1
Network Endpoint Data
Network Endpoint Data 1 TLS 1.3 : Solving new challenges for - - PowerPoint PPT Presentation
Network Endpoint Data 1 TLS 1.3 : Solving new challenges for next-generation firewalls (NGFW) Pass The Salt 2019 2 Who are we ? Nicolas Pamart Damien Deville Thomas Malherbe Apprentice Developer T echnical Leader Developer Does
1
Network Endpoint Data
2
TLS 1.3 : Solving new challenges for next-generation firewalls (NGFW)
Pass The Salt 2019
3
Who are we ?
Apprentice Developer Does stuff, Did not have a choice to talk In front of you nicolas.pamart@stormshield.eu
Damien Deville
T echnical Leader Does stuff damien.deville@stormshield.eu
Thomas Malherbe
Developer Does stuff thomas.malherbe@stormshield.eu www.stormshield.com
4
We’re on the network ...
5
We protect users & enforce company policy
6
With our state of the art IPS
7
Focus on TLS application filtering
8
TLS : T ransport layer security
A TLS connection TLS in the network stack
9
[ ] = Encrypted TLS 1.2 - Handshake TLS 1.2 – Analysed Handshake
10
With these data
11
But now … TLS 1.3 encrypts server certificate
12
Brand new TLS 1.3 handshake
[ ] = Encrypted TLS 1.2 TLS 1.3*
*RFC8446
13
We are passive*, we do not decrypt
*On the TLS layer
14
Server certificate is a public information
15
About certificates
16
How-to: Get the same certificate
17
Wait, usually kernels don’t speak TLS !
18
Dear userspace daemon, talk for me
19
Yay ! We saved our feature
20
But for each connection ?!
21
22
Let’s cache certificate !
Pros
Cons
23
Let’s cache it !
24
Let’s cache it !
25
How do we identify cache entries ?
26
Handling session resumption
27
TLS 1.3 session resumption
28
TLS 1.3 session resumption : limitations
We base ourselves on ClientHello information => SNI is « theorically* » provided in resumption ClientHello
resumption, thus breaking our filtering
*RFC 8446 section 4.2.11 : Pre-Shared Key Extension
29
Simple, just check the presence
30
The problem with SNI
31
Another cache … for the SNI !
32
The big picture
33
SNI not coherent
34
SNI coherent & Cache HIT - PASS
35
SNI coherent & Cache HIT - BLOCK
36
SNI coherent & Cache MISS - PASS
37
Proof of concept
38
PoC : design
39
PoC : supported features
=> Statistics gathering
40
PoC : results for 1 day / 1 user
Cache misses: 259 SNI incoherences : 0 Total: 2509 => Ratio: 10.32% cache miss
41
Final note
42
World is safer now
43
www.stormshield.com/join-us/
Villeneuve d’Ascq – Paris (ILM) - Lyon
44
22, rue du Gouverneur Général Éboué 92130 Issy-les-Moulineaux FRANCE nicolas.pamart@stormshield.eu +33 (0) 9 69 32 96 29
Get in T
Looking forward to hearing from you
damien.deville@stormshield.eu thomas.malherbe@stormshield.eu
45
About encrypted SNI (eSNI)
=> Solution: We also analyze DNS trafic (If you use DNSsec on top of that you may beat us)
46
TLS in kernel
=> Not enough memory to do that, too costly
47
About PSK-only servers (if it exists)
=> Thus no need for server certificate => Our solution don’t work (or don’t apply)
48
TLS 1.3 early-data
49
TLS 1.2 handshake
[ ] = Encrypted
50
TLS 1.3 handshake
[ ] = Encrypted
51
TLS 1.3 session resumption
52
TLS 1.3 0-RT == Resumption + Early data