Explaining TLS 1.3

  Рет қаралды 73,846

F5 DevCentral

F5 DevCentral

Күн бұрын

Пікірлер: 59
@BruceRicard
@BruceRicard Жыл бұрын
I just think it's awesome that you guy got a polo with the logo backwards. Good work!
@devcentral
@devcentral Жыл бұрын
Thanks for the comment and noticing that! We also got this for Behind the Scenes: kzbin.info/www/bejne/i2iokH9qrKiDisU
@rdshenai
@rdshenai 5 жыл бұрын
This is amazing! Good you covered both benefits and drawbacks so that those who implement have a very good picture of roadblocks as well.
@devcentral
@devcentral 5 жыл бұрын
glad you enjoyed it!
@TheBundyworld
@TheBundyworld 2 жыл бұрын
Your mirrored hand writing is around 1000x nicer than my regular left to right :)
@m.helazior9932
@m.helazior9932 2 жыл бұрын
I think the video is mirrored.
@Ray-Z-j4w
@Ray-Z-j4w Жыл бұрын
amazing...
@himanshusharma7860
@himanshusharma7860 6 жыл бұрын
Every session of yours is indespensable!!!
@devcentral
@devcentral 6 жыл бұрын
glad you enjoy them!
@xHuge1
@xHuge1 6 жыл бұрын
Are you writing backwards? Sorry for the off topic but it is blowing my mind.
@devcentral
@devcentral 6 жыл бұрын
I wish we were that talented! For details on our build and process, you can check out this article: devcentral.f5.com/articles/lightboard-lessons-behind-the-scenes
@joehurst1453
@joehurst1453 6 жыл бұрын
Glad someone else feels the same way.
@MikeHunt-wl4ye
@MikeHunt-wl4ye 6 жыл бұрын
I'm wondering the exact same thing!
@RayCh
@RayCh 5 жыл бұрын
Mirroring
@svarodzic
@svarodzic 5 жыл бұрын
That was the very first thing I started wondering as soon as I saw him writing... :)
@ZelenoJabko
@ZelenoJabko Жыл бұрын
Hello, do you think Websockets are susceptible to 0rtt replay attacks? I mean if tou can trigger a sensitive operation via a websocket message.
@netsnower
@netsnower 6 жыл бұрын
John you are the best man keep on ROCKING!!!
@devcentral
@devcentral 6 жыл бұрын
Thanks Abraham!
@TheMikael42
@TheMikael42 4 жыл бұрын
Thanks John, as always a very nice video !!
@devcentral
@devcentral 4 жыл бұрын
glad you enjoyed it!
@danpacheco1
@danpacheco1 6 жыл бұрын
When using tlsv1.3 or an older version that is configured to exclusively use PFS ciphers; is there a need to import the private key file that gets generated when we create the CSR? It seems that PFS ciphers generate their own private key, therefore importing a private key is not necessary. Is this assumption correct?
@devcentral
@devcentral 6 жыл бұрын
great question! PFS ciphers are used for the key exchange portion of the TLS handshake, and new bulk encryption session keys are generated for each session. but, for server authentication purposes, many implementations still use RSA, so importing a private key for that purpose might still be needed (although you don't have to use RSA for authentication). hope this helps!
@lokeshbangalore7319
@lokeshbangalore7319 4 жыл бұрын
Thank you, content and presentation is excellent. I do not understand reply attack - even though the intruder gets access to an existing session, he does not have secret key, symmetric key to encrypt and decrypt information. Can you please help me understand? Thank you.
@devcentral
@devcentral 3 жыл бұрын
Great question Lokesh! Here's a link to a discussion on Stack Exchange that does a good job of explaining the replay attack: security.stackexchange.com/questions/166156/understanding-a-tls-1-3-0-rtt-replay-attack
@vishnudixit68
@vishnudixit68 6 жыл бұрын
can anyone share me a link for what was the SSL certificate and what is TSL certificate how to work on both
@ricp
@ricp Жыл бұрын
great overview, thanks!
@gnyaneshwarignyaneshwari9853
@gnyaneshwarignyaneshwari9853 2 жыл бұрын
Very clear explanation.Thank you sir.
@devcentral
@devcentral 2 жыл бұрын
Thanks for the comment!!
@patcoder1287
@patcoder1287 4 жыл бұрын
Since when does Matthew McConaughey give lightboard sessions on KZbin
@devcentral
@devcentral 4 жыл бұрын
alright, alright, alright!
@MrBulletproof87
@MrBulletproof87 6 жыл бұрын
Is lighting on? The worlds look dim.
@inqztiv
@inqztiv 5 жыл бұрын
side effect of fancy lightboards
@hobbytan6841
@hobbytan6841 5 жыл бұрын
Great, Good summary and explanation
@devcentral
@devcentral 5 жыл бұрын
glad you enjoyed it!
@ZeeshanKhan-tj2wh
@ZeeshanKhan-tj2wh 6 жыл бұрын
Amazing lecture delivery (Y)
@devcentral
@devcentral 6 жыл бұрын
glad you enjoyed it!
@neilreonen75
@neilreonen75 6 жыл бұрын
You were wrong with explaining PFS, you never share your private key it simply a method to assure you that even if the server you are talking with was compromise i.e. an attacker somehow get hold of his private key he than this attacker still need to decrypt each session you do with that server separately as the session key will change (new random roll) for each session. so it is going to be a bit harder.
@devcentral
@devcentral 6 жыл бұрын
Hi Neil. Thanks for the comment. When I mentioned "share your private key" I was not referring to sharing it with everyone. In some implementations using RSA for key exchange, companies will want to add inline security inspection devices like Data Loss Prevention (DLP) or Intrusion Prevention Systems (IPS), etc. When a user connects to the web server and establishes an encrypted session with the server, no other device can read the contents of the data exchanged between client and server. But, when RSA is used for key exchange, the private key of the server can be shared with these trusted security devices (DLP, IPS, etc) so that they can ultimately decrypt the data and inspect it. This brings up the fundamental problem in TLS 1.3 when PFS key exchange ciphers are used. There's no web server private key to share with these security devices (because the key changes with every new session)...so you have to figure out some other way to let them inspect the traffic. This has created a big headache for many organizations. Thanks again for the comment!
@neilreonen75
@neilreonen75 6 жыл бұрын
Thanks for clarifying that for me. I guess any man in the middle that has a private key of one of the side will be able to decrypt as it will see the handshake negotiate and will get the new symmetric key each session. Basically government does not allow you to really hide the symmetric data key in order for them to continue reading all information . Tls 1.3 will just prevent tempering to the data so if one government modify the data before second goverment read it they will know :-)
@devcentral
@devcentral 6 жыл бұрын
@@neilreonen75 thanks!
@alin-valentinradulescu5915
@alin-valentinradulescu5915 4 жыл бұрын
I feel like the title is misleading. This is rather explaining why you should use TLS 1.3, a high level overview of what it adds on top of TLS 1.2, but not really explaining TLS 1.3.
@devcentral
@devcentral 4 жыл бұрын
Thanks...as you mentioned, it's more of a high-level view of what TLS 1.3 brings. I gave a talk on this at a recent conference and filled up every bit of an hour talking about the details of TLS 1.3, so it's hard to squeeze it all into a shorter video. Thanks for the comment, though!
@ClemBu
@ClemBu 10 ай бұрын
thanks!!
@realtopg
@realtopg 4 жыл бұрын
It’s hard for our little mobile phones to do these complicated computational stuff My iPhone: Laughs in A13 bionic which could very well compete with Intel’s core i5
@devcentral
@devcentral 4 жыл бұрын
touche! iPhones have certainly come a long way.
@JasonSmith-fu6oi
@JasonSmith-fu6oi 5 жыл бұрын
LOL ok "server, you're responsible for making sure no replay attacks can occur. please configure properly..."
@devcentral
@devcentral 5 жыл бұрын
Hi Jason...it's totally true! :) The TLS 1.3 RFC says "Ultimately, servers have the responsibility to protect themselves against attacks employing 0-RTT data replication." - Appendix E.5
@JasonSmith-fu6oi
@JasonSmith-fu6oi 5 жыл бұрын
@@devcentral i am sure it is. we'll be seeing LOTS of vulnerabilities with TLS 1.3 on the horizon.....
@Mike-ci5io
@Mike-ci5io 5 жыл бұрын
Technology explained as if nutritional guide
@ThackerayHumphrey
@ThackerayHumphrey 2 ай бұрын
27968 Aurelie Extensions
@dineshbaburamachandran5803
@dineshbaburamachandran5803 5 жыл бұрын
I watched your videos and got a question please- How reply attack is possible? Checked the handshake mechanism in your video and see the key handshake mechanism is truly secure. Even if the intruder (man in the middle) intercepts the pre-master secret, he cannot decipher symmetric key out of it, because it is encrypted with Server's public key which can only be decrypted by server's private key- Reference: kzbin.info/www/bejne/maa1YWivlJd6rsU
@devcentral
@devcentral 5 жыл бұрын
Great question! It's important to note that the replay attack can only happen on the Zero Round Trip Time session resumption feature in TLS 1.3; and even then, it's only possible for the first HTTP request during the resumption. So, the symmetric key is still safe, but the replay attack (if the server allows certain HTTP methods) can still be harmful to the end user or the application. Here's a quick diagram of how the replay attack could work: blog.cloudflare.com/content/images/2017/03/image00.jpg For many applications, the Zero Round Trip Time session resumption is only allowed for HTTP methods that will not change the state of the server and/or application. This effectively means that if a replay attack is launched, the application is not adversely affected. I hope this helps!
@lozD83
@lozD83 5 жыл бұрын
TLS 1dot3
@ayadahmedalwaisi3800
@ayadahmedalwaisi3800 5 жыл бұрын
Hamam
@BryceGathje-u3b
@BryceGathje-u3b 2 ай бұрын
Wiegand Turnpike
TLS 1.3 Handshake
9:21
F5 DevCentral
Рет қаралды 43 М.
What is a TLS Cipher Suite?
20:47
F5 DevCentral
Рет қаралды 116 М.
IL'HAN - Qalqam | Official Music Video
03:17
Ilhan Ihsanov
Рет қаралды 700 М.
To Brawl AND BEYOND!
00:51
Brawl Stars
Рет қаралды 17 МЛН
Cheerleader Transformation That Left Everyone Speechless! #shorts
00:27
Fabiosa Best Lifehacks
Рет қаралды 16 МЛН
Chain Game Strong ⛓️
00:21
Anwar Jibawi
Рет қаралды 41 МЛН
Perfect Forward Secrecy
13:26
F5 DevCentral
Рет қаралды 72 М.
Introducing The F5 Advanced WAF
15:57
F5 DevCentral
Рет қаралды 47 М.
Breaking Down the TLS Handshake
12:29
F5 DevCentral
Рет қаралды 257 М.
Transport Layer Security, TLS 1.2 and 1.3 (Explained by Example)
24:20
Hussein Nasser
Рет қаралды 266 М.
TLS 1.3 Handshake - many CHANGES from prior versions!
17:39
Practical Networking
Рет қаралды 19 М.
What Are AEAD Ciphers?
11:09
F5 DevCentral
Рет қаралды 24 М.
Digital Certificates: Chain of Trust
16:41
Dave Crabbe
Рет қаралды 297 М.
Explaining the Diffie-Hellman Key Exchange
11:49
F5 DevCentral
Рет қаралды 81 М.
Strong vs. Weak TLS Ciphers
12:24
F5 DevCentral
Рет қаралды 22 М.
Breaking Down the TLS Handshake
8:27
F5 DevCentral
Рет қаралды 123 М.
IL'HAN - Qalqam | Official Music Video
03:17
Ilhan Ihsanov
Рет қаралды 700 М.