Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

8/1/2013
11:09 AM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Facebook Enables Secure Browsing For All Users

Facebook converts all users to HTTPS for security, says the new encryption doesn't slow down connections.

10 Facebook Features To Help You Get Ahead
10 Facebook Features To Help You Get Ahead
(click image for larger view)
Facebook has converted all users to the Hypertext Transfer Protocol Secure (HTTPS) browsing form, the social network announced.

"HTTPS protects everyone, especially when you're using Wi-Fi access points," said Chester Wisniewski, senior security adviser at Sophos. "Before, it was really easy to have your Facebook account hijacked just by logging on a Wi-Fi network. Having HTTPS enabled also protects you when you're browsing from a mobile device, which people do daily."

This means that your browser now communicates with Facebook using a secure connection. You'll notice this in the address bar where there is a lock icon and "https" rather than "http" in the Web address.

Facebook first introduced the HTTPS browsing option two years ago. Facebook recommended that users who frequently accessed the social network from public Internet access points such as coffee shops, airports and schools enable this option, though it was voluntary. In November, the social network announced it would start rolling out HTTPS for all users in North America, followed by everywhere else.

[ Do you know what to look for? Read more: How To Spot A Facebook Scam. ]

According to Scott Renfro, a software engineer at Facebook, more than a third of users enabled the feature following its introduction. HTTPS uses Transport Layer Security, formerly known as Secure Sockets Layer, and makes the communication between your browser and Facebook servers more secure, he said.

"Now that HTTPS is on by default, virtually all traffic from www.facebook.com and 80% of traffic to m.facebook.com uses a secure connection," Renfro said. "Our native apps for Android and iOS have long used HTTPS a well."

One priority for Facebook in converting all users to HTTPS was increasing the site's speed, Renfro said. Encrypted pages tend to take longer to load, which slows down performance. Facebook was able to avoid extra latency in most cases by upgrading its infrastructure and using abbreviated "handshakes," he said. "In addition to the network round trips necessary for your browser to talk to Facebook servers, HTTPS adds additional round trips for the handshake to set up the connection. A full handshake requires two additional round trips, while an abbreviated handshake requires just one additional round trip. An abbreviated handshake can only follow a successful full handshake," he said.

"For example," he continued, "if you're in Vancouver, where a round trip to Facebook's Prineville, Oregon, data center takes 20ms, then the full handshake only adds about 40ms, which probably isn't noticeable. However, if you're in Jakarta, where a round trip takes 300ms, a full handshake can add 600ms. When combined with an already slow connection, this additional latency on every request could be very noticeable and frustrating."

Other changes Facebook made include: a secure attribute for authentication cookies, which instructs the browser to only send these cookies on HTTPS requests; an insecure indicator cookie, which directs to HTTPS when no authentication cookies are present; and upgrading all apps to support HTTPS browsing.

"Turning on HTTPS by default is a dream come true, and something Facebook's traffic, network, security infrastructure, and security teams have worked on for years," Renfro said. "We're really happy with how much of Facebook's traffic is now encrypted, and we are even more excited about the future changes we're preparing to launch."

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Sodinokibi Ransomware: Where Attackers' Money Goes
Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
Data Privacy Protections for the Most Vulnerable -- Children
Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
7 SMB Security Tips That Will Keep Your Company Safe
Steve Zurier, Contributing Writer,  10/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: The old using of sock puppets for Shoulder Surfing technique. 
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-17513
PUBLISHED: 2019-10-18
An issue was discovered in Ratpack before 1.7.5. Due to a misuse of the Netty library class DefaultHttpHeaders, there is no validation that headers lack HTTP control characters. Thus, if untrusted data is used to construct HTTP headers with Ratpack, HTTP Response Splitting can occur.
CVE-2019-8216
PUBLISHED: 2019-10-17
Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure .
CVE-2019-8217
PUBLISHED: 2019-10-17
Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-8218
PUBLISHED: 2019-10-17
Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure .
CVE-2019-8219
PUBLISHED: 2019-10-17
Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .