Rethinking network and security monitoring in the age of TLS 1.3 (2024)

The adoption of the Transport Layer Security (TLS) 1.3 creates a watershed moment for cybersecurity, revolutionizing encryption and data protection standards. TLS has been widely used to secure data end-to-end for many decades. Though this latest version significantly enhances the security of the TLS protocol, it also severely limits the decryption of those data streams for cybersecurity and network monitoring purposes. This results in our current forms of network and security monitoring used with previous TLS versions to lose their effectiveness. The new TLS encrypted traffic actually can increase security risks by obscuring malware and traffic by threat actors as well, and therefore requires a fundamental rethinking of today’s monitoring approach.

A U.S. response to a global challenge

These changes are considered enough of a cybersecurity challenge that the U.S. National Cybersecurity Center of Excellence (NCCoE), a part of the National Institute of Standards and Technology (NIST), has started a project to “provide system and application administrators with practical tools and approaches to help them gain visibility into the traffic flowing across their networks, and to fully adopt TLS 1.3.”

Collaborating with experts from various industries, NCCoE recently released draft publications describing the challenges of TLS 1.3 to cybersecurity and suggesting various solutions and their benefits to tackle this visibility challenge in the latest “NIST SPECIAL PUBLICATION 1800-37B: Addressing Visibility Challenges with TLS 1.3 within the Enterprise.”

TLS 1.3 — Innovation in encryption that negatively impacts visibility

Security, network and application operations have always relied on visibility into the traffic traversing the network, whether to determine the most efficient routing based on the data content, to measure network and application performance or to determine legitimate versus illegitimate resource usage. While ever more complex encryption and cypher technologies are employed to protect privacy and information confidentiality, it decreases visibility and increases complexity for these monitoring applications.

The Internet Engineering Task Force (IETF) released the TLS 1.3 specification in RFC 8446 in August of 2018 and is now the most common version in use. It significantly enhanced previous TLS and SSL encryption protocols but impacts visibility and monitoring capabilities:

  • TLS 1.3 has fewer handshake messages to initiate the connection between devices, which are also encrypted. This accelerates the setup process but also limits the information visible to security devices that do not carry out decryption.
  • TLS 1.3 reduces the number of options and cipher suites to those that have been proven to be unbreakable so far, creating more secure communication.
  • TLS 1.3 requires only cipher suites that provide Perfect Forward Secrecy (PFS) which applies cryptographic keys only to a single communication session, not all traffic sent from a device. This addresses the issue of threat actors potentially obtaining the private encryption keys to read all communication to a device, past and future.

How is this impacting the approach today?

Previous versions of TLS allowed for passive monitoring of the initial encryption handshake, providing vital insight. Furthermore, traffic could be decrypted if the monitoring application had a copy of each device’s static cryptographic key which then would allow for the monitoring of all traffic from these devices, whether recorded or real-time.

TLS 1.3 on the other hand requires that any application monitoring the traffic now needs to be inline and actively involved during each TLS connection establishment. Given the number of monitoring applications utilizing network traffic, this creates a significant number of decryption points that increase risk but also can impact the performance of the traffic. An alternative approach is the distribution of each session’s cryptographic keys to each monitoring application, a process that would create millions of keys that would need to be safely managed and applied.

NIST addressing the challenge in the enterprise

NIST assembled experts including cryptographers, network security technology providers and user organizations to identify solutions to address those issues. They focused on solutions for enterprise data centers either hosted by the enterprise (on-prem or virtual) or hosted by a third-party, public cloud provider. They did not address communication over the public Internet or for newly emerging encrypted Domain Name System (DNS) protocols.

Each solution had to ensure that it “does not change or replace the IETF RFC 8446 standard, provides secure management of servers’ cryptographic keys, securely manages recorded traffic, and manages expectations of privacy.” The experts identified two fundamentally different approaches:

  1. Passive network traffic analysis, requiring the safe storage and distribution of encryption keys to the monitoring applications.
  2. Inline traffic analysis, using “middle boxes” that are inline with the traffic flow and actively participate in the encryption. This is sometimes also referred to as “break and inspect”.

Alternative approaches such as analyzing only the encrypted network traffic or using security protocols without forward secrecy are not discussed. Those approaches do not deliver on the goal of TLS 1.3 visibility and do not address the vulnerabilities to which previous TLS versions are susceptible.

Visibility into TLS 1.3 encryption — Passive traffic analysis

The first approach is for passive traffic inspection, meaning analyzing copies of the traffic passing through the network, either in real-time or for later analysis. This requires key-management solutions that store those keys and defer deletion until the traffic inspection can be concluded. However, during this time, Perfect Forwarding Secrecy (PFS) could be compromised if threat actors would get access to those keys. This key management can be achieved in two ways:

  1. A key management system provides known, fixed keys for encryption to each endpoint that is valid for a limited time and then refreshed.
  2. The organization collects encryption keys directly from the end-devices and retains those.

In this approach, key management solutions need to securely store and reliably delete those keys by policy or when they are no longer required. Furthermore, applications monitoring the traffic need to be authorized and require safe — i.e., encrypted communication mechanisms — to obtain the keys for the key management system.

Visibility into TLS 1.3 encryption — Break and inspect via middle boxes

A middle box, whether virtual or physical, actively engages in the communication between two endpoints. It connects inline and actively participates in the communication between devices. In this context, its role is to decrypt traffic for numerous monitoring applications, thereby eliminating the need for each application to individually intercept the traffic. Applying this approach for each monitoring application individually would create a large number of concatenated monitoring points which could degrade transfer performance and generate additional potential security vulnerabilities. Therefore, this approach should be applied at strategic points in the network and one monitoring point utilized for as many monitoring applications as possible.

As organizations plan to enable TLS 1.3, they need to augment their traffic monitoring approach for security and all the other applications benefiting from traffic analysis. Without this change, they will enhance data privacy while losing vital visibility into existing and emerging threats, increasing their security risks.

Scott Aken is the CEO at Axellio. Image courtesy of Aken

Rethinking network and security monitoring in the age of TLS 1.3 (2024)

FAQs

How does TLS 1.3 affect network based security? ›

TLS 1.3 has fewer handshake messages to initiate the connection between devices, which are also encrypted. This accelerates the setup process but also limits the information visible to security devices that do not carry out decryption.

What protection was added to TLS 1.3 to prevent attacks that allow an attacker to use a less secure version of TLS? ›

For example, TLS 1.3 introduced improvements in cryptography and handshake mechanisms, making it more resistant to downgrade attacks. With TLS 1.3, the handshake process has been streamlined, reducing the number of round trips required to establish a secure connection.

What are the main differences in TLS 1.3 Ciphersuites compared to TLS 1.2 Select all that apply? ›

TLS 1.2 vs TLS 1.3: What are the Main Differences?
  • A Faster TLS Handshake. TLS encryption and SSL decryption require CPU time and add latency to network communications, somewhat degrading performance. ...
  • Simpler, Stronger Cipher Suites. ...
  • Zero Round-Trip Time (0-RTT)

What is the difference between TLS 1.2 and TLS 1.3 handshake? ›

The TLS 1.2 requires two round trips to complete the handshake process. TLS 1.3 combines the initial handshake and the negotiation of cryptographic parameters into one round trip.

Is TLS 1.3 safe to use? ›

In a nutshell, TLS 1.3 is faster and more secure than TLS 1.2. One of the changes that makes TLS 1.3 faster is an update to the way a TLS handshake works: TLS handshakes in TLS 1.3 only require one round trip (or back-and-forth communication) instead of two, shortening the process by a few milliseconds.

How does TLS 1.3 prevent downgrade attacks? ›

TLS 1.3 includes proactive downgrade protection mechanisms, ensuring that all participants in a “handshake” are using the most upgraded security protocols even if there is a man in the middle monitoring the transmissions.

How to check if TLS 1.3 is enabled? ›

Troubleshooting Tip: how to enable TLS 1.3 in Windows 10
  1. Open the 'Run' Windows by inputting 'Win + R' and type 'regedit' to execute 'Registry editor'.
  2. Browse to 'Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.3\Client' and double-click on 'Enabled'.
Oct 6, 2023

What are the security issues with TLS? ›

One of the most common TLS security risks is the use of weak ciphers. Attackers can crack weak ciphers easily, thereby allowing them to gain access to sensitive data. Some other TLS vulnerabilities include Padding Oracle on Downgraded Legacy Encryption (POODLE), man-in-the-middle (MITM), and so on.

What algorithm does TLS 1.3 use? ›

SHA-1 Hash Function. CBC (Block) Mode Ciphers. MD5 Algorithm. Various non-ephemeral Diffie-Hellman groups.

Why TLS 1.3 is not used? ›

While TLS 1.3 is more secure, not all devices, browsers, and servers support it. This means that if you are using TLS 1.3, some users may not be able to access your website or service, which can lead to decreased user engagement and potentially lost business.

Is TLS 1.3 symmetric or asymmetric? ›

It uses asymmetric encryption (i.e., a public key to encrypt data and a private key to decrypt it) at the start of a connection between the client and the server, and switches to symmetric encryption (i.e., the same key is used for encryption and decryption) after having exchanged session keys data.

Is TLS 1.3 handshake encrypted? ›

TLS 1.3 is one step ahead of TLS 1.2 in sending an encrypted message. It means less information a hacker can steal in the handshake process. sends its Change Cipher Spec and Finished message.

Does TLS 1.3 have forward secrecy? ›

Although forward secrecy was possible in older TLS versions, it was only optional. But with TLS 1.3, forward secrecy is mandatory. Perfect forward secrecy in TLS 1.3 uses the Diffie-Hellman Ephemeral algorithm for key exchange, which generates a unique session key for every new session.

How does TLS 1.3 prevent man in the middle? ›

By encrypting data and establishing a secure connection, TLS effectively prevents MITM attacks, ensuring that sensitive information remains private and untampered.

What is TLS in network security? ›

Transport Layer Security, or TLS, is a widely adopted security protocol designed to facilitate privacy and data security for communications over the Internet. A primary use case of TLS is encrypting the communication between web applications and servers, such as web browsers loading a website.

What are the risks of TLS v1? ›

Specifically, TLS 1.0 and 1.1 have flaws like weak ciphers that can be exploited to decrypt traffic. Newer protocols use improved encryption algorithms that make snooping much harder. Disabling legacy versions forces services to adopt the latest standards if they want to be accessible in future versions of Windows.

Top Articles
The Purpose of Form W-9
DOD's FY 2025 budget focuses on defense, people, teamwork
Splunk Stats Count By Hour
Santa Clara College Confidential
Steamy Afternoon With Handsome Fernando
Notary Ups Hours
Www.megaredrewards.com
Pj Ferry Schedule
Words From Cactusi
Achivr Visb Verizon
Xm Tennis Channel
Santa Clara Valley Medical Center Medical Records
Nonuclub
A rough Sunday for some of the NFL's best teams in 2023 led to the three biggest upsets: Analysis - NFL
2021 Lexus IS for sale - Richardson, TX - craigslist
House Of Budz Michigan
iLuv Aud Click: Tragbarer Wi-Fi-Lautsprecher für Amazons Alexa - Portable Echo Alternative
2016 Hyundai Sonata Refrigerant Capacity
Mflwer
Roll Out Gutter Extensions Lowe's
Jayah And Kimora Phone Number
Craigslist In Visalia California
91 East Freeway Accident Today 2022
Mychart Anmed Health Login
Drift Boss 911
Bjerrum difference plots - Big Chemical Encyclopedia
Www.paystubportal.com/7-11 Login
Www Pointclickcare Cna Login
Tokyo Spa Memphis Reviews
Xxn Abbreviation List 2023
Ihs Hockey Systems
Isablove
A Plus Nails Stewartville Mn
Jeep Cherokee For Sale By Owner Craigslist
2430 Research Parkway
Half Inning In Which The Home Team Bats Crossword
Craigslist Free Stuff San Gabriel Valley
Kaiju Paradise Crafting Recipes
Slv Fed Routing Number
#scandalous stars | astrognossienne
Rogers Centre is getting a $300M reno. Here's what the Blue Jays ballpark will look like | CBC News
Myfxbook Historical Data
15 Best Things to Do in Roseville (CA) - The Crazy Tourist
Gun Mayhem Watchdocumentaries
Yogu Cheshire
Seminary.churchofjesuschrist.org
All Obituaries | Sneath Strilchuk Funeral Services | Funeral Home Roblin Dauphin Ste Rose McCreary MB
Actress Zazie Crossword Clue
Mytmoclaim Tracking
Tìm x , y , z :a, \(\frac{x+z+1}{x}=\frac{z+x+2}{y}=\frac{x+y-3}{z}=\)\(\frac{1}{x+y+z}\)b, 10x = 6y và \(2x^2\)\(-\) \(...
Basic requirements | UC Admissions
Latest Posts
Article information

Author: Aron Pacocha

Last Updated:

Views: 6468

Rating: 4.8 / 5 (68 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Aron Pacocha

Birthday: 1999-08-12

Address: 3808 Moen Corner, Gorczanyport, FL 67364-2074

Phone: +393457723392

Job: Retail Consultant

Hobby: Jewelry making, Cooking, Gaming, Reading, Juggling, Cabaret, Origami

Introduction: My name is Aron Pacocha, I am a happy, tasty, innocent, proud, talented, courageous, magnificent person who loves writing and wants to share my knowledge and understanding with you.