/IT	professionals	in	selec2ng	and	managing	security	
products	
•  Scope	of	this	par2cular	methodology	includes:		
o  Verifica2on	of	SSL/TLS	capability		
o  SSL/TLS	performance	
•  Based	on	needs	iden2fied	in	NSS’	research,	the	following	capabili2es	are	
considered	essen2al	in	SSL/TLS-capable	devices:		
o  Ability	to	perform	SSL	inspec2on		
o  Ability	to	nego2ate	to	all	modern	ciphers	and	key	sizes		
o  Support	for	common	TLS	extensions	and	TLS	profile	enforcement
15	
SSL	Methodology:	Overall	Focus	
Decryp2on	
performance	
Encryp2on/	
inspec2on	
valida2on	
Cipher	
nego2a2on	
SSL	
func2onality	
valida2on	
	Connec2on	
rate	
Response	
2mes
16	
SSL	Methodology:	Performance	Focus	
Applica2on		
response	2me	
Max	SSL/TLS	
handshakes	
Max	decryp2on	
performance	
Max	connec2ons	
supported	
Performance
17	
SSL	Methodology:	Functionality	Focus	
TLS	profile	enforcement	
Cipher	nego2a2on	and	support	
Session	reuse	
Popular	cipher	suites
18	
Our	Objective	
•  SSL	encryp2on	has	increased	over	the	years,	and	many	products	have	come	to	
the	fore	to	protect	that	traffic.		
•  Un2l	now,	no	comprehensive,	methodical	test	has	been	performed	to	validate	
performance	and	func2onality	across	mul2ple	technologies	and	
manufacturers.	
•  The	NSS	Labs	SSL/TLS	test	is	designed	to	be	a	well-thought	out,	data-driven	
approach	to	give	enterprises	the	informa2on	they	need	to	protect	their	
networks	in	the	encryp2on	age.
19	
Test	Details	
•  Cipher	suites	and	key	sizes	
o  Over	75	tests	that	cover	this	range	of	cipher	suites	and	keys	
•  Manufacturer	and	enterprise	feedback		
•  Tes2ng	gear	and	tools
20	
Test	Deliverables	
•  Individual	Test	Reports	for	each	vendor	
•  Performance	results	for	each	cipher	suite	selected	
o  Results	provided	in	both	tables	and	graphs	
•  Matrix	of	supported	cipher	suites	based	on	tes2ng	
•  Results	of	func2onality	tes2ng
21	
Q&A
Thank	you	
www.nsslabs.com	
Contact	us	if	you	are	interested	in	participating	in	the	next	test:	
vendors@nsslabs.com

More Related Content

PDF
DDoS Prevention: Market Growth, Deployments, and NSS Test Results
PDF
NGFW: MARKET GROWTH, DEPLOYMENTS, AND NSS TEST RESULTS
PDF
NGIPS Market Trends and Group Test Results
PPTX
NSS Labs Präsentation isd
PPTX
DEVSECOPS: Coding DevSecOps journey
PPTX
Automating Open Source Security: A SANS Review of WhiteSource
PPTX
WhiteSource Webinar What's New With WhiteSource in December 2018
PDF
Securing an NGINX deployment for K8s
DDoS Prevention: Market Growth, Deployments, and NSS Test Results
NGFW: MARKET GROWTH, DEPLOYMENTS, AND NSS TEST RESULTS
NGIPS Market Trends and Group Test Results
NSS Labs Präsentation isd
DEVSECOPS: Coding DevSecOps journey
Automating Open Source Security: A SANS Review of WhiteSource
WhiteSource Webinar What's New With WhiteSource in December 2018
Securing an NGINX deployment for K8s

What's hot (20)

PDF
[OWASP Poland Day] Embedding security into SDLC + GDPR
PPTX
Security in the Development Lifecycle - lessons learned
PPTX
WhiteSource Webinar-New Research Reveals Key Strategy to Manage Open Source S...
PDF
Innocent Vulnerabilities vs. Malicious Backdoors: How to Manage Your Risk
PDF
Outpost24 webinar - A day in the life of an information security professional
PPTX
Vulnerability Management Nirvana - Seattle Agora - 18Mar16
PPTX
The Devops Challenge: Open Source Security Throughout the DevOps Pipline- A W...
PDF
CI/CD pipeline security from start to finish with WhiteSource & CircleCI
PPTX
The State of Open Source Vulnerabilities - A WhiteSource Webinar
PDF
Outpost24 webinar - Improve your organizations security with red teaming
PDF
Open Source Security at Scale- The DevOps Challenge 
PPTX
The road goes ever on and on by Ciaran Conliffe
PDF
SACON - Threat Hunting Workshop (Shomiron Das Gupta)
PDF
Why does security matter for devops by Caroline Wong
PDF
From Zero To Hero: Continuous Container Security in 4 Simple Steps- A WhiteSo...
PPTX
The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...
PDF
Fluency - Next Generation Incident Response Utilizing Big Data Analytics Over...
PDF
Outpost24 Webinar - Common wireless security threats and how to avoid them
PDF
Demystifying DevSecOps
PDF
The Challenges of Scaling DevSecOps
[OWASP Poland Day] Embedding security into SDLC + GDPR
Security in the Development Lifecycle - lessons learned
WhiteSource Webinar-New Research Reveals Key Strategy to Manage Open Source S...
Innocent Vulnerabilities vs. Malicious Backdoors: How to Manage Your Risk
Outpost24 webinar - A day in the life of an information security professional
Vulnerability Management Nirvana - Seattle Agora - 18Mar16
The Devops Challenge: Open Source Security Throughout the DevOps Pipline- A W...
CI/CD pipeline security from start to finish with WhiteSource & CircleCI
The State of Open Source Vulnerabilities - A WhiteSource Webinar
Outpost24 webinar - Improve your organizations security with red teaming
Open Source Security at Scale- The DevOps Challenge 
The road goes ever on and on by Ciaran Conliffe
SACON - Threat Hunting Workshop (Shomiron Das Gupta)
Why does security matter for devops by Caroline Wong
From Zero To Hero: Continuous Container Security in 4 Simple Steps- A WhiteSo...
The Top 3 Strategies To Reduce Your Open Source Security Risks - A WhiteSour...
Fluency - Next Generation Incident Response Utilizing Big Data Analytics Over...
Outpost24 Webinar - Common wireless security threats and how to avoid them
Demystifying DevSecOps
The Challenges of Scaling DevSecOps
Ad

Similar to Is Your Security Blind to SSL/TSL? (20)

PDF
Webinar SSL English
PDF
SSL and TLS Theory and Practice 2nd Edition Rolf Oppliger
PDF
Details about the SSL Certificate
PPTX
Introduction to SSL and How to Exploit & Secure
PDF
Ssl And Tls Theory And Practice 2nd Rolf Oppliger
PPT
Ssl Https Server
PDF
3441355 ln motileng_ssl_report
PPTX
Ssl and tls
PPTX
ION Sri Lanka - TLS for Network Operators
PPSX
BSET_Lecture_Crypto and SSL_Overview_FINAL
DOC
Demonstration of secure socket layer(synopsis)
PDF
Introduction of an SSL Certificate
PDF
Ssl tls-beginners-guide
PDF
HTTPS, Here and Now
PDF
Case Studies and Lessons Learned from SSL/TLS Certificate Verification Vulner...
PPT
SSL.ppt
PDF
All About SSL/TLS
PPTX
Transport layer security (tls)
PPTX
Transport layer security (tls)
PDF
Differences to Know Between SSL & TLS certificate .pdf
Webinar SSL English
SSL and TLS Theory and Practice 2nd Edition Rolf Oppliger
Details about the SSL Certificate
Introduction to SSL and How to Exploit & Secure
Ssl And Tls Theory And Practice 2nd Rolf Oppliger
Ssl Https Server
3441355 ln motileng_ssl_report
Ssl and tls
ION Sri Lanka - TLS for Network Operators
BSET_Lecture_Crypto and SSL_Overview_FINAL
Demonstration of secure socket layer(synopsis)
Introduction of an SSL Certificate
Ssl tls-beginners-guide
HTTPS, Here and Now
Case Studies and Lessons Learned from SSL/TLS Certificate Verification Vulner...
SSL.ppt
All About SSL/TLS
Transport layer security (tls)
Transport layer security (tls)
Differences to Know Between SSL & TLS certificate .pdf
Ad

Recently uploaded (20)

PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Hybrid model detection and classification of lung cancer
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Mushroom cultivation and it's methods.pdf
PPTX
TLE Review Electricity (Electricity).pptx
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Unlocking AI with Model Context Protocol (MCP)
A comparative analysis of optical character recognition models for extracting...
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
WOOl fibre morphology and structure.pdf for textiles
Hybrid model detection and classification of lung cancer
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
MIND Revenue Release Quarter 2 2025 Press Release
gpt5_lecture_notes_comprehensive_20250812015547.pdf
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Mushroom cultivation and it's methods.pdf
TLE Review Electricity (Electricity).pptx
1 - Historical Antecedents, Social Consideration.pdf
Encapsulation_ Review paper, used for researhc scholars
Digital-Transformation-Roadmap-for-Companies.pptx
Hindi spoken digit analysis for native and non-native speakers
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Group 1 Presentation -Planning and Decision Making .pptx
Univ-Connecticut-ChatGPT-Presentaion.pdf
NewMind AI Weekly Chronicles - August'25-Week II
Programs and apps: productivity, graphics, security and other tools
Unlocking AI with Model Context Protocol (MCP)

Is Your Security Blind to SSL/TSL?