RELATED CONTENT
Article
How to Uncover Attacks Hiding in Encryption
Hear from F5 security experts on the risks associated with encrypted traffic and how to manage inspection across all your security solutions.
F5 Labs threat intelligence research on millions of sites has found that nearly 90% of page loads are encrypted. This is because Transport Layer Security (TLS) adoption has become the norm for organizations of all sizes and in all industries.
Several driving factors have contributed to this widespread adoption: the EU General Data Protection Regulation (GDPR), Google search results ranking preferences, browser warnings for HTTP (cleartext) sites, and the ease of getting cheap or free certificates (Let’s Encrypt), to name just a few. While this evolution improves security for web traffic, it comes at a price: the potential hazards of malware cloaked in encrypted traffic and increased workload demand. Organizations must implement a solution that allows their infrastructure to enable speed and availability, while ensuring strong security and privacy.
90% of page loads on millions of sites sampled are encrypted, based on F5 Labs Threat Intelligence research.
Hear from F5 security experts on the risks associated with encrypted traffic and how to manage inspection across all your security solutions.
Encrypting traffic is great for preventing man-in-the-middle attacks that can potentially allow an attacker to view or alter data; however, encryption can make inspection or analytics devices and services blind to that traffic. Encrypting and decrypting traffic consumes a lot of computational power, so many security inspection solutions like an Intrusion Detection/Prevention System (IDS/ IPS), malware sandbox, next-gen firewall (NGFW), and others either don’t decrypt at all or take such a huge performance hit that they pass along encrypted traffic just to keep up. Whether it’s traffic coming into your application or internal traffic going out to the Internet, you need all your infrastructure investments to have the visibility they need to fulfill their potential.
Everyone knows that malware is dangerous, but it typically takes a layered defense to identify and stop it from propagating to other users and devices—or from exfiltrating data. Malware can be acquired from several different sources such as malicious web sites or phishing emails, so it’s crucial to inspect egress network traffic to ensure malware is unable to call out to command and control servers and that no sensitive data is leaving your controlled environment. This becomes a challenge as nearly all attackers are now using encrypted channels to hide their malware’s outbound communications.
There are also difficulties inspecting inbound traffic. An app or website is often crucial to an organization’s business—34% of web apps are reported as being mission critical, according to the F5 Labs 2018 Application Protection Report. And when your application is essential, you’ll likely have security solutions like a web application firewall (WAF) or an IDS/IPS to filter out malicious traffic. In addition to security inspection devices, you may need to run app traffic through analytics engines or customer experience solutions. All of these solutions offer unique value—but decryption at scale is not likely one of them.
of web apps are reported as being mission critical, and they're at risk from malicious traffic.
A recent F5 Labs study showed that 68% of malware uses encryption to hide its tracks from the security devices designed to identify and neutralize it—and that figure is likely to continue growing. When implementing a defense-in-depth strategy, many administrators deploy security solutions in a serial chain to defend against malware. This is incredibly inefficient, and also leaves the door open for malicious traffic to be passed through by an overwhelmed security inspection solution. You need visibility and security, but you can’t sacrifice performance.
An SSL/TLS solution to decrypt traffic and send to inspection devices is a good first step to mitigating the effects of malware. However, it may introduce unnecessary latency if certain traffic doesn’t need to go through certain inspection devices. For example, if a user’s outbound traffic is going to a known good site (or IP address), and the data loss prevention (DLP) solution doesn’t detect anything sensitive, does the traffic still need to go through the NGFW or the IDS? Perhaps, but it’s important to have the ability to customize the path of your traffic according to your risk tolerance.
Changing older ciphers as they are deprecated is easier when there is a centralized point of control.
The TLS protocol has a passive surveillance countermeasure called perfect forward secrecy (PFS) protection, which adds an additional exchange to the key establishment protocol between the two sides of the encrypted connection. By generating a unique session key for each session the user initiates, PFS guarantees that an attacker cannot simply recover a single key and decrypt millions of previously recorded conversations.
As PFS becomes the de facto standard—especially as this is the only method allowed within TLS 1.3—you’ll need to have a plan for any passive inspection solutions for inbound traffic. Previously, with RSA keys, you would share the key with any of those solutions. However, this is not possible with PFS generating a unique key for each session. F5 SSL Orchestrator can either decrypt and forward cleartext traffic to inspection solutions, or it can decrypt and re-encrypt using TLS 1.2 with RSA. The second option does put the onus back on the inspection devices to decrypt, but the solutions would not be required to be in line with traffic—and thus would not increase latency, nor would there be cleartext data-in-transit within your data center.
No vulnerabilities have yet been found with the elliptical curve ciphers, which are mandatory when implementing PFS; but as we all know, anything that's secure today won’t stay that way forever. Security research and hacking tools continue to advance, as does computing power—and that will inevitably help uncover a vulnerability. Having a centralized point of control for all decryption and encryption makes it easier to change ciphers as old ciphers are deprecated.
Having the ability to see inside the packets coming into your applications, or going out from your network, is a great step; but it’s only the first step. Resorting to manual daisy-chaining or configuration to manage decryption/encryption across the entire security stack is tedious, and we all know that any policy that mandates things must be a certain way always comes with an exception. F5 SSL Orchestrator delivers visibility at great scale, but it's the orchestration that really sets it apart from the pack.
Orchestration provides policy-based traffic steering to a service chain based on risk and dynamic network conditions. Via the virtue of being a full-proxy for both SSL/TLS and HTTP, SSL Orchestrator can make intelligent decisions to steer inbound and outbound traffic to service chains within the security stack. And while most of your traffic is likely HTTPS, SSL Orchestrator allows you to intelligently manage decryption and re-encryption with other traffic types such as STARTTLS within FTP, IMAP, POP3, and ICAP. No other product can do all that, which is why no other SSL/TLS solution provides more comprehensive protection for your apps—and your network.
Got a security question, issue, or something else you’d like to discuss?
We’d love to hear from you!
Hear from F5 security experts on the risks associated with encrypted traffic and how to manage inspection across all your security solutions.
Learn about the privacy, performance and security benefits of TLS 1.3 and why it’s critical to ensure visibility and orchestration into your encrypted traffic.
Hear from F5 security experts on the risks associated with encrypted traffic and how to manage inspection across all your security solutions.
Explore the latest SSL/TLS encryption management technologies, easily integrated into your entire infrastructure, and enabling your existing security inspection tool investments.