back

The Rocky Road to TLS 1.3 and better Internet Encryption

If you suspend your transcription on amara.org, please add a timestamp below to indicate how far you progressed! This will help others to resume your work!

Please do not press “publish” on amara.org to save your progress, use “save draft” instead. Only press “publish” when you're done with quality control.

Video duration
01:00:37
Language
English
Abstract
Since a few months we have a new version of TLS, the most important encryption protocol on the Internet. From the vulnerabilities that created the need of a new TLS version to the challenges of deploying it due to broken devices this talk will give an overview of the new TLS 1.3.

In August the new version 1.3 of the Transport Layer Security (TLS) protocol was released. It‘s the result of a process that started over four years ago when it became increasingly clear that previous TLS versions suffered from some major weaknesses.

In many ways TLS 1.3 is the biggest step ever done in the history of TLS and its predecessor SSL. While previous TLS versions always tried to retain compatibility and not change too many things, the new version radically removes problematic and insecure constructions like static RSA key exchanges, fragile CBC/HMAC constructions and broken hash functions like MD5 and SHA1.

As a bonus TLS 1.3 comes with a reworked handshake that reduces the number of round-trips and thus provides not just more security, but also better performance. If that sounds too good to be true: An optional, even faster mode of TLS 1.3 – the zero round trip or 0RTT mode – makes some security researchers worried, because they fear it introduces new security risks due to replay attacks.

Though the road to TLS 1.3 was complicated. The Internet is a buggy place and particularly Enterprise devices of all kinds – middleboxes, TLS-terminating servers and TLS-interception devices – slowed down the deployment and finalization of the new encryption protocol. Also some banks thought that TLS 1.3 is too secure for them.

The talk will give an overview of the developments that led to TLS 1.3, the major changes it brings, the challenges it had to face and some practical advice for deployment.

Talk ID
9607
Event:
35c3
Day
1
Room
Borg
Start
11:30 a.m.
Duration
01:00:00
Track
Security
Type of
lecture
Speaker
hanno
Talk Slug & media link
35c3-9607-the_rocky_road_to_tls_1_3_and_better_internet_encryption

Talk & Speaker speed statistics

Very rough underestimation:
134.7 wpm
746.1 spm
134.3 wpm
743.2 spm
100.0% Checking done100.0%
0.0% Syncing done0.0%
0.0% Transcribing done0.0%
0.0% Nothing done yet0.0%
  

Work on this video on Amara!

Talk & Speaker speed statistics with word clouds

Whole talk:
134.7 wpm
746.1 spm
tlsversion1.3dataprotocolserver1.2connectionenterpriseattackpaddinghandshakeattacksextensionversionsinternetsecuritykey1.0peoplehannoissuesmicattackerclientlongerbyteturnedthingsthingquestionsendencrypteddeviceserrornumbercalledencryptionimplementso-calledmessagerandomfuturersasmallbrowsersproblemtrafficserversstandard
hanno:
134.3 wpm
743.2 spm
tlsversiondata1.3server1.2protocolattackconnectionpaddinghandshakeextensionsecurityversions1.0attacksattackerkeyclientinternetbytelongerenterprisethingturnedsendissuesso-calledencryptionthingserrornumberencryptedcalledrandompeoplemessagefixedsendsrsasslsecurestandardtrafficsmallcountermeasuresearliersupportbrowsersbit