Recent Blog Posts

I've just released the June update of Bulletproof SSL and TLS. This batch completes the manuscript and brings about 80 new pages across three chapters: Chapter 1, SSL, TLS, and Cryptography, begins with a brief introduction to SSL and TLS and discusses where these secure protocols fit in the Internet...  MORE »

In the 1.10.x code branch of SSL Labs, which was deployed to production last week, we made a change in how we handle assessments with trust issues. Previously, all certificates that we couldn't validate (largely because they were self-signed or issued from a private CA root) were given an F...  MORE »

Last week (on June 5th), OpenSSL published an advisory detailing a number of serious problems. The CVE-2014-0224 vulnerability will be the most problematic for most deployments because it can be exploited via an active network (man in the middle) attack. This vulnerability allows an active network attacker to inject ChangeCipherSpec...  MORE »

I've just released the May update of Bulletproof SSL and TLS. This batch brings 78 pages and three chapters to the book: Chapter 8, Deployment, is the map for the entire book and provides step by step instructions on how to deploy secure and well-performing TLS servers and web applications....  MORE »

Heartbleed is a name for a critical vulnerability in OpenSSL, a very widely deployed SSL/TLS stack. A coding error had been made in the OpenSSL 1.0.1 code, which was subsequently released in March 2012. The vulnerability is in the rarely used heartbeat mechanism, specified in RFC 6520. The error allows...  MORE »

I've just released the April update of Bulletproof SSL and TLS. This batch concludes the part of the book that deals with attacks, vulnerabilities and weaknesses, both in the protocols and the PKI infrastructure. There's about 90 new pages, in three chapters: Chapter 4, Attacks against PKI, deals with attacks...  MORE »

Mixed content issues arise when web sites deliver their pages over HTTPS, but allow some of the resources to be delivered in plaintext. The active network attacker can't do anything about the encrypted traffic, but messing with the plaintext can result with attacks ranging from phishing in the best case...  MORE »

The next generation of the Java runtime, version 8, is around the corner, with the first production release planned for this month (March 2014). The new runtime brings a slew of language improvements and it’s actually proving to be quite an exciting release. If you ask me, Java 8 also...  MORE »

A couple of weeks ago, I added a test for Apple's TLS authentication bug to SSL Labs. Some people have asked me how they can do that themselves, so that they can test for this problem in a private setting (e.g., their intranet). First, you need to prepare a special...  MORE »

I've just released the March update of Bulletproof SSL and TLS. This batch is focused on protocol attacks. In about 50 pages, I cover the major problems discovered in recent years. In chronological order, they are: Insecure renegotiation (2009) BEAST (2011) CRIME (2012) Lucky 13 (2013) RC4 Weaknesses (2013) TIME...  MORE »

View all posts »