HTTPS encryption era has come, nearly two years, Google, Baidu, Facebook and other internet giants, coincides with the implementation of HTTPS, July 25, 2018, Chrome 68 on-line, all HTTP sites will be clearly marked as "unsafe." At home and abroad, including big to Google, Facebook and other giants, small to personal blog and many other sites, as well as the app to the Apple app Store, the small program has enabled the full-site HTTPS, which is the future trend of internet development.
HTTPS Continuous Optimization path
HTTPS (hypertext Transfer Protocol Secure) is a transport protocol designed to secure communications on a computer network. SSL layer is added under HTTP, which has the function of protecting the privacy and integrity of exchanging data and providing authentication to the website server, which simply means the security version of HTTP.
There are a lot of problems online, similar to "HTTPS more than HTTP how much server resources?" "Therefore, the encryption optimization of HTTPS is the direction of the cloud has been working, nearly two years we have launched a series of measures to improve HTTPS performance: including HSTS (HTTP Strict Transport security,http Strict transport security), HTTP/2 (including Ser Ver Push), TLS 1.3 and other functions, in the domestic CDN market has been in a leading position. Recently, we have introduced the minimum TLS version management feature once again.
Low version of TLS
The low version of TLS has a number of serious vulnerabilities that make the site vulnerable to attack, with the two vulnerabilities of Poodle and beast more than most people know. In addition, according to Nist (National Institute of Standards and Technology), there is no patch or fix to adequately fix the vulnerability of a low version of TLS, and it is best to upgrade to a higher version and disable the low version of TLS as soon as possible.
As encryption standards are upgraded, TLS 1/1.1 will be gradually disabled across the industry. is currently in the transition period of TLS 1.2 to replace TLS 1/1.1, 2018 will be more and more Internet security enterprises to enable TLS 1.2, see the following industry dynamics to know the status of the low version of TLS.
- On February 1, 2018, GitHub disables TLSv1 and TLSv1.1.
- Salesforce gradually disabled TLSv1 in March 2018.
- The TLS version required by the applet must be greater than or equal to 1.2.
- To comply with the payment Card Industry Data Security Standard (PCI DSS) and to comply with industry best practices, GlobalSign will disable TLS 1 and TLS 1.1 on June 21, 2018.
One of the PCI DSS's latest compliance standards came into effect on June 30, 2018, which requires disabling the low-version TLS protocol (for example: TLSV1), HTTPS configuration should implement a more secure encryption protocol (TLSv1.1 or later, it is highly recommended to use TLS v1.2) to meet PCI DSS requirements for the latest compliance standards to protect payment data.
The higher the protocol level you choose, the more secure it is, but the fewer browsers you can support, the more likely it will affect end-user access, and carefully select the configuration.
High version TLS VS low version TLS
This is a test of website security through the HTTPS Security level detection tool.
The minimum TLS version defaults to TLSV1
Minimum TLS version set to TLSv1.1
Where the TLSV1 version of the test results shows that the PCI DSS is noncompliant. This problem does not exist when the minimum TLS version management feature is turned on.
Turn on the minimum TLS version management feature
Log in and Pat the cloud console, create or select a CDN, cloud storage service, select "Configure", then select "https", find the "minimum TLS version" configuration item, click the "Manage" button to enter the configuration interface.
Customers can choose one of TLSv1, TLSv1.1, TLSv1.2, TLSv1.3 as the minimum TLS version according to the actual needs of their website, App and applet.
In order to meet certain test requirements, if you need to set the minimum TLS version to TLSv1.3, you need to turn on the TLS 1.3 feature (TLS 1.3 default relationship) in advance and need to be turned on manually. Access path: Console? Select or create a service? Configuration? HTTPS? TLS 1.3).
In the future, the cloud will continue to optimize HTTPS security encryption, will also continue to introduce new features to increase flexibility and security, for network security and progress to do a power.
Recommended reading:
PST TLS 1.3-new features and opening methods
HTTPS is not secure, the problem is on the low version of TLS