HTTP Strict Transport Security Performance: Is There An Issue? Does the Performance Working Group Have Recommendations for Tuning SSL/TLS For Internet2-Class.

Slides:



Advertisements
Similar presentations
RadSec – A better RADIUS protocol
Advertisements

The Internet and the Web
How to decrypt Smart Offices encrypted traffic Thibaud Lopez Schneider Lawson Software April 27, 2010 In this paper I will describe how to intercept and.
ForceHTTPS: Protecting High-Security Web Sites from Network Attacks Collin Jackson and Adam Barth.
HTTPS and the Lock Icon Dan Boneh. Goals for this lecture Brief overview of HTTPS: How the SSL/TLS protocol works (very briefly) How to use HTTPS Integrating.
Hands-on SQL Injection Attack and Defense HI-TEC July 21, 2013.
HiveMind Distributed File Storage Using JavaScript Botnets Copyright 2013 Sean T. Malone.
Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Lesson 4: Web Browsing.
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
Session Hijacking Why web security depends on communications security and how TLS everywhere is the only solution. Scott Helme - 6th Aug scotthel.me.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
Lesson 4: Web Browsing.
The OWASP Foundation Risks of Insecure Communication High likelihood of attack Open wifi, munipical wifi, malicious ISP Easy to exploit.
COMP 321 Week 12. Overview Web Application Security  Authentication  Authorization  Confidentiality Cross-Site Scripting Lab 12-1 Introduction.
© GlobalSign. A GMO Internet Inc group company. Authentication. Security. Trust. A tutorial on how you can host multiple SSL Certificates on a single IP.
Implementing ISA Server Caching. Caching Overview ISA Server supports caching as a way to improve the speed of retrieving information from the Internet.
SSL By: Anthony Harris & Adam Shkoler. What is SSL? SSL stands for Secure Sockets Layer SSL is a cryptographic protocol which provides secure communications.
Application Layer  We will learn about protocols by examining popular application-level protocols  HTTP  FTP  SMTP / POP3 / IMAP  Focus on client-server.
Putting the Network to Work
APACHE SERVER By Innovationframes.com »
By Swapnesh Chaubal Rohit Bhat. BEAST : Browser Exploit Against SSL/TLS Julianno Rizzo and Thai Duong demonstrated this attack.
Certificates ID on the Internet. SSL In the early days of the internet content was simply sent unencrypted. It was mostly academic traffic, and no one.
Christopher M. Pascucci Basic Structural Concepts of.NET Browser – Server Interaction.
RFC6520 defines SSL Heartbeats - What are they? 1. SSL Heartbeats are used to keep a connection alive without the need to constantly renegotiate the SSL.
Smart Card Single Sign On with Access Gateway Enterprise Edition
HTML and Designing Web Pages. u At its creation, the web was all about –Web pages were clumsily assembled –Web sites were accumulations of hyperlinked.
CSCI 323 – Web Development Chapter 1 - Setting the Scene We’re going to move through the first few chapters pretty quick since they are a review for most.
Internet Business Foundations © 2004 ProsoftTraining All rights reserved.
Cookies Set a cookie – setcookie() Extract data from a cookie - $_COOKIE Augment user authentication script with a cookie.
Towards a Safe Playground for HTTPS and Middle-Boxes with QoS2 Zhenyu Zhou CS Dept., Duke University.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Integrating with UCSF’s Shibboleth system
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
Course ILT Internet/intranet support Unit objectives Use the Internet Information Services snap-in to manage IIS, Web sites, virtual directories, and WebDAV.
POSTER TEMPLATE BY: Whitewater HTTP Vulnerabilities Nick Berry, Joe Joyce, & Kevin Vaccaro. Syntax & Routing Attempt to capture.
Week seven CIT 354 Internet II. 2 Objectives Database_Driven User Authentication Using Cookies Session Basics Summary Homework and Project 2.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
Web Design (1) Terminology. Coding ‘languages’ (1) HTML - Hypertext Markup Language - describes the content of a web page CSS - Cascading Style Sheets.
1 Robust Defenses for Cross-Site Request Forgery Adam Barth, Collin Jackson, John C. Mitchell Stanford University 15th ACM CCS.
Cookies and Sessions IDIA 618 Fall 2014 Bridget M. Blodgett.
Integrating and Troubleshooting Citrix Access Gateway.
By Sanjay Chand.  What is a web server?  A web server is a program that, uses the client/server model and the World Wide Web’s HTTP.  My recommendation.
Saphe surfing! 1 SAPHE Secure Anti-Phishing Environment Presented by Uri Sternfeld.
HOW THE WEB WORKS Reference: Learning Web Design (4 th edition) by Robbins 2012 – Chapter 2 (pp. 21 – 32)
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
PHP Secure Communications Web Technologies Computing Science Thompson Rivers University.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Web Browsing *TAKE NOTES*. Millions of people browse the Web every day for research, shopping, job duties and entertainment. Installing a web browser.
Website Design, Development and Maintenance ONLY TAKE DOWN NOTES ON INDICATED SLIDES.
Lecture 16 Page 1 CS 236 Online Exploiting Statelessness HTTP is designed to be stateless But many useful web interactions are stateful Various tricks.
Secure Socket Layer SSL and TLS. SSL Protocol Peer negotiation for algorithm support Public key encryptionPublic key encryption -based key exchange and.
+ CIW LESSON 4 Web Browsers. + Basic Functions of Web Browsers Provide a way for users to access and navigate Web pages Display Web pages properly Provide.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Chapter 11 How Does the Internet Work?. How Important is this Chapter to Understanding How to Use a Computer? 7 or 8 on a scale of 1 to 10.
ALL THINGS IIS TERRI DONAHUE
Secure HTTP (HTTPS) Pat Morin COMP 2405.
ArcGIS for Server Security: Advanced
Apache web server Quick overview.
Lesson 4: Web Browsing.
Warm Handshake with Websites, Servers and Web Servers:
Practical Censorship Evasion Leveraging Content Delivery Networks
Web Caching? Web Caching:.
Using SSL – Secure Socket Layer
Lesson 4: Web Browsing.
System Administration Homework 4 – Web Server
Presentation transcript:

HTTP Strict Transport Security Performance: Is There An Issue? Does the Performance Working Group Have Recommendations for Tuning SSL/TLS For Internet2-Class Traffic? Joe St Sauver, Ph.D. or Manager, InCommon Certificate Program and Manager, Internet2 Nationwide Security Programs

**Today’s Question For The Performance WG** If sites deploy HTTP Strict Transport Security, how much of a performance hit, if any, will sites experience? Will there be: -- increased session setup time delay? -- latency issues for interactive sessions using HSTS? (see -- decreased total throughput for bulk transfers? -- limits to the number of concurrent sessions? -- other performance issues? -- do we/should we care? Should sites tune HSTS-using servers? If so, what resources, and how? (e.g., see ncache for one potential item) 2

What About Web Server Configurations? What’s the recommended/most cost efficient hardware for an web server load that may now be dominated by SSL traffic? What’s better, Apache or something else, like nginx? (seemingly minor things such as choice of cipher can have a big impact, see for example es_not_suck_at_ssl/ur ) What about thinking out of the box, such as trying GPUs to accelerate SSL performance? See (not clear if this software is currently publicly available) Are there other issues in this area where we should be providing tuning guidance to server operators using HSTS (or simply doing SSL traffic over Internet2?) 3

A Terrific Article: “Overclocking SSL” One highly recommended article: “Overclocking SSL,” As mentioned in that, are y’all paying attention to Google’s SPDY initiative? See -- “Next Protocol Negotiation” (see -- “False Start” protocol (There’s an expired draft, see ) -- “Snap Start” protocol (expired draft: ) See also "More Bandwidth Doesn't Matter (Much)" and "An Argument for Changing Slow Start", as are linked from the primary SPDY page 4

Background Material on HSTS

Certificates: They're Not Just For Critical Web Content Anymore For a long time, most sites only deployed certs for critical content, leaving the vast majority of routine web traffic flowing over the network unencrypted. Why? The usual answers (valid or not) were all or some of: -- we do encrypt login info, that's the only real worry, right? -- no secrets are being served; users don't care; why bother? -- why buy expensive certificates when they aren't needed? -- it's a hassle obtaining, installing and maintaining certs -- we don't want to have to accept the "performance hit" associated with doing encryption and decryption on traffic -- debugging problems will be harder if the traffic is encrypted -- encrypted traffic can't be cached or proxied -- incoming encrypted traffic can't be scanned for malware -- let me look into that/I'm too busy/I'll do it "real soon now" 6

Then, The World Encountered Firesheep... If you're not familiar with Firesheep, see (24 October 2010) Firesheep is an application that does a nice job of demonstrating that encrypting just the user's login session is not enough (at least if a web site relies on cookies for authentication and access control): even if an attacker couldn't capture your username and password, they could still capture an unencrypted cookie, and after that, the attacker would then have full control of your account. This wasn't a new vulnerability, but creation of Firesheep made it apparent to everyone that this was a practical (rather than theoretical) worry. The only real solutions? Don't rely on cookies to carry critical security information -- or encrypt everything with https. 7

HTTP Strict Transport Security (HSTS) What we really need is a way for sites to declare that ALL traffic for their domain MUST be sent via https, and ONLY via https. If we just wanted to ENCOURAGE use of https on a site, a formal protocol isn’t absolutely necessary. Any site could simply decide to start using https to secure the web pages on their site, and voila, it could be done. However, it's easy for a user to accidentally request a page via http (instead of https), or for a web programmer to mistakenly link to an unencrypted local web page rather than an encrypted one. Fortunately, HSTS provides a way to say that a site MUST use https only. See: "HTTP Strict Transport Security (HSTS)," Hodges (Paypal), Jackson (CMU) & Barth (Google), tools.ietf.org/html/draft-ietf-websec-strict-transport-sec-02 (expires February 6 th, 2012) 8

Enabling HSTS Enabling HSTS on a web site that uses Apache is pretty easily done, see the description at "Adding HTTP Strict Transport Security (HSTS) to Apache Virtual Hosts," ansport-security-hsts-to-apache-virtual-host/ The one required additional HSTS header must be sent via an https: page – that header will be ignored if it is sent via an unencrypted http page. As a result of that requirement, and also due to limited browser support, OWASP emphasizes use of a 301 permanent redirect instead: (note that while approach work with any browser, it doesn’t rule out use of self-signed certs or other HSTS corner cases) That OWASP page also provides pointers to recipes for enabling HSTS on IIS, NGINX, and other web servers, too. 9

Non-Performance Issues To Be Aware Of When Performance Testing TLS: a) Browser Support To be candid about one disappointing point: browser support for HSTS is not currently really where I’d like it to be, and that's a shame, because browsers play a key role in recognizing and enforcing use of the HSTS protocol. The good news? HSTS *is* at least currently enabled in recent versions of Firefox and Chrome (e.g., see for example ). Another point: even if you don’t use a browser that support HSTS, browser non- support of HSTS shouldn't actively break anything. The bad news? There are major/important browsers that don't currently have support for HSTS: Internet Explorer, Safari, and Opera do not have support for HSTS at this time. (Likewise, I don't believe that HSTS has made it into many mobile device web browsers). Talk to your vendors! 10

b) Name-Based Virtual Hosting and https Usage One other consideration: when it comes to regular (non-https) hosting, many sites use name-based virtual hosting. In name- based virtual hosting, dozens or even hundreds of domains may get hosted on a single shared IP (e.g., see for example ) Traditionally, secure web sites needed IP-based hosting, with each secure web site residing on a dedicated address. If you have lots of secure web sites, doing IP-based hosting could rapidly deplete your pool of available addresses. Server Name Indication ("SNI") eliminates that requirment if you're running a current secure web server and browser. See Caution: Some browsers on some operating systems do not have support for SNI. Current versions of Firefox are generally SNI-safe on most all current operating systems. 11

c) Mixed Scripting and Mixed Display Issues While you're tightening things up and promoting use of https everywhere, you may particularly want to note the problem of "mixed scripting," where an https page loads a script, cascading style sheet or plugin resource over an insecure (http, instead of https page). Also bad: when an https page loads an image, iframe or font over http, a related if somewhat less serious problem that's sometimes called "mixed display". A nice summary posting on this issue is available at "Trying to End Mixed Scripting Vulnerabilities," June 16, 2011, end-mixed-scripting.html (the comments to that post bring up some interesting examples of prominent sites that apparently have issues in this regard) 12