ssl, hsts and other stuff with two esses

80
SSL, HSTS and other stuff with two eSSes Versão 1.0 - 01/06/2011 Tiago Mendo ,[email protected]

Upload: tiago-mendo

Post on 24-May-2015

430 views

Category:

Technology


1 download

DESCRIPTION

SSL is widely accepted as a technology that protects site users from certain attacks. But does it really protect them? Are we deploying it right? Probably not. I will show you why Presented at SAPO Session, 01/06/11, Lisbon. Video available at http://videos.sapo.pt/MSR8wyZtEt4wrns0yFDO note: this is the first version of this presentation. Please see the other presentations for updated content.

TRANSCRIPT

Page 1: SSL, HSTS and other stuff with two eSSes

SSL, HSTS and other stuff with two eSSes

Versão 1.0 - 01/06/2011

Tiago  Mendo  -­‐  ,[email protected]

Page 2: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

Summary

2

• History

– SSL

– TLS

– SSL  vs  TLS

• Protocol

– Objec9ves

– Applica9ons

• How  it  works  -­‐  the  2  minutes  version

• How  it  works  -­‐  the  30  minutes  version

– Cer9ficate  valida9on

– Cer9ficate  revoca9on  check

– Cer9ficate  chain  of  trust  check

– Fetching  content

– Redirec9ng  from  HTTP  to  HTTPS

– Full  HTTPS  browsing

– Mixed  content  browsing

• Recommenda9ons

• Conclusions

• Ques9ons

Page 3: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

History > SSL

3

• SSL  -­‐  Secure  Sockets  Layer

• 1994  -­‐  SSL  1.0  created  by  Netscape,  never                          released

• 1995  -­‐  SSL  2.0  released  in  Netscape  Navigator                                1.1.  Mul9ple  security  flaws  found

• 1996  -­‐  SSL  3.0  released

Page 4: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

History > TLS

4

• TLS  -­‐  Transport  Layer  Security

• 1999  -­‐  TLS  1.0  defined  in  RFC  2246,  using  SSL                          3.0  as  basis

• 2006  -­‐  TLS  1.1  defined  in  RFC  4346• 2008  -­‐  TLS  1.2  defined  in  RFC  5246

Page 5: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

History > SSL vs TLS

5

• SSL  3.0  and  TLS  1.0  are  equivalent  in  security,  but  incompa9ble• TLS  1.0  can  be  downgraded  to  SSL  3.0

SSL TLS

1.0

2.0

3.0

(3.1) 1.0

(3.2) 1.1

(3.3) 1.2

Page 6: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

Protocol > Objectives

6

• Why  SSL?

Page 7: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

Protocol > Objectives

6

• Why  SSL?

• To  protect  the  communica9ons  between  two  hosts:– content  confiden9ality– integrity– authen9city

Page 8: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

Protocol > Objectives

6

• Why  SSL?

• To  protect  the  communica9ons  between  two  hosts:– content  confiden9ality– integrity– authen9city

• Host  iden9ty  is  not  protected  (requires  IPSEC)• Normally  only  the  server  is  authen9cated  

Page 9: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

Protocol > Applications

7

Applica,on

Transport

Network

Data  link

Physical

HTTP

TCP

IP

802.11  -­‐  WLAN

Air

Page 10: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

Protocol > Applications

7

Applica,on

Transport

Network

Data  link

Physical

HTTP

TCP

IP

802.11  -­‐  WLAN

Air

HTTP  /  SSL

TCP

IP

802.11  -­‐  WLAN

Air

Page 11: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

Protocol > Applications

7

Applica,on

Transport

Network

Data  link

Physical

HTTP

TCP

IP

802.11  -­‐  WLAN

Air

HTTP  /  SSL

TCP

IP

802.11  -­‐  WLAN

Air

HTTP

SSL

TCP

IP

802.11  -­‐  WLAN

Air

Page 12: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

Protocol > Applications

7

• On  top  of  any  Transport  layer  (including  UDP)• Used  with  any  Applica9on  layer  protocol• HTTP,  SMTP,  XMPP,  SIP,  etc.• Used  in  OpenVPN

Applica,on

Transport

Network

Data  link

Physical

HTTP

TCP

IP

802.11  -­‐  WLAN

Air

HTTP  /  SSL

TCP

IP

802.11  -­‐  WLAN

Air

HTTP

SSL

TCP

IP

802.11  -­‐  WLAN

Air

Page 13: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works - the 2 minutes version

8

• Type  hbps://www.facebook.com  and  hit  enter

Page 14: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Traffic without SSL

9

Page 15: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Traffic with SSL

10

Page 16: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works - the 30 minutes version

11

• Type  hbps://www.facebook.com  and  hit  enter

• Browser  connects  to  www.facebook.com:443• SSL  handshake  is  ini9ated• Server  sends  its  X.509  cer9ficate  to  the  client• The  client  starts  the  valida9on  process

Page 17: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Certificate validation

12

• CN  matches  URL• For  each  cert.  in  the  chain– Has  not  expired–Was  not  revoked–Was  emibed  by  a  trusted  CA

Page 18: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Certificate validation

13

• CN  matches  URL• For  each  cert.  in  the  chain– Has  not  expired–Was  not  revoked–Was  emibed  by  a  trusted  CA

Page 19: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Certificate validation

14

• CN  matches  URL• For  each  cert.  in  the  chain– Has  not  expired–Was  not  revoked–Was  emibed  by  a  trusted  CA

Page 20: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Certificate validation

15

• CN  matches  URL• For  each  cert.  in  the  chain– Has  not  expired–Was  not  revoked–Was  emibed  by  a  trusted  CA

Page 21: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Certificate revocation check

16

• CRL  -­‐  Cer9ficate  Revoca9on  List

• The  CRL  is  a  list  of  revoked  serial  numbers• The  cer9ficate  specifies  a  CRL  URL• Answer  can  be  cached  for  a  few  months– period  defined  by  the  CA

• The  CRL  can  be  very  large:  enter  OCSP– expired  certs.  are  removed  from  the  CRL

Page 22: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Certificate revocation check

17

• OCSP  -­‐  Online  Cer9ficate  Status  Protocol

• Browser  asks  the  server  if  a  specific  cert.  is  s9ll  valid

• The  cer9ficate  specifies  a  OCSP  server• Answer  can  be  cached  for  a  few  days– period  defined  by  the  CA

• A  cert.  can  specify  both  the  CRL  and  OCSP

Page 23: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Certificate revocation check

18

• What  can  go  wrong?

Page 24: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Certificate revocation check

18

• CRL  and  OCSP  servers  can  be  unreachable– Browsers  will  allow  user  to  con9nue– You  may  or  may  not  be  warned  about  this

–Moxie  Marlinspike  found  that  OCSP  “try  again”  message  (error  code  3)  is  not  signed

– Aback:  MiTM  with  a  revoked  cert.  and  reply  3  to  the  OCSP  requests.  

• What  can  go  wrong?

Page 25: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Certificate revocation check

19

• How  to  mi9gate  this  problem?

Page 26: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Certificate revocation check

19

• OCSP  Stapling  -­‐  Kerberos  style  9cket– Cert.  owner  frequently  asks  the  OCSP  for  a  9cket– Ticket  says  “I,  CA  guarantee  with  my  signature  that  this  cer9ficate  is  valid  for  a  few  hours”

– Site  presents  this  9cket  to  reques9ng  browser

• Fallback  to  OCSP• Support:  Chrome  on  Windows  Vista  or  higher

• How  to  mi9gate  this  problem?

Page 27: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Certificate revocation check

20

• How  to  mi9gate  this  problem?

Page 28: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Certificate revocation check

20

• CRL  and  OCSP  cache• How  to  mi9gate  this  problem?

Page 29: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Certificate revocation check

20

• CRL  and  OCSP  cache• How  to  mi9gate  this  problem?

• Which  introduces  another  problem– If  a  cert.  is  compromised,  there  may  a  significant  window  of  vulnerability  (days/months  for  a  CRL)

– Remember  the  Comodo  RA  compromise?– 9  certs.  were  issued  to  7  domains– certs.  were  revoked  in  15  minutes– Browser  vendors  immediately  issued  browser  updates

Page 30: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Certificate validation

21

• CN  matches  URL• For  each  cert.  in  the  chain– Has  not  expired–Was  not  revoked–Was  emi@ed  by  a  trusted  CA

Page 31: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Certificate chain of trust check

22

• The  server  sends  the  whole  cer9ficate  chain

• For  each  cert.  in  the  chain  verify– is  properly  signed  by  the  CA  cer9ficate  immediately  higher  in  the  hierarchy

– last  cer9ficate  is  explicitly  trusted  by  the  browser,  so  no  signature  verifica9on  is  done

Page 32: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Certificate chain of trust check

23

• What  can  go  wrong?

Page 33: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Certificate chain of trust check

24

Page 34: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Certificate chain of trust check

25

• The  browser  does  not  know  the  root  CA– can  happen  if  you  are  using  an  old  browser/device– Firefox  effec9vely  prevents  progress!

• What  can  go  wrong?

Page 35: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Certificate chain of trust check

25

• The  browser  does  not  know  the  root  CA– can  happen  if  you  are  using  an  old  browser/device– Firefox  effec9vely  prevents  progress!

• What  can  go  wrong?

• How  to  mi9gate  this  problem?  • Mul9-­‐roo9ng  CAs– Server  sends  a  longer  chain  with  more  CA  cer9ficates  higher  in  the  hierarchy

– Both  CAs  trusted  by  Firefox

Page 36: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Certificate chain of trust check

26

• What  can  go  wrong?

Page 37: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Certificate chain of trust check

26

• You  do  not  trust  what  your  browser  trusts– Firefox  ships  with  76  CAs• Chunghwa  Telecom  Co.,  Ltd• Türkiye  Bilimsel  ve  Teknolojik  AraşSrma  Kurumu  -­‐  TÜBİTAK

– Are  all  of  them  secure  and  properly  managed?

• What  can  go  wrong?

Page 38: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Certificate chain of trust check

26

• You  do  not  trust  what  your  browser  trusts– Firefox  ships  with  76  CAs• Chunghwa  Telecom  Co.,  Ltd• Türkiye  Bilimsel  ve  Teknolojik  AraşSrma  Kurumu  -­‐  TÜBİTAK

– Are  all  of  them  secure  and  properly  managed?

• What  can  go  wrong?

– “I  have  not  been  able  to  find  the  current  owner  of  this  root.  Both  RSA  and  VeriSign  have  stated  in  email  that  they  do  not  own  this  root.”  said  one  of  the  maintainers  of  Mozilla  CA  list  (early  2010)

Page 39: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Certificate chain of trust check

27

• You  do  not  trust  what  your  browser  trusts– Recent  request  to  add  a  CA  to  Firefox• “This  is  a  request  to  add  the  CA  root  cerAficate  for  Honest  Achmed's  Used  Cars  and  CerAficates.”• “Achmed's  uncles  all  vouch  for  the  fact  that  he's  honest.”• “The  purpose  of  this  cerAficate  is  to  allow  Honest  Achmed  to  sell  bucketloads  of  other  cerAficates  and  make  a  lot  of  money.”

– It  was  not  granted.  This  9me.

• What  can  go  wrong?

Page 40: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Certificate chain of trust check

28

• How  to  mi9gate  this  problem?  • Remove  trust  or  delete  CAs– they  might  come  back  amer  somware  updates– how  do  you  evaluate  if  a  CA  should  be  trusted?– can  you  do  this  in  your  smartphone?

Page 41: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Fetching content

29

• At  this  point  the  browser  trusts  the  site  cer9ficate

• No  HTTP  request  was  made  yet!

• First  HTTP  request  is  made  only  now

GET / HTTP/1.1Host: www.facebook.com

Page 42: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Fetching content

30

Page 43: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Redirecting from HTTP to HTTPS

31

• Lets  go  back  a  lible• Imagine  you  type  hbp://www.facebook.com  instead  of  hbps...

• Hit  enter!

Page 44: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Redirecting from HTTP to HTTPS

31

• Lets  go  back  a  lible• Imagine  you  type  hbp://www.facebook.com  instead  of  hbps...

• Hit  enter!

• Browser  connects  to  www.facebook.com:80

Page 45: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Redirecting from HTTP to HTTPS

32

Page 46: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Redirecting from HTTP to HTTPS

33

Page 47: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Redirecting from HTTP to HTTPS

34

Page 48: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Redirecting from HTTP to HTTPS

35

• What  can  go  wrong?

Page 49: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Redirecting from HTTP to HTTPS

35

• Moxie  Marlinskipe  and  his  sslstrip  tool

• What  can  go  wrong?

Page 50: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Redirecting from HTTP to HTTPS

35

• Moxie  Marlinskipe  and  his  sslstrip  tool

• What  can  go  wrong?

Page 51: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Redirecting from HTTP to HTTPS

36

• sslstrip  func9oning–MiTM  tool– maps  HTTPS  links  to  HTTP– maps  redirects  to  HTTPS  back  to  HTTP– maps  HTTPS  links  to  homograph-­‐similar  HTTPS  links

– can  supply  a  lock  favicon– logging!

Page 52: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Redirecting from HTTP to HTTPS

37

• sslstrip  func9oning

Page 53: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Redirecting from HTTP to HTTPS

38

Page 54: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Redirecting from HTTP to HTTPS

39

• You  type  hbp://www.facebook.com  and  get  redirected  to  hbps://www.facebook.com

GET / HTTP/1.1

Host: www.facebook.com

HTTP/1.1 302 Found

Location: https://www.facebook.com/

• These  requests  are  not  protected  with  SSL!

Page 55: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Redirecting from HTTP to HTTPS

40

• How  to  mi9gate  this  problem?

Page 56: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Redirecting from HTTP to HTTPS

40

• Make  site  available  only  in  HTTPS– Does  not  work:  most  users  type  HTTP  and  redirects  are  dangerous

• How  to  mi9gate  this  problem?

Page 57: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Redirecting from HTTP to HTTPS

40

• Make  site  available  only  in  HTTPS– Does  not  work:  most  users  type  HTTP  and  redirects  are  dangerous

• How  to  mi9gate  this  problem?

• Use  STS:  Strict  Transport  Security– Formerly  HSTS:  HTTP  STS– Server  defined  policy  that  browsers  must  honor– Server  sends  HTTP  header  with  policy

Page 58: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Redirecting from HTTP to HTTPS

41

Strict-Transport-Security: max-age=15768000;includeSubdomains

• This  header  says  “Browser,  convert  all  requests  to  my  domain  to  HTTPS”

• It  also  says  “If  there  is  any  security  issue  with  the  connec9on  do  not  allow  progress”

• Consequences:– the  user  types  hbp://www.facebook.com  and  the  browser  requests  hbps://www.facebook.com

– any  HTTP  link  in  the  response  turns  to  HTTPS– no  HTTP  request  hits  the  network

Page 59: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Redirecting from HTTP to HTTPS

42

• S9ll,  there  is  a  problem:

Page 60: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Redirecting from HTTP to HTTPS

42

• We  have  never  visited  the  site  or  policy  expired– browser  does  not  know  the  STS  policy  for  the  site– if  the  user  types  hbp://www.facebook.com  the  request  is  done  using  HTTP

– TOFU:  Trust  On  First  Use• Recommenda9ons– first  visit  using  a  safe  wired  network– manually  instruct  the  browser  to  use  STS  

• S9ll,  there  is  a  problem:

Page 61: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Redirecting from HTTP to HTTPS

43

• Server  support:  all,  just  send  the  header• Browser  support– Chrome  4.0.211.0  (with  preloaded  domain  list)– Firefox  4

• Plugins– Safari  SSL  Everywhere– Firefox  EFF  HTTPS  Everywhere– Firefox  ForceTLS  (simple  list  edi9ng)

Page 62: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Redirecting from HTTP to HTTPS

44

Page 63: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Redirecting from HTTP to HTTPS

44

Page 64: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Redirecting from HTTP to HTTPS

45

Page 65: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Redirecting from HTTP to HTTPS

45

Page 66: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Full HTTPS browsing

46

• At  this  point  we  have  all  the  contents  of  the  site  served  over  HTTPS.  

• How  can  we  be  sure?

• No9ce  the  green  hbps  text

Page 67: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Mixed content browsing

47

• How  about  this  situa9on?

• No9ce  the  red  strikethrough  hbps  text

Page 68: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Mixed content browsing

48

• Chrome  console  output:

Page 69: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Mixed content browsing

49

• What  is  the  problem?

Page 70: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Mixed content browsing

49

• Sensi9ve  informa9on  can  be  captured– images:  your  last  night  weird  photos– javascript:  can  be  replaced  with  malicious  code– cookies:  sent  in  every  request!– full  browsing  informa9on

• Browser  warnings– can  affect  site  reputa9on– most  users  ignore  this

• What  is  the  problem?

Page 71: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Mixed content browsing

50

Page 72: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Mixed content browsing

51

• How  to  mi9gate  this  problem?  

Page 73: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Mixed content browsing

51

• STS– you  have  to  specify  all  domains  used  by  the  site– some  links  might  not  work  over  HTTPS– not  a  solu9on  for  all  sites

• How  to  mi9gate  this  problem?  

Page 74: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Mixed content browsing

51

• STS– you  have  to  specify  all  domains  used  by  the  site– some  links  might  not  work  over  HTTPS– not  a  solu9on  for  all  sites

• How  to  mi9gate  this  problem?  

• Use  only  HTTPS  links  :)– use  a  proxy:  make  your  server  fetch  the  HTTP  content  and  serve  it  over  HTTPS

– do  not  forget  the  favicon

Page 75: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Mixed content browsing

52

• How  to  minimize  this  problem?  

Page 76: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

How it works > Mixed content browsing

52

• Secure  Cookies– the  server  can  set  the  secure  flag  for  the  cookie– a  secure  cookie  is  only  sent  over  HTTPS– beware:  this  does  not  prevent  the  mixed  content  warning,  it  ONLY  prevents  cookies  from  being  sent  over  HTTP

• How  to  minimize  this  problem?  

Page 77: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

Recommendations

53

• A  few  more  recommenda9ons

Page 78: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

Recommendations

53

• Make  a  bookmark  with  the  HTTPS  link  for  the  site  (specially  homebanking  sites)– avoids  requests  using  HTTP– avoids  abacks  caused  by  typos

• Use  a  plugin  that  warns  you  if  the  cer9ficate  has  changed– Perspec9ves  (www.networknotary.org)– Cer9ficate  Patrol

• A  few  more  recommenda9ons

Page 79: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

Conclusions

54

• Conclusions– SSL  3.0  and  TLS  1.0+  are  the  way  to  go– Use  STS  and  manually  add  your  important  sites– Update  your  browser  omen  or  automa9cally– Do  not  visit  sites  which  the  first  page  is  HTTP  using  public  wireless  networks

– Do  not  create  sites  with  mixed  HTTP(S)  content– If  your  site  is  HTTPS  only,  use  secure  cookies

Page 80: SSL, HSTS and other stuff with two eSSes

SAPO  Websecurity  Team

Questions

55

Any  ques9ons?

[email protected]