Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Submission + - Book review: Bulletproof SSL and TLS

benrothke writes: Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications

Author: Ivan Ristic

Pages: 530

Publisher: Feisty Duck

Rating: 10/10

Reviewer: Ben Rothke

ISBN: 978-1907117046

Summary: Tremendous guide on how to correctly deploy TLS by one of the top experts in the field



If SSL is the emperor's new clothes, then Ivan Ristic in Bulletproof SSL and TLShas shown that perhaps the emperor isnt wearing anything at all. There is a perception that if a web site is SSL secured, then it's indeed secure. Read a few pages in this important book, and the SSL = securitymyth is dispelled.



For the first 8 of the 16 chapters, Ristic, one of the greatest practical SSL./TLS experts around, spends 230 pages showing countless weaknesses, vulnerabilities, attacks and other SSL weaknesses. He then spends the next 8 chapters showing how SSL can, if done correctly, be deployed to provide adequate security.



Ristic is the author of the SSL Labs web site; a site dedicated to everything SSL, including extensive documents and tools.



One would think that it's impossible to write an interesting book about a security protocol. But for those who use SSL or just want to understand what it's all about, the book is not only quite practical, but a very interesting read.



The book provides a good balance of overview, protocol details, summary of vulnerabilities and weaknesses, and a large chunk of practical deployment guidance.



The first three chapters provide an excellent overview to SSL, TLS, PKI and cryptography. While chapter 2 may be a bit dry, the introduction is thorough and comprehensive.



Chapter 4 is particularly interesting in that the author notes that while the cryptography behind SSL and PKI is fundamentally secure, there is an inherent flaw in how PKI operates, in that any CA (certificate authority) is able to issue a certificate for any name without have to seek approval from the domain name owner. This trust dependency creates numerous attack vectors that can be exploited.



The chapter details a number of significant incidents that arose from this flaw, from the 2001 code signing certificate mistake; where Verisign mistakenly issued Class 3 code signing certificates to someone claiming to be a Microsoft employee, to the Flame malware, which was signed with a bogus certificate that was seemingly signed by Microsoft, to a number of other issues.



In chapter 5, the book details a number of HTTP and browser issues, and related TLS threats. Attacks such as sidejacking, cookie stealing, cookie manipulation and more are detailed.



The author wisely notes that cookies suffer from two main problems: that they were poorly designed to being with, allowing behavior that encourages security weaknesses, and that they are not in sync with the main security mechanisms browsers use today, namely same-origin policy (SOP).



The chapter also details a significant TLS weakness in that that certificate warnings generated often leaves the clueless user to make the correct decision on how to proceed.



Ristic writes that if you receive an alert about an invalid TLS certificate, the right thing to do is immediately abandon the connection attempt. But the browser won't do that. Browser vendors decided not to enforce TLS connection security; rather they push the problem down to the user in the form of a certificate warning.



The problem is that when a user gets a certificate warning error, they simply don't know what to do to determine how big of an issue it really is, and will invariably choose to override the warning, and proceed to the website.



The challenge the user face is that these certificate warning errors are pervasive. In 2010, Ristic scanned about 119 million domain names (.com, .net and .org) searching for TLS enables sites. He found that over 22 million or 19% of the sites hosted in roughly 2 million IP addresses. But only about 720,000 had certificates whose names matches the intended hostname.



The chapter also details that the biggest problem with security indicators, similar to the certificate warnings, is that most users don't pay attention to them and possible don't even notice them.



As valuable as the first half of the book is, its significance really comes alive starting in chapter 8 on deployment issues. The level of security TLS offers only works when it is deployed correctly, and the book details how to do that. Given that OpenSSL, which is the most widely used SSL/TLS library, is notorious for being poorly documented and difficult to use, the deployment challenges are a significant endeavor.



Another issue with TLS, is that it can create performance issues and chapter 9 provides a lot of insight on performance optimization. The author quotes research from Google that SSL/TLS on their email systems account for less than 1% of the CPU load, less than 10kb of memory per connection, and less than 2% of the network overheard. The author writes that his goal is to enable the reader to get as close as possible to Google's performance numbers.



SSL/TLS has a reputation for being slow, but that is more a remnant of years ago when CPU's were much slower. With better CPU's and the optimization techniques the book shows, there is no reason not to use TLS.



For those that want an initial look, the table of contents, preface, and chapter 1 are available here. Once you get a taste of what this book has to offer, you will want to read the entire book.



As noted earlier, OpenSSL is poorly documented. InBulletproof SSL and TLS, Ivan Ristic has done the opposite: he has written the most readable and insightful book about SSL/TLS to date. TLS is not so difficult to deploy, but incredibly easy to deploy incorrectly. Anyone who is serious about ensuring that their SSL/TLS deployment is effective should certainly read this book.





Reviewed by Ben Rothke
Piracy

New Zealand Three-Strikes Law To Be Tested 77

Dangerous_Minds writes "Next month, tribunals will begin for the first people receiving their third strikes in the New Zealand 'Three Strikes Law.' In all, 11 people will have their cases heard, including one who said that her connection was used without her knowledge. Freezenet notes that there has been a long history of controversy for the law from the Internet blackout protests of 2008 to the cablegate leak which revealed that the law was financed and pushed by the United States."

Comment Re:Innovation in perspective (Score 1) 206

Yes, but he also wasn't Jonas Salk or Ghandi or Pasteur or Einstein or Justus von Liebig or any of a thousand others who had far greater impact of human life and culture and health. He had a brilliant design sense and he was a brilliant marketer but this whole "He changed the WORLD!" thing is more than a little overblown.

He made better gadgets and made a metric crapload of money doing it. More power to him, but his contributions are incremental and not terribly important.

Android

37 Android Patent Lawsuits 154

An anonymous reader writes "37 lawsuits have been filed against Android in a little more than a year, the latest one of them being Microsoft's lawsuit against Barnes & Noble, Foxconn and Inventec. ReadWriteWeb says 'the number of patent lawsuits related to the Android operating system is unprecedented' and shows an infographic that is also available on Twitpic and as a PDF file, on Scribd. The first two suits were filed in March 2010 by Apple and MobileMedia against HTC. The original source of the chart, the FOSS Patents blog, says that Android's market share is only one factor, other reasons being that Google's patent portfolio is 'far too weak for what's undertaken in connection with Android'; that Google doesn't do 'inbound licensing' from trolls; and that Google tends to ignore patent issues because Google itself is rarely sued: in most of these cases, Android device makers are under attack."

Comment This is what you get (Score 1) 794

(as others have noted) when you filter at all.

By opting to edit "objectionable material" they have opened themselves up to this.

I think people who think gayness can be "cured" are idiots. But for all I know these app developers are actually following my personal code of business ethics: "1. A fool and his money are my target market, and b. It is morally wrong to allow stupid people to keep their money."

(Or is this a free app?)

I'm firmly of two minds: The first is my standard response whenever anyone objects to any media content: You don't have to buy/watch/listen. There's an "off" switch. Use it.

The other mind is every company that appoints itself guardian of my content should have its arse sued into oblivion.

All I know is that my next device will be android. Not because of this specific case, but because of Apple's consistent impulse for control. The iPhone served me well as a user, but as a developer it rather sucks and the android platform and range of devices have come along nicely.

Image

British Pizza Chain To Install Cones of Silence 122

itwbennett writes "British pizza chain Pizza Express is installing iPod docks and soundproof domes in booths of their new iPizzeria stores. 'The idea is that you can plug in your iPod and play whatever music you like without disturbing other diners,' says blogger Peter Smith. 'But I'm sure it'd work for talking about government secrets and other spy stuff, too.'"
Image

Cooking With Your USB Ports 188

tekgoblin writes "Wow, I would never have thought to try and cook food with the power that a standard USB port provides, but someone did. A standard port provides 5V of power, give or take a little. I am not even sure what it takes to heat a small hotplate, but I am sure it is more than 5V. It looks like the guy tied together around 30 USB cables powered by his PC to power this small hotplate. But believe it or not, it seems to have cooked the meat perfectly."
Music

Astronaut Sues Dido For Album Cover 264

An anonymous reader writes "Astronaut Bruce McCandless is suing Dido for her album cover that uses a famous NASA photograph of a tiny, tiny, tiny McCandless floating in space. McCandless doesn't own the copyright on the photo, so he's claiming it's a violation of his publicity rights ... except that he's so tiny in the photo, it's not like anyone's going to recognize him."
Image

Selling Incandescent Light Bulbs As Heating Devices 557

Csiko writes "The European Union has banned by law trading of incandescent light bulbs due to their bad efficiency/ecology (most of the energy is transformed into heat). A company is now trying to bypass this restriction by offering their incandescent light bulb products as a heating device (article in German) instead of a light device. Still, their 'heat balls' give light as well as heating. So — every law can be bypassed if you have some creativity!"
Medicine

High Fructose Corn Syrup To Get a Makeover 646

An anonymous reader writes "With its sweetener linked to obesity, some cancers and diabetes, the Corn Refiners Association (CRA) doesn't want you to think 'fructose' when you see high fructose corn syrup in your soda, ketchup or pickles. Instead, the AP reports, the CRA submitted an application to the FDA, hoping to change the name of their top-selling product to 'corn sugar.'"
Image

Frustrated Reporter Quits After Slow News Day 178

Norwegian radio journalist Pia Beathe Pedersen quit on the air complaining that her bosses were making her read news on a day when "nothing important has happened." Pedersen claimed that broadcaster NRK put too much pressure on the staff and that she "wanted to be able to eat properly again and be able to breathe," during her nearly two-minute on-air resignation.

Slashdot Top Deals

The sooner all the animals are extinct, the sooner we'll find their money. - Ed Bluestone

Working...