RSA Recap – Securing Your Site

Friday March 8, 2013

At RSA last week a few of us participated in panel discussions that focused on SSL/TLS. During the panel that I moderated on Friday, one theme we addressed was secure server configuration. One of CASC’s goals is to help harden existing SSL/TLS implementations against vulnerabilities—because most SSL/TLS exploits arise from suboptimal website configurations. These vulnerabilities and attacks can be mitigated or even eliminated with proper server configuration and good website design.

Server Configuration (or Load Balancer Configuration, if that is where your SSL connection terminates)

Security threats can be minimized by selecting the right cryptographic protocols. First, SSL version 2 should be disabled because among other vulnerabilities, SSL v2 has no protection for the SSL handshake, thus allowing a man-in-the-middle to hijack the session. TLS version 1.2 is the current protocol specification. While implementing TLS v1.2 does not negate the need for strong key sizes, or a publicly trusted certificate (instead of a self-signed one) from a CA with robust operational procedures, TLS v1.2 is the preferred way of defending against newly discovered attacks like those that exploit vulnerabilities in TLS session renegotiation, Browser Exploit Against SSL/TLS (BEAST), and other man-in-the-middle attacks, and you can always patch your servers to prevent insecure session renegotiation. (Unfortunately, some system administrators have simply disabled server-side renegotiation as a temporary workaround, but this is not the solution, it does not provide the permanent security benefits of TLS v1.2.)

Because server configurations differ by platform and deployment model, there is no universal way to configure your web server to prevent insecure renegotiation, so we’ll have to provide more detailed configuration steps in a future blog post. Meanwhile, you should test your server using https://casecurity.ssllabs.com/ to make sure your server does not allow insecure renegotiation. Also, to protect against the types of attacks discussed above, you should configure your server by disabling null ciphers and MD5 while preferring more secure TLS 1.2 cipher suites that will cause TLS 1.2 clients to use them, and yet include others to still allow any TLS 1.1-compliant or older clients to still fall back to encryption ciphers that are considered “strong.” (RC4 is no longer considered strong, but it doesn’t use CBC mode, so it might be used to protect a legacy system against BEAST.)

Finally, in 2012 a new exploit was documented—”Compression Ratio Info-leak Made Easy (CRIME).” To protect against this exploit, which derives the secret session key from observations about changes in the size of compressed request payloads, simply disable TLS compression. The “Ciphers” page at OpenSSL will help you configure secure TLS 1.2 if use Apache or nginx, and for IIS, take a look at MS Knowledgebase Article 245030.

Good Website Design

The CASC recommends that customers scan their websites for vulnerabilities to cross-site-scripting (XSS) and that they implement secure cookies and consider HTTP Strict Transport Security (HSTS) and Content Security Policy (CSP).

First, XSS vulnerabilities are created when web pages allow the client to inject an untrusted data flow into web page processes. Proper web site design forces untrusted client data to be “escaped” with encoding appropriate for the script used on the web page. JavaScript, HTML, URLs, CSSs, and other web design elements use escape codes to enclose or “bracket” untrusted data and prevent it from corrupting data flowing through trusted processes. See this OWASP article for more information on XSS.

Second, the newer variety of man-in-the-middle attacks use exfiltrated data such as insecure cookies and other session data to impersonate user connections. For example, Firesheep, a Firefox browser extension released in 2010, sniffs wi-fi networks and intercepts unsecured user cookies, and BEAST, discussed above, uses JavaScript with a network sniffer to hijack session cookies. Cookies should be configured with a “Secure” attribute that is set to “True.”

HSTS and CSP are two ways to mitigate the leak of information to an attacker. With HSTS (sometimes referred to as Always On SSL), you add an HTTP header, which is received over HTTPS and processed by the client at the transport layer and stored for use in future communications with your site. Future attempts to load via HTTP will be replaced by HTTPS. Similarly, the W3C’s candidate recommendation Content Security Policy communicates security instructions to the application layer. The security policy header then specifies the security-relevant information that browsers should expect to see when they attempt to communicate with the web site, and site operators can even configure alerts when browsers encounter certain unanticipated SSL-related events.

Overall, the RSA sessions this year were particularly helpful and informative on available ways to mitigate and prevent attacks on the security of SSL communications.

Ben Wilson, General Counsel & Senior Vice President of Industry Relations, DigiCert

This article was originally published by the "CA Security Council". In 2021 the CASC was restructred and renamed to the "Public Key Infrastructure Consortium" shortly "PKI Consortium".

Learn more about the PKI Consortium
Participate in our community discussions and/or join the consortium