SlideShare a Scribd company logo
UNCLASSIFIED//COMSEC//CRYPTO
UNCLASSIFIED//COMSEC//CRYPTO
nsa
How to Encrypt
Everything That Moves
and Keep It Usable
Denis Gundarev, Application
Solutions Architect, VMware
dgundarev@vmware.com @fdwl
Delivered From: @FDWL
Dated: 20150722
Page 0
UNCLASSIFIED//COMSEC//CRYPTO
UNCLASSIFIED//COMSEC//CRYPTO
nsafdwl@E0D23:~# gpg –d message
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hi %username%, my name is Denis Gundarev, I’m a Senior MTS/Architect at VMware
I hope you understand that the opinions expressed here represent my own and not
those of my employer.
All data and information provided in this presentation is for informational purposes
only.
-----BEGIN PGP SIGNATURE-----
iD8DBkjNWQIQFFxqRFCkjNWQIMEeCgg7y6IUikeCgg7yjNWQIW6eCgg7y3QE=
=aAhr
-----END PGP SIGNATURE-----
How to encrypt everything that moves and keep it usable
FIPS 140-2
Compliant
&
Common Criteria
Certified
Certified Security
Worldwide recognition as the industry standard for App and Desktop
security
XenApp & XenDesktop are
Common Criteria
Certified
XenApp & XenDesktop are
FIPS compliant, simplifying
highly regulated compliance
FIPS Compliance Documents
http://www.citrix.com/about/legal/security-compliance/security-standards.html
Common Criteria Certificates
http://www.cesg.gov.uk/finda/Pages/CCITSECResults.aspx?post=1&company=Citrix+Systems+Inc&status=Certified&sort=name
How to encrypt everything that moves and keep it usable
Workspace PortalHorizon Clients
Virtual Desktops
RDS Hosted DesktopsRDS Hosted Applications
Horizon 6 Enterprise
App Volumes
Desktop PoolsApp Pools
Agenda
 Introduction to PKI
 TLS for you
 IPsec is your friend
 Security regulations in a real world
7
Introduction to Public Key
Infrastructure (PKI)
Certificates
Root Certification Authority
Subordinate Certification Authority
Certificate Certificate Certificate Certificate
Public Key Infrastructure
How to encrypt everything that moves and keep it usable
How to encrypt everything that moves and keep it usable
How to encrypt everything that moves and keep it usable
Privet! I will send you encrypted
message, use secret word “secret” to
decrypt it!
Hello x secret=
ЙЦГШЩЗЪФ
ЮБЬИЧЯЖД / secret
= Nice to meet you
ЙЦГШЩЗЪФ! ЙЦГШЩЗЪФ /
secret= HelloЮБЬИЧЯЖД!
Nice to meet
you x secret=
ЮБЬИЧЯЖД
Got It!
Symmetric Encryption
I want to send you a private message
but don’t want anyone else to read
it…
Hello x a12f2d8ac =
ЙЦГШЩЗЪФ
ЙЦГШЩЗЪФ! ЙЦГШЩЗЪФ /
privatesecret=
Hello
Got It!
Not a problem,
here’s my public
key – a12f2d8ac
Asymmetric Encryption
Howdy-doo!
hablemos español!
Here’s my ID, public
key and my
6bcfae6a
Privet! I want to speak privately with
Yosemite Sam. I can speak Russian,
Chinese, Spanish and English
here’s my random e77dfb41
Hmm, California,
USA, ok I trust your ID
Encrypt (convertir en
Español (E77dfb41 +
6bcfae6a))
Here’s pre-
master, en
español,
encrypted with
your private
Decrypt (pre-
master)
Lo tengo!
(Got it!)
𝑀𝐴𝐶 =
𝑏2 − 4𝑎𝑐
2𝑎
𝑀𝐴𝐶 =
𝑏2 − 4𝑎𝑐
2𝑎
es tan genial para
hablar en privado
sí, es difícil
hablar libre en
estos días
SSL/TLS Handshake
Hmm, California,
USA, ok I trust your ID
How to encrypt everything that moves and keep it usable
Just need to
see your I.D.
please.
Sorry, but
we don’t sell
beer to
Russians
How to encrypt everything that moves and keep it usable
20
How to encrypt everything that moves and keep it usable
How to encrypt everything that moves and keep it usable
I heard that self-
signed certificates
are not secure!!!
How to encrypt everything that moves and keep it usable
Keep Private Keys Private
 NTFS ACL
 Windows private key ACL
 Use Hardware Security modules
 Windows support out of the box
 Apache support
 Avoid using shared wildcard certificates
Subordinate Certification Authority
ESX Hosts Network equipment Users
Public Key Infrastructure
Root Certification Authority
Mobile devices
TLS recommendations
 Use TLS or DTLS for everything that moves over the wire
 RDP https://technet.microsoft.com/en-us/magazine/ff458357.aspx
 XenDesktop http://blogs.citrix.com/2014/10/16/xenapp-and-xendesktop-7-6-security-fips-140-2-and-ssl-
to-vda/
 Horizon View https://pubs.vmware.com/horizon-view-60/topic/com.vmware.ICbase/PDF/horizon-view-
60-scenarios-ssl-certificates.pdf
 SQL Server http://blogs.msdn.com/b/sqlserverfaq/archive/2012/04/04/can-tls-certificate-be-used-for-
sql-server-encryption-on-the-wire.aspx
 LDAP http://social.technet.microsoft.com/wiki/contents/articles/2980.ldap-over-ssl-ldaps-
certificate.aspx
 Use other encryption methods for other protocols
 SMB Encryption http://blogs.technet.com/b/filecab/archive/2012/05/03/smb-3-security-enhancements-
in-windows-server-2012.aspx
 Horizon View https://pubs.vmware.com/horizon-view-60/topic/com.vmware.ICbase/PDF/horizon-view-
60-security.pdf
TLS recommendations
 Disable weak ciphers and SSL 3.0
 Windows https://support.microsoft.com/en-us/kb/245030
 Apache https://www.sslshopper.com/article-how-to-disable-weak-ciphers-and-ssl-2.0-in-apache.html
 Nginx https://raymii.org/s/tutorials/Strong_SSL_Security_On_nginx.html
 NetScaler http://www.antonvanpelt.com/make-netscaler-ssl-vips-secure/
 F5 https://support.f5.com/kb/en-us/solutions/public/13000/100/sol13171.html
 Use TLS internally
 Use an appropriate Certification Authority
 Switch to SHA256 - http://blogs.technet.com/b/pki/archive/2013/09/19/upgrade-certification-
authority-to-sha256.aspx
Know the difference
 Self-signed vs. preinstalled certificate
 Check the date/name
 Intended usage
 Make sure that you use correct templates
 Encryption vs. Obfuscation
 Unsecured private key = obfuscation
How to encrypt everything that moves and keep it usable
IPSec is
so 90s!!!
Demo time
How to encrypt everything that moves and keep it usable
FIPS/Common Criteria
 Remember who do you trust
 Certified software/hardware doesn’t secure you automatically.
 Security policy “System Cryptography: Use FIPS compliant algorithms for
encryption, hashing, and signing.” does not affect third-party and
breaks .net
 Certification may take years, release cycle usually shorter
Compliance
 A foolproof plan for security
 Nothing is foolproof to a sufficiently talented fool
 Standardized environments are easier to hack
 Additional budget for IT
 Enforcing documentation
 Just a checklist to impress auditor
How to encrypt everything that moves and keep it usable
How to encrypt everything that moves and keep it usable
your questions.
It’s now safe to ask

More Related Content

PPTX
Hypervisor and VDI security
Denis Gundarev
 
PDF
Citrix Internals: Tracing, Debugging & Troubleshooting
Denis Gundarev
 
PPTX
BriForum 2013 Chicago - Citrix Troubleshooting - Denis Gundarev
Denis Gundarev
 
PPTX
SYN507: Reducing desktop infrastructure management overhead using “old school...
Denis Gundarev
 
PPTX
BlueHat v17 || Betraying the BIOS: Where the Guardians of the BIOS are Failing
BlueHat Security Conference
 
PPTX
How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....
Denis Gundarev
 
PPTX
VMware App Volumes Troubleshooting
Denis Gundarev
 
PPTX
Zumasys Citrix Top 10 Tips and Tricks
Frank A. Petillo, Sr.
 
Hypervisor and VDI security
Denis Gundarev
 
Citrix Internals: Tracing, Debugging & Troubleshooting
Denis Gundarev
 
BriForum 2013 Chicago - Citrix Troubleshooting - Denis Gundarev
Denis Gundarev
 
SYN507: Reducing desktop infrastructure management overhead using “old school...
Denis Gundarev
 
BlueHat v17 || Betraying the BIOS: Where the Guardians of the BIOS are Failing
BlueHat Security Conference
 
How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....
Denis Gundarev
 
VMware App Volumes Troubleshooting
Denis Gundarev
 
Zumasys Citrix Top 10 Tips and Tricks
Frank A. Petillo, Sr.
 

What's hot (20)

PDF
Operation emmental appsec
Cyber Security Alliance
 
PPT
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Jeremiah Grossman
 
PPTX
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...
Benjamin Delpy
 
PPTX
BlueHat v17 || Securing Windows Defender Application Guard
BlueHat Security Conference
 
PPTX
MongoDB World 2018: Low Hanging Fruit: Making Your Basic MongoDB Installation...
MongoDB
 
PDF
[CB21] ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Mic...
CODE BLUE
 
PDF
Easy public-private-keys-strong-authentication-using-u2 f
Cyber Security Alliance
 
PDF
Hack any website
sunil kumar
 
PPTX
Understanding Active Directory Enumeration
Daniel López Jiménez
 
PPTX
Security best practices for hyper v and server virtualisation [svr307]
Louis Göhl
 
PDF
BlackHat 2014 Briefings - Exploiting Fundamental Weaknesses in Botnet C&C Pan...
Aditya K Sood
 
PDF
Hunting for security bugs in AEM webapps
Mikhail Egorov
 
ODP
Virtually Pwned
Claudio Criscione
 
PDF
An easy way into your sap systems v3.0
Cyber Security Alliance
 
PDF
HackInTheBox - AMS 2011 , Spying on SpyEye - What Lies Beneath ?
Aditya K Sood
 
PDF
TekCERT Manual
Yasin KAPLAN
 
PDF
[CB20] Operation I am Tom: How APT actors move laterally in corporate network...
CODE BLUE
 
PDF
[CB20] Pwning OT: Going in Through the Eyes by Ta-Lun Yen
CODE BLUE
 
PPT
How to configure esx to pass an audit
Concentrated Technology
 
PDF
McAfee Foundstone Update
webhostingguy
 
Operation emmental appsec
Cyber Security Alliance
 
Identifying Web Servers: A First-look Into the Future of Web Server Fingerpri...
Jeremiah Grossman
 
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...
Benjamin Delpy
 
BlueHat v17 || Securing Windows Defender Application Guard
BlueHat Security Conference
 
MongoDB World 2018: Low Hanging Fruit: Making Your Basic MongoDB Installation...
MongoDB
 
[CB21] ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Mic...
CODE BLUE
 
Easy public-private-keys-strong-authentication-using-u2 f
Cyber Security Alliance
 
Hack any website
sunil kumar
 
Understanding Active Directory Enumeration
Daniel López Jiménez
 
Security best practices for hyper v and server virtualisation [svr307]
Louis Göhl
 
BlackHat 2014 Briefings - Exploiting Fundamental Weaknesses in Botnet C&C Pan...
Aditya K Sood
 
Hunting for security bugs in AEM webapps
Mikhail Egorov
 
Virtually Pwned
Claudio Criscione
 
An easy way into your sap systems v3.0
Cyber Security Alliance
 
HackInTheBox - AMS 2011 , Spying on SpyEye - What Lies Beneath ?
Aditya K Sood
 
TekCERT Manual
Yasin KAPLAN
 
[CB20] Operation I am Tom: How APT actors move laterally in corporate network...
CODE BLUE
 
[CB20] Pwning OT: Going in Through the Eyes by Ta-Lun Yen
CODE BLUE
 
How to configure esx to pass an audit
Concentrated Technology
 
McAfee Foundstone Update
webhostingguy
 
Ad

Viewers also liked (20)

PDF
Application Streaming is dead. A smart way to choose an alternative
Denis Gundarev
 
PDF
TLS Certificates on the Web – The Good, The Bad and The Ugly
CASCouncil
 
PPTX
Drupal 8 and NGINX
NGINX, Inc.
 
PDF
Encryption Boot Camp on the JVM
Matthew McCullough
 
PDF
New in russia electronic (digital) signatures, electronic vat invoices, elect...
Awara Direct Search
 
PDF
Unleashing End-to_end TLS Security Leveraging NGINX with Intel(r) QuickAssist...
Michelle Holley
 
PDF
Российская криптография: блочные шифры и их режимы шифрования (Russian crypto...
Advanced monitoring
 
PPTX
SanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
Brent Muir
 
PDF
F5 TLS & SSL Practices
Brian A. McHenry
 
PPT
ID Next 2013 Keynote Slides by Mike Schwartz
Mike Schwartz
 
PPTX
RSA Europe: Future of Cloud Identity
Mike Schwartz
 
PPTX
DaaS/IaaS Forum Moscow - Najat Messaoud
Denis Gundarev
 
PPTX
DaaS/IaaS Forum Moscow - Ivo Murris
Denis Gundarev
 
PPT
Mule security - saml
charan teja R
 
PDF
Cloud Identity: A Recipe for Higher Education
Mike Schwartz
 
PPTX
Briforum 2011 Chicago
Dan Brinkmann
 
PPTX
The Tools I Use
Dan Brinkmann
 
PPTX
DaaS/IaaS Forum Moscow - Chris Rogers
Denis Gundarev
 
PPTX
RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5
Denis Gundarev
 
PDF
Who Are You? From Meat to Electrons - SXSW 2014
Mike Schwartz
 
Application Streaming is dead. A smart way to choose an alternative
Denis Gundarev
 
TLS Certificates on the Web – The Good, The Bad and The Ugly
CASCouncil
 
Drupal 8 and NGINX
NGINX, Inc.
 
Encryption Boot Camp on the JVM
Matthew McCullough
 
New in russia electronic (digital) signatures, electronic vat invoices, elect...
Awara Direct Search
 
Unleashing End-to_end TLS Security Leveraging NGINX with Intel(r) QuickAssist...
Michelle Holley
 
Российская криптография: блочные шифры и их режимы шифрования (Russian crypto...
Advanced monitoring
 
SanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
Brent Muir
 
F5 TLS & SSL Practices
Brian A. McHenry
 
ID Next 2013 Keynote Slides by Mike Schwartz
Mike Schwartz
 
RSA Europe: Future of Cloud Identity
Mike Schwartz
 
DaaS/IaaS Forum Moscow - Najat Messaoud
Denis Gundarev
 
DaaS/IaaS Forum Moscow - Ivo Murris
Denis Gundarev
 
Mule security - saml
charan teja R
 
Cloud Identity: A Recipe for Higher Education
Mike Schwartz
 
Briforum 2011 Chicago
Dan Brinkmann
 
The Tools I Use
Dan Brinkmann
 
DaaS/IaaS Forum Moscow - Chris Rogers
Denis Gundarev
 
RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5
Denis Gundarev
 
Who Are You? From Meat to Electrons - SXSW 2014
Mike Schwartz
 
Ad

Similar to How to encrypt everything that moves and keep it usable (20)

PPTX
DevOOPS: Attacks and Defenses for DevOps Toolchains
Chris Gates
 
PDF
Security Theatre (PHP Leuven)
xsist10
 
PDF
FreeBSD and Hardening Web Server
Muhammad Moinur Rahman
 
PPT
Securing Network Access with Open Source solutions
Nick Owen
 
PDF
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
Felipe Prado
 
PPT
EAP TLS, the Rolls-Royce of extensible authentication protocol (EAP) methods ...
Jisc
 
PDF
Don't Get Hacked on Hostile WiFi
Mackenzie Morgan
 
PDF
Avoiding damage, shame and regrets data protection for mobile client-server a...
Stanfy
 
PDF
Case Studies and Lessons Learned from SSL/TLS Certificate Verification Vulner...
JPCERT Coordination Center
 
ODP
Cracking Into Embedded Devices - HACK.LU 2K8
guest441c58b71
 
PDF
Security Theatre - PHP UK Conference
xsist10
 
PPT
Rhel5
Yash Gulati
 
PDF
Root via SMS: 4G access level security assessment, Sergey Gordeychik, Alexand...
Sergey Gordeychik
 
PPTX
Hacker Halted 2014 - Post-Exploitation After Having Remote Access
EC-Council
 
PDF
Rt2870 Software Release Note For Windows Ce
guesta5887e6b
 
PDF
Mise en place d'un client VPN l2tp IPsec sous docker
Nicolas Trauwaen
 
PDF
Présentation Ikoula au Meet-up Docker à l'école 42
Ikoula
 
PPT
How to Install SSL Certificate in Red Hat Linux Apache Web Server
AboutSSL
 
PDF
The 5 elements of IoT security
Julien Vermillard
 
PPTX
Q Con New York 2015 Presentation - Conjur
conjur_inc
 
DevOOPS: Attacks and Defenses for DevOps Toolchains
Chris Gates
 
Security Theatre (PHP Leuven)
xsist10
 
FreeBSD and Hardening Web Server
Muhammad Moinur Rahman
 
Securing Network Access with Open Source solutions
Nick Owen
 
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
Felipe Prado
 
EAP TLS, the Rolls-Royce of extensible authentication protocol (EAP) methods ...
Jisc
 
Don't Get Hacked on Hostile WiFi
Mackenzie Morgan
 
Avoiding damage, shame and regrets data protection for mobile client-server a...
Stanfy
 
Case Studies and Lessons Learned from SSL/TLS Certificate Verification Vulner...
JPCERT Coordination Center
 
Cracking Into Embedded Devices - HACK.LU 2K8
guest441c58b71
 
Security Theatre - PHP UK Conference
xsist10
 
Root via SMS: 4G access level security assessment, Sergey Gordeychik, Alexand...
Sergey Gordeychik
 
Hacker Halted 2014 - Post-Exploitation After Having Remote Access
EC-Council
 
Rt2870 Software Release Note For Windows Ce
guesta5887e6b
 
Mise en place d'un client VPN l2tp IPsec sous docker
Nicolas Trauwaen
 
Présentation Ikoula au Meet-up Docker à l'école 42
Ikoula
 
How to Install SSL Certificate in Red Hat Linux Apache Web Server
AboutSSL
 
The 5 elements of IoT security
Julien Vermillard
 
Q Con New York 2015 Presentation - Conjur
conjur_inc
 

More from Denis Gundarev (19)

PDF
Citrix Internals: ICA Connectivity
Denis Gundarev
 
PDF
SAML and Other Types of Federation for Your Enterprise
Denis Gundarev
 
PDF
How to build a Citrix infrastructure on AWS
Denis Gundarev
 
PPTX
How to fail or succeed with desktop virtualization and workspace mobility
Denis Gundarev
 
PPTX
Application Virtualization overview - BayCUG
Denis Gundarev
 
PPTX
Deep dive in Citrix Troubleshooting
Denis Gundarev
 
PPTX
DaaS/IaaS Forum Moscow - Rick Dehlinger
Denis Gundarev
 
PPTX
RUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-V
Denis Gundarev
 
PPTX
Anton Zhbankov: 7. Back side of the cloud
Denis Gundarev
 
PPTX
RUCUG: 4. Brian Madden:Terminal Services или VDI, что сейчас происходит с des...
Denis Gundarev
 
PPSX
RUCUG: 11. Rick Dehlinger BYOC: Beware the Perimeter
Denis Gundarev
 
PPTX
RUCUG: 10. Robert Morris:Жизнь в окопах виртуализационной войны
Denis Gundarev
 
PPT
Alexander Tarasov: 5. Wyse Xenith - новейший тонкий клиент с поддержкой HDX
Denis Gundarev
 
PPTX
RUCUG: 3. Vasily Malanin:Microsoft + Citrix: Обзор новых возможностей
Denis Gundarev
 
PPTX
RUCUG: 2. Harry Labana:Keynote: Новости Citrix Synergy, технологии будущего
Denis Gundarev
 
PPTX
Citrix XenApp — будущее и настоящее
Denis Gundarev
 
PPTX
Citrix и мобильность
Denis Gundarev
 
PPTX
техники vs. маркетологи — разбор терминологии Citrix + Новости Citrix Synergy
Denis Gundarev
 
PPT
xen server 5.6, provisioning server 5.6 — технические детали и планы на будущее
Denis Gundarev
 
Citrix Internals: ICA Connectivity
Denis Gundarev
 
SAML and Other Types of Federation for Your Enterprise
Denis Gundarev
 
How to build a Citrix infrastructure on AWS
Denis Gundarev
 
How to fail or succeed with desktop virtualization and workspace mobility
Denis Gundarev
 
Application Virtualization overview - BayCUG
Denis Gundarev
 
Deep dive in Citrix Troubleshooting
Denis Gundarev
 
DaaS/IaaS Forum Moscow - Rick Dehlinger
Denis Gundarev
 
RUCUG: 6. Fabian Kienle - NetScaler and Branch Repeater for Hyper-V
Denis Gundarev
 
Anton Zhbankov: 7. Back side of the cloud
Denis Gundarev
 
RUCUG: 4. Brian Madden:Terminal Services или VDI, что сейчас происходит с des...
Denis Gundarev
 
RUCUG: 11. Rick Dehlinger BYOC: Beware the Perimeter
Denis Gundarev
 
RUCUG: 10. Robert Morris:Жизнь в окопах виртуализационной войны
Denis Gundarev
 
Alexander Tarasov: 5. Wyse Xenith - новейший тонкий клиент с поддержкой HDX
Denis Gundarev
 
RUCUG: 3. Vasily Malanin:Microsoft + Citrix: Обзор новых возможностей
Denis Gundarev
 
RUCUG: 2. Harry Labana:Keynote: Новости Citrix Synergy, технологии будущего
Denis Gundarev
 
Citrix XenApp — будущее и настоящее
Denis Gundarev
 
Citrix и мобильность
Denis Gundarev
 
техники vs. маркетологи — разбор терминологии Citrix + Новости Citrix Synergy
Denis Gundarev
 
xen server 5.6, provisioning server 5.6 — технические детали и планы на будущее
Denis Gundarev
 

Recently uploaded (20)

PPTX
The-Dawn-of-AI-Reshaping-Our-World.pptxx
parthbhanushali307
 
PPTX
GALILEO CRS SYSTEM | GALILEO TRAVEL SOFTWARE
philipnathen82
 
PPT
Activate_Methodology_Summary presentatio
annapureddyn
 
DOCX
Can You Build Dashboards Using Open Source Visualization Tool.docx
Varsha Nayak
 
PPTX
Smart Panchayat Raj e-Governance App.pptx
Rohitnikam33
 
PDF
IEEE-CS Tech Predictions, SWEBOK and Quantum Software: Towards Q-SWEBOK
Hironori Washizaki
 
PDF
Key Features to Look for in Arizona App Development Services
Net-Craft.com
 
PDF
QAware_Mario-Leander_Reimer_Architecting and Building a K8s-based AI Platform...
QAware GmbH
 
PPTX
AI-Ready Handoff: Auto-Summaries & Draft Emails from MQL to Slack in One Flow
bbedford2
 
PPTX
Presentation about variables and constant.pptx
safalsingh810
 
PDF
Why Use Open Source Reporting Tools for Business Intelligence.pdf
Varsha Nayak
 
PDF
lesson-2-rules-of-netiquette.pdf.bshhsjdj
jasmenrojas249
 
PDF
On Software Engineers' Productivity - Beyond Misleading Metrics
Romén Rodríguez-Gil
 
PPTX
Contractor Management Platform and Software Solution for Compliance
SHEQ Network Limited
 
PPTX
Explanation about Structures in C language.pptx
Veeral Rathod
 
PDF
Wondershare Filmora 14.5.20.12999 Crack Full New Version 2025
gsgssg2211
 
PDF
Jenkins: An open-source automation server powering CI/CD Automation
SaikatBasu37
 
PDF
Teaching Reproducibility and Embracing Variability: From Floating-Point Exper...
University of Rennes, INSA Rennes, Inria/IRISA, CNRS
 
PPTX
Why Use Open Source Reporting Tools for Business Intelligence.pptx
Varsha Nayak
 
PDF
Build Multi-agent using Agent Development Kit
FadyIbrahim23
 
The-Dawn-of-AI-Reshaping-Our-World.pptxx
parthbhanushali307
 
GALILEO CRS SYSTEM | GALILEO TRAVEL SOFTWARE
philipnathen82
 
Activate_Methodology_Summary presentatio
annapureddyn
 
Can You Build Dashboards Using Open Source Visualization Tool.docx
Varsha Nayak
 
Smart Panchayat Raj e-Governance App.pptx
Rohitnikam33
 
IEEE-CS Tech Predictions, SWEBOK and Quantum Software: Towards Q-SWEBOK
Hironori Washizaki
 
Key Features to Look for in Arizona App Development Services
Net-Craft.com
 
QAware_Mario-Leander_Reimer_Architecting and Building a K8s-based AI Platform...
QAware GmbH
 
AI-Ready Handoff: Auto-Summaries & Draft Emails from MQL to Slack in One Flow
bbedford2
 
Presentation about variables and constant.pptx
safalsingh810
 
Why Use Open Source Reporting Tools for Business Intelligence.pdf
Varsha Nayak
 
lesson-2-rules-of-netiquette.pdf.bshhsjdj
jasmenrojas249
 
On Software Engineers' Productivity - Beyond Misleading Metrics
Romén Rodríguez-Gil
 
Contractor Management Platform and Software Solution for Compliance
SHEQ Network Limited
 
Explanation about Structures in C language.pptx
Veeral Rathod
 
Wondershare Filmora 14.5.20.12999 Crack Full New Version 2025
gsgssg2211
 
Jenkins: An open-source automation server powering CI/CD Automation
SaikatBasu37
 
Teaching Reproducibility and Embracing Variability: From Floating-Point Exper...
University of Rennes, INSA Rennes, Inria/IRISA, CNRS
 
Why Use Open Source Reporting Tools for Business Intelligence.pptx
Varsha Nayak
 
Build Multi-agent using Agent Development Kit
FadyIbrahim23
 

How to encrypt everything that moves and keep it usable

  • 1. UNCLASSIFIED//COMSEC//CRYPTO UNCLASSIFIED//COMSEC//CRYPTO nsa How to Encrypt Everything That Moves and Keep It Usable Denis Gundarev, Application Solutions Architect, VMware [email protected] @fdwl Delivered From: @FDWL Dated: 20150722 Page 0
  • 2. UNCLASSIFIED//COMSEC//CRYPTO UNCLASSIFIED//COMSEC//CRYPTO nsafdwl@E0D23:~# gpg –d message -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi %username%, my name is Denis Gundarev, I’m a Senior MTS/Architect at VMware I hope you understand that the opinions expressed here represent my own and not those of my employer. All data and information provided in this presentation is for informational purposes only. -----BEGIN PGP SIGNATURE----- iD8DBkjNWQIQFFxqRFCkjNWQIMEeCgg7y6IUikeCgg7yjNWQIW6eCgg7y3QE= =aAhr -----END PGP SIGNATURE-----
  • 4. FIPS 140-2 Compliant & Common Criteria Certified Certified Security Worldwide recognition as the industry standard for App and Desktop security XenApp & XenDesktop are Common Criteria Certified XenApp & XenDesktop are FIPS compliant, simplifying highly regulated compliance FIPS Compliance Documents http://www.citrix.com/about/legal/security-compliance/security-standards.html Common Criteria Certificates http://www.cesg.gov.uk/finda/Pages/CCITSECResults.aspx?post=1&company=Citrix+Systems+Inc&status=Certified&sort=name
  • 6. Workspace PortalHorizon Clients Virtual Desktops RDS Hosted DesktopsRDS Hosted Applications Horizon 6 Enterprise App Volumes Desktop PoolsApp Pools
  • 7. Agenda  Introduction to PKI  TLS for you  IPsec is your friend  Security regulations in a real world 7
  • 8. Introduction to Public Key Infrastructure (PKI)
  • 10. Root Certification Authority Subordinate Certification Authority Certificate Certificate Certificate Certificate Public Key Infrastructure
  • 14. Privet! I will send you encrypted message, use secret word “secret” to decrypt it! Hello x secret= ЙЦГШЩЗЪФ ЮБЬИЧЯЖД / secret = Nice to meet you ЙЦГШЩЗЪФ! ЙЦГШЩЗЪФ / secret= HelloЮБЬИЧЯЖД! Nice to meet you x secret= ЮБЬИЧЯЖД Got It! Symmetric Encryption
  • 15. I want to send you a private message but don’t want anyone else to read it… Hello x a12f2d8ac = ЙЦГШЩЗЪФ ЙЦГШЩЗЪФ! ЙЦГШЩЗЪФ / privatesecret= Hello Got It! Not a problem, here’s my public key – a12f2d8ac Asymmetric Encryption
  • 16. Howdy-doo! hablemos español! Here’s my ID, public key and my 6bcfae6a Privet! I want to speak privately with Yosemite Sam. I can speak Russian, Chinese, Spanish and English here’s my random e77dfb41 Hmm, California, USA, ok I trust your ID Encrypt (convertir en Español (E77dfb41 + 6bcfae6a)) Here’s pre- master, en español, encrypted with your private Decrypt (pre- master) Lo tengo! (Got it!) 𝑀𝐴𝐶 = 𝑏2 − 4𝑎𝑐 2𝑎 𝑀𝐴𝐶 = 𝑏2 − 4𝑎𝑐 2𝑎 es tan genial para hablar en privado sí, es difícil hablar libre en estos días SSL/TLS Handshake Hmm, California, USA, ok I trust your ID
  • 18. Just need to see your I.D. please. Sorry, but we don’t sell beer to Russians
  • 20. 20
  • 23. I heard that self- signed certificates are not secure!!!
  • 25. Keep Private Keys Private  NTFS ACL  Windows private key ACL  Use Hardware Security modules  Windows support out of the box  Apache support  Avoid using shared wildcard certificates
  • 26. Subordinate Certification Authority ESX Hosts Network equipment Users Public Key Infrastructure Root Certification Authority Mobile devices
  • 27. TLS recommendations  Use TLS or DTLS for everything that moves over the wire  RDP https://technet.microsoft.com/en-us/magazine/ff458357.aspx  XenDesktop http://blogs.citrix.com/2014/10/16/xenapp-and-xendesktop-7-6-security-fips-140-2-and-ssl- to-vda/  Horizon View https://pubs.vmware.com/horizon-view-60/topic/com.vmware.ICbase/PDF/horizon-view- 60-scenarios-ssl-certificates.pdf  SQL Server http://blogs.msdn.com/b/sqlserverfaq/archive/2012/04/04/can-tls-certificate-be-used-for- sql-server-encryption-on-the-wire.aspx  LDAP http://social.technet.microsoft.com/wiki/contents/articles/2980.ldap-over-ssl-ldaps- certificate.aspx  Use other encryption methods for other protocols  SMB Encryption http://blogs.technet.com/b/filecab/archive/2012/05/03/smb-3-security-enhancements- in-windows-server-2012.aspx  Horizon View https://pubs.vmware.com/horizon-view-60/topic/com.vmware.ICbase/PDF/horizon-view- 60-security.pdf
  • 28. TLS recommendations  Disable weak ciphers and SSL 3.0  Windows https://support.microsoft.com/en-us/kb/245030  Apache https://www.sslshopper.com/article-how-to-disable-weak-ciphers-and-ssl-2.0-in-apache.html  Nginx https://raymii.org/s/tutorials/Strong_SSL_Security_On_nginx.html  NetScaler http://www.antonvanpelt.com/make-netscaler-ssl-vips-secure/  F5 https://support.f5.com/kb/en-us/solutions/public/13000/100/sol13171.html  Use TLS internally  Use an appropriate Certification Authority  Switch to SHA256 - http://blogs.technet.com/b/pki/archive/2013/09/19/upgrade-certification- authority-to-sha256.aspx
  • 29. Know the difference  Self-signed vs. preinstalled certificate  Check the date/name  Intended usage  Make sure that you use correct templates  Encryption vs. Obfuscation  Unsecured private key = obfuscation
  • 34. FIPS/Common Criteria  Remember who do you trust  Certified software/hardware doesn’t secure you automatically.  Security policy “System Cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing.” does not affect third-party and breaks .net  Certification may take years, release cycle usually shorter
  • 35. Compliance  A foolproof plan for security  Nothing is foolproof to a sufficiently talented fool  Standardized environments are easier to hack  Additional budget for IT  Enforcing documentation  Just a checklist to impress auditor

Editor's Notes