Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

CloudFlare Adds Support for TLS 1.3

CloudFlare announced on Tuesday the introduction of three new encryption features, including support for TLS 1.3, automatic HTTPS rewrites and opportunistic encryption.

CloudFlare announced on Tuesday the introduction of three new encryption features, including support for TLS 1.3, automatic HTTPS rewrites and opportunistic encryption.

The Transport Layer Security (TLS) protocol, the successor of Secure Sockets Layer (SSL), is a critical component for the protection of online communications. Version 1.2 of TLS has been around since 2008 and while it’s still fairly secure, researchers have started identifying some vulnerabilities. Another problem with TLS 1.2 is that it’s often not configured properly, leaving websites vulnerable to attacks.

TLS 1.3 is still under development, but a final version is expected soon. The new version of the protocol eliminates the problematic features that have been leveraged in many of the attack methods disclosed over the past years, including RSA key transport, the SHA-1 hash function, arbitrary Diffie-Hellman groups, and various ciphers (e.g. CBC, RC4, export ciphers). This makes it less likely for administrators to misconfigure the protocol.

Another advantage of TLS 1.3 is improved speed. In the case of TLS 1.2, completing a handshake when the connection is initiated can have a significant impact on the load time, particularly on mobile networks. TLS 1.3 cuts the initial handshake in half, significantly improving load times.

CloudFlare is offering TLS 1.3 support by default to both Free and Pro customers. Mozilla and Google have already implemented preliminary versions of the new protocol in Firefox Nightly and Chrome Canary, and CloudFlare has promised to keep up with the updates rolled out to these browsers until TLS 1.3 is finalized.

CloudFlare has been offering HTTPS to all customers through Universal SSL, but many websites still use HTTP due to mixed content (i.e. HTTPS sites that serve some sub-resources over HTTP). Sites with mixed content cause web browsers to display warnings, which is why many administrators choose HTTP over HTTPS.

According to CloudFlare, content served over HTTP is often also available over HTTPS, which means that changing http:// links to https:// in the page source can address the mixed content issue. Automatic HTTPS rewrites is a feature that automatically replaces “http” with “https” for all sub-resources available over HTTPS.

In some cases, sub-resources are served from domains that don’t support HTTPS (e.g. ads), which prevents websites from using it. CloudFlare has decided to help these sites become more secure via a feature called opportunistic encryption.

Advertisement. Scroll to continue reading.

Opportunistic encryption ensures that the connection between the browser and CloudFlare’s systems is encrypted, enabling websites to take advantage of the significant performance improvements provided by HTTP/2. For the time being, the opportunistic encryption feature is only supported by Mozilla Firefox.

Related Reading: CloudFlare Launches Security-Focused Domain Registrar

Related Reading: Tor, CloudFlare Spar Over Malicious Traffic

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

Cloud Security

VMware described the bug as an out-of-bounds write issue in its implementation of the DCE/RPC protocol. CVSS severity score of 9.8/10.