Home Books Training Newsletter Resources
Sign up Log in

Bulletproof TLS Newsletter

69

Raccoon attack shows design flaw in old TLS

30 Sep 2020

Bulletproof TLS Newsletter is a free periodic newsletter bringing you commentary and news surrounding SSL/TLS and Internet PKI, designed to keep you informed about the latest developments in this space. Received monthly by more than 50,000 subscribers. Written by Hanno Böck.

The current Chrome version no longer loads mixed content on HTTPS connections. This change was announced by the Chrome security team last year and has now been implemented. Emily Stark from Chrome’s security team explains some of the details on Twitter.

When a web page is loaded via encrypted HTTPS to load subresources like images or videos via unencrypted connections, this is called mixed content. This can be a security risk because attackers can read and modify the unencrypted connections.

Browsers blocked active mixed content, including Javascript and CSS files, for many years. However, having passive content like images or videos as mixed content was still allowed.

Chrome changes this behavior now. If an HTTPS web page tries to load such content via HTTP, it will automatically try to load the content via HTTPS. If that doesn’t work, the loading is blocked. Mozilla plans to adopt this behavior as well, and there is work underway for standardizing it.

There is a special case in which mixed content warnings still appear: forms loaded from HTTPS web pages that have HTTP targets. Changes for this case are planned for version 87, including Chrome showing a warning while a user is typing into such forms and a full page warning before submission.

Subscribe to the Bulletproof TLS Newsletter

This subscription is just for the newsletter; we won't send you anything else.

Short news

  • Henry de Valence analyzed inconsistencies in the signature verification of Ed25519 signatures.
  • The Internet Security Research Group (ISRG), wolfSSL, and Daniel Stenberg (the author of cURL) plan to work on a memory-safe HTTP implementation called Hyper. It will use Rustls as the TLS backend.
  • OpenSSL released alpha 7 of the upcoming version 3.0.
  • Mozilla released NSS version 3.58, including a security fix regarding ChangeCipherSpec (CCS) messages that could lead to denial of service. It also includes preliminary support for hybrid key exchanges, which will become important with the introduction of post-quantum cryptography.
  • The Network Time Security (NTS) protocol, which provides authentication for NTP connections, is now officially published as an RFC.
  • Chrony version 4.0 has been released. This is the first stable version supporting NTS.
  • The Chrome team recently announced that it will run its own CA Root store.
  • Google's Devon O'Brien summarized the results of the recent CT Days, discussing the future of Certificate Transparency.

Designed by Ivan Ristić, the author of SSL Labs, Bulletproof TLS and PKI, and Hardenize, our course covers everything you need to know to deploy secure servers and encrypted web applications.

Remote and trainer-led, with small classes and a choice of timezones.

Join over 1,500 students who have benefited from more than a decade of deep TLS and PKI expertise.

Find out More

THE FINEST IN TLS
AND PKI EDUCATION
@feistyduck

Books

  • Bulletproof TLS and PKI
  • ModSecurity Handbook
  • OpenSSL Cookbook

Training

  • Practical TLS and PKI

Resources

  • Bulletproof TLS Newsletter
  • SSL/TLS and PKI History
  • Archived Books
  • Bulletproof TLS Guide

Company

  • Support
  • Website Terms of Use
  • Terms and Conditions
  • Privacy Policy
  • About Us