More Related Content
Sullivan handshake proxying-ieee-sp_2014
Sullivan white boxcrypto-baythreat-2013
Sullivan red october-oscon-2014
Sullivan randomness-infiltrate 2014
Sullivan heartbleed-defcon22 2014
Running a Robust DNS Infrastructure with CloudFlare Virtual DNS
What's hot
Overview of SSL: choose the option that's right for you
Surviving A DDoS Attack: Securing CDN Traffic at CloudFlare
An analysis of TLS handshake proxying
MRA AMA Part 7: The Circuit Breaker Pattern
MRA AMA Part 8: Secure Inter-Service Communication
Heartache and Heartbleed - 31c3
Monitoring Highly Dynamic and Distributed Systems with NGINX Amplify
Bringing Elliptic Curve Cryptography into the Mainstream
Owasp crypto tools and projects
The 3 Models in the NGINX Microservices Reference Architecture
CFSSL 1.1: The Evolution of a PKI toolkit - DEF CON 23
What's New in Go Crypto - Gotham Go
Secure Your Apps with NGINX Plus and the ModSecurity WAF
MRA AMA: Ingenious: The Journey to Service Mesh using a Microservices Demo App
Improve App Performance & Reliability with NGINX Amplify
TLS 1.3 and Other New Features in NGINX Plus R17 and NGINX Open Source EMEA
Security with VA Smalltalk
Viewers also liked
High Performance Systems in Go - GopherCon 2014
Detecting Corporate Fraud: Tips from a Crook and a Sleuth by Roddy Boyd and S...
Database Scalability - The Shard Conflict
Assholes are killing your project
Corporate Open Source Anti-patterns
The Hard Truths of Entrepreneurship
Similar to Running Secure Server Software on Insecure Hardware Without Parachute
Running Secure Server Software on Insecure Hardware without a Parachute - RSA...
Security at Scale - Lessons from Six Months at Yahoo
Cloud Computing & Security
Securing the channel - Tarkay Jamaan
00. introduction to app sec v3
FreeBSD and Hardening Web Server
Network Security_Module_2.pdf
Network Security_Module_2_Dr Shivashankar
Null bhopal Sep 2016: What it Takes to Secure a Web Application
Chapter 2 Overview of Commercial Issues.pptx
Security Theatre - Confoo
software-security-intro in information security.ppt
software-security-intro Secure software Design and Development
More from Cloudflare
Succeeding with Secure Access Service Edge (SASE)
Close your security gaps and get 100% of your traffic protected with Cloudflare
Why you should replace your d do s hardware appliance
Don't Let Bots Ruin Your Holiday Business - Snackable Webinar
Why Zero Trust Architecture Will Become the New Normal in 2021
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
Zero trust for everybody: 3 ways to get there fast
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
Network Transformation: What it is, and how it’s helping companies stay secur...
Scaling service provider business with DDoS-mitigation-as-a-service
Application layer attack trends through the lens of Cloudflare data
Recent DDoS attack trends, and how you should respond
Cybersecurity 2020 threat landscape and its implications (AMER)
Strengthening security posture for modern-age SaaS providers
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Stopping DDoS Attacks in North America
It’s 9AM... Do you know what’s happening on your network?
Cyber security fundamentals (simplified chinese)
Bring speed and security to the intranet with cloudflare for teams
Accelerate your digital transformation
Recently uploaded
Introducing VisualSim 2610 The Next Leap in System Level Modeling
GenerationAI Paris 2025 | AI in Tech: Beyond Expectations, Into Execution
Agent to agent service discovery using HashiCorp Consul and Vault
Microsoft Azure News - February 2026 - BAUG
Transcript: Escape from the Forbidden Zone: Smuggling green and inclusive tec...
final~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~.pdf
Automated Governance for FME Flow: Smarter Admin at Scale
GDG Cloud Southlake #49: Pradeep R Kumar: Implications of Agentic AI for Iden...
Digital Twin in IBM for Accelerated Discovery of Climate & Sustainability, K...
Spec-Driven Development with Kiro: Elevating Software Quality, Traceability, ...
AI Vector Search Best Practices Multicloud Feb 2026
February 2026 Patch Tuesday hosted by Chris Goettl and Todd Schell
How does MES(Manufacturing Execution System) work?
Escape from the Forbidden Zone: Smuggling green and inclusive tech past the g...
HOW TO OVERCOME THE THREATS OF ARTIFICIAL INTELLIGENCE AGAINST HUMANITY.pdf
Effortless Distributed Systems with Aspire.pdf
Preserve workload integrity during cross-architecture migration
apidays New York 2025 | AI in Application Security
Founder & Tech Lead | Web Development & Digital Growth Consultant | Helping B...
Odoo Implementation Checklist: A Strategic ERP Blueprint for Business-Ready D...
Running Secure Server Software on Insecure Hardware Without Parachute
- 1.
- 2.
What this talkis about u The web is changing — consolidation at the edge u Fundamental assumptions about server security are wrong u How do we design server software with the worst case in mind? u Distinguish between long and short term secrets u Devise approaches for protecting each 2
- 3.
- 4.
- 5.
- 6.
- 7.
- 8.
- 9.
- 10.
- 11.
Traditional server threatmodel u Assume server is secure u Add layers of protection to keep attackers out u Network layer protection u Operating System Level: principle of least privilege u Protection against maliciously installed code u More advanced barriers 11
- 12.
Globally distributed servers uLess jurisdictional control = less physical security u Physical access trumps static defense layers ! u Traditional defenses helpful, but not ideal u Cannot rely on security of keys u Single break-in results in immediate compromise 12
- 13.
- 14.
Approach system securitythe ‘DRM way’ u Assume attacker has bypassed all static defenses u Goal is to refresh secrets before they are compromised u Split system into long-term secrets and short-term secrets u Focus on renewability of secrets 14
- 15.
Secrets must besplit into two tiers u Long-term Secrets u Useful for attacker for long period of time u Do not store at the edge ! u Short-term Secrets u Expire after a short period of time u Cannot be re-used 15
- 16.
Example: Traditional TLStermination u TLS handshake with nginx and Apache u SSL keys on disk u Read from disk, use in memory ! u Cryptographic elements at risk if server is compromised u Private key u Session key 16
- 17.
TLS revisited foruntrusted hardware u Long term secrets u Private key ! u Short term secrets u Session key u Session IDs and Session ticket keys u Credentials to access private keys 17
- 18.
- 19.
Short-term secrets —threat model u Must live on machines in unsafe locations u Memory u Control Flow u By the time a secret is broken, it should be expired u Don’t keep secrets in a useable state u Impose computational cost to retrieve the original secret u Expire secrets quickly ! 19
- 20.
Techniques from DRMare applicable u White-box cryptography u Code obfuscation 20
- 21.
- 22.
- 23.
- 24.
White-box cryptography u Hidethe cryptographic key from everyone u Protect against key extraction in the strongest threat model ! u Takes time to extract key — lots of math u Choose difficulty based on secret lifetime 24
- 25.
- 26.
- 27.
Code obfuscation u Makingreverse engineering difficult u Compile-time control-flow modification u Data transformation in memory u Anti-debugging 27
- 28.
- 29.
- 30.
- 31.
- 32.
Keyless SSL u SSLwithout keys? Surely you’re joking. u SSL without keys at the edge. That’s better. 32
- 33.
How Keyless SSLWorks u Split the TLS state machine geographically u Perform private key operation at site owner’s facility (in HSM, etc) u Perform rest of handshake at edge u Communicate with signing server over mutually authenticated TLS 33
- 34.
- 35.
- 36.
- 37.
Conclusion u Untrusted hardwarerequires a new approach u Split secrets into long-term and short-term u Design for rapid renewal — replace secrets faster than they can be broken u Leverage short-term secrets to access long-term secrets 37