<section title="17.4. Transport Layer Security"><subsection title="Objective"><paragraph
    title="17.4.1."


><![CDATA[<p>Transport Layer Security is implemented correctly as an approved protocol.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="17.4.2."


><![CDATA[<p>This section covers the conditions under which TLS can be used as an approved cryptographic protocols.  Additionally, as File Transfer Protocol over SSL is built on SSL/TLS, it is also considered within scope.</p>]]></paragraph>
<paragraph
    title="17.4.3."


><![CDATA[<p>When using a product that implements TLS, requirements for using approved cryptographic protocols will also need to be referenced in the <a href="http://nzism.gcsb.govt.nz/ism-document#Section-15924">Section 17.3 - Approved Cryptographic Protocols</a>.</p>]]></paragraph>
<paragraph
    title="17.4.4."


><![CDATA[<p>Further information on handling TLS traffic through gateways can be found in <a href="http://nzism.gcsb.govt.nz/ism-document#Section-15091">Section 14.3 - Web Applications</a>.</p>]]></paragraph>
</block>
<block title="Background"><paragraph
    title="17.4.5."


><![CDATA[<p><strong>Secure Sockets Layer (SSL)</strong>, and <strong>Transport Layer Security (TLS)</strong> are cryptographic protocols designed to provide communication security when using the Internet.  They use X.509 certificates and asymmetric cryptography for authentication purposes.  This generates a session key.  This session key is then used to encrypt data between the parties.</p>]]></paragraph>
<paragraph
    title="17.4.6."


><![CDATA[<p>Encryption with the session key provides data and message confidentiality, and message authentication codes for message integrity.</p>]]></paragraph>
<paragraph
    title="17.4.7."


><![CDATA[<p>Several versions of the SSL and TLS protocols are in widespread use in applications such as web browsing, electronic mail, Internet faxing, instant messaging, and voice-over-IP (VoIP).</p>]]></paragraph>
<paragraph
    title="17.4.8."


><![CDATA[<p>Although common usage has been to use the terms TLS and SSL interchangeably, they are distinct protocols.</p>]]></paragraph>
<paragraph
    title="17.4.9."


><![CDATA[<p>TLS is an Internet Engineering Task Force (IETF) protocol, first defined in 1999, updated in RFC 5246 (August 2008) and RFC 6176 (March 2011).  It is based on the earlier SSL specifications (1994, 1995, 1996) developed by Netscape Communications for adding the HTTPS protocol to their Navigator web browser.  A draft of TLS 1.3 was released in October 2014, with a definitive version issued in 2018.</p>]]></paragraph>
<paragraph
    title="17.4.10."


><![CDATA[<p>Microsoft announced in October 2014 that that it will disable Secure Sockets Layer (SSL) 3.0 support in its Internet Explorer browser and in its Online Services, from Dec. 1, 2014.</p>]]></paragraph>
</block>
<block title="SSL 3.0 Vulnerability"><paragraph
    title="17.4.11."


><![CDATA[<p>A design vulnerability has been found in the way SSL 3.0 handles block cipher mode padding.  The Padding Oracle On Downgraded Legacy Encryption (POODLE) attack demonstrates how an attacker can exploit this vulnerability to decrypt and extract information from an encrypted transaction.</p>]]></paragraph>
<paragraph
    title="17.4.12."


><![CDATA[<p>The POODLE attack demonstrates this vulnerability using web browsers and web servers, which is one of the most likely exploitation scenarios.  All systems and applications utilizing the Secure Socket Layer (SSL) 3.0 with cipher-block chaining (CBC) mode ciphers may be vulnerable.</p>]]></paragraph>
</block>
<block title="SSL Superseded"><paragraph
    title="17.4.13."


><![CDATA[<p>SSL is now superseded by TLS, with the latest version being TLS 1.3 which was released in August 2018.  This is largely because of security flaws in the older SSL protocols.</p>]]></paragraph>
<paragraph
    title="17.4.14."


><![CDATA[<p>Accordingly SSL is no longer an approved cryptographic protocol and it SHOULD be replaced by TLS.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="17.4.15."


><![CDATA[<p>Further information on SSL and TLS can be found at:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td><strong>The SSL 3.0 specification</strong></td>
<td style="text-align: center;">IETF</td>
<td><a rel="noopener noreferrer" href="https://tools.ietf.org/html/draft-ietf-tls-ssl-version3-00" target="_blank">https://tools.ietf.org/html/draft-ietf-tls-ssl-version3-00</a></td>
</tr>
<tr>
<td><strong>&nbsp;RFC5246</strong></td>
<td><strong>The TLS 1.2 specification</strong></td>
<td style="text-align: center;">IETF</td>
<td>
<p><a rel="noopener noreferrer" href="http://tools.ietf.org/html/rfc5246" target="_blank">https://tools.ietf.org/html/rfc5246</a></p>
</td>
</tr>
<tr>
<td><strong>&nbsp;RFC6176</strong></td>
<td><strong>The SSL 2.0 prohibition</strong></td>
<td style="text-align: center;">IETF</td>
<td>
<p><a rel="noopener noreferrer" href="http://tools.ietf.org/html/rfc6176" target="_blank">https://tools.ietf.org/html/rfc6176</a></p>
</td>
</tr>
<tr>
<td><strong>&nbsp;RFC8446</strong></td>
<td>
<p><strong>The Transport Layer Security (TLS) Protocol Version 1.3</strong></p>
</td>
<td style="text-align: center;">IETF</td>
<td>
<p><a href="https://tools.ietf.org/html/rfc8446"></a><a rel="noopener noreferrer" href="https://tools.ietf.org/html/rfc8446" target="_blank">https://tools.ietf.org/html/rfc8446</a><a href="https://tools.ietf.org/html/rfc8446"></a>&nbsp;&nbsp;&nbsp;</p>
</td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td><strong>Vulnerability Summary for CVE-2014-3566</strong></td>
<td style="text-align: center;">NIST</td>
<td><a rel="noopener noreferrer" href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3566" target="_blank">http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3566</a></td>
</tr>
<tr>
<td><strong>&nbsp;<strong>TA14-290A</strong></strong></td>
<td><strong>Alert (TA14-290A) - SSL 3.0 Protocol Vulnerability and POODLE Attack</strong></td>
<td style="text-align: center;">US-CERT</td>
<td>
<p><a rel="noopener noreferrer" href="https://www.us-cert.gov/ncas/alerts/TA14-290A" target="_blank">https://www.us-cert.gov/ncas/alerts/TA14-290A</a></p>
</td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td><strong>This POODLE Bites: Exploiting The SSL 3.0 Fallback</strong></td>
<td style="text-align: center;">
<p>Google<br>September 2014</p>
</td>
<td>
<p><a rel="noopener noreferrer" href="http://www.openssl.org/~bodo/ssl-poodle.pdf" target="_blank">http://www.openssl.org/~bodo/ssl-poodle.pdf [PDF, 213 KB]</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Using TLS"><paragraph
    title="17.4.16.R.01."

    tags="Approved Cryptographic Algorithms,Cryptography,Technical,TLS"


><![CDATA[<p>Whilst version 1.0 of SSL was never released, version 2.0 had significant security flaws leading to the development of SSL 3.0.  SSL has since been superseded by TLS with the latest version being TLS 1.3 which was released in August 2018. SSL is no longer an approved cryptographic protocol.</p>]]></paragraph>
<paragraph
    title="17.4.16.C.01."

    tags="Approved Cryptographic Algorithms,Cryptography,Technical,TLS"


    classification="All Classifications"
    compliance="Should"
    cid="2598"
><![CDATA[<p>Agencies SHOULD use the current version of TLS (version 1.3).</p>]]></paragraph>
<paragraph
    title="17.4.16.C.02."

    tags="Approved Cryptographic Algorithms,Cryptography,Technical,TLS"


    classification="All Classifications"
    compliance="Should Not"
    cid="2600"
><![CDATA[<p>Agencies SHOULD NOT use any version of SSL.</p>]]></paragraph>
</block>
</subsection>
</section>
