Securely implement and configure SSL to ward off SSL vulnerabilities

Secure Sockets Layer (SSL) has been under constant attack since it was developed by Netscape in 1994. The security and integrity of the X.509 Public Key Infrastructure has encountered more questions recently, but improvements have been made in response to the attacks and research. My SearchSecurity.com tip on SSL from September, 2010 discussed many of these SSL vulnerabilities at that time, but additional improvements have been made in the last two years.

Despite the warnings about SSL security, if implemented and configured correctly, SSL can still be used to secure the transport of data across unsecured networks. In this tip, we’ll examine the extent to which SSL vulnerabilities represent a threat to enterprises today and offer ways to implement and configure SSL securely.

SSL security questions

Due to the increased reliance on SSL for protecting communications, insecure usage of SSL presents more of a threat to enterprises and users now than it did two years ago. Recent attacks include the issuing of man-in-the middle certificates by Comodo, DigiNotar and other attacks where PKI certificate authorities (CAs) have issued fraudulent intermediate CAs or server certificates that could be used to attack SSL connections. These certificates could even be used by organizations to monitor the communications on their own network.

But the bigger threat is in the perceived protections that don’t exist. SSL does not provide everything a Web application or system needs to secure the data or the system. SSL does provide strong protections for data transported across networks and cryptography can protect data in many other places. If the SSL or cryptography implementation is insecure or the system is insecure, the strength of the algorithms protecting the system does not matter.

Beyond the questions about SSL’s core cryptography and key-exchange methods, more serious flaws are often found in enterprise SSL implementations. These flaws include enabling weak encryption and using a certificate for a different hostname.

Defending against SSL vulnerabilities

If and when there are vulnerabilities found in SSL, organizations should keep up to date on patches so most of the fixes can be implemented in a similar fashion as any other software is patched or secured. Given the complexity of SSL and the various devices supporting it, this could be a daunting task that requires significant effort if the patches or changes are not backward-compatible. Just like for any other patch, the patches for SSL Certifiate should be tested thoroughly to ensure it doesn’t break any functionality. The test systems might also need to be connected to the patched systems to ensure they are still able to connect.

To guard against SSL vulnerabilities, enterprises should first ensure the basics from my 2010 tip have been covered, but there are additional steps that can be taken. These protection efforts by enterprises can be broken down into three areas: users, customers and services. Enterprises can protect their users by installing browser plug-ins that force SSL usage if it is supported by the remote host. Tools for this purpose include the Electronic Frontier Foundation’s FireFox plug-in, called HTTPS Everywhere, which forces the use of SSL when available, and Convergence, which allows greater control over which CAs are trusted by the browser. Enterprise users should also receive some security awareness training to ensure they use secure connections. Users should not need to make sophisticated and technically detailed decisions about how to secure their communications, but they should understand the necessity of using secure connections. These same protections can be suggested to an organization’s customers, but the organization can only provide services over secured connections to help reinforce good habits.

Enterprises should also ensure any older, less secure SSL implementations are retired or disabled to protect services against downgrade attacks where client systems are tricked into using unsecure connection methods. The Internet Engineering Task Force has been working on improvements to SSL to get the SSL ecosystem to improve the state of security. Recommendations from the Trustworthy Internet Movement’s SSLPulse on how to securely deploy SSL are also worthy of review.

Conclusion

The SSL protocol can still be implemented and used securely, but the risks and vulnerabilities of unsecure SSL usage are now more widely known outside of SSL experts. SSL is still only one part of the overall Web security challenge. The core cryptography and key-exchange methods will always be the focus of active research to find new attacks and identify improvements, but the implementation details could yield the most improvements in security. End users will likely never notice many of these improvements, but they will need to be implemented by organizations, server operators and software developers. The importance of SSL has only increased in the last two years. More users utilize varied networks or devices to access social networks and the Internet, but they still want their Internet usage protected by an encrypted connection.

RapidSSL Online announces Cheapest SAN Certificate / UCC Certificate

The SAN (Subject Alternative Names) Certificate, aka UCC (Unified Communications) Certificate, is the reliable multi-domain SSL security which allows for secure transmissionon up to 25 host names (FQDN) and/or web servers. Use of a single SAN / UCC certificate can secure multiple public or private host names, IP addresses, and server host names, as well as firewall devices, host names, and gateways. RapidSSLonline.com provides the SAN / UCC SSL certificate to secure multiple domains.


Based in Saint Petersburg, Florida, RapidSSL Online (RapidSSLonline.com) provides trust and confidence to online users or organizations while they communicate or shop worldwide on the Web. Online businesses depend heavily on trust, and RapidSSL Online creates trust with its SAN / UCC SSL certificate, available to any website for security and enhanced credibility. Generate real time confidence for a secure ecommerce business environment by employing a broad and suitable web security solution to your business.


RapidSSLonline.com is the leading authority in SSL security certificate solutions internationally. We are the fastest growing Platinum Partner of major SSL brands: Symantec, Norton, VeriSign, GeoTrust, Thawte, and RapidSSL. We discount multi-domain SSL (SAN/UCC) certificates to just $211.95/Year with our multi-domain SSL coupon code “SUPER10OFF”. With a GeoTrust True BusinessID Multi-Domain - (SAN / UCC) SSL certificate, you can add, edit, or delete up to 25 domain names over the lifetime of the certificate. You can take advantages of this SAN certificate promo code now.


Multi Domain SSL certificate includes Up to 256-bit SSL encryption, GeoTrust site seals which includes the company name and date/time stamp. Improve customers’ trust and confidence instantly while transmitting online with a dynamic site seal from GeoTrust. Our SAN certificates are highly compatible, recognized by 99.99% web browsers and web servers.


For more details about our SAN / UCC certificates (Multi-Domain SSL), visit

https://www.rapidsslonline.com/san-ucc-certificates.aspx

Apple resolves recent issue with faulty code signing certificates

Apple issued an email notice to developers today, informing them it has been able to resolve an issue with faulty code signing certificates. The company’s update on developer certificates reads as follows (hat tip to our reader Jan!):

We have identified and resolved a recent issue with certificates for iOS and Mac code signing, Apple Push Notifications and Safari Extensions. If you have experienced any problems with a certificate issued over the past 4 days, simply re-generate a new one.

This could be the reason for this morning’s outage over at the Apple Developer Center portal. A quick look at recent posts on Apple Developer Forums reveals that programmers have experienced various issues with faulty code signing certificates since Friday. The hiccup inconvenienced developers with new certificates, as they were unable to submit new apps or app updates.




Resource:
http://9to5mac.com/2012/01/17/apple-resolves-recent-issue-with-faulty-code-signing-certificates/

RapidSSLonline Promo Offer GeoTrust QuickSSL Premium at $49.5/Yr

GeoTrust QuickSSL Premium Certificate is one of the most trusted and highly recommending SSL certificate securities for web sites accepting online payment transactions. QuickSSL Premium is a comprehensive solution for small and medium size ecommerce web site which has on average 2 or 3 sub domains. Secure Email Server, application server, and SharePoint server with the Strongest 128 to 256 bit SSL encryption.

RapidSSLonline is one of the leading and the largest cheap SSL certificate provider on Global Scale and Platinum authority Company of major SSL brands such as VeriSign, GeoTrust, Thawte, and RapidSSL. RapidSSLonline announce a wide discounted promo offer for GeoTrust SSL Certificates
 
Get Promotional Offer on GeoTrust? Save Up To 80%

Buy GeoTrust QuickSSL Premium - $49.5/yr

Use Coupon Code - @GEOTRUST99
 
Term: 2 Years Purchase

  • Secure Multiple Sub Domains up to 4 domains.
  • A comprehensive SSL security solution for payment applications and ecommerce web sites.
  • Recommending and Highly Trusted SSL certificates for Exchange (OWA) and Application servers.
  • 2048 bit CSR and strong 128 to 256 bit SSL encryption support GeoTrust SSL Certificate.
  • Instant and Easy Email Authentication only and Immediate SSL issuance within some moments.
  • $100,000K warranty, FREE: Dynamic site seal, SSL Reissue, & Root CA. 

Select 2 Years Purchase SSL options, Add Coupon Code and Buy GeoTrust QuickSSL Premium at just $49.5/Year from RapidSSLonline.com to avail the benefits of discount offer visit;
https://www.rapidsslonline.com/quickssl-premium.aspx

For more information visit https://www.rapidsslonline.com