{"id":1809,"date":"2022-05-20T16:37:01","date_gmt":"2022-05-20T14:37:01","guid":{"rendered":"https:\/\/www.dsecbypass.com\/?p=1809"},"modified":"2022-09-27T08:29:18","modified_gmt":"2022-09-27T06:29:18","slug":"improve-your-tls-encryption","status":"publish","type":"post","link":"https:\/\/www.dsecbypass.com\/en\/improve-your-tls-encryption\/","title":{"rendered":"Improve your TLS encryption"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.dsecbypass.com\/wp-content\/uploads\/2022\/05\/tls_gradeF.png&#8221; alt=&#8221;TLS Security F-Rating&#8221; title_text=&#8221;tls_gradeF&#8221; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;50%&#8221; module_alignment=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\">The vast majority of exchanges now use encryption to guarantee the confidentiality and integrity of exchanges : HTTP<strong>S<\/strong>, SMTP<strong>S<\/strong>, LDAP<strong>S<\/strong> and many others. SSL (Secure Socket Layer) encryption, and its modern version TLS (Transport Layer Security) encryption are the most commonly encountered.<\/p>\n<p style=\"text-align: justify;\">Although HTTPS is easy to set up, default or aging configurations are often vulnerable and <strong>do not guarantee the best level of security for the user.<\/strong> In addition, a bad configuration also leads to a <strong>reduction in the ratings<\/strong> assigned by cybersecurity products on which <strong>cyber insurance<\/strong> can be based.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2 class=\"part\" data-startline=\"14\" data-endline=\"14\">How to test your TLS\/SSL security?<\/h2>\n<p style=\"text-align: justify;\">In order to test the security of HTTPS encryption yourself, there are a few online solutions that allow you to easily measure it:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.ssllabs.com\/ssltest\/\" target=\"_blank\" rel=\"noopener\" title=\"Test TLS security with ssllabs\">https:\/\/www.ssllabs.com\/ssltest<\/a><\/li>\n<li><a href=\"https:\/\/observatory.mozilla.org\" target=\"_blank\" rel=\"noopener\" title=\"Test SSL security with Mozilla\">https:\/\/observatory.mozilla.org<\/a><\/li>\n<\/ul>\n<p style=\"text-align: justify;\">A score is then assigned to you, along with the details of the weaknesses.<\/p>\n<p style=\"text-align: justify;\">Attention, by default the results <strong>are made public<\/strong>, remember to check the box &#8220;<em>Do not show the results on the boards<\/em>&#8221; or &#8220;<em>Don&#8217;t include my site in the public results<\/em>&#8221; respectively.<\/p>\n<p style=\"text-align: justify;\">A more confidential alternative is to perform the analysis yourself using the <strong>testssl<\/strong>tool (<a href=\"https:\/\/github.com\/drwetter\/testssl.sh\" target=\"_blank\" rel=\"noopener\" title=\"testssl tool to analyze SSL encryption\">https:\/\/github.com\/drwetter\/testssl.sh<\/a>).<\/p>\n<p style=\"text-align: justify;\">For example on Kali Linux, type the following commands to analyze your website:<\/p>\n<blockquote>\n<p>sudo apt install testssl.sh<\/p>\n<p>testssl https:\/\/yourdomain\/<\/p>\n<\/blockquote>\n<p style=\"text-align: justify;\">The tool colors positive results in green and weak configuration in orange\/red.<\/p>\n<p>&nbsp;<\/p>\n<h2>Understanding the results<\/h2>\n<p>The most common SSL\/TLS vulnerabilities are:<\/p>\n<ul>\n<li>Use of outdated or vulnerable protocols (SSLv2, SSLv3, TLS 1, TLS 1.1)<\/li>\n<li>The use of weak algorithms (RC4, obsolete CBC ciphers on AES, ARIA etc.)<\/li>\n<li>Vulnerabilities in SSL\/TLS implementation(Heartbleed, Ticketbleed, TLSStorm for instance)<\/li>\n<\/ul>\n<p>In general, these vulnerabilities can allow a malicious actor in a <em>Man-in-The-Middle<\/em> position to decrypt communications if the conditions are met, or to attack web servers directly as in the case of Heartbleed (CVE-2014-0160) or Ticketbleed (CVE-2016-9244).<\/p>\n<p>&nbsp;<\/p>\n<h2>How to improve SSL\/TLS security?<\/h2>\n<p style=\"text-align: justify;\">When you own the configuration of web servers, securing TLS encryption can be easily achieved by using the parameters recommended by Mozilla on the following online generator: <a href=\"https:\/\/ssl-config.mozilla.org\/\" target=\"_blank\" rel=\"noopener\" title=\"Generate a secure TLS configuration\">https:\/\/ssl-config.mozilla.org\/<\/a>.<\/p>\n<p style=\"text-align: justify;\">To use it, simply choose your type of web server or reverse proxy (Apache, IIS, Nginx, Traefik, others), as well as the desired TLS hardening level. The latter will also depend on the level of compatibility with old browsers (old PCs or smartphones).<\/p>\n<p style=\"text-align: justify;\">It is generally recommended to use the &#8220;Intermediate&#8221; setting for a compromise between security and backwards compatibility, or &#8220;modern&#8221; for optimal security and score.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\"><span>\ud83d\udee1\ufe0f DSecBypass supports you in securing your TLS services during <a href=\"https:\/\/www.dsecbypass.com\/en\/website-pentest\/\">website security audits<\/a> or <a href=\"https:\/\/www.dsecbypass.com\/en\/external-pentest\/\">external penetration tests<\/a>, with quality services and significant experience in this type of service. Do not hesitate to <a href=\"https:\/\/www.dsecbypass.com\/en\/contact\/\">contact <\/a>us for additional information and\/or a personalized quote \ud83d\udcdd.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;https:\/\/www.dsecbypass.com\/en\/contact\/&#8221; button_text=&#8221;CONTACT US&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;13px&#8221; button_bg_color=&#8221;#4328b7&#8243; button_border_width=&#8221;10px&#8221; button_border_color=&#8221;#4328b7&#8243; button_border_radius=&#8221;0px&#8221; button_letter_spacing=&#8221;2px&#8221; button_font=&#8221;Titillium Web|700||on|||||&#8221; background_layout=&#8221;dark&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Although HTTPS is easy to set up, default or aging configurations are often vulnerable and do not guarantee the best level of security for the user. In addition, a bad configuration also leads to a reduction in the ratings assigned by cybersecurity products on which cyber insurance can be based.<\/p>\n","protected":false},"author":4,"featured_media":1649,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[34],"tags":[],"class_list":["post-1809","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en"],"_links":{"self":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/posts\/1809","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/comments?post=1809"}],"version-history":[{"count":21,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/posts\/1809\/revisions"}],"predecessor-version":[{"id":2479,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/posts\/1809\/revisions\/2479"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/media\/1649"}],"wp:attachment":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/media?parent=1809"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/categories?post=1809"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/tags?post=1809"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}