{"id":7085,"date":"2017-03-23T05:00:02","date_gmt":"2017-03-23T13:00:02","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/03\/23\/news-876\/"},"modified":"2017-03-23T05:00:02","modified_gmt":"2017-03-23T13:00:02","slug":"news-876","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/03\/23\/news-876\/","title":{"rendered":"The S In HTTPS"},"content":{"rendered":"<p><strong>Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Thu, 23 Mar 2017 12:00:37 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/s-in-https-300x169.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/s-in-https-300x169.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/s-in-https-768x432.jpg 768w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/s-in-https-1024x576.jpg 1024w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/s-in-https-640x360.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/s-in-https-900x506.jpg 900w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/s-in-https-440x248.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/s-in-https-380x214.jpg 380w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/s-in-https.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>If you\u2019ve ever bought anything online, checked your bank accounts through the app, or logged on to your favorite social media network, you\u2019ve used a technology called <a href=\"https:\/\/en.wikipedia.org\/wiki\/Transport_Layer_Security\">SSL\/TLS<\/a>. The <b>S<\/b> in <b>HTTPS<\/b>.<\/p>\n<p>SSL\/TLS (just to keep it simple, I\u2019ll refer to as SSL) is the technology used to encrypt the communication between your browser and the site you\u2019re visiting.<\/p>\n<p>This is crucial to ensure that malicious actors\u2014like hackers and cybercriminals\u2014don\u2019t see the contents of your web traffic.\u00a0But like anything to do with cryptography and encryption, there\u2019s a lot of confusion and misunderstanding.<\/p>\n<h2>How Do You Know?<\/h2>\n<p>As a user, you rely on your browser to indicate whether a site is safe or not. This includes a number of things like checking to make sure it\u2019s not hosting malware, running malicious javascript, and\u2014for secure sites\u2014that the connection is encrypted.<\/p>\n<p>Sadly, due to the complexities of encryption, checking to see if a connection is valid has boiled down to some combination of the traditional lock icon, a green URL\/address bar, and the word &#8220;secure.&#8221; Most browsers also take things a step further and highlight when you\u2019ve landed on a page where the browser can\u2019t verify the encryption.<\/p>\n<p>But what\u2019s happening in the background? What makes a site show as secure?<\/p>\n<h2>Certificates<\/h2>\n<p>A site that uses HTTPS to deliver content uses a digital certificate to help confirm its identity. A digital certificate contains a lot of information that can be summed up as two really, really big prime numbers (one private, one public) and data that\u2019s designed to help you trust those two numbers.<\/p>\n<p>The numbers are used for a technique called <a href=\"https:\/\/en.wikipedia.org\/wiki\/Diffie%E2%80%93Hellman_key_exchange\">a key exchange<\/a>. This is a really interesting mathematical process that lets two entities (in this case, you and the site you\u2019re visiting) create a shared secret over a public channel (the internet).<\/p>\n<p>The rest of the data is designed to help you and your browser verify that the site you\u2019re visiting is in fact the site you intended to visit. This is accomplished through <a href=\"https:\/\/en.wikipedia.org\/wiki\/Chain_of_trust\">a chain of trust<\/a> that includes the certificate for the site you\u2019re visiting, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Certificate_authority\">a certificate authority<\/a>, and a root certificate trusted by your operating system or browser.<\/p>\n<p>A chain of trust works just like it sounds. The root certificate is verified by a big organization, typically <a href=\"https:\/\/social.technet.microsoft.com\/wiki\/contents\/articles\/31633.microsoft-trusted-root-program-requirements.aspx\">Microsoft<\/a>, <a href=\"http:\/\/www.apple.com\/certificateauthority\/ca_program.html\">Apple<\/a> or <a href=\"https:\/\/www.mozilla.org\/en-US\/about\/governance\/policies\/security-group\/certs\/policy\/\">Mozilla<\/a>. In turn, they issue signing certificates to a group of certificate authorities. These are the organizations that either sell or <a href=\"https:\/\/letsencrypt.org\/\">give away certificates<\/a> to site owners.<\/p>\n<p>Site owners prove to the certificate authority that they own the site in question and then get a certificate to use with you, their user.<\/p>\n<div id=\"attachment_538828\" style=\"width: 940px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-538828\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/us-cert-ta17-explanation-001.jpg\" alt=\"\" width=\"930\" height=\"466\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/us-cert-ta17-explanation-001.jpg 930w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/us-cert-ta17-explanation-001-300x150.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/us-cert-ta17-explanation-001-768x385.jpg 768w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/us-cert-ta17-explanation-001-640x321.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/us-cert-ta17-explanation-001-900x451.jpg 900w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/us-cert-ta17-explanation-001-440x220.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/us-cert-ta17-explanation-001-380x190.jpg 380w\" sizes=\"auto, (max-width: 930px) 100vw, 930px\" \/><\/p>\n<p class=\"wp-caption-text\">SSL\/TLS certificate trust chain diagram<\/p>\n<\/p><\/div>\n<h2>Weakest Link?<\/h2>\n<p>When you visit a secure site, your browser gets the digital certificate from the site in question\u2026say example[.]com. The certificate says that it was issued from CA01. Your browser knows CA01 and trusts it because it\u2019s on the list from Microsoft<i>Apple<\/i>Mozilla.<\/p>\n<p>After checking with CA01, your browser knows that the certificate it got from example[.]com checks out. This results in the lock icon\/green URL in your browser.<\/p>\n<p>Now this system isn\u2019t foolproof. An attack could hijack the name example[.]com and use another certificate that\u2019s just as valid but it\u2019s unlikely. As with any security system, there are tradeoffs in HTTPS, but the balance struck here is a reasonable one.<\/p>\n<p>Except when someone puts their finger on the scales\u2026<\/p>\n<h2>US-CERT Alert<\/h2>\n<p>Recently the US-CERT (an organization that helps educate users about potential digital security issues and current threats) issued an alert (<a href=\"https:\/\/www.us-cert.gov\/ncas\/alerts\/TA17-075A\">TA17-075A<\/a>) meant to highlight issues with a security control often deployed by enterprises.<\/p>\n<p>Surfing the web over an encrypted connection is great for users, but it can lead to some challenges in a corporate environment. As much as banks and apps are using encryption to help users, cybercriminals are also using it to harm users.<\/p>\n<p>When you\u2019re setting up the defences for your enterprise network, it\u2019s not uncommon to deploy technology to <b>intercept<\/b> HTTPS connections (typically using a web gateway or <a href=\"https:\/\/en.wikipedia.org\/wiki\/Proxy_server\">outbound proxy<\/a>). The goal here isn\u2019t (usually) to snoop on your users, but to make sure that you can block malware and other malicious content.<\/p>\n<p>To do this, the interception technology adds another link to the chain of trust.<\/p>\n<div id=\"attachment_538829\" style=\"width: 940px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-538829\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/us-cert-ta17-explanation-002.jpg\" alt=\"\" width=\"930\" height=\"466\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/us-cert-ta17-explanation-002.jpg 930w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/us-cert-ta17-explanation-002-300x150.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/us-cert-ta17-explanation-002-768x385.jpg 768w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/us-cert-ta17-explanation-002-640x321.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/us-cert-ta17-explanation-002-900x451.jpg 900w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/us-cert-ta17-explanation-002-440x220.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/us-cert-ta17-explanation-002-380x190.jpg 380w\" sizes=\"auto, (max-width: 930px) 100vw, 930px\" \/><\/p>\n<p class=\"wp-caption-text\">SSL\/TLS certificate trust chain diagram with interception<\/p>\n<\/p><\/div>\n<p><i>[This technology has been available for quite a while and\u00a0<\/i><b>full disclosure\u00a0<\/b><i>is warranted here, Trend Micro offers products in this category.]<\/i><\/p>\n<p>US-CERT raised the alert based on some <a href=\"https:\/\/insights.sei.cmu.edu\/cert\/2015\/03\/the-risks-of-ssl-inspection.html\">recently released research<\/a> from Carnegie Mellon University (CMU). In this study, they looked at a number of products in this category and found that there are some significant issues that could make users less safe while surfing.<\/p>\n<h2>Interception Issues<\/h2>\n<p>We\u2019ve already seen that there\u2019s a lot of complexity required to show that simple lock\/green URL to the user. The CMU study shows that when an interception technology is in play, that simple indicator can be deceiving. It can show users that their surfing is secure when it actually isn\u2019t and that\u2019s the last thing that users or IT security teams want.<\/p>\n<p>CMU sites seven specific issues in their study, but they essentially stem from one particular issue.<\/p>\n<div id=\"attachment_538830\" style=\"width: 940px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-538830\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/us-cert-ta17-explanation-003.jpg\" alt=\"\" width=\"930\" height=\"466\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/us-cert-ta17-explanation-003.jpg 930w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/us-cert-ta17-explanation-003-300x150.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/us-cert-ta17-explanation-003-768x385.jpg 768w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/us-cert-ta17-explanation-003-640x321.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/us-cert-ta17-explanation-003-900x451.jpg 900w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/us-cert-ta17-explanation-003-440x220.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/us-cert-ta17-explanation-003-380x190.jpg 380w\" sizes=\"auto, (max-width: 930px) 100vw, 930px\" \/><\/p>\n<p class=\"wp-caption-text\">SSL\/TLS certificate trust chain diagram with interception and issue pointed out<\/p>\n<\/p><\/div>\n<p>The interception tools either don\u2019t gracefully handle certificate validation errors or don\u2019t validate them at all. Ouch. That defeats the entire <i>trust<\/i> part of the chain.<\/p>\n<h2>Next Steps<\/h2>\n<p>The US-CERT advisory recommends testing any interception solution against <a href=\"https:\/\/badssl.com\/\">https:\/\/badssl.com\/<\/a>. That\u2019s a fantastic tool that lets you see how your browser handles various SSL\/TLS issues. With the interception tool in place, try each of the scenarios and ensure that they\u2019re properly handled.<\/p>\n<p>Furthermore, if you\u2019re rolling out interception technology here are some concrete steps to make it as smooth as possible:<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ol>\n<li>Test the tool against <a href=\"https:\/\/badssl.com\/\">https:\/\/badssl.com\/<\/a> before deploying it to production<\/li>\n<li>Whitelist trusted sites like major banks &amp; financial institutions<\/li>\n<li>Have a strong communications plan that clearly explains the how and why to your user community<\/li>\n<\/ol>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Interception technology can help defend your enterprise from malware and cybercriminals, but it\u2019s not without potential issues (as shown by <a href=\"https:\/\/www.us-cert.gov\/ncas\/alerts\/TA17-075A\">the US-CERT alert<\/a>). This is a case where a little planning and forethought can go a long way.<\/p>\n<p><a href=\"http:\/\/blog.trendmicro.com\/the-s-in-https\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Mark Nunnikhoven (Vice President, Cloud Research)| Date: Thu, 23 Mar 2017 12:00:37 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/s-in-https-300x169.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/s-in-https-300x169.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/s-in-https-768x432.jpg 768w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/s-in-https-1024x576.jpg 1024w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/s-in-https-640x360.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/s-in-https-900x506.jpg 900w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/s-in-https-440x248.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/s-in-https-380x214.jpg 380w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/03\/s-in-https.jpg 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>If you\u2019ve ever bought anything online, checked your bank accounts through the app, or logged on to your favorite social media network, you\u2019ve used a technology called SSL\/TLS. The S in HTTPS. SSL\/TLS (just to keep it simple, I\u2019ll refer to as SSL) is the technology used to encrypt the communication between your browser and&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[10422,10439,714,10752,11716],"class_list":["post-7085","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-current-news","tag-encryption","tag-security","tag-vulnerabilities","tag-web-threats"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7085","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7085"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7085\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7085"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7085"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7085"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}