Published: 23 December 2019
Summary
The impact of TLS 1.3 on security is still shrouded in mystery. Security and risk management technical professionals must assess their security properties and identify where and how to adjust their network security monitoring.
Included in Full Research
- Business Requirements for TLS Decryption
- TLS Decryption Techniques and Potential Issues
- Forward Proxy
- Passive Decryption
- Reverse Proxy
- TLS 1.3 Changes From TLS 1.2
- Concerns With TLS 1.3 Inspection
- Passive Inspection
- Reverse Proxy
- Forward Proxy
- Decrypt Once, Inspect Many
- Assistance With Passive Mode Decryption
- Leverage SNI for Server Identification
- Deal With Technologies That Impact Decryption
- Drop Undecryptable Traffic
- 0-RTT Replay Attacks
- Analysis Without Decryption
- Details
- TLS History
- Perfect Forward Secrecy
- Ciphers Supported in TLS 1.3
- Security Tools That Benefit From TLS Decryption
- Types of TLS Certificates