About CloudBleed

If you aren’t familiar with CloudBleed, take a moment to read the following articles to get an understanding how it was found, what happened, and what PII/PCI data was (possibly) leaked:

In some of the examples shown by Tavis, or by digging into cached sites on less popular search engines, you can see how usernames, passwords, sessions, credit card info, etc could be seen in clear text despite the use of HTTPS (TLS1.2). A simplification of the flow would look like this:

Request: Client >=====> CloudFlare >=====> Origin Web Server
Response: Client <=====< CloudFlare <=====< Origin Web Server

Despite the fact that the client is utilizing HTTPS, CloudFlare has the ability to  terminate the secure connection since it has the private key. This is essentially the content  (PII or PCI) that was being cached if certain conditions occurred on the CloudFlare reverse proxy.

0-day Protection Against CloudBleed

So, what is the 0-day protection and what is it all about? Application Layer Encryption is a feature from F5 that would have left researchers scratching their heads when looking at the cached content.

First things first, let’s dynamically encrypt sensitive parameter names using Application Layer Encryption. But really, what does that mean? Let’s take a deeper look.

In all examples I will be using Google Chrome.

Let’s say you have login page without Application Layer Encryption.

Login box min

If I were to right click on the Password box and choose Inspect, I would see something like this:

Off parameters min

As you can see from the red boxes, the parameters for my username and password are log and pwd. We can all agree that this is in human readable format (HRF).

If I were to do the exact same thing with Application Layer Encryption, I would see this:

On form min

In the screen shot above there are 3 things I would like to focus your attention on:

  1. Both name=log and name=pwd are no longer in HRF.
  2. Notice in the first red box that there is a slight purple hue over the value? That’s the dynamic part of Application Layer Encryption. Every few seconds the values will change. This is done on the client side, not the server side. That value will never repeat and is completely unique to the user’s session.
  3. We also removed the element IDs, id=”user_login” and id=”user_pass”.

With Application Layer Encryption turned on, every user will have a unique value for name=log and name=pwd moving forward.

We can also turn up the security a notch by inserting decoy fields to further confuse the bad guys.

Parameters 3 min

Decoy fields are only seen in the raw code and do not change the end users experience. As you can see above, there are additional IDs which makes it very difficult to pull apart in a replay attack.

But Brian, what about the values being sent!?!!?

8893118 225x300

Let’s look at a data submission without Application Layer Encryption from the browser via the network tools in Chrome:
 
Off post 2 min
 

As you can see from the picture above, the username is briandeitch and the password is test. Although this is sent via HTTPS, CloudFlare has the private key and this is the type of data that could have been cached by search engines. Yikes!

Same exercise but this time with Application Layer Encryption:

Decoy fields turned off:

On post 2 min

Decoy fields turned on:

On post 3 min

As you can see from the form data, both the parameter names and values have been dynamically encrypted on the client side. Let’s say this data was leaked by CloudFlare and cached by a search engine. Couple of points:

  • These substituted and encrypted values are single use, meaning a replay attack wouldn’t work.
  • Good luck reverse engineering any of this. Application Layer Encryption uses private/public key technology and this key, unlike the private key for the SSL Certificate, isn’t hosted on CloudFlare. This means the payload (form data shown above, you know the values for the username and password) is completely encrypted to CloudFlare (or any other proxy for that matter).
  • In addition, the decoy fields are sent as well. Good luck deciphering which fields are mapped to the actual application(s).
Personally, my favorite part of Application Layer Encryption is that is requires no change to my back end application. This solution requires no installation or modification to the end users web browser, is 100% client-less, and transparent to the end user. At the end of the day, you can still rely on HTTPS for transport layer security however Application Layer Encryption steps up your overall security posture by using clever obfuscation and encryption to protect your data when there is a proxy (MITM device) between your customers and application(s).
 
Lastly, Application Layer Encryption is a feature within F5 WebSafe. F5 has taken a complex security enhancement and created a point and click solution to easily protect your application(s).

Configuring Application Layer Encryption

Step 1: By creating a profile, specify the URIs you want protected.
 
Url list min
 
*Note: You are able to use wildcard URIs as well.
 
Step 2: Add the parameters you want protected.
 
Parameters 2 min
 
The Encrypt checkbox is how we secure the username and password values that are being sent. By encrypting the values, this will prevent replay attacks as the values can only be used once.
 
The Substitute Value checkbox substitutes the parameter’s value with a random value in the web application while the form is being filled. This also prevents browser based malware from capturing keystrokes as they are being entered.
 
The Obfuscate checkbox encrypts the parameter’s name attribute.
 
Step 2a: If you would like to insert decoy fields to further mess with the bad guys, you don’t have to be a rocket scientist. Relax, it is just a checkbox.
 
Decoy min
 
Step 3: Associate the new profile to the application.
 
Stopper min
 
That’s it! You have successfully configured and secured your application with Application Layer Encryption. Special thanks to BAM, Todd Morton, Chad Fazio, Jeffery McFerson, Joe Martin, and Ted Byerly for their contributions on this article.