TLS 1.3 is here. The Internet is About to Get a Lot Safer
1 Star2 Stars3 Stars4 Stars5 Stars (3 votes, average: 4.33 out of 5)
Loading...

TLS 1.3 is here. The Internet is About to Get a Lot Safer

The wait is finally over – IETF has approved TLS 1.3

After four years, 28 drafts, tons of middleboxes, and some last-minute guest-appearances; the road to making TLS 1.3 a web standard was nothing less than a soap opera. But finally, the IETF (Internet Engineering Task Force) has given its approval to TLS 1.3.

The standard was approved in the task force’s meeting in London last week. Many weren’t expecting TLS 1.3 to get approved considering the last-minute “concerns” raised by the banking industry as well as some other groups. Ignoring all these calls, the IETF has passed the 28th draft of TLS 1.3.

It is no surprise that the pro-security community is in rejoicing at the moment. Why wouldn’t they? After all, TLS 1.3 brings a host of security and performance advancements.

What is TLS 1.3?

To understand TLS 1.3, you must first understand what TLS (Transport Layer Security) is.

While browsing on the internet, you may have noticed that the URLs of some sites start with HTTPS while some have HTTP in front of them. You may have even wondered about the difference between them. Well, as you can see, ‘S’ is the difference here. This ‘S’ stands for secure. It means that your connection to the HTTPS site is secured and every bit of information transmitted between the client and the server gets encrypted.

So, how can one get his/her website secured?

To get a site secured, one must install SSL/TLS certificates. These certificates, through various mechanisms, encrypt in-transit information, thereby thwarting any data theft or tampering. The encryption is carried out by cryptographic protocols. These protocols comprise of algorithms and ciphers that are responsible for data encryption.

TLS 1.3 is the fourth version of the TLS family. It brings a host of advancements when compared to TLS 1.2, the incumbent cryptographic protocol.

TLS 1.3: Security Improvements

Vulnerabilities such as POODLE and Heartbleed, and the recently discovered ROBOT attack have shown us how vulnerabilities left unfixed could affect millions of users around the world. TLS 1.3, ditches the insecurities present in TLS 1.2.

TLS 1.2, the latest TLS standard, consists of insecure protocols, ciphers, and algorithms. However, you don’t need to be concerned about it as there is very slim chance you will get attacked. But it doesn’t mean that it can’t be exploited. Attackers can capitalize on these insecure parts of TLS 1.2 and perform a downgrade attack. TLS 1.3 eliminates this possibility by phasing out these obsolete ciphers and protocols while bringing in secure replacements.

Here are some of the ciphers and algorithms discontinued in TLS 1.3:

  • RC4 Steam Cipher
  • RSA Key Transport
  • SHA-1 Hash Function
  • CBC Mode Ciphers
  • MD5 Algorithm
  • Various Diffie-Hellman groups
  • EXPORT-strength ciphers
  • DES
  • 3DES

TLS 1.3 Passed with Unprecedented Support

To get TLS 1.3 approved, it had to be passed by the Internet Engineering Steering Group (IESG), a wing of IETF. In the words of Adam Roach, a principal engineer at Mozilla, the level of support for TLS 1.3 in the IESG was “unusually high.” Out of the thirteen members who voted, eight members voted in favor of TLS 1.3 while five opted for ‘no objection.’

Improved SSL/TLS Handshake

The second major thing that sets TLS 1.3 apart from its predecessors is its upgraded version of the SSL/TLS handshake. Before a secure connection is established between the client and the server, a handshake process is carried out between both the parties. This handshake involves a series of back-and-forth communication steps between the client and the server to validate each other’s and negotiate the terms of the data transfer.

TLS 1.2 along with 1.1 and 1.0, facilitated the handshake by virtue of two round-trips of communication between the client and the server. In technical terms, this is called ‘2-RTT’ handshake.

TLS 1.2 Handshake; TLS 1.3 handshake

These two round-trips result in much higher TTFB (time to first byte). It takes somewhere between 0.25 to 0.5 seconds to execute the handshake. Time of half a second might not seem like a big deal but keep in mind that this is just the handshake – a process before data transfer takes place. In areas such as stock trading where connection speed is of paramount importance, half a second could make a massive impact.

TLS 1.3, with its improvised handshake, takes an entire round-trip out of the equation. This way, only a single round-trip is needed to complete the SSL/TLS handshake. Correspondingly, the handshake time is reduced drastically.

TLS 1.3 Handshake

However, this isn’t where the advancement stops. TLS 1.3 also enables 0-RTT handshakes between the clients and servers that have met before. It means that it’ll require zero round trips to get the handshake done. This results in significant latency improvement.

If you want to take a closer look at the TLS 1.3 handshake process, click here.

IETF says NO to TLS 1.3 backdoor

The banking industry led by BITS, the technology policy division of the financial services roundtable, appeared out of nowhere at the last-minute. They asked for “an option for negotiation of visibility in the datacenter.” In other words, they were asking for a backdoor.

This demand was laughed off by experts when the news came out, and the IETF was widely expected to ignore it. And that’s exactly what happened. As reported by The Register, “An effort to effectively insert a backdoor into the protocol was met with disdain and some anger by internet engineers.”

This was pretty much expected. Backdoor in the protocol that is the foundation of web security? Are you kidding me? There was no way the IETF would have allowed a backdoor in the TLS 1.3 and the vote count vouches for it. The IETF members voted unanimously against having a backdoor. I’m sure they would’ve voted with a big grin on their faces.

How do I enable TLS 1.3?

Google Chrome, the most vastly used browser on the planet, just rolled out support for TLS 1.3 (Draft 23) with the launch of Chrome 65. Although this is just the draft, you can still experience TLS 1.3 on the sites that have enabled support for TLS 1.3. Firefox too has enabled TLS 1.3 for its users. Let’s see how you can use TLS 1.3.

Enable TLS 1.3 in Chrome

  • First, search for chrome://flags/ in the address bar and hit enter
  • Now go to TLS 1.3 and select enable TLS 1.3 (draft 23)
  • Relaunch your Chrome
  • Go to https://istlsfastyet.com/
  • Now press F12 and go to the Security tab
  • Reload the website
  • Click on the link listed under Main origin

There you have it. As you can see, your connection to the website is protected through TLS 1.3.

Enable TLS 1.3 in Firefox

  • Search for about:config in the address bar and press enter
  • In the search space, search for tls.version.max
  • Now change the value from 3 to 4
  • Restart your Firefox
  • Go to https://istlsfastyet.com/
  • Click on the padlock in the URL bar
  • Now you should see a small pop-up citing the connection to be secure. Click on the > that you see and then click on More Information
  • A window with certificate details will open up. See the technical details at the bottom of it, you’ll see TLS 1.3 being the security protocol.
2 comments
  • I have Chrome 65.0.3325.181. I try to enable TLS 1.3 as per your instructions.

    On the flags page, I cannot find “Maximum TLS version enabled”. I find “TLS 1.3” instead, I select “Enabled (Draft 23)” and continue with your instructions. Chrome says that it got only TLS 1.2.

  • I was able to see TLS 1.3 in Chrome, and I do have Chrome 65.

    I still see TLS 1.2 when I follow the Firefox instructions. I checked my FF version, and I upgraded to the latest, but it still says TLS 1.2.

Leave a Reply

Your email address will not be published. Required fields are marked *

Captcha *