SlideShare a Scribd company logo
1 of 65
Vรญt zslav รญลพekฤ› ฤŒ
vcizek@suse.com
Introduction to TLS 1.3
About me
โ— Open Source Developer
โ— Software Engineer at SUSE
โ€“ Mostly C programming
โ€“ Member of Emergency Update Team
โ€“ Maintainer of OpenSSL, GnuTLS and mod_nss
Agenda
โ— Whatโ€™s TLS
โ— Whatโ€™s different in TLS 1.3
โ— TLS 1.3 adoption
What is TLS
What is Transport Layer Security
โ— cryptographic protocol providing a secure connection over
computer networks
โ— Widely used on the Internet
โ€“ HTTP, Email, VPN, VoIP, etc
โ— Client-Server architecture
โ— Utilizes Public Key Infrastructure
Properties of the Secure Connection
โ— Authentication
โ€“ Public Key Cryptography
โ€“ Mandatory for the server
โ— Confidentiality
โ€“ Transmitted data is private to the peers
โ— Integrity
โ€“ Sent data cannot be modified
TLS Components
โ— Handshake protocol (interesting)
โ€“ Establish shared keys
โ€“ Negotiate parameters
โ€“ Authenticate peers
โ— Record protocol (boring)
โ€“ Data transmission
Handshake (TLS 1.2)
โ— Shared secret exchanged
using DHE
โ— Random nonces and
shared secret mixed into a
master secret
โ— All keys are derived from
master secret
TLS Security Issues
Brief history of TLS
โ— SSL 2.0: *1995, โ€ 2011 (RFC 6176)
โ— SSL 3.0: *1996, โ€ 2015 (RFC 7568)
โ— TLS 1.0: *1999 (RFC 2246)
โ— TLS 1.1: *2006 (RFC 4346)
โ— TLS 1.2: *2008 (RFC 5246)
โ— TLS 1.3: *2018 (Proposed Standard)
SSL 2.0 deficiencies
โ— Sessions terminated by the end of TCP connection
โ€“ Injected TCP FIN is indistinguishable from a legimate end of the session
โ— Handshake messages are not protected
โ€“ MitM can trick the client into picking a weaker cipher suite
โ— Weak MAC (MD5)
โ— MAC and encryption use the same key
โ€“ Problem with a weak encryption algorithm
โ— Missing functionality (PFS, Extensions, etc)
SSL 3.0
โ— Killed by a dog!
โ— Do you know which one?
POODLE Attack (CVEยญ-2014ยญ-3566)
โ— Padding Oracle on Downgraded Legacy Encryption
โ— Exploits CBC encryption mode
โ€“ Padding is non-deterministic and not covered by MAC
โ— No more secure ciphers in SSL 3.0
SSL 3.0 Issues
โ— No suitable ciphers
โ€“ AES CBC broken (POODLE)
โ€“ RC4 is weak and biased
โ— MAC-then-encrypt used in CBC mode
โ— Key Exchange vulnerable to MitM
โ€“ Renegotiation attack
โ€“ Triple Handshake (session resumption)
โ— Weak hash functions SHA-1 and
MD5
โ— Custom Cryptographic Primitives
(risky)
โ— Missing functionality
โ€“ TLS Extensions are used to
address the issues on the left
Some attacks agains TLS
โ— CBC
โ€“ BEAST, POODLE, Lucky
Microseconds
โ— Mac-Then-Encrypt
โ€“ Lucky 13
โ— Compression
โ€“ CRIME, TIME, BREACH
โ— RSA
โ€“ Bleichenbacher, Klรญma, ROBOT,
BERserk, FREAK
โ— RC4
โ€“ RC4 No More, Bar-Mitzvah
โ— MD5/SHA1
โ€“ SLOTH
โ— Renegotiation
โ€“ Triple Handshake, CVE-2009-3555
Other Security Issues
โ— Implementation bugs
โ€“ Heartbleed, BERserk, SMACK
โ€“ Hundreds of CVEs
โ— Weak cryptography
โ€“ LOGJAM, (FREAK, Curveswap)
More information about TLS security
โ— RFC 7457: Summarizing Known Attacks on TLS and DTLS
โ— RFC 7525: Recommendations for Secure Use of TLS and
DTLS
TLS 1.3
TLS 1.3 Standard Development
โ— Lead by IETF
โ— Initiated in Spring 2014
โ— GitHub: https://github.com/tlswg/tls13-spec
โ— Mailing List: tls@ietf.org
TLS 1.3 development
โ— More open to the community
โ— Several independent implementations
โ— Formal verification
TLS 1.3 Design Goals (by Eric Rescorla)
โ— Clean-up
โ€“ Remove unused and
obsolete stuff
โ— Security
โ€“ Use modern cryptography
โ— Privacy
โ€“ Encrypt more of the protocol
โ— Performance
โ€“ Speed up the handshake
โ— Continuity
โ€“ Maintain existing use
cases
Half of the presentation
โ— Still awake? Good!
โ— More interesting stuff coming :-)
Clean-Up
Clean-up Victims
โ— Custom DHE groups
โ€“ Servers guessing
acceptable client size
โ€“ Unused for ECDHE
โ— Point formats negotiation
โ€“ Mostly uncompressed
formats used
โ— DSA
โ— โ€œObscureโ€ ciphers
(Camellia)
โ— Renegotiation
Protocol Simplification
โ— Simplified handshake state machine
โ— Session resumption merged with PSK
โ— Renegotiation removed and replaced
Renegotiation
โ— Complicated, source of several vulnerabilities
(3Handshake)
โ— Key Update
โ€“ Simple post-handshake message
โ€“ New keys derived from the old keys by HKDF
โ— Post-Handshake Authentication
โ€“ Server prompts client for a certificate
Better Security
Security Victims
โ— Compression
โ— Export Ciphers
โ— Static RSA Key Exchange
โ€“ Slow, not PFS
โ— RSA-PKCS15
โ— Non-AEAD ciphers
โ— Static DH removed
โ€“ Not PFS
Compression
โ— CBC
โ€“ BEAST, POODLE, Lucky
Microseconds
โ— Mac-Then-Encrypt
โ€“ Lucky 13
โ— Compression
โ€“ CRIME, TIME, BREACH
โ— RSA
โ€“ Bleichenbacher, Klรญma, ROBOT,
BERserk, FREAK
โ— RC4
โ€“ RC4 No More, Bar-Mitzvah
โ— MD5/SHA1
โ€“ SLOTH
โ— Renegotiation
โ€“ Triple Handshake, CVE-2009-3555
Non-AEAD ciphers
โ— CBC
โ€“ BEAST, POODLE, Lucky
Microseconds
โ— Mac-Then-Encrypt
โ€“ Lucky 13
โ— Compression
โ€“ CRIME, TIME, BREACH
โ— RSA
โ€“ Bleichenbacher, Klรญma, ROBOT,
BERserk, FREAK
โ— RC4
โ€“ RC4 No More, Bar-Mitzvah
โ— MD5/SHA1
โ€“ SLOTH
โ— Renegotiation
โ€“ Triple Handshake, CVE-2009-3555
RSA
โ— CBC
โ€“ BEAST, POODLE, Lucky
Microseconds
โ— Mac-Then-Encrypt
โ€“ Lucky 13
โ— Compression
โ€“ CRIME, TIME, BREACH
โ— RSA
โ€“ Bleichenbacher, Klรญma, ROBOT,
BERserk, FREAK
โ— RC4
โ€“ RC4 No More, Bar-Mitzvah
โ— MD5/SHA1
โ€“ SLOTH
โ— Renegotiation
โ€“ Triple Handshake, CVE-2009-3555
Overall
โ— CBC
โ€“ BEAST, POODLE, Lucky
Microseconds
โ— Mac-Then-Encrypt
โ€“ Lucky 13
โ— Compression
โ€“ CRIME, TIME, BREACH
โ— RSA
โ€“ Bleichenbacher, Klรญma, ROBOT,
BERserk, FREAK
โ— RC4
โ€“ RC4 No More, Bar-Mitzvah
โ— MD5/SHA1
โ€“ SLOTH
โ— Renegotiation
โ€“ Triple Handshake, CVE-2009-3555
TLS 1.3 cipher suites
โ— Authentication and key exchange separated from cipher
negotiation
โ— Authentication
โ€“ Certificate/PSK
โ— Key exchange
โ€“ ECDHE/DHE
TLS 1.2 and 1.3 ciphers
โ— Key exchange, Authentication, Encryption, MAC
โ— TLS 1.2
โ€“ TLS_ECDHE_ECDSA_AES_256_GCM_SHA384
โ— TLS 1.3
โ€“ TLS_AES_256_GCM_SHA384
The short TLS 1.3 ciphers list
โ— TLS13-AES-256-GCM-SHA384
โ— TLS13-CHACHA20-POLY1305-SHA256
โ— TLS13-AES-128-GCM-SHA256
โ— TLS13-AES-128-CCM-8-SHA256
โ— TLS13-AES-128-CCM-SHA256
TLS 1.3 Crypto overview
โ— Key Exchange
โ€“ Elliptic Curves: P-256, P-384, P-521, x25519, x448
โ€“ Finite Field (DHE)
โ— Authentication
โ€“ RSA, ECDSA, EdDSA
โ— Encryption
โ€“ AEAD only (AES-GCM, ChaCha20/Poly1305)
โ€“ Cipher TLS_AES_128_GCM_SHA256 mandatory
TLS 1.3 Crypto Summary
โ— A few, but good choices
โ— Just 5 ciphersuites (1 mandatory)
โ— One EC point format
Speed-up
Handshake Speed-up
โ— 1 round trip โ€œlighterโ€ than TLS 1.2 in most cases
โ— Full Handshake (1-RTT)
โ— Resumption (0-RTT)
Full Handshake (1.2 vs 1.3)
TLS 1.3
โ— Tries to be optimistic
โ€“ Goes hand in hand with the reduced list of options
โ— Client guesses server parameters and sends a key_share
on first flight
โ— key_share can contain more groups
โ— What happens when the speculation goes wrong?
TLS 1.3 โ€“ Worst Case
โ— Server didnโ€™t like the
clientโ€™s key_share
โ— Sends its own key_share
based on supported client
groups
Resumed Handshake (1.2 vs 1.3)
Perfect Forward Secrecy
โ— TLS 1.2
โ€“ Server certificate
โ— DHE ciphers: YES
โ— Other ciphers: NO
โ€“ Pre-Shared Key
โ— NO
โ— TLS 1.3
โ€“ Server certificate
โ— YES (all ciphers are
DHE)
โ€“ Pre-Shared Key
โ— PSK-ECDHE: YES
(except EarlyData)
โ— PSK-only: NO
1-RTT: Can we do better?
โ— 0-RTT Early Data!
TLS 1.3 with 0-RTT
โ— Early data encrypted with
the PSK
โ— Not forward secret
โ— Needs application support
O-RTT: EarlyData
โ— Upon receiving 0-RTT EarlyData a server can:
โ€“ Ignore it and return 1-RTT response
โ€“ Request a new CH by HRR and skip all Application Data
โ€“ Send early_data in encrypted extensions, signalling that it'll process it
โ— TLS implementations shouldn't resend early data, and mustn't
โ— resend them if ALPN differs in negotiated connection
โ— After server's Finished, EndOfEarlyData indicates key change
Replay Attack!
โ— Attacker can replay the Early Data
EarlyData Anti-Replay Protection
โ— Mitigation: saving state and allow the 0-RTT data accepted
once
โ— Problem sharing the state when the servers are
geographically spread
โ€“ No globally consistent server state
โ— Servers should ensure that any server accepts 0-RTT for
the same 0-RTT handshake at most once
EarlyData Replay Attacks
โ— The Replays canโ€™t be avoided, only limited
โ€“ Attacker could be fast enough
โ€“ No consistent state across all the servers
โ— Applications have to count with it
โ€“ Allow only idempotent requests (HTTP Get)
More Privacy
Traffic analysis countermeasures
โ— More parts of the Handshake are encrypted
โ€“ Server certificate
โ— Record content type encrypted
โ€“ 23 (application data)
โ€“ True content type hidden encrypted
โ— Arbitrary padding
โ— SNI
โ€“ Proposal using Front/Hidden via 0-RTT data
Compatibility
Middleboxes
โ— Machines that examine TLS traffic
โ€“ MitM the TLS connection
โ— Middleboxes donโ€™t like new versions
โ€“ version 0x0304 means disconnect
โ— Solution: Make TLS 1.3 look like TLS 1.2 resumption
TLS 1.3 Camouflage
โ— KeyShare, supported_versions, PSK are extensions
โ— HRR looks like ServerHello, distinguished by Random field
โ€“ Random set to SHA-256 of "HelloRetryRequest"
โ— Real protocol version in supported_version extension
โ— session_id and compression restored back in ServerHello
โ— Dummy Change Cipher Spec (CCS)
โ— GREASE mechanism
TLS 1.3 pitfalls
โ— TLS 1.3 ciphers incompatible with TLS 1.2
โ€“ OpenSSL cipher string "ECDHE" won't match any TLS 1.3
ciphersuites
โ— Sessions are established after the handshake
โ— DSA certificate aren't allowed any more
โ— Renegotiation results in a terminated connection
โ— Compression also not allowed
TLS 1.3 Adoption
TLS 1.3 status
โ— Draft 28 approved as Proposed Standard by IETF
โ— Will become an RFC soon
TLS Libraries
โ— OpenSSL: will be in 1.1.1
โ— GnuTLS: will be in 3.6.3
โ— NSS: yes
โ— SChannel (Microsoft): not yet
โ— Secure Transport (Apple): yes
Web Browsers
โ— Chrome: yes, enabled since 65
โ— Firefox: yes, gradually being enabled
โ€“ check your security.tls.version.max
โ— Safari: yes, off by default
โ— Edge: no, in development
Web servers
โ— Apache
โ€“ mod_ssl: no
โ€“ mod_nss: yes, since 1.0.17
โ— Nginx: yes, 1.13
โ— IIS: no
Other Applications
โ— Wireshark
close_notify
โ— Questions?
Links
โ— TLS 1.3 Draft 28: https://tools.ietf.org/html/draft-ietf-tls-tls13-28
โ— Summarizing Known Attacks on TLS: https://tools.ietf.org/html/rfc7457
โ— Recommendations for Secure Use of Transport Layer Security (TLS)
โ— https://tools.ietf.org/html/rfc7525
โ— https://tools.ietf.org/html/rfc7525
โ— https://tools.ietf.org/html/rfc7525
License
This slide deck is licensed under the Creative Commons Attribution-ShareAlike 4.0 International
license.
It can be shared and adapted for any purpose (even commercially) as long as Attribution is given and
any derivative work is distributed under the same license.
Details can be found at https://creativecommons.org/licenses/by-sa/4.0/
General Disclaimer
This document is not to be construed as a promise by any participating organisation to develop,
deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and
should not be relied upon in making purchasing decisions. openSUSE makes no representations or
warranties with respect to the contents of this document, and specifically disclaims any express or
implied warranties of merchantability or fitness for any particular purpose. The development, release,
and timing of features or functionality described for openSUSE products remains at the sole discretion
of openSUSE. Further, openSUSE reserves the right to revise this document and to make changes to
its content, at any time, without obligation to notify any person or entity of such revisions or changes.
All openSUSE marks referenced in this presentation are trademarks or registered trademarks of
SUSE LLC, in the United States and other countries. All third-party trademarks are the property of
their respective owners.
Credits
Template
Richard Brown
rbrown@opensuse.org
Design & Inspiration
openSUSE Design Team
http://opensuse.github.io/branding-
guidelines/

More Related Content

What's hot

Recover A RSA Private key from a TLS session with perfect forward secrecy
Recover A RSA Private key from a TLS session with perfect forward secrecyRecover A RSA Private key from a TLS session with perfect forward secrecy
Recover A RSA Private key from a TLS session with perfect forward secrecy
Priyanka Aash
ย 
Transport Layer Security
Transport Layer SecurityTransport Layer Security
Transport Layer Security
Chhatra Thapa
ย 
Transport layer security
Transport layer securityTransport layer security
Transport layer security
Hrudya Balachandran
ย 
Sniffing SSL Traffic
Sniffing SSL TrafficSniffing SSL Traffic
Sniffing SSL Traffic
dkaya
ย 

What's hot (20)

Intro to Packet Analysis - pfSense Hangout May 2014
Intro to Packet Analysis - pfSense Hangout May 2014Intro to Packet Analysis - pfSense Hangout May 2014
Intro to Packet Analysis - pfSense Hangout May 2014
ย 
TLS/SSL Protocol Design 201006
TLS/SSL Protocol Design 201006TLS/SSL Protocol Design 201006
TLS/SSL Protocol Design 201006
ย 
CNIT 1417. Keyed Hashing
CNIT 1417. Keyed HashingCNIT 1417. Keyed Hashing
CNIT 1417. Keyed Hashing
ย 
Site-to-Site VPNs - pfSense Hangout November 2015
Site-to-Site VPNs - pfSense Hangout November 2015Site-to-Site VPNs - pfSense Hangout November 2015
Site-to-Site VPNs - pfSense Hangout November 2015
ย 
Recover A RSA Private key from a TLS session with perfect forward secrecy
Recover A RSA Private key from a TLS session with perfect forward secrecyRecover A RSA Private key from a TLS session with perfect forward secrecy
Recover A RSA Private key from a TLS session with perfect forward secrecy
ย 
TLS/SSL Internet Security Talk
TLS/SSL Internet Security TalkTLS/SSL Internet Security Talk
TLS/SSL Internet Security Talk
ย 
CNIT 141: 6. Hash Functions
CNIT 141: 6. Hash FunctionsCNIT 141: 6. Hash Functions
CNIT 141: 6. Hash Functions
ย 
Traffic Shaping Basics with PRIQ - pfSense Hangout February 2016
Traffic Shaping Basics with PRIQ - pfSense Hangout February 2016Traffic Shaping Basics with PRIQ - pfSense Hangout February 2016
Traffic Shaping Basics with PRIQ - pfSense Hangout February 2016
ย 
Transport Layer Security
Transport Layer SecurityTransport Layer Security
Transport Layer Security
ย 
Geographically dispersed perconaxtra db cluster deployment
Geographically dispersed perconaxtra db cluster deploymentGeographically dispersed perconaxtra db cluster deployment
Geographically dispersed perconaxtra db cluster deployment
ย 
security in transport layer ssl
 security in transport layer ssl security in transport layer ssl
security in transport layer ssl
ย 
Transport layer security
Transport layer securityTransport layer security
Transport layer security
ย 
SSL Secure Socket Layer
SSL Secure Socket LayerSSL Secure Socket Layer
SSL Secure Socket Layer
ย 
SSL/TLS
SSL/TLSSSL/TLS
SSL/TLS
ย 
Sniffing SSL Traffic
Sniffing SSL TrafficSniffing SSL Traffic
Sniffing SSL Traffic
ย 
Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)
ย 
Connectivity Troubleshooting - pfSense Hangout June 2016
Connectivity Troubleshooting - pfSense Hangout June 2016Connectivity Troubleshooting - pfSense Hangout June 2016
Connectivity Troubleshooting - pfSense Hangout June 2016
ย 
Advanced OpenVPN Concepts on pfSense 2.4 & 2.3.3 - pfSense Hangout February 2017
Advanced OpenVPN Concepts on pfSense 2.4 & 2.3.3 - pfSense Hangout February 2017Advanced OpenVPN Concepts on pfSense 2.4 & 2.3.3 - pfSense Hangout February 2017
Advanced OpenVPN Concepts on pfSense 2.4 & 2.3.3 - pfSense Hangout February 2017
ย 
Configuring Netgate Appliance Integrated Switches on pfSense 2.4.4 - pfSense ...
Configuring Netgate Appliance Integrated Switches on pfSense 2.4.4 - pfSense ...Configuring Netgate Appliance Integrated Switches on pfSense 2.4.4 - pfSense ...
Configuring Netgate Appliance Integrated Switches on pfSense 2.4.4 - pfSense ...
ย 
NAT on pfSense 2.3 - pfSense Hangout May 2016
NAT on pfSense 2.3 - pfSense Hangout May 2016NAT on pfSense 2.3 - pfSense Hangout May 2016
NAT on pfSense 2.3 - pfSense Hangout May 2016
ย 

Similar to Tls 13final13

SSL, X.509, HTTPS - How to configure your HTTPS server
SSL, X.509, HTTPS - How to configure your HTTPS serverSSL, X.509, HTTPS - How to configure your HTTPS server
SSL, X.509, HTTPS - How to configure your HTTPS server
hannob
ย 
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdfSECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
NiharikaDubey17
ย 
ssl-tls-ipsec-vpn.pptx
ssl-tls-ipsec-vpn.pptxssl-tls-ipsec-vpn.pptx
ssl-tls-ipsec-vpn.pptx
jithu26327
ย 

Similar to Tls 13final13 (20)

Rootconf2019
Rootconf2019Rootconf2019
Rootconf2019
ย 
SSL, X.509, HTTPS - How to configure your HTTPS server
SSL, X.509, HTTPS - How to configure your HTTPS serverSSL, X.509, HTTPS - How to configure your HTTPS server
SSL, X.509, HTTPS - How to configure your HTTPS server
ย 
Tls 1.3
Tls 1.3Tls 1.3
Tls 1.3
ย 
Cours4.pptx
Cours4.pptxCours4.pptx
Cours4.pptx
ย 
Pentesting custom TLS stacks
Pentesting custom TLS stacksPentesting custom TLS stacks
Pentesting custom TLS stacks
ย 
Why Many Websites are still Insecure (and How to Fix Them)
Why Many Websites are still Insecure (and How to Fix Them)Why Many Websites are still Insecure (and How to Fix Them)
Why Many Websites are still Insecure (and How to Fix Them)
ย 
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdfSECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
SECURE SOCKET LAYER(SSL)_LECTURE SLIDES.pdf
ย 
CNIT 141: 13. TLS
CNIT 141: 13. TLSCNIT 141: 13. TLS
CNIT 141: 13. TLS
ย 
CNIT 141: 13. TLS
CNIT 141: 13. TLSCNIT 141: 13. TLS
CNIT 141: 13. TLS
ย 
Egor Podmokov - TLS from security point of view
Egor Podmokov - TLS from security point of viewEgor Podmokov - TLS from security point of view
Egor Podmokov - TLS from security point of view
ย 
CNIT 141 13. TLS
CNIT 141 13. TLSCNIT 141 13. TLS
CNIT 141 13. TLS
ย 
SSL overview
SSL overviewSSL overview
SSL overview
ย 
ssl-tls-ipsec-vpn.pptx
ssl-tls-ipsec-vpn.pptxssl-tls-ipsec-vpn.pptx
ssl-tls-ipsec-vpn.pptx
ย 
Go paranoid
Go paranoidGo paranoid
Go paranoid
ย 
TLS 1.3: Everything You Need to Know - CheapSSLsecurity
TLS 1.3: Everything You Need to Know - CheapSSLsecurityTLS 1.3: Everything You Need to Know - CheapSSLsecurity
TLS 1.3: Everything You Need to Know - CheapSSLsecurity
ย 
TLS Perf: from three to zero in one spec
TLS Perf:  from three to zero in one specTLS Perf:  from three to zero in one spec
TLS Perf: from three to zero in one spec
ย 
Ssl (Secure Socket Layer)
Ssl (Secure Socket Layer)Ssl (Secure Socket Layer)
Ssl (Secure Socket Layer)
ย 
DANE/DNSSEC/TLS Testing in the go6Lab - ION Cape Town
DANE/DNSSEC/TLS Testing in the go6Lab - ION Cape TownDANE/DNSSEC/TLS Testing in the go6Lab - ION Cape Town
DANE/DNSSEC/TLS Testing in the go6Lab - ION Cape Town
ย 
SSL Checklist for Pentesters (BSides MCR 2014)
SSL Checklist for Pentesters (BSides MCR 2014)SSL Checklist for Pentesters (BSides MCR 2014)
SSL Checklist for Pentesters (BSides MCR 2014)
ย 
Using SCTP with Scamper and Netty
Using SCTP with Scamper and NettyUsing SCTP with Scamper and Netty
Using SCTP with Scamper and Netty
ย 

Recently uploaded

Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐ŸฅตLow Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
Chandigarh Call girls 9053900678 Call girls in Chandigarh
ย 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
SUHANI PANDEY
ย 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
singhpriety023
ย 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
SUHANI PANDEY
ย 
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRLLucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
imonikaupta
ย 

Recently uploaded (20)

Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
ย 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
ย 
WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)
WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)
WhatsApp ๐Ÿ“ž 8448380779 โœ…Call Girls In Mamura Sector 66 ( Noida)
ย 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
ย 
Call Now โ˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now โ˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
ย 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
ย 
Call Now โ˜Ž 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now โ˜Ž 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
ย 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
ย 
Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...
Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...
Hireโ† Young Call Girls in Tilak nagar (Delhi) โ˜Ž๏ธ 9205541914 โ˜Ž๏ธ Independent Esc...
ย 
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Prashant Vihar, Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
ย 
Call Now โ˜Ž 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.Call Now โ˜Ž 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
ย 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
ย 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
ย 
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐ŸฅตLow Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
Low Sexy Call Girls In Mohali 9053900678 ๐ŸฅตHave Save And Good Place ๐Ÿฅต
ย 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
ย 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
ย 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
ย 
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft DatingDubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
ย 
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRLLucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
ย 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
ย 

Tls 13final13

  • 1. Vรญt zslav รญลพekฤ› ฤŒ vcizek@suse.com Introduction to TLS 1.3
  • 2. About me โ— Open Source Developer โ— Software Engineer at SUSE โ€“ Mostly C programming โ€“ Member of Emergency Update Team โ€“ Maintainer of OpenSSL, GnuTLS and mod_nss
  • 3. Agenda โ— Whatโ€™s TLS โ— Whatโ€™s different in TLS 1.3 โ— TLS 1.3 adoption
  • 5. What is Transport Layer Security โ— cryptographic protocol providing a secure connection over computer networks โ— Widely used on the Internet โ€“ HTTP, Email, VPN, VoIP, etc โ— Client-Server architecture โ— Utilizes Public Key Infrastructure
  • 6. Properties of the Secure Connection โ— Authentication โ€“ Public Key Cryptography โ€“ Mandatory for the server โ— Confidentiality โ€“ Transmitted data is private to the peers โ— Integrity โ€“ Sent data cannot be modified
  • 7. TLS Components โ— Handshake protocol (interesting) โ€“ Establish shared keys โ€“ Negotiate parameters โ€“ Authenticate peers โ— Record protocol (boring) โ€“ Data transmission
  • 8. Handshake (TLS 1.2) โ— Shared secret exchanged using DHE โ— Random nonces and shared secret mixed into a master secret โ— All keys are derived from master secret
  • 10. Brief history of TLS โ— SSL 2.0: *1995, โ€ 2011 (RFC 6176) โ— SSL 3.0: *1996, โ€ 2015 (RFC 7568) โ— TLS 1.0: *1999 (RFC 2246) โ— TLS 1.1: *2006 (RFC 4346) โ— TLS 1.2: *2008 (RFC 5246) โ— TLS 1.3: *2018 (Proposed Standard)
  • 11. SSL 2.0 deficiencies โ— Sessions terminated by the end of TCP connection โ€“ Injected TCP FIN is indistinguishable from a legimate end of the session โ— Handshake messages are not protected โ€“ MitM can trick the client into picking a weaker cipher suite โ— Weak MAC (MD5) โ— MAC and encryption use the same key โ€“ Problem with a weak encryption algorithm โ— Missing functionality (PFS, Extensions, etc)
  • 12. SSL 3.0 โ— Killed by a dog! โ— Do you know which one?
  • 13. POODLE Attack (CVEยญ-2014ยญ-3566) โ— Padding Oracle on Downgraded Legacy Encryption โ— Exploits CBC encryption mode โ€“ Padding is non-deterministic and not covered by MAC โ— No more secure ciphers in SSL 3.0
  • 14. SSL 3.0 Issues โ— No suitable ciphers โ€“ AES CBC broken (POODLE) โ€“ RC4 is weak and biased โ— MAC-then-encrypt used in CBC mode โ— Key Exchange vulnerable to MitM โ€“ Renegotiation attack โ€“ Triple Handshake (session resumption) โ— Weak hash functions SHA-1 and MD5 โ— Custom Cryptographic Primitives (risky) โ— Missing functionality โ€“ TLS Extensions are used to address the issues on the left
  • 15. Some attacks agains TLS โ— CBC โ€“ BEAST, POODLE, Lucky Microseconds โ— Mac-Then-Encrypt โ€“ Lucky 13 โ— Compression โ€“ CRIME, TIME, BREACH โ— RSA โ€“ Bleichenbacher, Klรญma, ROBOT, BERserk, FREAK โ— RC4 โ€“ RC4 No More, Bar-Mitzvah โ— MD5/SHA1 โ€“ SLOTH โ— Renegotiation โ€“ Triple Handshake, CVE-2009-3555
  • 16. Other Security Issues โ— Implementation bugs โ€“ Heartbleed, BERserk, SMACK โ€“ Hundreds of CVEs โ— Weak cryptography โ€“ LOGJAM, (FREAK, Curveswap)
  • 17. More information about TLS security โ— RFC 7457: Summarizing Known Attacks on TLS and DTLS โ— RFC 7525: Recommendations for Secure Use of TLS and DTLS
  • 19. TLS 1.3 Standard Development โ— Lead by IETF โ— Initiated in Spring 2014 โ— GitHub: https://github.com/tlswg/tls13-spec โ— Mailing List: tls@ietf.org
  • 20. TLS 1.3 development โ— More open to the community โ— Several independent implementations โ— Formal verification
  • 21. TLS 1.3 Design Goals (by Eric Rescorla) โ— Clean-up โ€“ Remove unused and obsolete stuff โ— Security โ€“ Use modern cryptography โ— Privacy โ€“ Encrypt more of the protocol โ— Performance โ€“ Speed up the handshake โ— Continuity โ€“ Maintain existing use cases
  • 22. Half of the presentation โ— Still awake? Good! โ— More interesting stuff coming :-)
  • 24. Clean-up Victims โ— Custom DHE groups โ€“ Servers guessing acceptable client size โ€“ Unused for ECDHE โ— Point formats negotiation โ€“ Mostly uncompressed formats used โ— DSA โ— โ€œObscureโ€ ciphers (Camellia) โ— Renegotiation
  • 25. Protocol Simplification โ— Simplified handshake state machine โ— Session resumption merged with PSK โ— Renegotiation removed and replaced
  • 26. Renegotiation โ— Complicated, source of several vulnerabilities (3Handshake) โ— Key Update โ€“ Simple post-handshake message โ€“ New keys derived from the old keys by HKDF โ— Post-Handshake Authentication โ€“ Server prompts client for a certificate
  • 28. Security Victims โ— Compression โ— Export Ciphers โ— Static RSA Key Exchange โ€“ Slow, not PFS โ— RSA-PKCS15 โ— Non-AEAD ciphers โ— Static DH removed โ€“ Not PFS
  • 29. Compression โ— CBC โ€“ BEAST, POODLE, Lucky Microseconds โ— Mac-Then-Encrypt โ€“ Lucky 13 โ— Compression โ€“ CRIME, TIME, BREACH โ— RSA โ€“ Bleichenbacher, Klรญma, ROBOT, BERserk, FREAK โ— RC4 โ€“ RC4 No More, Bar-Mitzvah โ— MD5/SHA1 โ€“ SLOTH โ— Renegotiation โ€“ Triple Handshake, CVE-2009-3555
  • 30. Non-AEAD ciphers โ— CBC โ€“ BEAST, POODLE, Lucky Microseconds โ— Mac-Then-Encrypt โ€“ Lucky 13 โ— Compression โ€“ CRIME, TIME, BREACH โ— RSA โ€“ Bleichenbacher, Klรญma, ROBOT, BERserk, FREAK โ— RC4 โ€“ RC4 No More, Bar-Mitzvah โ— MD5/SHA1 โ€“ SLOTH โ— Renegotiation โ€“ Triple Handshake, CVE-2009-3555
  • 31. RSA โ— CBC โ€“ BEAST, POODLE, Lucky Microseconds โ— Mac-Then-Encrypt โ€“ Lucky 13 โ— Compression โ€“ CRIME, TIME, BREACH โ— RSA โ€“ Bleichenbacher, Klรญma, ROBOT, BERserk, FREAK โ— RC4 โ€“ RC4 No More, Bar-Mitzvah โ— MD5/SHA1 โ€“ SLOTH โ— Renegotiation โ€“ Triple Handshake, CVE-2009-3555
  • 32. Overall โ— CBC โ€“ BEAST, POODLE, Lucky Microseconds โ— Mac-Then-Encrypt โ€“ Lucky 13 โ— Compression โ€“ CRIME, TIME, BREACH โ— RSA โ€“ Bleichenbacher, Klรญma, ROBOT, BERserk, FREAK โ— RC4 โ€“ RC4 No More, Bar-Mitzvah โ— MD5/SHA1 โ€“ SLOTH โ— Renegotiation โ€“ Triple Handshake, CVE-2009-3555
  • 33. TLS 1.3 cipher suites โ— Authentication and key exchange separated from cipher negotiation โ— Authentication โ€“ Certificate/PSK โ— Key exchange โ€“ ECDHE/DHE
  • 34. TLS 1.2 and 1.3 ciphers โ— Key exchange, Authentication, Encryption, MAC โ— TLS 1.2 โ€“ TLS_ECDHE_ECDSA_AES_256_GCM_SHA384 โ— TLS 1.3 โ€“ TLS_AES_256_GCM_SHA384
  • 35. The short TLS 1.3 ciphers list โ— TLS13-AES-256-GCM-SHA384 โ— TLS13-CHACHA20-POLY1305-SHA256 โ— TLS13-AES-128-GCM-SHA256 โ— TLS13-AES-128-CCM-8-SHA256 โ— TLS13-AES-128-CCM-SHA256
  • 36. TLS 1.3 Crypto overview โ— Key Exchange โ€“ Elliptic Curves: P-256, P-384, P-521, x25519, x448 โ€“ Finite Field (DHE) โ— Authentication โ€“ RSA, ECDSA, EdDSA โ— Encryption โ€“ AEAD only (AES-GCM, ChaCha20/Poly1305) โ€“ Cipher TLS_AES_128_GCM_SHA256 mandatory
  • 37. TLS 1.3 Crypto Summary โ— A few, but good choices โ— Just 5 ciphersuites (1 mandatory) โ— One EC point format
  • 39. Handshake Speed-up โ— 1 round trip โ€œlighterโ€ than TLS 1.2 in most cases โ— Full Handshake (1-RTT) โ— Resumption (0-RTT)
  • 41. TLS 1.3 โ— Tries to be optimistic โ€“ Goes hand in hand with the reduced list of options โ— Client guesses server parameters and sends a key_share on first flight โ— key_share can contain more groups โ— What happens when the speculation goes wrong?
  • 42. TLS 1.3 โ€“ Worst Case โ— Server didnโ€™t like the clientโ€™s key_share โ— Sends its own key_share based on supported client groups
  • 44. Perfect Forward Secrecy โ— TLS 1.2 โ€“ Server certificate โ— DHE ciphers: YES โ— Other ciphers: NO โ€“ Pre-Shared Key โ— NO โ— TLS 1.3 โ€“ Server certificate โ— YES (all ciphers are DHE) โ€“ Pre-Shared Key โ— PSK-ECDHE: YES (except EarlyData) โ— PSK-only: NO
  • 45. 1-RTT: Can we do better? โ— 0-RTT Early Data!
  • 46. TLS 1.3 with 0-RTT โ— Early data encrypted with the PSK โ— Not forward secret โ— Needs application support
  • 47. O-RTT: EarlyData โ— Upon receiving 0-RTT EarlyData a server can: โ€“ Ignore it and return 1-RTT response โ€“ Request a new CH by HRR and skip all Application Data โ€“ Send early_data in encrypted extensions, signalling that it'll process it โ— TLS implementations shouldn't resend early data, and mustn't โ— resend them if ALPN differs in negotiated connection โ— After server's Finished, EndOfEarlyData indicates key change
  • 48. Replay Attack! โ— Attacker can replay the Early Data
  • 49. EarlyData Anti-Replay Protection โ— Mitigation: saving state and allow the 0-RTT data accepted once โ— Problem sharing the state when the servers are geographically spread โ€“ No globally consistent server state โ— Servers should ensure that any server accepts 0-RTT for the same 0-RTT handshake at most once
  • 50. EarlyData Replay Attacks โ— The Replays canโ€™t be avoided, only limited โ€“ Attacker could be fast enough โ€“ No consistent state across all the servers โ— Applications have to count with it โ€“ Allow only idempotent requests (HTTP Get)
  • 52. Traffic analysis countermeasures โ— More parts of the Handshake are encrypted โ€“ Server certificate โ— Record content type encrypted โ€“ 23 (application data) โ€“ True content type hidden encrypted โ— Arbitrary padding โ— SNI โ€“ Proposal using Front/Hidden via 0-RTT data
  • 54. Middleboxes โ— Machines that examine TLS traffic โ€“ MitM the TLS connection โ— Middleboxes donโ€™t like new versions โ€“ version 0x0304 means disconnect โ— Solution: Make TLS 1.3 look like TLS 1.2 resumption
  • 55. TLS 1.3 Camouflage โ— KeyShare, supported_versions, PSK are extensions โ— HRR looks like ServerHello, distinguished by Random field โ€“ Random set to SHA-256 of "HelloRetryRequest" โ— Real protocol version in supported_version extension โ— session_id and compression restored back in ServerHello โ— Dummy Change Cipher Spec (CCS) โ— GREASE mechanism
  • 56. TLS 1.3 pitfalls โ— TLS 1.3 ciphers incompatible with TLS 1.2 โ€“ OpenSSL cipher string "ECDHE" won't match any TLS 1.3 ciphersuites โ— Sessions are established after the handshake โ— DSA certificate aren't allowed any more โ— Renegotiation results in a terminated connection โ— Compression also not allowed
  • 58. TLS 1.3 status โ— Draft 28 approved as Proposed Standard by IETF โ— Will become an RFC soon
  • 59. TLS Libraries โ— OpenSSL: will be in 1.1.1 โ— GnuTLS: will be in 3.6.3 โ— NSS: yes โ— SChannel (Microsoft): not yet โ— Secure Transport (Apple): yes
  • 60. Web Browsers โ— Chrome: yes, enabled since 65 โ— Firefox: yes, gradually being enabled โ€“ check your security.tls.version.max โ— Safari: yes, off by default โ— Edge: no, in development
  • 61. Web servers โ— Apache โ€“ mod_ssl: no โ€“ mod_nss: yes, since 1.0.17 โ— Nginx: yes, 1.13 โ— IIS: no
  • 64. Links โ— TLS 1.3 Draft 28: https://tools.ietf.org/html/draft-ietf-tls-tls13-28 โ— Summarizing Known Attacks on TLS: https://tools.ietf.org/html/rfc7457 โ— Recommendations for Secure Use of Transport Layer Security (TLS) โ— https://tools.ietf.org/html/rfc7525 โ— https://tools.ietf.org/html/rfc7525 โ— https://tools.ietf.org/html/rfc7525
  • 65. License This slide deck is licensed under the Creative Commons Attribution-ShareAlike 4.0 International license. It can be shared and adapted for any purpose (even commercially) as long as Attribution is given and any derivative work is distributed under the same license. Details can be found at https://creativecommons.org/licenses/by-sa/4.0/ General Disclaimer This document is not to be construed as a promise by any participating organisation to develop, deliver, or market a product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. openSUSE makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The development, release, and timing of features or functionality described for openSUSE products remains at the sole discretion of openSUSE. Further, openSUSE reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All openSUSE marks referenced in this presentation are trademarks or registered trademarks of SUSE LLC, in the United States and other countries. All third-party trademarks are the property of their respective owners. Credits Template Richard Brown rbrown@opensuse.org Design & Inspiration openSUSE Design Team http://opensuse.github.io/branding- guidelines/