delinea.com
Open in
urlscan Pro
199.60.103.114
Public Scan
Submitted URL: https://thycotic.com/company/blog/2014/05/16/ssl-beyond-the-basics-part-2-ciphers/
Effective URL: https://delinea.com/blog/ssl-beyond-the-basics-part-2-ciphers
Submission: On October 29 via api from HU — Scanned from DE
Effective URL: https://delinea.com/blog/ssl-beyond-the-basics-part-2-ciphers
Submission: On October 29 via api from HU — Scanned from DE
Form analysis
1 forms found in the DOM/search?searchString=&activeType=
<form action="/search?searchString=&activeType=">
<input type="text" id="site-search" class="hs-search-field__input" name="searchString" autocomplete="off" aria-label="Search" placeholder="">
<script nonce="">
// Add event listener for search button click
const el = document.querySelector('.header-links-search');
el.addEventListener("click", addFocus, false);
//add focus to search field once it displays
function addFocus() {
setTimeout(function() {
document.getElementById('site-search').focus()
}, 500)
}
</script>
<button aria-label="Search"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512" width="24" height="16">
<title>Search</title>
<path fill="#fff"
d="M505 442.7L405.3 343c-4.5-4.5-10.6-7-17-7H372c27.6-35.3 44-79.7 44-128C416 93.1 322.9 0 208 0S0 93.1 0 208s93.1 208 208 208c48.3 0 92.7-16.4 128-44v16.3c0 6.4 2.5 12.5 7 17l99.7 99.7c9.4 9.4 24.6 9.4 33.9 0l28.3-28.3c9.4-9.4 9.4-24.6.1-34zM208 336c-70.7 0-128-57.2-128-128 0-70.7 57.2-128 128-128 70.7 0 128 57.2 128 128 0 70.7-57.2 128-128 128z">
</path>
</svg></button>
</form>
Text Content
Skip to content Services Support Contact Blog Search Search * Solutions ▼ * Secure Credentials * Enterprise Vault * DevOps Vault * Service Account Management * Privileged Remote Access * Remote Admin Access * VPN-less Browser Sessions * Privilege & Entitlement Elevation * Servers * Workstations * Cloud Infrastructure * Identity Protection * Detect & Remediate Threats * Delinea Products * Account Lifecycle Manager * Cloud Suite * Connection Manager * DevOps Secrets Vault * Identity Threat Protection * Privileged Behavior Analytics * * Privilege Control for Cloud Entitlements * Privilege Control for Servers * Privilege Manager * Privileged Remote Access * Secret Server * Server Suite * Delinea Platform * Delinea Platform Seamlessly extend Privileged Access Management to provide just-in-time access with easy, adaptive controls View the Platform * Use Cases ▼ * By common security issue * Audit and Compliance * Incident Response * IT Complexity * Privileged Access Management Maturity * Remote Workforce / Secure Remote Access * Service Account Management * Zero Trust / Least Privilege * By industry or sector * Cyber Insurance * Education * Energy & Utilities * Financial Services * Government * Healthcare * Telecommunications * By role and responsibility * Cybersecurity Management * DevOps * IT Management * Resources ▼ * Resource 1 * All Resources * Analyst Reports * Case Studies * Conferences * Datasheets * Demos * eBooks * Free Tools * Glossary * Resources 2 * Infographics * Podcasts * Product Documentation * Solution Briefs * Videos * Webinars * Whitepapers * Trials * Promo Panel * * Company ▼ * About Delinea * Delinea Overview Seamless privileged access without the excess * Leadership Meet the team at Delinea * Board of Directors Our strategic advisors * Company News Read the latest Delinea News * Careers Discover your possibilities * Contact Us Here to help you define the boundaries of access * Why Delinea * Why Delinea Proven leader in Privileged Access Management * Trust Center We’ve got you covered * In the Press Read the latest Delinea Press * Social Spread the word about Delinea * Customers * Customers We work to keep your business moving forward * Partners ▼ * Partner Program * Program Overview Partnership options with Delinea * Partnership Inquires Become a Partner or get in touch to talk * Partner Resources * Register a Deal For Reseller, Technology and Trusted Advisory Partners * Partner Portal All the resources you need, in one place * Find a Partner * Strategic Partnerships Implement and operationalize PAM programs * Integrations Marketplace Making your privileged access goals a reality * Free Trials ▼ * Trials 1 * Secret Server Discover, manage, protect and audit privileged account access * Account Lifecycle Manager Discover, secure, provision, and decommission service accounts * Privileged Behavior Analytics Detect anomalies in privileged account behavior * Trials 2 * Privilege Manager Workstation endpoint privilege management and application control * Server PAM Manage identities and policies on servers * DevOps Secrets Vault Manage credentials for applications, databases, CI/CD tools, and services * Trials 3 * All Trials Try one of our PAM solutions free for 30 days * All Tools Free Privileged Account Security and Management Tools * Request a Quote We’re here to give you pricing when you’re ready Delinea Blog > SSL beyond the basics part 2: Ciphers SSL BEYOND THE BASICS PART 2: CIPHERS Written by Delinea Team Share: In our previous post, we discussed the different protocols for SSL and TLS, and how we can improve security by disabling older, less secure protocols and enabling newer, more secure ones. Today, we will talk about ciphers, which is one of the key pieces to making these protocols work. Here’s a quick refresher: In daily conversation, SSL is often used as a catchall phrase for both SSL and TLS protocols. However, TLS is a more secure option for data transmission. When Secret Server connects with a user’s browser, a “handshake” or negotiation happens between the server and browser to decide whether to use SSL or TLS and which version of the protocol will be used. The negotiation phase includes a step to decide which ciphers, or what cipher suite, will be used. TLS sessions use multiple ciphers, and each performs a different type of operation, such as hashing, signing, or encrypting. The security of ciphers can vary and some ciphers are supported only on a particular version of TLS. Also, Microsoft’s implementation of TLS in their SChannel library complicates the matter slightly because Microsoft only allows certain ciphers to be used with certain types of certificates. For simplicity, we’ll assume our web server’s HTTPS certificate is a standard RSA 2048 certificate with SHA1 as the signature hash algorithm and with TLS 1.0, 1.1, and 1.2 enabled. A NOTE OF CAUTION One side effect of configuring protocols and ciphers on Windows is that it makes the changes for all software that relies on SChannel, not just Internet Information Services (IIS). This can make it tricky to enforce strong cipher suites for clients connecting to IIS without also impacting other software on the server, such as Microsoft SQL Server. Therefore, we recommend making all cipher configuration changes in a staging environment to determine the impact on all software. The cipher suites you choose to support will depend on the clients. If you can control which clients are connecting to the server, then it can be assumed which ciphers are safe to turn off. If you have little or no control over the clients, then some older cipher suites must still be supported for compatibility reasons. THE HANDSHAKE A typical TLS handshake goes something like this: During the handshake, the server and client are agreeing upon a master Secret. Here are the details for how this happens: First, the client generates a pre-master Secret, which it encrypts with the server’s RSA public key during the Client Key Exchange step. Next, the server uses the RSA private key to decrypt this pre-master Secret. Finally, the client and server use the pre-master Secret, along with other information that was transmitted during the Client Hello and Server Hello steps, to derive the master key. Once the master key is created, it is used to generate a session key for all communications during that session. This session key is a symmetric algorithm such as AES. This poses one potentially big problem. If an attacker (or in this case, we can all him a man-in-the-middle) were recording all of the encrypted traffic sent between the client and server, the attacker would be able to decrypt the TLS session if the server’s private key was ever leaked. PERFECT FORWARD SECRECY The secrecy problem above can be avoided by using what is called perfect forward secrecy. This is done by using an ephemeral Diffie-Hellman key exchange instead of using an RSA key exchange. The ephemeral key is only good for the duration of the TLS session, which means that once the session is over, the session key is no longer usable. Now, even if the session was recorded via a man-in-the-middle, there is no key that could later be found and used to decrypt the session. While Ephemeral Diffie-Hellman (or DHE) provides strong security, it has a big impact on performance. Because the server is now generating these ephemeral keys for each session, the handshake takes significantly longer. To improve the speed of the Diffie-Hellman process, you can use Elliptic Curve (together, this is called ECDHE). Although ECDHE doesn’t perform as well as a static RSA key, it is comparable when used on modestly powered servers. The downside is ECDHE is relatively new. While supported by new versions of desktop browsers, it is not supported by some older smartphones and browsers. In the case of Microsoft Windows, ECDHE requires TLS 1.2 and Windows Server 2012. SYMMETRIC CIPHERS The symmetric cipher is the algorithm used to encrypt data in the TLS session. There have been many advances with the symmetric cipher over the past few years, including authenticated ciphers such as AES in GCM mode. The strength of the symmetric cipher is important when considering which cipher suites to support. RC4 The RC4 cipher is one of the oldest ciphers still used in TLS today. Being a stream cipher, RC4 provides good performance, which is crucial in small computing devices, but more secure methods of encryption, such as AES, are recommended. Although RC4 saw an increase in popularity because it was not affected by the recent BEAST vulnerability, it should still be phased out. RC4 does not provide the same level of strength as ciphers that were affected by BEAST, and BEAST has since been fixed in most clients. There are still many clients that don’t support anything stronger than RC4, so before phasing it out, manually audit its use. This can be done by disabling RC4 in an isolated environment and determining what no longer works. AES The AES algorithm is the next most popular and offers superior strength over RC4 and others. Its most common mode of operation is Cipher-Block-Chaining (CBC), and a fairly new mode of operation is Galois/Counter Mode (GCM). AES-GCM is recommended over AES-CBC because it is an authenticated cipher. An authenticated cipher provides message integrity in the symmetric algorithm itself, whereas non-authenticated ciphers need to rely on signed hashes for message integrity. GCM is fairly new, but all modern clients should support it. However, keep in mind that for Windows Server, GCM can only be used in Windows Server 2012. AES comes with three different key sizes: 128, 192, and 256 bit. All of these are safe for use in production, with 128 being the most common. The current belief is that 128-bit provides adequate security, and the additional overhead required for 256-bit may not be worth it. However, 256-bit is used in the wild. It’s recommended to support AES-CBC and GCM cipher suites, and both 128 and 256 key variants. The order you prefer depends. It is common to set a preference in this order: AES-GCM-128, AES-GCM-256, AES-CBC-128, and AES-CBC-256. TripleDES TripleDES, or 3DES, is an older cipher that has support back to Internet Explorer 6 on Windows XP. Because it is not as strong as AES, it’s recommended that 3DES be placed behind AES in symmetric cipher preference. 3DES does not commonly operate in any mode other than CBC. PRIVILEGED ACCESS MANAGEMENT FOR DUMMIES Get smart about Privileged Account password security with this quick read. Download Ebook HASHING AES-GCM is an authenticated algorithm and can both encrypt and protect the integrity of the message. However, AES-CBC and many other encryption methods cannot protect integrity. For this reason, signed hashes are used in addition to the encryption method. The two most common types of hashes are MD5 and SHA, with SHA having several variants. The hash computes a digest of the message, which is then signed by the server or client to verify its integrity. MD5, while quite popular, is in the process of being phased out. MD5 is often still supported with other older ciphers in cipher suites, such as RC4. Notably, MD5 is not FIPS compliant, which may be a deciding factor for supporting it, for some. SHA1 is the most common hashing algorithm and is currently considered safe for production use. However, the newer SHA256 is actively replacing SHA1. Supporting both is recommended, with SHA256 coming before SHA1 in preference. SHA256 does impact performance, but this is considered negligible compared with its security improvements. CHOOSING CIPHER SUITE ORDER Given everything above, it is now possible to determine the preferred cipher suite order. This order can be set in Windows Server with Group Policy under: Computer Configuration > Administrative Templates > Network > SSL Configuration Settings > SSL Cipher Suite Order setting. Cipher suite configurations look like this: TLS_RSA_WITH_AES_128_CBC_SHA256 This means that an RSA key exchange is used in conjunction with AES-128-CBC (the symmetric cipher) and SHA256 hashing is used for message authentication. The cipher order decides, starting from the top, which ciphers will be preferred by the server. During the negotiation, the server will select a cipher that meets the client and the server requirements by offering them in this order. Here is an example cipher order that places newer, more secure ciphers, at the top: * TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P256 * TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P384 * TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P256 * TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P384 * TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA_P256 * TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA_P384 * TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA_P256 * TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA_P384 * TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256 * TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P384 * TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P256 * TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P384 * TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P256 * TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA_P384 * TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 * TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 * TLS_DHE_DSS_WITH_AES_128_CBC_SHA * TLS_DHE_DSS_WITH_AES_256_CBC_SHA * TLS_RSA_WITH_AES_128_CBC_SHA * TLS_RSA_WITH_AES_256_CBC_SHA * TLS_RSA_WITH_AES_128_CBC_SHA256 * TLS_RSA_WITH_AES_256_CBC_SHA256 DISABLING CIPHERS While the above sets the order of preferred cipher suites, excluding a cipher from the list does not prevent it from being used. For example, RC4 is not included in the approved list above, but if it is not disabled, it could be used if the client insists on using it. To permanently disable older ciphers, a registry change is required. You can do this by adding subkeys to the registry key: HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSecurityProvidersSCHANNELCiphers Adding a subkey with the name “RC4 128/128” and putting a DWORD named “Enabled” in the new subkey with a value of 0x0 causes RC4 128/128 to become disabled. A nice advantage to these registry changes is they take effect immediately without restarting anything. While the above disables RC4 128/128, there are other variants of RC4 to disable such as RC4 64/128 and RC4 56/128. All of these values and more are documented in a Microsoft Knowledge Base article here: http://support.microsoft.com/kb/245030 WHAT’S NEXT? Next, we will focus on the SSL certificate itself. While most SSL certificates have not changed lately, there is a need to improve their security, such as moving to SHA2 algorithms for the signature algorithm and moving from RSA to ECDSA. Read All Parts: SSL: Beyond the Basics SSL: Beyond the Basics Part 2: Ciphers SSL: Beyond the Basics Part 3: Certificates SSL: Beyond the Basics Part 4: Strict Transport Security IT SECURITY SHOULD BE EASY. WE'LL SHOW YOU HOW Try Secret Server and experience how fast and easy IT security products can be. Start My Free Trial PAM Advanced OTHER POSTS YOU MIGHT LIKE CIPHER LOCK: STORE PHYSICAL SECRETS IN SECRET SERVER SSL BEYOND THE BASICS PART 3: CERTIFICATES In our previous post, we discussed configuring TLS cipher suites to maximize security by preferring... SSL BEYOND THE BASICS PART 1: PROTOCOL SELECTION Here at Delinea we have a wide range of recommended security best practices for our customers Blog Login Contact Us Follow us on LinkedIn Follow us on Twitter Follow us on Facebook Subscribe on YouTube Subscribe on YouTube * Solutions * Account Lifecycle Manager * Connection Manager * Delinea Platform * DevOps Secrets Vault * Identity Threat Protection * Privilege Control for Cloud Entitlements * Privilege Control for Servers * Privilege Manager * Privileged Behavior Analytics * Privileged Remote Access * Secret Server * Server PAM * Use Cases * Audit & Compliance * Incident Response * IT Complexity * Privileged Access Management Maturity * Remote Workforce * Service Account Management * Zero Trust / Least Privilege * Cyber Insurance * Education * Energy & Utilities * Financial Services * Government * Healthcare * Telecommunications * Cybersecurity Management * DevOps * IT Management * Services * Professional * Training * Support * Get Support * Find Help * Partners * Program Overview * Partner Portal * Partnership Inquiries * Register a Deal * Strategic Partnerships * Resources * Analyst Reports * Case Studies * Datasheets * Demos * eBooks * Free Tools * Infographics * Product Documentation * Solutions Briefs * Trials * Videos * White Papers * Company * About Delinea * Why Delinea * Contact Us * Customers * Careers * News * Trust Center * Delinea Social * Legal © 2024 Copyright Delinea. Privacy PolicyTerms of UseMSLASitemapYour Privacy Choices By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. Cookie Policy Cookies Settings Reject All Accept All Cookies Your Opt Out Preference Signal is Honored PRIVACY PREFERENCE CENTER When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. Cookie Policy User ID: fc8edd6d-773a-4638-8f4f-7c0d59223f96 This User ID will be used as a unique identifier while storing and accessing your preferences for future. Timestamp: -- Allow All MANAGE CONSENT PREFERENCES FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Cookies Details PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. Cookies Details TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Cookies Details STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. Cookies Details Back Button COOKIE LIST Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label Reject All Confirm My Choices