Analyzing DANE's Response to Known DNSsec Vulnerabilities

Size: px
Start display at page:

Download "Analyzing DANE's Response to Known DNSsec Vulnerabilities"

Transcription

1 Analyzing DANE's Response to Known DNSsec Vulnerabilities Matthew Henry Joseph Kirik Emily Scheerer UMBC UMBC UMBC May 9, 2014 Abstract: SSL/TLS is currently the most popular solution for secure communication between clients and servers. Although there are weaknesses in the current system, Certificate Authorities remain a critical security service in a network, able to verify the identity of an entity, issue digital certificates, and maintain a certificate revocation list. In an ideal world, DANE (DNS-based Authentication of Named Entities) would support a certificate authority, preventing man in the middle attacks by giving the certificate record based on the previously made DNSsec (The Domain Name System Security Extension) request through a TLSA record. However, our research discovered that with a self-signed certificate, instead of supporting a certificate authority, DANE makes it easier for the attacker by only requiring them to forge the DNS server and claiming a selfsigned certificate, instead of needing to compromise both the certificate authority and the DNS server. Keywords: SSL, TLS, DANE, DNSsec, Certificate Authorities Section 1: Motivation 1.1 Introduction Our group analyzed the security concepts instituted as part of the DANE protocol to authenticate DNS and browser requests. Until now, authentication of domain names have been done by third party Certificate Authorities, in order to make sure the entity on the far end of a secure connection actually represents the users intended domain. 1 Currently SSL/TLS-based applications maintain a list of over 200 Certificate Authorities whose certificates they will accept, creating many points of vulnerability. A compromise at any point would allow the attacker to issue certificates for any domain. As a result, DNSsec was developed to distribute secure information about domain names through the DNS system itself. Each domain holder can act as an authority for subordinate domains. The DANE working group within the Internet Engineering Task Force (IETF) created a new type of DNS record format for certificate associations, known as TLSA, which allows a domain to sign statements about which entities are authorized to represent it. Initially we believed that DANE was a reasonably thought-out method to securely determine exactly which SSL/TLS certificate a browser should use to connect to the site. DANE as advertised was also being considered to be used in securing and voice communications/multimedia sessions over IP protocol networks (VoIP). According to our analysis, DANE associations can be used either as a check on the current model (i.e. limit which Certification Authorities may vouch for a 1 Barnes, Richard L. Domain Name Authentication with DNSSEC and DANE-The Internet Protocol Journal, Volume 15, No. 1. Cisco, n.d. Web. 04 May ed_issues/ipj_15-1/151_dane.html 1

2 domain) or as an alternative trust path (i.e. root trust in a DNSsec authority instead of a Certification Authority), but it still does not overcome the inherent vulnerabilities in DNSsec. In other words, the transition and security problems that face DANE arise because DANE is the first real application of DNSsec that is expected to be widely deployed. In order to comprehensively understand DANE, we must first address its foundation, namely SSL/TLS and DNSsec. The following sections attempt to give an adequate representation of both, ending with a detailed discussion of the new DANE protocol. 1.2 Secure Sockets Layer/Transport Layer Security (SSL/TLS) HTTPS is identical to HTTP syntactically but adds an additional layer of security known as SSL (Secure Sockets Layer) or a newer implementation known as TLS (Transport Layer Security). These security protocols rely on the notion of a certificate to verify the identity of both the server and to establish the encrypted communication channel between the web browser and the web server. Current TLS-based applications rely on PKIX for authentication of domain names. PKIX is based on a very general digital certificate system called X.509, and as a result, it has no inherent binding to the DNS. Unlike the DNS, which has a single global root, there is no single authority under which all PKIX certificates can be verified. Relying parties can either trust every authority that has a signed certificate for an entity it wants to authenticate or they will not be able to validate the identities of some entities. To establish an HTTPS session there is a series of communications that take place between the browser and the server. First, the browser requests an HTTPS session with the servers and provides a list of cryptographic hash functions and ciphers. Then the server selects strongest hash function and ciphers its supports, informs browser and send back its certificate. The certificate will contain the server s public encryption key. After this, the browser verifies the authenticity of the certificate and encrypts a random number using the server s public key. Finally, using the random number, the browser and server generate shared secret keys that are used to encrypt and authenticate all subsequent messages. In addition to providing a server s public key, certificates provide a means of verifying the identity of websites. Each of the web servers communicating with the browsers may be run by a different administrative authority. Therefore certificates are used to provide a means of verifying the identity of websites to the browsers. Certificates are digitally signed using the private key of a trusted third party, known as a Certificate Authority. In order to get a certificate, a web site owner submits a certificate signing request to the authority alongside a fee. If the identity of the requestor and ownership of the domain name for the website is verified, the authority signs and issues the certificate. Overall, the goal of the Certificate Authority verification is initially to verify the authenticity of the binding between a certificate and a domain name. Secondly, it allows a Certificate Authority organization to vouch for the trustworthiness of the entity that is managing the domain name in question. When a user navigates to a website that attempts to establish an HTTPS session but in return is provided a revoked or expired certificate, the web browser should display an error message. This certificate verification model has been in use by the HTTPS protocol for since the mid- 90 s but recently it has been compromised. In many situations, adversaries were able to defeat this model by attacking one of the Certificate Authorities that the victim web site was not actually using. Several recent attacks have taken advantage of this fact by targeting smaller Certification Authorities as a way to obtain 2

3 certificates for major domains (i.e. an attack through DigiNotar on Google). 2 It is possible for attackers to initiate a man-in-the-middle attack to intercept encrypted traffic by providing forged or expired certificates. 1.3Domain Name System Security Extension (DNSsec) In November 1993, the earliest organized work on DNSsec within the Internet Engineering Task Force began as an open design team meeting run by members of the DNS working group. 3 It was not until 2004 that the IETF began writing down the specific set of threats against which DNSsec is designed to protect. In response to increasingly complicated attacks on Certificate Authorities over the past two decades, DNSsec was developed as a way to alleviate the risk from compromising parties. Any HTTPS session that uses a domain name opposed to a hard coded IP address begins with a DNS lookup. DNSsec is a set of security extensions to the DNS protocol, which digitally signs all DNS replies using public-key cryptography, making it difficult to spoof a DNS reply. When a user issues a DNS request, the request packet indicates that DNSsec is supported and if the queried supporter also supports DNSsec, a resource-record signature (RRSIG) is returned alongside any resolved queries as well as DNSKEY record containing the authoritative name server s public key. The RRSIG contains a digital signature of the returned records (hash of the returned records encrypted with the authoritative name server s 2 Barnes, Richard L. Domain Name Authentication with DNSSEC and DANE-The Internet Protocol Journal, Volume 15, No. 1. Cisco, n.d. Web. 04 May ed_issues/ipj_15-1/151_dane.html 3 "RFC Threat Analysis of the Domain Name System (DNS)." Internet Engineering Task Force, n.d. Web. 04 May < private key). The user can verify the returned records by decrypting the digital signature using the name server s public key. In order to be useful as a given relying party to authenticate someone, a certification path has to end in a trust anchor, that is, an authority that the relying party trusts to make assertions. In the DNSsec context, relying parties can in principle have only one trust anchor, namely the DNS root. 4 In order to establish trust in the name server s public key, DNSsec employs a chain of trust to the root name server. 1.4 DNSsec-based Authentication of Named Entities (DANE) The goal of DANE is to address some of the vulnerabilities of the current PKIX system by allowing DNSsec to allow domains to publish information secured with DNSsec that can add additional security to PKIX certificates used for TLS. DANE explicitly staples a domain name to a certificate. Previously relaying parties could not determine which Certificate Authority a web site obtained their certificate from. DANE relies on DNSsec to cryptographically secure the transaction between the relaying party and the zone owner; therefore the zone owner can also use DNS to convey details about the web server s certificate. DNSsec uses a resource record, whereas DANE specific a new type called the TLSA (TLS associations) record containing a hashed fingerprint of the certificate that the relaying parties should see when they contact the server. More specifically the TLSA has three basic fields: usage (which type of statement the record is making), selector/matching (how a TLS certificate chain should be matched against the 4 Barnes, Richard L. Domain Name Authentication with DNSSEC and DANE-The Internet Protocol Journal, Volume 15, No. 1. Cisco, n.d. Web. 04 May ed_issues/ipj_15-1/151_dane.htm 3

4 record), and certificate for association (the actual data against which the TLS certificate chain should be matched). These records are stored under the target domain with a prefix that indicates the transport and port number for the TLS server. The DANE protocol limits the scope of the existing trust anchors while simultaneously providing the client with a new trust anchor. In other words, the client only accepts a specific certificate issued under a specific Certificate Authority and the client should use a domain-provided trust anchor to validate certificates for that domain. Section 2: Previous Work In a SANS Institute report, Holly McKinley depicts how SSL/TLS works in its current implementation, provides a chronological history of development and also an analysis of the security the protocol supports. 5 Although it mentions several of the vulnerabilities in the SSL/TLS protocol, it did not propose or evaluate any potential solutions. Several similar articles discussing SSL/TLS were referenced as a template for evaluations in our analysis. Researchers have also analyzed DANE s implementation. One paper in particular referenced in our analysis was Eric Osterweil, Danny McPherson and Lixia Zhang s Verisign technical report 6. The group addresses the implementation that the operational community has long used as attack surfaces or 5 McKinley, Holly Lynne. SSL and TLS: a Beginner s Guide. SANS Institute, room/whitepapers/protocols/ssl-tls-beginners-guide Osterweil, Eric, Danny McPherson, and Lixia Zhang. "A Quantitative Comparison Between X.509 CA Verification and DANE Via Attack Surface Analysis." Verisign Labs, pdf. general notions of system vulnerabilities. Their results show that if web sites implemented DNSsec excluding DANE, they would reduce their attack surface by as much as two orders of magnitude. By implementing DANE in full using DNSsec as a verification substrate, it would reduce their attack surface by three orders of magnitude. The report also provides an extensive detailed description of TLSA, a new type of DNS resource record specified by DANE, which contains a hashed fingerprint of the certificate that the relying party (RP) should expect to see when they contact the web server. This resource is useful for our overall analysis of the new security mechanisms offered in the DANE protocol. However, this report was not analyzing attack vectors, as ours has done. Instead, it assumed the ideal DANE setup. In an IETF Journal report, Richard Barnes explains the DANE protocol and how it attempts to solve some of the issues with TLS 7. He details the underpinnings of the DANE protocol and presents some of the new security challenges this protocol will create for users and client-side developers. This paper describes the current TLS client authentication, which uses asymmetric cryptology to protect communications. The current implementation is vulnerable to the BEAST attack, and the article discussed, DANE s vulnerability to it. This paper served as an example for our lab research, although we attempted a similar analysis with other known attacks, specifically spoofing and sniffing. Finally, in the process of conducting our group s analysis, we used several documents created by the actual DANE developers. Specifically, V. Dukhovni s memo in 2013 detailing how to implement DANE and the different aspects of publishing DANE TLSA 7 Barnes, Richard L. DANE: Taking TLS Authentication to the Next Level Using DNSSec. IETF Journal, October

5 records. 8 This document reports what server operators need to consider, how the clients authenticate the server s certificate chain, how DANE leverages the DNSsec infrastructure, and finally how TLSA records are validated. This document helped us to implement DANE, but was not instructive in detailing its vulnerabilities. Section 3: Methods 3.1 Lab Setup To test DANE s response to known vulnerabilities, we created a lab environment to run attacks. Our lab consisted of two apache webservers with self-signed certificates, one Nginx server with a self-signed certificate, a raspberry pi running Bind acting as our DNS server, and a machine running attack scripts. Our main attack consisted of an attacker on the network listening and responding to DNS requests and responding with a spoofed response. We experimented with this attack on multiple different security surfaces to determine the attack vectors. 3.2 Adversarial Model There are three main types of adversaries to be considered. A simple script kiddie attack was the focus of our investigation. Two additional types of adversaries exist, although these are not covered in our lab. These include a more intelligent hacker running a botnet or more sophisticated nation-state interested in cyber exploitation. Both adversaries could accomplish attacks at a higher level, like a DNS DDoS attack. However, we have limited our considerations to a simple attacker. 8 Dukhovni, V. DANE TLSA implementation and operational guidance May 2013, DANE Draft Our experiment assumes an adversary with some minimal knowledge of DNSsec sniffing and spoofing. This can be a simple script kiddie attack, our hypothetical adversary. Considering the attack is from a script kiddie implies we are assuming a computationally bounded adversary. In other words, they are running on a single server with a self-signed SSL certificate and that they have limited running time and processing power to accomplish their attacks. This prevents our hypothetical adversary from forging a TLSA record. We assumed our script kiddie adversary has the ability to access open source tools, like Kali Linux or OpenSSL. Our hypothetical attacker has a very low and limited budget and unable to purchase their own legitimate SSL certificate. In our scenario, the goal of the adversary is simply to attack the network s security to see if it can be defeated and the transferred secrets can be discovered. A script kiddie motivation is mostly to prove that they can do something, not because there is something to steal. Other attackers could have other motivations. For example, a hacker running a botnet often wants to increase their computational power, and therefore they turn other computers into zombie machines. Nationstates are attacking for espionage purposes, to obtain documents and plans that would otherwise be kept secret. SSL/TLS and DNSsec are used to protect all kinds of data transfers, financial, classified or otherwise, so securing those communications is significantly important. 3.3 Scenario 1: Traditional DNS In this setup, there is no protection against a DNS spoofer attack, the attacker only must answer faster than the legitimate DNS server to succeed, which is easily done while on the same network. If an HTTPS session assumes the Certificate Authority was not 5

6 compromised there will be a raised error message saying that the given SSL certificate does not match the URL. If the requested URL is of a subdomain (i.e. docs.google) it is possible to forge a CNAME record for the domain and alias the requested URL to a slightly misspelled URL which has a legitimate Certificate Authority approved certificate for the misspelled domain (i.e. docs.gooogle.com, notice the third o ). This would bypass the warning message saying the certificate is invalid. 3.4 Scenario 2: DNSsec In this scenario, the success of the attack depends on whether or not the client refuses Traditional DNS responses when asking for a DNSsec query. If the client accepts, the attacker could use the above attack and mark DNSsec not supported in the response. If the client only accepted DNSsec responses, then the attacker would have to forge a signature for the given forged record (which is computationally difficult). If the attacker were to try to perpetrate a subdomain attack it would have to forge a signature for the given CNAME record and a second A record. 3.5 Scenario 3: DANE Similar to the DNSsec scenario, if the client accepts traditional DNS responses, then all DANE s protections can be bypassed. If it does not, the attacker would have to include a TLSA record for the SSL certificate of their malicious site. This can be easier for the attacker because the DANE protocol allows for self-signed certificates which would eliminate the need for taking over a Certificate Authority or forging a Certificate Authority s signature. Again, the attack would need to forge the DNSsec trust chain signature. DANE would trade one single point of failure (CA s) for another (the DNSsec trust chain). A remedy to the situation would be to not allow self-signed certificates, however this decision would not be without its obvious tradeoffs. Section 4: Results Although DNSsec has always meant that DNS operators would have more security functions, DANE deployment will give them an explicit effect on application security, acting as arbiters of who can authenticate under a given name in TLS. Nonetheless, we found that DANE is still vulnerable to a DNSsec spoofing attack. DANE binds an SSL certificate to an IP address in addition to the URL binding that DNSsec does. DNS operators will play an analogous role to the one Certification Authorities play today a compromise in a DNS operator will allow an attacker to masquerade as a victim domain. However, if the DNSsec response cannot be trusted, the DANE response also cannot be trusted. Essentially, DANE trades one attack vector for another. As an adversary, instead of having to compromise the Certificate Authority and the DNS server to attack DANE, s/he would only need to take over the DNS Server because the DANE protocol allows self-signed SSL certificates (similar to the certificates we used in our lab). Additionally, DANE does not have a way to validate selfsigned certificates, so attacking the DNS server is sufficient with a self-signed certificate. Section 6: Discussion During this research project, a new vulnerability in OpenSSL was discovered. DANE currently works with OpenSSL. As a result, DANE is still vulnerable to the Heartbleed vulnerability. However, DANE also works with TLSLite, which is not vulnerable to the Heartbleed bug. DANE is designed to bind the appropriate certificate to an IP address, adding security and simplicity by ensuring certificates used are in the correct country and 6

7 location for the IP address being used. Heartbleed is not something that attacks DANE, it attacks OpenSSL and if DANE is on top of OpenSSL it doesn t fix holes in OpenSSL. This will be true for any future vulnerabilities discovered in SSL. However, it is important to consider the scope of DANE when drawing our results and conclusions. The DANE Digest is careful to clarify what is and is not relevant when testing DANE. Initially, our project description intended to evaluate DANE, compared to a number of other solutions. Our goal was to provide an explicit evaluation of several proposed solutions, critically reviewing them based on a standard metric. We had planned for our metric to be based on vulnerabilities, specifically focusing on usability, especially regarding understandability and ease of access. Our goal was to force security analysts and creators of web service security solutions to consider how effective their work was regarding the end user. We believed that this would ultimately create a more secure internet because the end user would know why they should care about security. However, we realized that evaluating DANE from a usability perspective and from a vulnerability perspective would be too large a scope for a one semester project, and decided to focus on the vulnerability analysis. A usability study is a different scope of research, focused on human response over technical details or errors. If we were to continue this project in the future, we would try to develop a user installation guide for DANE and a user survey to see how effective our installation guide is in encouraging system admins to install DANE. One of the main problems we discovered while analyzing DANE is the lack of information available about the system. DANE is still in an experimental stage, and for it to become truly popular and widely accepted, industry admins must understand how and why they should add DANE to their existing server side security. Section 7: Open Problems From the vulnerability analysis side, developing an exploit specifically for DANE would be a possible future problem. Our analysis tests DANE s ability to protect against known vulnerabilities in SSL and DNSsec. It does not analyze the TLSA certificates or the DANE implementation for new vulnerabilities. From the DANE developer forums, we know there are places in the existing DANE protocol that could be exploited, but developing the technical details of this attack would be another possible project. Throughout the duration of our analysis, we have been subscribed to the DANE IETF digest mailing list. As a subscriber, the list gave us a lot of insight on the future developments of DANE. Each of these insights has the potential to be a future project, either as an additional study or as a potential exploit. For example, DANE Digest Volume 37, Issue 2 noted that, The near-future course of the DANE project at NIST will now focus on SMTP uses, for both MUAs and MTAs...the issues with the HTTP use case are not protocol-specific and will crop up again with SMTP. Exploiting the HTTP use case would be one way to develop an attack against DANE. Finally, developing a client side attack against DANE would appear to be possible. DANE Digest Volume 36, Issue 30, notes that, the client still typically has no corresponding certificate in hand, and so, if the server does not provide a matching certificate in the TLS handshake, the client cannot "compare" the TLSA record with the server's chain. However, if the server's chain starts with a certificate signed with the trust anchor key in question (obtained from the TLSA record), the client can in principle verify the chain. This statement 7

8 would seem to point to the fact that DANE could be attacked by attaching a false trust anchor to the front of a certificate chain, and investigating this further would be worthwhile. Section 8: Conclusions DANE is meant to be an extension to SSL/TLS certificate authorities, not a replacement. Our experiment tested known DNSsec vulnerabilities against DANE s TLSA records and found that TLSA records can be spoofed and sniffed like other DNSsec records. Additionally, our tests involved self-signed SSL certificates, not a certificate authority. As a result, we discovered that forging a TLSA record is possible, and that an adversary could claim a self-signed SSL certificate to bypass DANE s certificate authentication. If DANE is used with existing SSL/TLS certificate authorities and a strong DNS server protecting itself against sniffing and spoofing, DANE will provide an additional level of security and reduce the attack vectors, as shown in the previous work section. However, DANE cannot stand alone in defending a network. 8

SSL/TLS: The Ugly Truth

SSL/TLS: The Ugly Truth SSL/TLS: The Ugly Truth Examining the flaws in SSL/TLS protocols, and the use of certificate authorities. Adrian Hayter CNS Hut 3 Team adrian.hayter@cnsuk.co.uk Contents Introduction to SSL/TLS Cryptography

More information

Public Key Infrastructure (PKI)

Public Key Infrastructure (PKI) Public Key Infrastructure (PKI) In this video you will learn the quite a bit about Public Key Infrastructure and how it is used to authenticate clients and servers. The purpose of Public Key Infrastructure

More information

Securing End-to-End Internet communications using DANE protocol

Securing End-to-End Internet communications using DANE protocol Securing End-to-End Internet communications using DANE protocol Today, the Internet is used by nearly.5 billion people to communicate, provide/get information. When the communication involves sensitive

More information

SSL BEST PRACTICES OVERVIEW

SSL BEST PRACTICES OVERVIEW SSL BEST PRACTICES OVERVIEW THESE PROBLEMS ARE PERVASIVE 77.9% 5.2% 19.2% 42.3% 77.9% of sites are HTTP 5.2% have an incomplete chain 19.2% support weak/insecure cipher suites 42.3% support SSL 3.0 83.1%

More information

Introduction to the DANE Protocol

Introduction to the DANE Protocol Introduction to the DANE Protocol ICANN 47 July 17, 2013 Internet Society Deploy360 Programme Providing real-world deployment info for IPv6, DNSSEC, routing and other Internet technologies: Case Studies

More information

Attacks against certification service providers and their ramifications

Attacks against certification service providers and their ramifications Federal IT Steering Unit FITSU Federal Intelligence Service FIS Reporting and Analysis Centre for Information Assurance MELANI www.melani.admin.ch Technological consideration Attacks against certification

More information

White Paper. Enhancing Website Security with Algorithm Agility

White Paper. Enhancing Website Security with Algorithm Agility ENHANCING WEBSITE SECURITY WITH ALGORITHM AGILITY White Paper Enhancing Website Security with Algorithm Agility Enhancing Website Security with Algorithm Agility Contents Introduction 3 Encryption Today

More information

Deploying DNSSEC: From End-Customer To Content

Deploying DNSSEC: From End-Customer To Content Deploying DNSSEC: From End-Customer To Content March 28, 2013 www.internetsociety.org Our Panel Moderator: Dan York, Senior Content Strategist, Internet Society Panelists: Sanjeev Gupta, Principal Technical

More information

DNSSEC - Why Network Operators Should Care And How To Accelerate Deployment

DNSSEC - Why Network Operators Should Care And How To Accelerate Deployment DNSSEC - Why Network Operators Should Care And How To Accelerate Deployment Dan York, CISSP Senior Content Strategist, Internet Society Eurasia Network Operators' Group (ENOG) 4 Moscow, Russia October

More information

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication

More information

DOMAIN NAME SECURITY EXTENSIONS

DOMAIN NAME SECURITY EXTENSIONS DOMAIN NAME SECURITY EXTENSIONS The aim of this paper is to provide information with regards to the current status of Domain Name System (DNS) and its evolution into Domain Name System Security Extensions

More information

Server Certificates based on DNSSEC

Server Certificates based on DNSSEC Server Certificates based on DNSSEC Audun Jøsang and Kashif Sana Dar University of Oslo josang@mn.uio.no and kashifd@ifi.uio.no Abstract. Globally unique domain names and IP addresses that are provided

More information

SSL Overview for Resellers

SSL Overview for Resellers Web Security Enterprise Security Identity Verification Services Signing Services SSL Overview for Resellers What We ll Cover Understanding SSL SSL Handshake 101 Market Opportunity for SSL Obtaining an

More information

SSL and Browsers: The Pillars of Broken Security

SSL and Browsers: The Pillars of Broken Security SSL and Browsers: The Pillars of Broken Security Ivan Ristic Wolfgang Kandek Qualys, Inc. Session ID: TECH-403 Session Classification: Intermediate SSL, TLS, And PKI SSL (or TLS, if you prefer) is the

More information

Digital certificates and SSL

Digital certificates and SSL Digital certificates and SSL 20 out of 33 rated this helpful Applies to: Exchange Server 2013 Topic Last Modified: 2013-08-26 Secure Sockets Layer (SSL) is a method for securing communications between

More information

CS5008: Internet Computing

CS5008: Internet Computing CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is

More information

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate

More information

HTTPS Inspection with Cisco CWS

HTTPS Inspection with Cisco CWS White Paper HTTPS Inspection with Cisco CWS What is HTTPS? Hyper Text Transfer Protocol Secure (HTTPS) is a secure version of the Hyper Text Transfer Protocol (HTTP). It is a combination of HTTP and a

More information

TLS and SRTP for Skype Connect. Technical Datasheet

TLS and SRTP for Skype Connect. Technical Datasheet TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security

More information

Part 5 DNS Security. SAST01 An Introduction to Information Security 2015-09-21. Martin Hell Department of Electrical and Information Technology

Part 5 DNS Security. SAST01 An Introduction to Information Security 2015-09-21. Martin Hell Department of Electrical and Information Technology SAST01 An Introduction to Information Security Part 5 DNS Security Martin Hell Department of Electrical and Information Technology How DNS works Amplification attacks Cache poisoning attacks DNSSEC 1 2

More information

SSL A discussion of the Secure Socket Layer

SSL A discussion of the Secure Socket Layer www.harmonysecurity.com info@harmonysecurity.com SSL A discussion of the Secure Socket Layer By Stephen Fewer Contents 1 Introduction 2 2 Encryption Techniques 3 3 Protocol Overview 3 3.1 The SSL Record

More information

DNS security: poisoning, attacks and mitigation

DNS security: poisoning, attacks and mitigation DNS security: poisoning, attacks and mitigation The Domain Name Service underpins our use of the Internet, but it has been proven to be flawed and open to attack. Richard Agar and Kenneth Paterson explain

More information

WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services

WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services WEB SITE SECURITY Jeff Aliber Verizon Digital Media Services 1 SECURITY & THE CLOUD The Cloud (Web) o The Cloud is becoming the de-facto way for enterprises to leverage common infrastructure while innovating

More information

A Step-by-Step guide for implementing DANE with a Proof of Concept

A Step-by-Step guide for implementing DANE with a Proof of Concept A Step-by-Step guide for implementing DANE with a Proof of Concept Sandoche BALAKRICHENAN, Stephane BORTZMEYER, Mohsen SOUISSI AFNIC R&D {sandoche.balakrichenan, stephane.bortzmeyer, mohsen.souissi}@afnic.fr

More information

Protecting Your Name on the Internet The Business Benefits of Extended Validation SSL Certificates

Protecting Your Name on the Internet The Business Benefits of Extended Validation SSL Certificates Protecting Your Name on the Internet The Business Benefits of Extended Validation SSL Certificates 2008 Copyright Godaddy. All rights Reserved Page 1 Contents 1. Where We Are Now...3 2. How SSL Certificates

More information

Security Goals Services

Security Goals Services 1 2 Lecture #8 2008 Freedom from danger, risk, etc.; safety. Something that secures or makes safe; protection; defense. Precautions taken to guard against crime, attack, sabotage, espionage, etc. An assurance;

More information

Apache Security with SSL Using Linux

Apache Security with SSL Using Linux Apache Security with SSL Using Linux These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Some SSL background

More information

BREAKING HTTPS WITH BGP HIJACKING. Artyom Gavrichenkov R&D Team Lead, Qrator Labs ag@qrator.net

BREAKING HTTPS WITH BGP HIJACKING. Artyom Gavrichenkov R&D Team Lead, Qrator Labs ag@qrator.net BREAKING HTTPS WITH BGP HIJACKING Artyom Gavrichenkov R&D Team Lead, Qrator Labs ag@qrator.net ABSTRACT OVERVIEW OF BGP HIJACKING GLOBAL AND LOCAL HIJACKING HIJACKING A CERTIFICATE AUTHORITY MITIGATIONS

More information

High-speed cryptography and DNSCurve. D. J. Bernstein University of Illinois at Chicago

High-speed cryptography and DNSCurve. D. J. Bernstein University of Illinois at Chicago High-speed cryptography and DNSCurve D. J. Bernstein University of Illinois at Chicago Stealing Internet mail: easy! Given a mail message: Your mail software sends a DNS request, receives a server address,

More information

Alternatives and Enhancements to CAs for a Secure Web

Alternatives and Enhancements to CAs for a Secure Web Alternatives and Enhancements to CAs for a Secure Web Ben Wilson Digicert, Inc. - CA/Browser Forum Eran Messeri Google Session Classification: Intermediate Current Web PKI System OS / Browsers have Managed

More information

Where every interaction matters.

Where every interaction matters. Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper

More information

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution. Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution. 1 Opening quote. 2 The topics of cryptographic key management

More information

Secure Sockets Layer (SSL) / Transport Layer Security (TLS)

Secure Sockets Layer (SSL) / Transport Layer Security (TLS) Secure Sockets Layer (SSL) / Transport Layer Security (TLS) Brad Karp UCL Computer Science CS GZ03 / M030 19 th November 2014 What Problems Do SSL/TLS Solve? Two parties, client and server, not previously

More information

Internal Server Names and IP Address Requirements for SSL:

Internal Server Names and IP Address Requirements for SSL: Internal Server Names and IP Address Requirements for SSL: Guidance on the Deprecation of Internal Server Names and Reserved IP Addresses provided by the CA/Browser Forum June 2012, Version 1.0 Introduction

More information

Why you need secure email

Why you need secure email Why you need secure email WHITE PAPER CONTENTS 1. Executive summary 2. How email works 3. Security threats to your email communications 4. Symmetric and asymmetric encryption 5. Securing your email with

More information

Apache Security with SSL Using Ubuntu

Apache Security with SSL Using Ubuntu Apache Security with SSL Using Ubuntu These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Some SSL background

More information

Websense Content Gateway HTTPS Configuration

Websense Content Gateway HTTPS Configuration Websense Content Gateway HTTPS Configuration web security data security email security Support Webinars 2010 Websense, Inc. All rights reserved. Webinar Presenter Title: Sr. Tech Support Specialist Cisco

More information

How to configure SSL proxying in Zorp 3 F5

How to configure SSL proxying in Zorp 3 F5 How to configure SSL proxying in Zorp 3 F5 June 14, 2013 This tutorial describes how to configure Zorp to proxy SSL traffic Copyright 1996-2013 BalaBit IT Security Ltd. Table of Contents 1. Preface...

More information

Lesson 10: Attacks to the SSL Protocol

Lesson 10: Attacks to the SSL Protocol Lesson 10: Attacks to the SSL Protocol Luciano Bello - luciano@debian.org Chalmers University Dr. Alfonso Muñoz - amunoz@diatel.upm.es T>SIC Group. Universidad Politécnica de Madrid Security of the SSL

More information

Integrated SSL Scanning

Integrated SSL Scanning Software Version 9.0 Copyright Copyright 1996-2008. Finjan Software Inc. and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included in this publication are the exclusive

More information

Security Digital Certificate Manager

Security Digital Certificate Manager System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure

More information

Sync Security and Privacy Brief

Sync Security and Privacy Brief Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical

More information

The Shape and Size of Threats: Defining a Networked System s Attack Surface

The Shape and Size of Threats: Defining a Networked System s Attack Surface The Shape and Size of Threats: Defining a Networked System s Attack Surface Eric Osterweil eosterweil@verisign.com Danny McPherson dmcpherson@verisign.com Lixia Zhang lixia@cs.ucla.edu Abstract As more

More information

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:

More information

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

Session Hijacking Exploiting TCP, UDP and HTTP Sessions Session Hijacking Exploiting TCP, UDP and HTTP Sessions Shray Kapoor shray.kapoor@gmail.com Preface With the emerging fields in e-commerce, financial and identity information are at a higher risk of being

More information

SSL Interception Proxies. Jeff Jarmoc Sr. Security Researcher Dell SecureWorks. and Transitive Trust

SSL Interception Proxies. Jeff Jarmoc Sr. Security Researcher Dell SecureWorks. and Transitive Trust SSL Interception Proxies Jeff Jarmoc Sr. Security Researcher Dell SecureWorks and Transitive Trust About this talk History & brief overview of SSL/TLS Interception proxies How and Why Risks introduced

More information

Understanding Digital Certificates and Secure Sockets Layer (SSL)

Understanding Digital Certificates and Secure Sockets Layer (SSL) Understanding Digital Certificates and Secure Sockets Layer (SSL) Author: Peter Robinson January 2001 Version 1.1 Copyright 2001-2003 Entrust. All rights reserved. Digital Certificates What are they?

More information

SSL Server Rating Guide

SSL Server Rating Guide SSL Server Rating Guide version 2009j (20 May 2015) Copyright 2009-2015 Qualys SSL Labs (www.ssllabs.com) Abstract The Secure Sockets Layer (SSL) protocol is a standard for encrypted network communication.

More information

Is Your SSL Website and Mobile App Really Secure?

Is Your SSL Website and Mobile App Really Secure? Is Your SSL Website and Mobile App Really Secure? Agenda What is SSL / TLS SSL Vulnerabilities PC/Server Mobile Advice to the Public Hong Kong Computer Emergency Response Team Coordination Centre 香 港 電

More information

beginners guide Beginners Guide Certificates the best decision when considering your online security options.

beginners guide Beginners Guide Certificates the best decision when considering your online security options. Beginners Guide to Digital SSL Certificates the best decision when considering your online security options. Beginners Guide to Digital SSL Certificates introduction Whether you are an individual or a

More information

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped

More information

Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience

Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Applied Technology Abstract The Web-based approach to system management taken by EMC Unisphere

More information

Securing your Online Data Transfer with SSL

Securing your Online Data Transfer with SSL Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4. What does

More information

Chapter 17. Transport-Level Security

Chapter 17. Transport-Level Security Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics

More information

BEGINNERS GUIDE BEGINNERS GUIDE TO SSL CERTIFICATES: MAKING THE BEST CHOICE WHEN CONSIDERING YOUR ONLINE SECURITY OPTIONS

BEGINNERS GUIDE BEGINNERS GUIDE TO SSL CERTIFICATES: MAKING THE BEST CHOICE WHEN CONSIDERING YOUR ONLINE SECURITY OPTIONS BEGINNERS GUIDE TO SSL CERTIFICATES: MAKING THE BEST CHOICE WHEN CONSIDERING YOUR ONLINE SECURITY OPTIONS BEGINNERS GUIDE TO SSL CERTIFICATES INTRODUCTION Whether you are an individual or a company, you

More information

Understanding Secure Shell Host Keys

Understanding Secure Shell Host Keys Understanding Secure Shell Host Keys White Paper 4848 tramway ridge dr. ne suite 101 albuquerque, nm 87111 505-332 -5700 www.vandyke.com Understanding Host Keys Think about the last time you faxed personal

More information

Integrated SSL Scanning

Integrated SSL Scanning Version 9.2 SSL Enhancements Copyright 1996-2008. Finjan Software Inc. and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included in this publication are the exclusive

More information

Compter Networks Chapter 9: Network Security

Compter Networks Chapter 9: Network Security Goals of this chapter Compter Networks Chapter 9: Network Security Give a brief glimpse of security in communication networks Basic goals and mechanisms Holger Karl Slide set: Günter Schäfer, TU Ilmenau

More information

EE 7376: Introduction to Computer Networks. Homework #3: Network Security, Email, Web, DNS, and Network Management. Maximum Points: 60

EE 7376: Introduction to Computer Networks. Homework #3: Network Security, Email, Web, DNS, and Network Management. Maximum Points: 60 EE 7376: Introduction to Computer Networks Homework #3: Network Security, Email, Web, DNS, and Network Management Maximum Points: 60 1. Network security attacks that have to do with eavesdropping on, or

More information

Security Digital Certificate Manager

Security Digital Certificate Manager IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,

More information

White paper. How to choose a Certificate Authority for safer web security

White paper. How to choose a Certificate Authority for safer web security White paper How to choose a Certificate Authority for safer web security Executive summary Trust is the cornerstone of the web. Without it, no website or online service can succeed in the competitive online

More information

ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER

ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER M-FILES CORPORATION ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER VERSION 2.3 DECEMBER 18, 2015 Page 1 of 15 CONTENTS 1. Version history... 3 2. Overview... 3 2.1. System Requirements... 3 3. Network

More information

CYBER ATTACKS EXPLAINED: THE MAN IN THE MIDDLE

CYBER ATTACKS EXPLAINED: THE MAN IN THE MIDDLE CYBER ATTACKS EXPLAINED: THE MAN IN THE MIDDLE Due to the encouraging feedback this series of articles has received, we decided to explore yet another type of cyber intrusionthe Man In The Middle (MITM)

More information

CHAPTER 7 SSL CONFIGURATION AND TESTING

CHAPTER 7 SSL CONFIGURATION AND TESTING CHAPTER 7 SSL CONFIGURATION AND TESTING 7.1 Configuration and Testing of SSL Nowadays, it s very big challenge to handle the enterprise applications as they are much complex and it is a very sensitive

More information

Implementation Vulnerabilities in SSL/TLS

Implementation Vulnerabilities in SSL/TLS Implementation Vulnerabilities in SSL/TLS Marián Novotný novotny@eset.sk ESET, spol. s r.o. Bratislava, Slovak Republic Abstract SSL/TLS protocol has become a standard way for establishing a secure communication

More information

Web Security: Encryption & Authentication

Web Security: Encryption & Authentication Web Security: Encryption & Authentication Arnon Rungsawang fenganr@ku.ac.th Massive Information & Knowledge Engineering Department of Computer Engineering Faculty of Engineering Kasetsart University, Bangkok,

More information

Certificates and network security

Certificates and network security Certificates and network security Tuomas Aura CSE-C3400 Information security Aalto University, autumn 2014 Outline X.509 certificates and PKI Network security basics: threats and goals Secure socket layer

More information

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network. Elements of Email Email Components There are a number of software components used to produce, send and transfer email. These components can be broken down as clients or servers, although some components

More information

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For Secure Socket Layer Secure Socket Layer Introduction Overview of SSL What SSL is Useful For Introduction Secure Socket Layer (SSL) Industry-standard method for protecting web communications. - Data encryption

More information

VIDEO Intypedia013en LESSON 13: DNS SECURITY. AUTHOR: Javier Osuna García-Malo de Molina. GMV Head of Security and Process Consulting Division

VIDEO Intypedia013en LESSON 13: DNS SECURITY. AUTHOR: Javier Osuna García-Malo de Molina. GMV Head of Security and Process Consulting Division VIDEO Intypedia013en LESSON 13: DNS SECURITY AUTHOR: Javier Osuna García-Malo de Molina GMV Head of Security and Process Consulting Division Welcome to Intypedia. In this lesson we will study the DNS domain

More information

How to configure HTTPS proxying in Zorp 5

How to configure HTTPS proxying in Zorp 5 How to configure HTTPS proxying in Zorp 5 June 24, 2014 This tutorial describes how to configure Zorp to proxy HTTPS traffic Copyright 1996-2014 BalaBit IT Security Ltd. Table of Contents 1. Preface...

More information

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1 Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions

More information

Securing LAN Connected Devices in Industrial Sites with TLS and Multicast DNS

Securing LAN Connected Devices in Industrial Sites with TLS and Multicast DNS Securing LAN Connected Devices in Industrial Sites with TLS and Multicast DNS Tero Keski-Valkama May 28, 2015 Version 1.0 Abstract This whitepaper outlines a more flexible and more secure user interface

More information

Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application INDEX 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4.

More information

Transport Layer Security Protocols

Transport Layer Security Protocols SSL/TLS 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally designed to by Netscape to secure HTTP Version 2 is being replaced by version 3 Subsequently became Internet Standard known

More information

ITL BULLETIN FOR JULY 2012. Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance

ITL BULLETIN FOR JULY 2012. Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance ITL BULLETIN FOR JULY 2012 Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance Paul Turner, Venafi William Polk, Computer Security Division, Information

More information

Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce. Domain Name System

Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce. Domain Name System Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce 18/02/15 Networks: DNS attacks 1 Domain Name System The domain name system (DNS) is an applica>on- layer protocol

More information

DNS Security FAQ for Registrants

DNS Security FAQ for Registrants DNS Security FAQ for Registrants DNSSEC has been developed to provide authentication and integrity to the Domain Name System (DNS). The introduction of DNSSEC to.nz will improve the security posture of

More information

SSL EXPLAINED SSL EXPLAINED

SSL EXPLAINED SSL EXPLAINED 1 Table of Contents Introduction... 3 What is SSL?... 4 How does SSL work?... 7 Google & SSL... 11 SSL/TLS... 13 Web Filtering SSL... 14 About Lightspeed Systems... 26 2 Introduction SSL is a challenge

More information

The Benefits of SSL Content Inspection ABSTRACT

The Benefits of SSL Content Inspection ABSTRACT The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic

More information

BEGINNER S GUIDE TO SSL CERTIFICATES: Making the best choice when considering your online security options

BEGINNER S GUIDE TO SSL CERTIFICATES: Making the best choice when considering your online security options BEGINNER S GUIDE TO SSL CERTIFICATES: Making the best choice when considering your online security options BEGINNERS GUIDE TO SSL CERTIFICATES Introduction Whether you are an individual or a company, you

More information

WHY YOU NEED AN SSL CERTIFICATE Introduction

WHY YOU NEED AN SSL CERTIFICATE Introduction WHY YOU NEED AN SSL CERTIFICATE Introduction People are getting smart about online security. More and more of them are looking for the padlock icon, the https prefix and a green address bar in their browser

More information

Certificate Management. PAN-OS Administrator s Guide. Version 7.0

Certificate Management. PAN-OS Administrator s Guide. Version 7.0 Certificate Management PAN-OS Administrator s Guide Version 7.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us

More information

The Domain Name System from a security point of view

The Domain Name System from a security point of view The Domain Name System from a security point of view Simon Boman Patrik Hellström Email: {simbo105, pathe321}@student.liu.se Supervisor: David Byers, {davby@ida.liu.se} Project Report for Information Security

More information

Topics in Network Security

Topics in Network Security Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure

More information

[SMO-SFO-ICO-PE-046-GU-

[SMO-SFO-ICO-PE-046-GU- Presentation This module contains all the SSL definitions. See also the SSL Security Guidance Introduction The package SSL is a static library which implements an API to use the dynamic SSL library. It

More information

Should You Trust the Padlock? Web Security and the HTTPS Value Chain. Keeping Current 20 November 2013 Ken Calvert

Should You Trust the Padlock? Web Security and the HTTPS Value Chain. Keeping Current 20 November 2013 Ken Calvert Should You Trust the Padlock? Web Security and the HTTPS Value Chain Keeping Current 20 November 2013 Ken Calvert Outline 1. What are we afraid of? 2. Countermeasures: Securing the Web 3. Public-key Crypto

More information

DNSSEC. What is DNSSEC? Why is DNSSEC necessary? Ensuring a secure Internet

DNSSEC. What is DNSSEC? Why is DNSSEC necessary? Ensuring a secure Internet SEC Ensuring a secure Internet What is SEC? SEC is an extension of the Domain Name System (), that ensures the authenticity and integrity of the data in replies. Technical measures have been implemented

More information

How to configure SSL proxying in Zorp 6

How to configure SSL proxying in Zorp 6 How to configure SSL proxying in Zorp 6 April 17, 2015 Abstract This tutorial describes how to configure Zorp to proxy SSL traffic Copyright 1996-2015 BalaBit IT Security Ltd. Table of Contents 1. Preface...

More information

Vulnerabilità dei protocolli SSL/TLS

Vulnerabilità dei protocolli SSL/TLS Università degli Studi di Milano Facoltà di Scienze Matematiche, Fisiche e Naturali Dipartimento di Informatica e Comunicazione Vulnerabilità dei protocolli SSL/TLS Andrea Visconti Overview Introduction

More information

Introduction to Network Security Key Management and Distribution

Introduction to Network Security Key Management and Distribution Introduction to Network Security Key Management and Distribution Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of Science and Technology cetinkayae@mst.edu http://web.mst.edu/~cetinkayae/teaching/cpe5420fall2015

More information

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Overview of CSS SSL. SSL Cryptography Overview CHAPTER CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers

More information

Introduction. Purpose. Background. Details

Introduction. Purpose. Background. Details Introduction Recent media reports confirm that Secure Socket Layer (SSL) 3.0 is obsolete and insecure. This report provides guidance on how to ensure your communications use the more secure Transport Layer

More information

DNSSEC Applying cryptography to the Domain Name System

DNSSEC Applying cryptography to the Domain Name System DNSSEC Applying cryptography to the Domain Name System Gijs van den Broek Graduate Intern at SURFnet Overview First half: Introduction to DNS Attacks on DNS Second half: DNSSEC Questions: please ask! DNSSEC

More information

APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10)

APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10) APNIC elearning: Network Security Fundamentals 20 March 2013 10:30 pm Brisbane Time (GMT+10) Introduction Presenter/s Nurul Islam Roman Senior Training Specialist nurul@apnic.net Specialties: Routing &

More information

WPAD TECHNOLOGY WEAKNESSES. Sergey Rublev Expert in information security, "Positive Technologies" (srublev@ptsecurity.ru)

WPAD TECHNOLOGY WEAKNESSES. Sergey Rublev Expert in information security, Positive Technologies (srublev@ptsecurity.ru) WPAD TECHNOLOGY WEAKNESSES Sergey Rublev Expert in information security, "Positive Technologies" (srublev@ptsecurity.ru) MOSCOW 2009 CONTENTS 1 INTRODUCTION... 3 2 WPAD REVIEW... 4 2.1 PROXY AUTO CONFIGURATION

More information

Securing VMware View Communication Channels with SSL Certificates TECHNICAL WHITE PAPER

Securing VMware View Communication Channels with SSL Certificates TECHNICAL WHITE PAPER Securing VMware View Communication Channels with SSL Certificates TECHNICAL WHITE PAPER Table of Contents About VMware View.... 3 Changes in VMware View 5.1.... 3 SSL Authentication Mechanism.... 4 X.509

More information

Email Encryption. Administrator Guide

Email Encryption. Administrator Guide Email Encryption Administrator Guide Email Encryption Administrator Guide Documentation version: 1.0 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo,

More information

One year of DANE Tales and Lessons Learned. sys4.de

One year of DANE Tales and Lessons Learned. sys4.de One year of DANE Tales and Lessons Learned sys4.de DANE secures Security Why secure Security? Encryption Models Opportunistic Encryption > Expect anything > Proceed if absent > Try if offered > Proceed

More information

Extended SSL Certificates

Extended SSL Certificates Introduction Widespread usage of internet has led to the growth of awareness amongst users, who now associate green address bar with security. Though people are able to recognize the green bar, there is

More information