Leaving TLS 1.2 and moving to TLS 1.3 | CalCom (2024)



A new version of TLS was launched in 2018 - the TLS 1.3 protocol. TLS 1.3 aims to solve all of the problems facing its older version - TLS 1.2. While TLS 1.2 was a good choice for a TLS protocol until recently, but now, TLS 1.3 offers a better solution with a refreshing approach, especially for security-related matters. As configuring your systems to using only TLS 1.2 and above can be painful and cause production damage, so does the update for TLS 1.3. This is the main reason why a well-designed protocol like TLS 1.3 has yet to see extensive usage. However, updating your TLS protocol doesn’t have to be painful if using automated tools that can prevent outages and save you time and effort.

In this article you will learn:

  1. What is TLS protocol
  2. What is TLS 1.2 and its possible attack vectors
  3. About TLS 1.3 protocol
  4. TLS 1.2 vs. TLS 1.3


What is TLS?

Transport Layer Security (TLS) is a cryptographic protocol designed to provide secure communication between web browsers and servers. It is used in almost every app nowadays. Many IP-based protocols such as HTTPS, SMTP, POP3, and FTP support TLS. Secure Sockets Layer (SSL), on the other hand, is a protocol used to establish an encrypted link between web browsers and servers. It uses symmetric cryptography to encrypt the data transmitted. Encryption keys are based on shared secret negotiation at the beginning of any communication session. This secret negotiation is referred to as the TLS handshake.

The most widely used versions of TLS nowadays are TLS 1.0, TLS 1.1, and TLS 1.2. While TLS 1.0 & TLS 1.1 are known to be very vulnerable, the TLS 1.2 protocol is considered to be much more secure and is thus recommended for use. Furthermore, InOctober 2018, Apple, Google, Microsoft & Mozilla (responsible for Chrome, Edge, IE, Firefox, and Safari browsers) announced that by the first half of 2020, TLS 1.0 & 1.1 will be disabled by them. While that is a good move by them, the question is: What if TLS 1.2 is no longer as secure as we thought?


TLS 1.2:

TLS version 1.2 was released in 2008. It is currently the most widely implemented version of TLS. TLS 1.2 offers major improvements over the older version, TLS 1.1. The most essential improvement, however, is in the encryption protocol. TLS 1.2 allows the use of more secure hash algorithms such asSHA-256. In addition, it allows the use of advanced cipher suites that supportelliptic curve cryptography. Up until recently, TLS 1.2 was considered fairly secure, but the discovery of new vulnerabilities, similar to the old TLS protocols' vulnerabilities, put TLS 1.2's reliability in question.

Zombie POODLE vulnerability in TLS 1.2:

We know about the Zombie POODLE attacks from five years ago which leveraged SSL 3.0 vulnerabilities. And apparently,they haven't really died.

Researchers have revealed two new vulnerabilities in the TLS 1.2 protocol which allows attacks similar to POODLE to breach it. The source of one vulnerability is in TLS 1.2's support for the outdated cryptographic method, cipher block chaining (CBC). Using the CBC method allows man-in-the-middle attacks (MITM) on users' encrypted web and VPN sessions. With some minor tweaking of the familiar POODLE attack, it is possible to hack systems that still make use of outdated crypto methods.

Another vulnerability was also found in TLS 1.2 which allows the GOLDENDOODLE attack to breach outdated crypto methods. GOLDENDOODLE is similar to, yet more powerful than the POODLE attack. It has more powerful and rapid hacking abilities, and even if a system has fully eradicated the POODLE flaw, it could still be vulnerable to GOLDENDOODLE attacks.

While this issue should have been resolved four or five years ago,the support for older protocols – which was included mainly to ensure that older legacy browsers and client machines won't be locked out of websites – means that the issue still remains.Meanwhile, those websites, operated mainly by government agencies and financial institutions, remain vulnerable.

Leaving TLS 1.2 and moving to TLS 1.3 | CalCom (1)


TLS 1.2 possible attack vector:

The new TLS 1.2 vulnerability, like the old POODLE, allows the attacker to gain access to encrypted blocks of data - and then gain exposure to plain text information - using side channels. The procedure is this: if the victim visits, for example, a non-encrypted website, malicious JavaScript is injected into the victim's browser. Once the browser is infected, a MITM attack is executed and the attacker can grab the victim's cookies and credentials from a secure web session.


TLS 1.3:

In addition to TLS 1.2's security issues, problems in performance and privacy were also noted in TLS 1.2. Therefore, a new version of TLS was launched in 2018 - the TLS 1.3 protocol. TLS 1.3 aims to address all of the problems facing TLS 1.2. Security-wise, TLS 1.3 completely abandons backward compatibility and has a completely new functional security design. TLS 1.3's security was designed from scratch, which allows it to perform the same functions as TLS 1.2, but with significantly improved resilience to attacks.


TLS 1.3 vs. TLS 1.2:

In August 2018,version 1.3 of the TLS protocol was released.The new versionincludes a lot of privacy, security and performance improvements. With TLS 1.3, encrypted connections are much faster and more secure than before. While high profile vulnerabilities were discovered in TLS 1.2, TLS 1.3 solves those issues and supports only state-of-the-art algorithms with no known vulnerabilities.

TLS 1.3 also provides additionalprivacy by encrypting more of the handshake to protect it from eavesdroppers.

Features removed from TLS 1.3:

  • Static RSA handshake
  • CBC MtE modes
  • RC4
  • SHA1, MD5
  • Compression
  • Regeneration
Leaving TLS 1.2 and moving to TLS 1.3 | CalCom (2)

Bottom line:TLS 1.3 takes a significant step forward in enhancing security. It removes all primitive features that lead to weak configurations. TLS 1.3 prevents common SSL/TLS vulnerabilities such as DROWN, POODLE, SLOTH, CRIME, and more. We recommend to use assistive tools such as PowerShell, or other hardening automation platforms to help you increase IIS security.


References:

https://kinsta.com/blog/tls-1-3/

https://www.ietf.org/blog/tls13/

https://www.darkreading.com/application-security/tls-1-3-won-t-break-everything

https://www.zdnet.com/article/chrome-edge-ie-firefox-and-safari-to-disable-tls-1-0-and-tls-1-1-in-2020/

Leaving TLS 1.2 and moving to TLS 1.3 | CalCom (2024)

FAQs

What is the handshake comparison between TLS V 1.2 and TLS V 1.3 protocol? ›

TLS 1.2 vs TLS 1.3: What are the Main Differences? TLS 1.3 offers several improvements over earlier versions, most notably a faster TLS handshake and simpler, more secure cipher suites. Zero Round-Trip Time (0-RTT) key exchanges further streamline the TLS handshake.

How does TLS 1.3 prevent downgrade attacks? ›

TLS 1.3 includes proactive downgrade protection mechanisms, ensuring that all participants in a “handshake” are using the most upgraded security protocols even if there is a man in the middle monitoring the transmissions.

Is TLS 1.3 mandatory? ›

Agencies shall support TLS 1.3 by January 1, 2024. After this date, servers shall support TLS 1.3 for both government-only and citizen or business-facing applications. In general, servers that support TLS 1.3 should be configured to use TLS 1.2 as well.

Can TLS 1.2 and 1.3 coexist? ›

TLS 1.3 is not directly compatible with previous versions. Although TLS 1.3 can be implemented with a backward-compatibility mode, there are still several compatibility risks to consider when upgrading to TLS 1.3: TLS 1.3 uses a half-close policy, while TLS 1.2 and earlier use a duplex-close policy.

Is TLS 1.3 handshake encrypted? ›

TLS 1.3 is one step ahead of TLS 1.2 in sending an encrypted message. It means less information a hacker can steal in the handshake process. sends its Change Cipher Spec and Finished message.

Does TLS 1.3 have forward secrecy? ›

Although forward secrecy was possible in older TLS versions, it was only optional. But with TLS 1.3, forward secrecy is mandatory. Perfect forward secrecy in TLS 1.3 uses the Diffie-Hellman Ephemeral algorithm for key exchange, which generates a unique session key for every new session.

How does TLS 1.3 prevent man in the middle? ›

By encrypting data and establishing a secure connection, TLS effectively prevents MITM attacks, ensuring that sensitive information remains private and untampered.

How does TLS 1.3 affect network based security? ›

TLS 1.3 has fewer handshake messages to initiate the connection between devices, which are also encrypted. This accelerates the setup process but also limits the information visible to security devices that do not carry out decryption.

Is TLS 1.2 obsolete? ›

Effective April 2, 2024 Calabrio will deprecate Transport Layer Security (TLS) 1.1 and weak Secure Sockets Layer (SSL) and TLS 1.2 ciphers. This communication provides you with comprehensive information about these changes, their impact, and the necessary steps you need to take.

Is TLS 1.3 still experimental? ›

IT'S OFFICIAL: THE TLS UPGRADE IS HERE

TLS 1.3 has been approved by the Internet Engineering Task Force (IETF).

Is TLS 1.3 supported by all browsers? ›

TLS 1.3 protocol has improved latency over older versions, has several new features, and is currently supported in both Chrome (starting with release 66), Firefox (starting with release 60), and in development for Safari and Edge browsers.

What is the difference between TLS handshake and 3 way handshake? ›

TCP 3-way handshake includes SYN, ACK-SYN, ACK, with an incremental sequence number. After TCP 3-way handshake, if the website is HTTPS, browser and server starts TLS handshake. The main purposes of TLS handshake are to negotiate the cryptography used to encrypt data and to verify the server based on SSL certificate.

What is handshake protocol in TLS? ›

The SSL/TLS handshake is a series of steps that allows two parties – typically a client and a server – to authenticate each other, agree on encryption standards, and establish a secure channel for transferring data. It's like a complex digital dance with sophisticated back-and-forth communication in milliseconds.

Is TLS 1.1 better than 1.2 handshake? ›

Performance. TLS 1.2 is faster than TLS 1.1 due to several improvements in the protocol. TLS 1.2 reduces the number of round trips required during the handshake process, which reduces latency and improves performance. In addition, TLS 1.2 uses more efficient cipher suites, which also contribute to better performance.

What is the difference between TLS handshake and record protocol? ›

The record protocol is responsible for securing application data and verifying it's integrity and authenticity. The TLS handshake protocol is responsible for the authentication and key exchange necessary to establish and secure sessions.

Top Articles
Forgot to File FBAR & Have Past Due Filing Requirements?
First Citizens shares soar 50% after the bank buys a large chunk of failed Silicon Valley Bank
No Hard Feelings (2023) Tickets & Showtimes
It's Official: Sabrina Carpenter's Bangs Are Taking Over TikTok
Using GPT for translation: How to get the best outcomes
Mileage To Walmart
Videos De Mexicanas Calientes
EY – все про компанію - Happy Monday
His Lost Lycan Luna Chapter 5
Günstige Angebote online shoppen - QVC.de
Funny Marco Birth Chart
111 Cubic Inch To Cc
Sonic Fan Games Hq
Der Megatrend Urbanisierung
Dark Chocolate Cherry Vegan Cinnamon Rolls
Trivago Sf
UPS Store #5038, The
Heart and Vascular Clinic in Monticello - North Memorial Health
O'Reilly Auto Parts - Mathis, TX - Nextdoor
Zillow Group Stock Price | ZG Stock Quote, News, and History | Markets Insider
Getmnapp
Prep Spotlight Tv Mn
What Equals 16
At 25 Years, Understanding The Longevity Of Craigslist
Soul Eater Resonance Wavelength Tier List
Relaxed Sneak Animations
10-Day Weather Forecast for Santa Cruz, CA - The Weather Channel | weather.com
Japanese Emoticons Stars
Bj's Tires Near Me
Trust/Family Bank Contingency Plan
Grove City Craigslist Pets
2015 Chevrolet Silverado 1500 for sale - Houston, TX - craigslist
Chase Bank Cerca De Mí
A Man Called Otto Showtimes Near Carolina Mall Cinema
Montrose Colorado Sheriff's Department
Baywatch 2017 123Movies
Babbychula
Ksu Sturgis Library
Td Ameritrade Learning Center
„Wir sind gut positioniert“
More News, Rumors and Opinions Tuesday PM 7-9-2024 — Dinar Recaps
Ursula Creed Datasheet
Casamba Mobile Login
Cult Collectibles - True Crime, Cults, and Murderabilia
Contico Tuff Box Replacement Locks
Yosemite Sam Hood Ornament
Diario Las Americas Rentas Hialeah
Bluebird Valuation Appraiser Login
Arre St Wv Srj
Craigslist Farm And Garden Missoula
Latest Posts
Article information

Author: Edwin Metz

Last Updated:

Views: 5979

Rating: 4.8 / 5 (78 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Edwin Metz

Birthday: 1997-04-16

Address: 51593 Leanne Light, Kuphalmouth, DE 50012-5183

Phone: +639107620957

Job: Corporate Banking Technician

Hobby: Reading, scrapbook, role-playing games, Fishing, Fishing, Scuba diving, Beekeeping

Introduction: My name is Edwin Metz, I am a fair, energetic, helpful, brave, outstanding, nice, helpful person who loves writing and wants to share my knowledge and understanding with you.