Running Secure Server Software on Insecure Hardware Without Parachute

6 min read Original article ↗

More Related Content

Sullivan randomness-infiltrate 2014

Sullivan heartbleed-defcon22 2014

Sullivan white boxcrypto-baythreat-2013

Sullivan red october-oscon-2014

Sullivan handshake proxying-ieee-sp_2014

Running a Robust DNS Infrastructure with CloudFlare Virtual DNS

What's hot

Security with VA Smalltalk

MRA AMA Part 7: The Circuit Breaker Pattern

Surviving A DDoS Attack: Securing CDN Traffic at CloudFlare

Secure Your Apps with NGINX Plus and the ModSecurity WAF

The 3 Models in the NGINX Microservices Reference Architecture

MRA AMA Part 8: Secure Inter-Service Communication

Heartache and Heartbleed - 31c3

Overview of SSL: choose the option that's right for you

Owasp crypto tools and projects

An analysis of TLS handshake proxying

Bringing Elliptic Curve Cryptography into the Mainstream

MRA AMA: Ingenious: The Journey to Service Mesh using a Microservices Demo App

Monitoring Highly Dynamic and Distributed Systems with NGINX Amplify

TLS 1.3 and Other New Features in NGINX Plus R17 and NGINX Open Source EMEA

Improve App Performance & Reliability with NGINX Amplify

What's New in Go Crypto - Gotham Go

CFSSL 1.1: The Evolution of a PKI toolkit - DEF CON 23

Viewers also liked

Database Scalability - The Shard Conflict

High Performance Systems in Go - GopherCon 2014

The Hard Truths of Entrepreneurship

Detecting Corporate Fraud: Tips from a Crook and a Sleuth by Roddy Boyd and S...

Corporate Open Source Anti-patterns

Assholes are killing your project

Similar to Running Secure Server Software on Insecure Hardware Without Parachute

FreeBSD and Hardening Web Server

Network Security_Module_2_Dr Shivashankar

Network Security_Module_2.pdf

Security Theatre - Confoo

software-security-intro in information security.ppt

Chapter 2 Overview of Commercial Issues.pptx

Enhancing Web Security: Key Concepts & Strategies.pptx

Running Secure Server Software on Insecure Hardware without a Parachute - RSA...

Securing the channel - Tarkay Jamaan

00. introduction to app sec v3

Cloud Computing & Security

Security at Scale - Lessons from Six Months at Yahoo

Null bhopal Sep 2016: What it Takes to Secure a Web Application

More from Cloudflare

Succeeding with Secure Access Service Edge (SASE)

Stopping DDoS Attacks in North America

Accelerate your digital transformation

Zero trust for everybody: 3 ways to get there fast

Application layer attack trends through the lens of Cloudflare data

Close your security gaps and get 100% of your traffic protected with Cloudflare

Why Zero Trust Architecture Will Become the New Normal in 2021

HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...

Scaling service provider business with DDoS-mitigation-as-a-service

Why you should replace your d do s hardware appliance

Recent DDoS attack trends, and how you should respond

Strengthening security posture for modern-age SaaS providers

Cybersecurity 2020 threat landscape and its implications (AMER)

Cyber security fundamentals (simplified chinese)

Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks

Don't Let Bots Ruin Your Holiday Business - Snackable Webinar

Bring speed and security to the intranet with cloudflare for teams

It’s 9AM... Do you know what’s happening on your network?

LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...

Network Transformation: What it is, and how it’s helping companies stay secur...

Recently uploaded

Cyber Security Overview-breif note .pptx

THREE PATHS TO PERSITENT AWS COMPROMISE A pentester's playbook.pptx

Introduction to cybersecurity and pentesting

Techbrains Baku 2025 by GoUP - all speaker session

Wavetel IOT Product catalog _ v1.3. pdf

Core Components of Internet of Things (IoT)

Advent of Cyber 2025 TryHackMe Certificate

AI Infrastructure and the Compute Gap - Matt Dratch

The Other Part of SMS: Storage Management Subsystem Definitions.pdf

Copy of AI in Pharma Sector by Dhairya.pptx

_OSHA102_U06_Chemical Safety and Hazard Communication_ 001 (1) (1).pdf

apprentissage CCNA Network Engineer Workbook.pdf

Uplers' Wrapped | Talent Edition | Year 2025

The Multiverse of Artificial Intelligence

Thermal Management Design Guidelines for PCB Layout.docx

RAAS™ by The Encarnacion Institute

Most Inspiring TEDx Speakers to Follow in 2026

AI Ethics & Cybersecurity: Building Enterprise Trust

Mexico E-Commerce Market Report To 2026-2034

Exploring the TopMate ES32 Electric Scooter

Running Secure Server Software on Insecure Hardware Without Parachute

  • 1.
  • 2.

    What this talkis about u The web is changing — consolidation at the edge u Fundamental assumptions about server security are wrong u How do we design server software with the worst case in mind? u Distinguish between long and short term secrets u Devise approaches for protecting each 2

  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.

    Traditional server threatmodel u Assume server is secure u Add layers of protection to keep attackers out u Network layer protection u Operating System Level: principle of least privilege u Protection against maliciously installed code u More advanced barriers 11

  • 12.

    Globally distributed servers uLess jurisdictional control = less physical security u Physical access trumps static defense layers ! u Traditional defenses helpful, but not ideal u Cannot rely on security of keys u Single break-in results in immediate compromise 12

  • 13.
  • 14.

    Approach system securitythe ‘DRM way’ u Assume attacker has bypassed all static defenses u Goal is to refresh secrets before they are compromised u Split system into long-term secrets and short-term secrets u Focus on renewability of secrets 14

  • 15.

    Secrets must besplit into two tiers u Long-term Secrets u Useful for attacker for long period of time u Do not store at the edge ! u Short-term Secrets u Expire after a short period of time u Cannot be re-used 15

  • 16.

    Example: Traditional TLStermination u TLS handshake with nginx and Apache u SSL keys on disk u Read from disk, use in memory ! u Cryptographic elements at risk if server is compromised u Private key u Session key 16

  • 17.

    TLS revisited foruntrusted hardware u Long term secrets u Private key ! u Short term secrets u Session key u Session IDs and Session ticket keys u Credentials to access private keys 17

  • 18.
  • 19.

    Short-term secrets —threat model u Must live on machines in unsafe locations u Memory u Control Flow u By the time a secret is broken, it should be expired u Don’t keep secrets in a useable state u Impose computational cost to retrieve the original secret u Expire secrets quickly ! 19

  • 20.

    Techniques from DRMare applicable u White-box cryptography u Code obfuscation 20

  • 21.
  • 22.
  • 23.
  • 24.

    White-box cryptography u Hidethe cryptographic key from everyone u Protect against key extraction in the strongest threat model ! u Takes time to extract key — lots of math u Choose difficulty based on secret lifetime 24

  • 25.
  • 26.
  • 27.

    Code obfuscation u Makingreverse engineering difficult u Compile-time control-flow modification u Data transformation in memory u Anti-debugging 27

  • 28.
  • 29.
  • 30.
  • 31.
  • 32.

    Keyless SSL u SSLwithout keys? Surely you’re joking. u SSL without keys at the edge. That’s better. 32

  • 33.

    How Keyless SSLWorks u Split the TLS state machine geographically u Perform private key operation at site owner’s facility (in HSM, etc) u Perform rest of handshake at edge u Communicate with signing server over mutually authenticated TLS 33

  • 34.
  • 35.
  • 36.
  • 37.

    Conclusion u Untrusted hardwarerequires a new approach u Split secrets into long-term and short-term u Design for rapid renewal — replace secrets faster than they can be broken u Leverage short-term secrets to access long-term secrets 37