Risk
8/1/2013
11:09 AM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Facebook Enables Secure Browsing For All Users

Facebook converts all users to HTTPS for security, says the new encryption doesn't slow down connections.

10 Facebook Features To Help You Get Ahead
10 Facebook Features To Help You Get Ahead
(click image for larger view)
Facebook has converted all users to the Hypertext Transfer Protocol Secure (HTTPS) browsing form, the social network announced.

"HTTPS protects everyone, especially when you're using Wi-Fi access points," said Chester Wisniewski, senior security adviser at Sophos. "Before, it was really easy to have your Facebook account hijacked just by logging on a Wi-Fi network. Having HTTPS enabled also protects you when you're browsing from a mobile device, which people do daily."

This means that your browser now communicates with Facebook using a secure connection. You'll notice this in the address bar where there is a lock icon and "https" rather than "http" in the Web address.

Facebook first introduced the HTTPS browsing option two years ago. Facebook recommended that users who frequently accessed the social network from public Internet access points such as coffee shops, airports and schools enable this option, though it was voluntary. In November, the social network announced it would start rolling out HTTPS for all users in North America, followed by everywhere else.

[ Do you know what to look for? Read more: How To Spot A Facebook Scam. ]

According to Scott Renfro, a software engineer at Facebook, more than a third of users enabled the feature following its introduction. HTTPS uses Transport Layer Security, formerly known as Secure Sockets Layer, and makes the communication between your browser and Facebook servers more secure, he said.

"Now that HTTPS is on by default, virtually all traffic from www.facebook.com and 80% of traffic to m.facebook.com uses a secure connection," Renfro said. "Our native apps for Android and iOS have long used HTTPS a well."

One priority for Facebook in converting all users to HTTPS was increasing the site's speed, Renfro said. Encrypted pages tend to take longer to load, which slows down performance. Facebook was able to avoid extra latency in most cases by upgrading its infrastructure and using abbreviated "handshakes," he said. "In addition to the network round trips necessary for your browser to talk to Facebook servers, HTTPS adds additional round trips for the handshake to set up the connection. A full handshake requires two additional round trips, while an abbreviated handshake requires just one additional round trip. An abbreviated handshake can only follow a successful full handshake," he said.

"For example," he continued, "if you're in Vancouver, where a round trip to Facebook's Prineville, Oregon, data center takes 20ms, then the full handshake only adds about 40ms, which probably isn't noticeable. However, if you're in Jakarta, where a round trip takes 300ms, a full handshake can add 600ms. When combined with an already slow connection, this additional latency on every request could be very noticeable and frustrating."

Other changes Facebook made include: a secure attribute for authentication cookies, which instructs the browser to only send these cookies on HTTPS requests; an insecure indicator cookie, which directs to HTTPS when no authentication cookies are present; and upgrading all apps to support HTTPS browsing.

"Turning on HTTPS by default is a dream come true, and something Facebook's traffic, network, security infrastructure, and security teams have worked on for years," Renfro said. "We're really happy with how much of Facebook's traffic is now encrypted, and we are even more excited about the future changes we're preparing to launch."

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0972
Published: 2014-08-01
The kgsl graphics driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not properly prevent write access to IOMMU context registers, which allows local users to select a custom page table, and consequently write ...

CVE-2014-2627
Published: 2014-08-01
Unspecified vulnerability in HP NonStop NetBatch G06.14 through G06.32.01, H06 through H06.28, and J06 through J06.17.01 allows remote authenticated users to gain privileges for NetBatch job execution via unknown vectors.

CVE-2014-3009
Published: 2014-08-01
The GDS component in IBM InfoSphere Master Data Management - Collaborative Edition 10.0 through 11.0 and InfoSphere Master Data Management Server for Product Information Management 9.0 and 9.1 does not properly handle FRAME elements, which makes it easier for remote authenticated users to conduct ph...

CVE-2014-3302
Published: 2014-08-01
user.php in Cisco WebEx Meetings Server 1.5(.1.131) and earlier does not properly implement the token timer for authenticated encryption, which allows remote attackers to obtain sensitive information via a crafted URL, aka Bug ID CSCuj81708.

CVE-2014-3534
Published: 2014-08-01
arch/s390/kernel/ptrace.c in the Linux kernel before 3.15.8 on the s390 platform does not properly restrict address-space control operations in PTRACE_POKEUSR_AREA requests, which allows local users to obtain read and write access to kernel memory locations, and consequently gain privileges, via a c...

Best of the Web
Dark Reading Radio