OWASP Mobile Top 10: M3 Insecure Transport Layer

Null Bangalore Meet

20 September 2014

Abstract

Discussion about M3 Insecure Transport Layer

Slides

AI Generated Summary

AI Generated Content Disclaimer

Note: This summary is AI-generated and may contain inaccuracies, errors, or omissions. If you spot any issues, please contact the site owner for corrections. Errors or omissions are unintended.

This presentation covers OWASP Mobile Top 10 Risk M3: Insufficient Transport Layer Protection, providing a thorough walkthrough of transport layer security fundamentals, known SSL/TLS vulnerabilities, and common insecure implementation patterns in mobile applications. Anant Shrivastava explains the OSI model’s transport layer, TLS certificate chains, protocol version weaknesses from SSLv2 through TLS 1.2, and delivers platform-specific prevention guidance for both Android and iOS developers.

Key Topics Covered

Actionable Takeaways

  1. Disable all weak cipher suites and protocol versions (SSLv2, SSLv3) — enforce TLS 1.1+ at minimum and prefer TLS 1.2 for all mobile app communications.
  2. Never allow connections using self-signed certificates in production apps, and always validate the complete certificate chain of trust.
  3. Perform all sensitive communication over TLS — avoid mixing HTTP and HTTPS content, and ensure ad networks and analytics SDKs also use secure connections.
  4. Implement certificate pinning as an additional layer of protection against MITM attacks, using platform-appropriate mechanisms (Secure Transport API on iOS, custom TrustManager on Android).
  5. Test mobile app transport security by setting up an interception proxy — if the app functions normally through the proxy without certificate errors, the TLS implementation is insecure.
  6. Add a second layer of encryption for highly sensitive data transmitted over TLS, and follow the OWASP Transport Layer Protection Cheat Sheet.