Menu
CloudFlare can provide its caching service without your SSL keys

CloudFlare can provide its caching service without your SSL keys

The company said it has made an encryption breakthrough that will put financial institutions at ease

CloudFlare says it has engineered a novel way to handle sensitive encryption keys that allow organizations such as financial institutions  to retain their SSL keys but still use its services.

CloudFlare says it has engineered a novel way to handle sensitive encryption keys that allow organizations such as financial institutions to retain their SSL keys but still use its services.

CloudFlare said it has engineered a novel way to handle sensitive encryption keys that allows organizations such as financial institutions to still use its caching service to fend off cyberattacks.

The breakthrough, called "Keyless SSL," is a new method for handling SSL (Secure Socket Layer) keys, which are used to encrypt content between a client and a service and are a fundamental defense to prevent intercepted data from being read by an attacker.

The company's popular services protect websites from distributed denial-of-service and other attacks by using a network of global data centers to detect and filter attack traffic and keep websites online through extensive caching.

Websites using SSL could be accommodated by CloudFlare, but those operators had to turn over their SSL encryption keys. That's risky, since the safety of the data is dependent on how well a third-party provider protects those keys.

If a bank's SSL key is lost, for example, the incident is so serious that it must be reported to the Federal Reserve, wrote Matthew Prince, CloudFlare's CEO, in a blog post on Thursday.

A stolen SSL key would allow attackers to decrypt traffic they've intercepted or set up a fake website that appears to be legitimate.

According to a technical writeup, Keyless SSL works like this: a person's Web browser connects to the closest CloudFlare server and sends a bit of data, called a secret, that has been encrypted with a bank's public SSL key.

CloudFlare's server authenticates itself to a key server and sends its own encrypted secret, which the key server decrypts and sends it back over an encrypted tunnel. The shared secret is then used to connect the Web browser and the bank's online service via CloudFlare.

One of the company's edge nodes, or session server, does have to decrypt, inspect and re-encrypt the traffic before it goes back to the bank's site, CloudFlare said.

Keyless SSL has been audited by iSEC Partners and Matasano Security, according to CloudFlare. The company will offer Keyless SSL initially for customers on its enterprise plan.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk


Follow Us

Join the newsletter!

Or
Error: Please check your email address.

Tags securityencryptionCloudFlare

Featured

Slideshows

Looking back at the top 15 M&A deals in NZ during 2017

Looking back at the top 15 M&A deals in NZ during 2017

In 2017, merger and acquisitions fever reached new heights in New Zealand, with a host of big name deals dominating the headlines. Reseller News recaps the most important transactions of the Kiwi channel during the past 12 months.

Looking back at the top 15 M&A deals in NZ during 2017
Kiwi channel closes 2017 with After Hours

Kiwi channel closes 2017 with After Hours

The channel in New Zealand came together to celebrate the close of 2017, as the final After Hours played out in front of a bumper Auckland crowd.

Kiwi channel closes 2017 with After Hours
Meet the top performing HP partners in NZ

Meet the top performing HP partners in NZ

HP honoured leading partners across the channel at the Partner Awards 2017 in New Zealand, recognising excellence across the entire print and personal systems portfolio.

Meet the top performing HP partners in NZ
Show Comments