SlideShare a Scribd company logo
Infosecurity Magazine Webinar
#InfosecWebinar
@InfosecurityMag
Why Many Websites are still Insecure (and
How to Fix Them)
Sponsored by
Moderator
Dan Raywood, Contributing Editor
Infosecurity Magazine
#InfosecWebinar
@InfosecurityMag
Nick Sullivan, Head of Cryptography,
Cloudflare
Vlad Krasnov, System Engineer
Cloudflare
Scott Helme, UK Researcher
Josh Aas, Executive Director and co-founder
Let's Encrypt
#InfosecWebinar
@InfosecurityMag
Nick Sullivan
Head of Cryptography
Cloudflare
#InfosecWebinar
@InfosecurityMag
&
Vlad Krasnov
System Engineer
Cloudflare
Why Many Websites are still Insecure (and
How to Fix Them)
● What have been problems with TLS?
● Why TLS 1.2 was so slow to be adopted
● What problems and vulnerabilities did TLS 1.3 address?
● Will TLS 1.3 adoption be faster than that of TLS 1.2?
● The expensive “crypto” myth
● How you can help solve this problem
Agenda
HTTPS = HTTP + Security
• Transport Layer Security (TLS)
• Data encryption and integrity
• Server authentication
• Negotiation of keys happens in the
“handshake”
7
1994 1998 2002 2010 20142006 2018
SSLv1
SSLv2
SSLv3
TLSv1 TLSv1.1
TLSv1.2
TLSv1.3
What have been problems with TLS?
1994 1998 2002 2010 20142006 2016
SSLv1
SSLv2
SSLv3
TLSv1 TLSv1.1
TLSv1.2
SSLv2
Broken
SSLv3
Broken
(POODLE)
Vaudenay
Padding
Oracle
Boney/Brumley
Padding Oracle
MD5
CA
BEAST
CRIME
BREACH
RC4
Lucky 13
LogJam
WeakDH
Bleichenbacher
e=3
Heartbleed
BERserk
FREAK
SLOTH
DROWN
Padding Oracles
11
CBC mode (POODLE, BEAST, Lucky 13)
RSA Key Exchange (ROBOT)
MAC-then-encrypt
12
13
Valid padding TLS:
0x00
0x01, 0x01
0x02, 0x02, 0x02
etc.
MAC-then-encrypt
Padding
Oracle
Step 1
14
Padding
Oracle
Step 2
15
POODLE
16
Padding oracle and a downgrade attack
• Downgrade dance (thanks browsers!)
• Line things up so that padding is in last block
• Swap target block with padding block
• Around 256 guesses per byte
1994 1998 2002 2010 20142006 2018
SSLv1
SSLv2
SSLv3
TLSv1 TLSv1.1
TLSv1.2
TLSv1.3
SSLv2
Broken
SSLv3
Broken
(POODLE)
Vaudenay
Padding
Oracle
Boney/Brumley
Padding Oracle
MD5
CA
BEAST
CRIME
BREACH
RC4
Lucky 13
LogJam
WeakDH
Bleichenbacher
e=3
Heartbleed
BERserk
FREAK
Why TLS 1.2 was so slow to be adopted
Dec 2015Feb 2014May 2012
Data: SSL Pulse
Google
• Chrome 30 and later
• Google Android Browser for Android 5.0 and
later
Mozilla:
• Firefox 27 and and later
Microsoft:
• Internet Explorer 11 and later
• Internet Explorer Mobile 11 and later
• Microsoft Edge all versions
Apple
• Safari on OS X 10.9 and later
• Safari on iOS 5 and later
TLS 1.2 Client Support
TLS 1.2 had problems being deployed due
to server intolerance.
Some servers would disconnect rather than downgrade
if a TLS 1.2 client connected.
This led to the deployment of insecure downgrades,
which led to POODLE.
2
1
What problems and vulnerabilities did TLS
1.3 address?
TLS 1.3
Remove support for
● weak ciphers (3DES, RC4)
● weak cipher modes (CBC)
● weak public key modes (Static RSA, RSA-PKCS#1v1.5)
● insecure downgrade (POODLE)
● Insecure renegotiation modes (Triple Handshake)
2
3
Will TLS 1.3 adoption be faster than that
of TLS 1.2?
TLS 1.3 was tested in production before finalizing the
specification.
Server intolerance was found, along with middlebox
intolerance.
The specification was modified to be more friendly
(read: it looks a lot like 1.2 to intolerant
implementations)
The concept of GREASE was introduced to prevent
future intolerance.
TLS 1.2 had problems being deployed due to
server intolerance
The “expensive” crypto myth
Is it really a myth?
This is the new style.
● Yes … today
● Not so a few years ago
“Key exchange is slow”
● Historically: RSA
○ Even 1024-bit RSA was very, very slow on 32-bit systems
○ First x86-64 server in 2003 (Opteron)
○ Took years for ecosystem to catch up
■ First 64-bit Windows in 2005
■ x86_64 Montgomery Multiplication added to OpenSSL in 2005
● DSA was faser, but never caught up
● No ECDSA
○ Technically supported since TLS 1.0 (1999!)
○ Suite B in 2005
■ Patents
■ No CA support, more expensive
● Symantec (and others) added ECDSA in 2013, only with their
“premium” certificates
Käsper
Krasnov &
Gueron
Krasnov
Krasnov &
Gueron
AVX
2
ECDSA with ECDHE!
● Supported by all browsers today
● ECC certificates are available for FREE!
○ Let’s Encrypt
● Use with P256 or x25519 ECDHE key exchange
“Encryption is slow”
● Historically:
○ RC4
○ 3DES
○ AES-CBC
● Today:
○ AES-GCM
○ CHACHA20-POLY1305
AES-NI
“Stitched” implementation
“TLS adds round trips”
● Full TLS1.2 handshake adds 2 round trips
● Only 1 round trip with resumption
○ Tickets
○ Session ID
● Full TLS1.3 handshake only adds 1 round trip
● Option for 0 round trip
● Also round trips today can be made much shorter
○ Deploy in any geography
○ Use a CDN!
Why Many Websites are still Insecure (and How to Fix Them)
Why Many Websites are still Insecure (and How to Fix Them)
“TLS adds overhead to the network”
● Record framing
○ Smaller overhead when using AES-128-GCM
● Handshake
○ Smaller overhead when using x25519 + ECDSA
○ Certificate compression in TLS 1.3
● In addition to compensate over TLS
○ Enable HTTP/2 with HPACK header compression
○ Enable Brotli compression
“Certificates cost money and are hard to
manage”
● Free certificates by Let’s Encrypt and others
● Easy to manage and automate
○ ACME
A look into the future - Post Quantum
● Currently a “competition” is held by NIST
● Some good implementation
● Size vs. speed tradeoffs
○ E.g. NewHope very fast, large key exchange
○ E.g. SIKE, slower but small key exchange
● Good idea to start incorporating in KX today, for PFS
● Eventually signatures would have to evolve too
How you can help solve this problem
https://tls13.mitm.watch/
Scott Helme, UK Researcher
#InfosecWebinar
@InfosecurityMag
The Journey to TLSv1.3
@Scott_Helme | scotthelme.co.uk
Scott Helme
Why Many Websites are still Insecure (and How to Fix Them)
Source: https://scotthelme.co.uk/alexa-top-1-million-analysis-february-
Source:
Source:
TLSv1.2
• HTTP/2 has many benefits
• Brotli Compression
• SEO++
• Powerful Features (geolocation et
al.)
• Referrer Data
• Session Resumption
• HTTP Bad
Additional Support
• Content-Security-Policy
• upgrade-insecure-requests
• CSP Reporting (mixed-content)
• Strict-Transport-Security
• Default HTTPS
• Hard fail certificate errors
• Saves redirects on the wire
 TLSv1.3 is more complex
 TLSv1.3 is also simpler
TLSv1.3
All cipher suites
TLS_AES_128_GCM_SHA256
TLS_AES_256_GCM_SHA384
TLS_CHACHA20_POLY1305_SH
A256
TLS_AES_128_CCM_SHA256
TLS_AES_128_CCM_8_SHA256
Source: https://tools.ietf.org/html/draft-ietf-tls-tls13-
Better performance
1-RTT
Handshake
0-RTT
Handshake
Improved Forward Secrecy
Server key - Forward Secrecy (optional in
TLSv1.2)
Ticket key - Forward Secrecy (not in TLSv1.2)
Early data - No Forward Secrecy (n/a in
TLSv1.2)
Thanks!
@Scott_Helme | scotthelme.co.uk
Scott Helme
Questions?
@Scott_Helme | scotthelme.co.uk
Scott Helme
Josh Aas, Executive Director and co-founder
Let's Encrypt
#InfosecWebinar
@InfosecurityMag
Q&A
#InfosecWebinar
@InfosecurityMag
Infosecurity Magazine Webinar
#InfosecWebinar
@InfosecurityMag
Why Many Websites are still Insecure (and
How to Fix Them)
Sponsored by

More Related Content

PDF
65% Performance Gains at Cryptocurrency Platform CoinGecko: An Argo Smart Rou...
PDF
What You Should Know Before The Next DDoS Attack
PDF
Securing Internal Applications with Cloudflare Access
PDF
New Products Overview: Use Cases and Demos
PPTX
What’s New at Cloudflare: New Product Launches
PPTX
How to Flip a Switch for 55% Web Performance Gains
PPTX
How to Reduce Latency with Cloudflare Argo Smart Routing
PPTX
Latest Trends in Web Application Security
65% Performance Gains at Cryptocurrency Platform CoinGecko: An Argo Smart Rou...
What You Should Know Before The Next DDoS Attack
Securing Internal Applications with Cloudflare Access
New Products Overview: Use Cases and Demos
What’s New at Cloudflare: New Product Launches
How to Flip a Switch for 55% Web Performance Gains
How to Reduce Latency with Cloudflare Argo Smart Routing
Latest Trends in Web Application Security

What's hot (20)

PPTX
Managing Traffic Spikes This Holiday Season
PPTX
DDoS 101: Attack Types and Mitigation
PPTX
Surviving A DDoS Attack: Securing CDN Traffic at CloudFlare
PDF
SSL for SaaS Providers
PPTX
DNS and Infrastracture DDoS Protection
PPTX
Running a Robust DNS Infrastructure with CloudFlare Virtual DNS
PPTX
Protect Your Assets with Single IP DDoS Protection
PPT
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
PPTX
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
PPTX
E-commerce Optimization: Using Load Balancing and CDN to Improve Website Perf...
PPTX
Fully Automate Application Delivery with Puppet and F5 - PuppetConf 2014
PPTX
Unexpected Impacts of DDoS Attacks and How to Stop Them
PDF
Migrating from Akamai to Incapsula: What You Need to Know
PPTX
NGINX Plus R18: What's new
PPTX
A DevOps Guide to Web Application Security
PPTX
21092018-C4E-What's Next for the Net? Security, Reliability, Capability, Perf...
PPTX
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
PDF
Is the Cloud Going to Kill Traditional Application Delivery?
PDF
Next-Gen DDoS Detection
PPTX
Filling the Gaps in Your DDoS Mitigation Strategy
Managing Traffic Spikes This Holiday Season
DDoS 101: Attack Types and Mitigation
Surviving A DDoS Attack: Securing CDN Traffic at CloudFlare
SSL for SaaS Providers
DNS and Infrastracture DDoS Protection
Running a Robust DNS Infrastructure with CloudFlare Virtual DNS
Protect Your Assets with Single IP DDoS Protection
[Webinar] DDoS Pentester Reveals: How Hackers Find Your Website’s Weak Points...
Incapsula: How to Increase SaaS Websites’ Uptime and Accelerate Performance
E-commerce Optimization: Using Load Balancing and CDN to Improve Website Perf...
Fully Automate Application Delivery with Puppet and F5 - PuppetConf 2014
Unexpected Impacts of DDoS Attacks and How to Stop Them
Migrating from Akamai to Incapsula: What You Need to Know
NGINX Plus R18: What's new
A DevOps Guide to Web Application Security
21092018-C4E-What's Next for the Net? Security, Reliability, Capability, Perf...
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
Is the Cloud Going to Kill Traditional Application Delivery?
Next-Gen DDoS Detection
Filling the Gaps in Your DDoS Mitigation Strategy
Ad

Similar to Why Many Websites are still Insecure (and How to Fix Them) (20)

ODP
Tls 1.3
PPTX
TLS 1.3: Everything You Need to Know - CheapSSLsecurity
PDF
Rootconf2019
PDF
Vulnerability-tolerant Transport Layer Security
PDF
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
PDF
Introduction to TLS 1.3
PDF
Introduction to TLS-1.3
PDF
Sử dụng TLS đúng cách - Phạm Tùng Dương
PDF
wolfSSL and TLS 1.3
PDF
SSL, X.509, HTTPS - How to configure your HTTPS server
PPTX
Cours4.pptx
PPTX
BlueHat v17 || TLS 1.3 - Full speed ahead... mind the warnings - the great, t...
PPTX
ION Bangladesh - DANE, DNSSEC, and TLS Testing in the Go6lab
PPTX
Random musings on SSL/TLS configuration
PPTX
Introducing TLS 1.3 – The future of Encryption
PDF
Go paranoid
PPTX
[Wroclaw #8] TLS all the things!
PPTX
TLS - Transport Layer Security
PDF
OSDC 2018 | Hitchhiker’s guide to TLS 1.3 and GnuTLS by Ander Juaristi Alamos
PPTX
Wo defensive trickery_13mar2017
Tls 1.3
TLS 1.3: Everything You Need to Know - CheapSSLsecurity
Rootconf2019
Vulnerability-tolerant Transport Layer Security
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
Introduction to TLS 1.3
Introduction to TLS-1.3
Sử dụng TLS đúng cách - Phạm Tùng Dương
wolfSSL and TLS 1.3
SSL, X.509, HTTPS - How to configure your HTTPS server
Cours4.pptx
BlueHat v17 || TLS 1.3 - Full speed ahead... mind the warnings - the great, t...
ION Bangladesh - DANE, DNSSEC, and TLS Testing in the Go6lab
Random musings on SSL/TLS configuration
Introducing TLS 1.3 – The future of Encryption
Go paranoid
[Wroclaw #8] TLS all the things!
TLS - Transport Layer Security
OSDC 2018 | Hitchhiker’s guide to TLS 1.3 and GnuTLS by Ander Juaristi Alamos
Wo defensive trickery_13mar2017
Ad

More from Cloudflare (20)

PDF
Succeeding with Secure Access Service Edge (SASE)
PPTX
Close your security gaps and get 100% of your traffic protected with Cloudflare
PPTX
Why you should replace your d do s hardware appliance
PPTX
Don't Let Bots Ruin Your Holiday Business - Snackable Webinar
PPTX
Why Zero Trust Architecture Will Become the New Normal in 2021
PPTX
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
PPTX
Zero trust for everybody: 3 ways to get there fast
PPTX
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
PPTX
Network Transformation: What it is, and how it’s helping companies stay secur...
PPTX
Scaling service provider business with DDoS-mitigation-as-a-service
PPTX
Application layer attack trends through the lens of Cloudflare data
PPTX
Recent DDoS attack trends, and how you should respond
PPTX
Cybersecurity 2020 threat landscape and its implications (AMER)
PPTX
Strengthening security posture for modern-age SaaS providers
PPTX
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
PDF
Stopping DDoS Attacks in North America
PPTX
It’s 9AM... Do you know what’s happening on your network?
PPTX
Cyber security fundamentals (simplified chinese)
PPTX
Bring speed and security to the intranet with cloudflare for teams
PPTX
Accelerate your digital transformation
Succeeding with Secure Access Service Edge (SASE)
Close your security gaps and get 100% of your traffic protected with Cloudflare
Why you should replace your d do s hardware appliance
Don't Let Bots Ruin Your Holiday Business - Snackable Webinar
Why Zero Trust Architecture Will Become the New Normal in 2021
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
Zero trust for everybody: 3 ways to get there fast
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
Network Transformation: What it is, and how it’s helping companies stay secur...
Scaling service provider business with DDoS-mitigation-as-a-service
Application layer attack trends through the lens of Cloudflare data
Recent DDoS attack trends, and how you should respond
Cybersecurity 2020 threat landscape and its implications (AMER)
Strengthening security posture for modern-age SaaS providers
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Stopping DDoS Attacks in North America
It’s 9AM... Do you know what’s happening on your network?
Cyber security fundamentals (simplified chinese)
Bring speed and security to the intranet with cloudflare for teams
Accelerate your digital transformation

Recently uploaded (20)

PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Empathic Computing: Creating Shared Understanding
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
cuic standard and advanced reporting.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Encapsulation theory and applications.pdf
PPTX
Spectroscopy.pptx food analysis technology
PDF
Chapter 3 Spatial Domain Image Processing.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Network Security Unit 5.pdf for BCA BBA.
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Empathic Computing: Creating Shared Understanding
Spectral efficient network and resource selection model in 5G networks
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Mobile App Security Testing_ A Comprehensive Guide.pdf
cuic standard and advanced reporting.pdf
Review of recent advances in non-invasive hemoglobin estimation
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
NewMind AI Weekly Chronicles - August'25 Week I
Building Integrated photovoltaic BIPV_UPV.pdf
Unlocking AI with Model Context Protocol (MCP)
The Rise and Fall of 3GPP – Time for a Sabbatical?
20250228 LYD VKU AI Blended-Learning.pptx
MYSQL Presentation for SQL database connectivity
Encapsulation theory and applications.pdf
Spectroscopy.pptx food analysis technology
Chapter 3 Spatial Domain Image Processing.pdf

Why Many Websites are still Insecure (and How to Fix Them)