Sponsored by the Alliance for Telecommunications Industry Solutions. Generic Guidelines for the use of TCP/IP in Electronic Bonding

Size: px
Start display at page:

Download "Sponsored by the Alliance for Telecommunications Industry Solutions. Generic Guidelines for the use of TCP/IP in Electronic Bonding"

Transcription

1 Sponsored by the Alliance for Telecommunications Industry Solutions Generic Guidelines for the use of TCP/IP in Electronic Bonding TCIF Issue 1 12/08/1999

2 Copyright TCIF Guideline Use of TCP/IP in Electronic Bonding Generic Guidelines for use of TCP/IP in Electronic Bonding Prepared for TCIF by the Electronic Communications Implementation Committee. For more information about TCIF, go to To order this document, please contact TCIF at (202) , FAX (202) If you have questions or comments about this document, please contact: Alliance for Telecommunication Industry Solutions 1200 G St. NW, Suite 500 Washington, D.C (phone) (fax) Copyright 1999 ATIS. This document is printed and distributed by the Alliance for Telecommunications Industry Solutions ("ATIS") on behalf of the Telecommunications Industry Forum ("TCIF"). Participants in TCIF are hereby authorized to reproduce this document and distribute it within their own business organizations and to others for TCIFrelated business provided that this notice continues to appear in the reproduced documentation. Reproduction and distribution for resale is prohibited. TCIF Issue 1 Page 2 12/08/1999

3 TCIF Guideline Use of TCP/IP in Electronic Bonding Contents Table of Contents 1 Purpose Scope Access Architecture and Standards Access Topology Options Physical and Data Link Layers Configuration Requirements Network Interoperability Protocol Interoperability Bandwidth and Scalability Configuration Requirements TCP versus OSI Transport Class TP TCP/IP Security Security for EDI over TCP/IP Security for CMIP Over TCP/IP Upper Layer Security Peer Entity Authentication Data Origin Authentication Whole PDU Protection Security for CORBA Over TCP/IP References...14 List of Figures Figure 1. Applicable Protocol Standards for EB over TCP/IP...6 Figure 2. Applicable Protocol Standards for CORBA over TCP/IP...6 Figure 3. Applicable Protocol Standards for EDI over TCP/IP...7 Figure 4. Applicable Protocol Standards for CMIP over TCP/IP...8 Figure 5. Sample Network Topology for EB over TCP/IP...9 Issue 1 TCIF /08/1999 Page 3

4 List of Acronyms TCIF Guideline Use of TCP/IP in Electronic Bonding List of Acronyms ACSE Association Control Service Element ANSI American National Standards Institute ATIS Alliance for Telecommunication Industry Solutions CA Certification Authority CBC Cipher Block Chaining CMIP Common Managed Information Protocol CMISE Common Management Information Service Element CORBA Common Object Request Broker Architecture DES Digital Encryption Standard EB Electronic Bonding IETF Internet Engineering Task Force IIOP Internet Inter ORB Protocol IP Internet Protocol ISO International Organization for Standardization ITU International Telecommunications Union ITU-T International Telecommunications Union Telecommunications MD Message Digest OAM&P Operation, Administration, Maintenance and Provisioning ORB Object Request Broker OSI Open Systems Interconnection ROSE Remote Operation Service Element RSA Rivest Shamir Adelman SHA Secure Hash Algorithm SNI Subscriber Network Interface SSL3 Secure Socket Layer version 3 TCIF Telecommunications Industry Forum TCP Transmission Connection Protocol TLS Transaction Layer Security TCIF Issue 1 Page 4 12/08/1999

5 TCIF Guideline Purpose Use of TCP/IP in Electronic Bonding 1 1 Purpose The purpose of this document is to outline a recommendation for the use of TCP/IP as a generic transport for Electronic Bonding (EB) Gateways as proposed by the ITU-T in standards Q.811 and Q.812. It is intended that this recommendation be used for any application level gateway. This includes (but is not limited to) those gateways using EDI (ANSI X12), CORBA, or CMIP at the application layer. This recommendation incorporates and supercedes the two previous TCIF Connectivity documents (TCIF Lower Layer Protocol Specifications for EDI over TCP/IP, TCIF Lower Layer Protocol Specifications for CMIP over TCP/IP ). It is intended that any future changes to recommendations for connectivity using TCP/IP will be made as updates to this current document. 2 Scope This document provides for the addition of TCP/IP (Internet Engineering Task Force RFCs 793, 791) for use as a generic transport for any Electronic Bonding application as specified in ITU-T Q.811/Q Access Architecture and Standards This document supports the implementation of protocol stacks that use TCP/IP. Stacks may differ slightly depending on what is running at the application layer. The following figures present protocol stacks currently supported by this document. Applicable connectivity standards are referenced in each case for the four lower layers. Future TCP/IP based applications will be addressed as the need arises. Figure 1 depicts a generic protocol stack for connecting Electronic Bonding Gateways over TCP/IP. If CMIP is used in the Application Layer then RFC 1006 is included in the transport layer. TLS (RFC 2246) is used for security. For those implementations still using SSL3 it is recommended that they consider upgrading to TLS. More specifics can be found in the example protocol stacks below. Issue 1 TCIF /08/1999 Page 5

6 Access Architecture & Standards TCIF Guideline 3 Use of TCP/IP in Electronic Bonding Application Layer Presentation Layer Session Layer Transport Layer SSL3 or TLS RFC 2246 RFC1006 for CMIP TCP RFC 793 Network Layer IP RFC 791 Data Link Layer LLC, ATM, X.25, ISDN, Frame Relay, SMDS Physical Layer Ethernet, Token Ring, FDDI, SNI, V.35, SONET, RS-449, EIA-232D Figure 1. Applicable Protocol Standards for EB over TCP/IP Figure 2 depicts the protocol stack recommended for CORBA over TCP/IP. Security options include SSL3 or TLS (see section 6 for more details). CORBA incorporates GIOP (Generic Inter-ORB Protocol) and IIOP (Internet Inter-ORB Protocol) to allow for communication over TCP/IP. Document TCIF , CORBA Implementation Profile for Electronic Communications contains additional information on GIOP and IIOP. Application Layer (CORBA, GIOP, IIOP) Transport Layer SSL3 or TLS RFC 2246 TCP RFC 793 Network Layer IP RFC 791 Data Link Layer LLC, ATM, X.25, ISDN, Frame Relay, SMDS Physical Layer Ethernet, Token Ring, FDDI, SNI, V.35, SONET, RS-449, EIA-232D Figure 2. Applicable Protocol Standards for CORBA over TCP/IP TCIF Issue 1 Page 6 12/08/1999

7 TCIF Guideline Access Architecture & Standards Use of TCP/IP in Electronic Bonding 3 Figure 3 depicts a protocol stack for running an EDI application gateway over TCP/IP. In this case the Interactive Agent (defined in TCIF ) runs above the transport layer. The Interactive Agent provides session layer functionality for EDI. It can also provide nonrepudiation and/or whole message integrity protection. As in figure 1, SSL3 or TLS provide security at the transport layer. Upper Layer EDI (ANSI X12) IA -Interactive Agent Transport Layer SSL3 or TLS RFC 2246 TCP RFC 793 Network Layer IP RFC 791 Data Link Layer LLC, ATM, X.25, ISDN, Frame Relay, SMDS Physical Layer Ethernet, Token Ring, FDDI, SNI, V.35, SONET, RS-449, EIA-232D Figure 3. Applicable Protocol Standards for EDI over TCP/IP Figure 4 depicts a protocol stack running CMIP over TCP/IP in accordance with RFC Note that T1.256 is simply an example of an application that could be used with this protocol stack. The stack is applicable to any CMIP-based application layer standard. Issue 1 TCIF /08/1999 Page 7

8 Access Architecture & Standards TCIF Guideline 3 Use of TCP/IP in Electronic Bonding ANSI T1.256 (PROVISIONING) CMISE/CMIP ISO 9595/9596 ACSE ISO 8649/8650. ROSE, STASE ROSE Presentation Layer ISO 8822/8823 Basic encoding rules (BER) ISO 8825 Session Layer ISO 8326/8327 Transport Layer RFC1006 SSL3 or TLS RFC 2246 TCP RFC 793 Network Layer IP RFC 791 Data Link Layer LLC, ATM, X.25, ISDN, Frame Relay, SMDS Physical Layer Ethernet, Token Ring, FDDI, SNI,V.35,SONET, RS- 449, EIA-232D Figure 4. Applicable Protocol Standards for CMIP over TCP/IP 4 Access Topology Options Figure 5 shows a typical TCP/IP based configuration. For the purpose of this document the encryption devices should be considered optional; their use is dependent on the nature of the application data to be exchanged. The use of firewalls (screening routers or proxy servers) is highly recommended. Routers are required for an internetwork based connection. The router or firewall must allow the specified TCP port on which application traffic is to pass. Point to point connections are also possible using this protocol stack. If the application layer is running CMIP, then the transport layer will have to be compliant with RFC 1006 as well as RFC 793. If the application layer is running EDI, then the Interactive Agent, as specified in TCIF , Electronic Communications Interactive Agent Functional Specifications", must be running above the transport layer. TCIF Issue 1 Page 8 12/08/1999

9 TCIF Guideline Access Topology Options Use of TCP/IP in Electronic Bonding 4 Application Layer Presentation Layer Interactive Agent Transport Session Layer SSL3 or TLS TCP RFC 793 (RFC 1006) Network Layer IP RFC 791 Data Link Layer LLC, ATM, X.25, ISDN, Frame Relay, SMDS Physical Layer Ethernet, Token Ring, FDDI, SNI, V.35, Sonet, RS-449, EIA232D Application Layer Presentation Layer Interactive Agent Transport Session Layer SSL3 or TLS TCP RFC 793 (RFC 1006) Network Layer IP RFC 791 Data Link Layer LLC, ATM, X.25, ISDN, Frame Relay, SMDS Physical Layer Ethernet, Token Ring, FDDI, SNI, V.35, Sonet, RS-449, EIA232D Screening Router (Firewall) Point to Point or Internetwork Connection Screening Router (Firewall) Figure 5. Sample Network Topology for EB over TCP/IP 4.1 Physical and Data Link Layers As depicted in Figure 5, the physical and data link layers of the protocol stack may be chosen from a large number of alternatives when using TCP/IP, depending on throughput requirements. The TCP/IP protocol stack may be run over, for example Frame Relay, FDDI, ATM, X.25, SMDS, Token Ring or Token Bus topologies, and over point to point T1. The choice of lower layers should be made by each company, or pair of bonded companies, based on their internal policies and throughput requirements. 5 Configuration Requirements 5.1 Network Interoperability Any network supporting TCP/IP will work. This includes dedicated circuits (e.g. 9.6 kbps, 56 kbps, 256 kbps, T1-T3, etc) and the Internet. 5.2 Protocol Interoperability IPv4 is the version of IP currently deployed worldwide. It has been in existence and utilized for the past twelve years. This document recommends the use of IPv4 for Electronic Bonding applications. Issue 1 TCIF /08/1999 Page 9

10 Configuration Requirements TCIF Guideline 5 Use of TCP/IP in Electronic Bonding Currently, IPv6 is being developed and will be deployed world wide to provide additional functionality to IP users (see IETF RFC 1752). It is expected that IPv6 will be incorporated into Electronic Bonding implementation guidelines when IPv6 becomes widely available. 5.3 Bandwidth and Scalability The bandwidth supported by TCP/IP ranges from a few kbps to gigabits per second. A T1 for each interface will allow more than adequate bandwidth for current needs and growth. To increase network capacity, a larger pipe such as a T3 can be put into place without affecting the architecture of an Electronic Bonding gateway. In fact one of the primary benefits of the use of TCP/IP is the ease of changing the data link layer to provide the necessary throughput. 5.4 Configuration Requirements Stacks utilizing TCP/IP are available from several suppliers. Specific configuration requirements are a joint implementation issue for negotiation between implementing companies. 5.5 TCP versus OSI Transport Class TP-4 This section addresses the concern regarding the use of RFC 1006 with TP-0. RFC 1006 uses only transport class TP-0 at this time. This does not pose a problem for Electronic Bonding because RFC 1006 is implemented on top of TCP and TCP provides the same functionality as transport class TP-4 as indicated in Table 1. 6 TCP/IP Security Functions TP-4 TCP Flow control x x Window Management x x Handles recovery x x Error detection x x TABLE 1 Two communicating trading partners can agree on any level of security for their mutual interface and on any method for supporting the agreed-upon level of security. This section offers complete and detailed guidelines for an adequate level of security for Electronic Bonding applications. The security specified in these guidelines is based on the Transport Layer Security (TLS) standard developed by the Internet Engineering Task Force (IETF). For those implementations still using SSL3 it is recommended that they consider upgrading to TLS. The selection of TLS is based, in part, on the following assumptions and considerations: Electronic Bonding transactions can be carried directly over TCP/IP. Inclusion of TLS between the Electronic Bonding gateway application and TCP (Transport Control Protocol) does not impact the gateway application (with the possible exception of a configuration change such as different port number). In the course of a session: 1. The application instructs TCP to establish a connection, which it does TCIF Issue 1 Page 10 12/08/1999

11 TCIF Guideline TCP/IP Security Use of TCP/IP in Electronic Bonding 6 2. The application instructs TLS to establish a secure connection, which it does through the TLS handshaking mechanism 3. Electronic Bonding gateway messages are typically handed over to TLS using a TLS toolkit Application Programming Interface (API). These messages may be fragmented or combined by TLS, subjected to security transformations, delivered to the receiver. At the receiver the security transformations are reversed and/or verified, the original Electronic Bonding gateway messages are reconstructed and delivered to the TLS client. Transport Layer Security shall be used to secure Electronic Bonding gateway transactions with the following guidelines: Strong peer entity authentication, based on public key encryption shall be provided for all associations (this precludes interoperability with SSL2) Session secret shall be encrypted with receiver s public key Message encryption is optional SHA1 shall be used for integrity by TLS If privacy protection by TLS is chosen, then TDES (Triple Data Encryption Standard) in the EDE/CBC (Encrypt-Decrypt-Encrypt/Cipher Block Chaining) mode shall be used for symmetric key encryption. Alternatively, DES in the CBC mode may be used, but companies should be aware that this introduces more vulnerability, as there is a known attack on this encryption method Every participant is required to obtain a public key certificate from a CA acceptable to the communicating parties Message integrity and non-repudiation shall be computed on clear text (unencrypted) messages, Entity public key size shall be at least 1024 bits Certification Authority s public key size shall be at least 2048 bits Certificates shall be X.509 version 3. The following cipher suites will be supported: RSA_NULL_SHA1 (if no privacy protection is desired) RSA_DES CBC_SHA1 (if privacy protection is desired) Resumable sessions do not present any additional threat 6.1 Security for EDI over TCP/IP EDI transactions can be carried directly over TCP/IP. Inclusion of TLS between EDI and TCP does not impact EDI (with the possible exception of a configuration change such as different port number). In the course of a session, the application instructs TCP to establish a connection, which it does. The application instructs TLS to establish a secure connection, which it does through the TLS handshaking protocol. EDI messages are handed over to TLS using a TLS toolkit Application Programming Interface (API). These messages may be fragmented or combined by TLS, subjected to security transformations, and delivered to the receiver. At the receiver the security transformations are reversed, the original EDI messages are reconstructed and delivered to the TLS client. Non-repudiation or message integrity can be provided under EDI by the Interactive Agent (IA). If the IA provides message integrity, it shall use SHA1 to produce the message digest (MD). If the IA provides non-repudiation, it shall compute the message digest of the EDI Issue 1 TCIF /08/1999 Page 11

12 TCP/IP Security TCIF Guideline 6 Use of TCP/IP in Electronic Bonding data using the SHA1 digest algorithm and then digitally sign the message by applying the RSA signature algorithm to the digest. 6.2 Security for CMIP Over TCP/IP This section specifies the security measures to be provided over the Electronic Bonding CMIP/TCP/IP interface. When CMIP is carried over TCP/IP it can use TLS for security. In this case the application must instruct TLS to establish a secure connection before invoking ACSE to establish the association. TLS should be used with the same specifications as provided at the beginning of Section 6 of this document. In addition, further security measures can be provided in the upper layers of the protocol stack. They are included here for reference. Three types of security features are addressed in this document: External encryption devices IP network layer security Upper layer security External encryption devices (hardware or software) can be interposed between each of the communicating systems and the network. Their use and configuration are dependent on joint implementation agreements between bonded companies. IP security is provided through firewalls. It is recommended that firewalls be deployed to provide functionality analogous to Closed User Groups in X.25 networks. Upper Layer security is discussed in more detail below Upper Layer Security This document addresses the security of TMN management messages exchanged over the TMN X interface. It offers three levels of security: 1. Peer entity authentication 2. Data origin authentication 3. Whole Protocol Data Unit (PDU) protection. Which of the three levels of security is to be used is application dependent. However, this document specifies the following: Peer entity authentication shall always be provided. In addition data origin authentication or whole PDU protection shall be provided. Data origin authentication shall not be used if whole PDU protection is provided. Indeed, the mechanisms for whole PDU protection specified in this document implicitly provide data origin authentication. This document supports five types of whole PDU protection: confidentiality integrity non-repudiation confidentiality with non-repudiation confidentiality with integrity. TCIF Issue 1 Page 12 12/08/1999

13 TCIF Guideline TCP/IP Security Use of TCP/IP in Electronic Bonding 6 It is application dependent which of those five, if any, to use during any given association. Access control is a major component of security, however implementation of access control is a local matter that does not affect interoperability, it is therefore not discussed in this document. (For a discussion of access control and access control management in the TMN see ANSI T1.261.) Peer Entity Authentication For peer entity authentication both the initiator and the responder of an association will use the authenticator described in T1.259, it shall be carried in the Authentication Functional Unit of the ACSE AARQ and AARE messages respectively. The (optional) publicly encrypted symmetric encryption keys in the AARQ and AARE messages can be different, allowing the initiator and the responder of the association to use different keys in the course of the association Data Origin Authentication This document specifies data origin authentication only for CMIP PDUs that have the access control field, i.e., m-get, m-set, m-create, m-delete, and m-action. Data origin authentication shall be provided by putting an authenticator in the CMIP access control field. The authenticator shall consist of: the unique identity of the sender an Initialization Vector (IV) an encrypted string consisting of a time stamp followed by a sequence number encrypted with a shared symmetric encryption key. The authenticator is fully specified in T1 Technical Report Number Whole PDU Protection Protection of whole PDUs, when desired, shall be accomplished by using STASE-ROSE (T ). STASE-ROSE protects ROSE PDUs by applying selected security transformations (ST) to whole ROSE PDUs encoded with the Distinguished Encoding Rules (DER). The use of STASE-ROSE shall be as specified in ANSI T Security for CORBA Over TCP/IP Two communicating trading partners can agree on any level of security for their mutual interface and on any method for supporting the agreed level of security. This document offers complete and detailed guidelines for the use of TLS to protect CORBA messages. The security specified in these guidelines is based on the Transport Layer Security (TLS) standard developed by the Internet Engineering Task Force (IETF). For those implementations still using SSL3 it is recommended that they consider upgrading to TLS. The selection of TLS is based, in part, on the following considerations: Issue 1 TCIF /08/1999 Page 13

14 TCP/IP Security TCIF Guideline 6 Use of TCP/IP in Electronic Bonding CORBA IIOP transactions can be carried directly over TCP/IP. inclusion of TLS between IIOP and TCP (Transport Control Protocol) does not impact IIOP (with the possible exception of a different port number). in the course of a session IIOP messages are handed over to TLS. These messages may be fragmented or combined by TLS, subjected to security transformations, delivered to the receiver. At the receiver the security transformations are reversed, the original IIOP messages are reconstructed. Transport layer Security (TLS) shall be used to secure IIOP transactions with the following guidelines: Strong peer entity authentication, based on public key encryption shall be provided for all associations (this precludes interoperability with SSL2) Session secret shall be encrypted with receiver s public key Message encryption is optional SHA1 shall be used for integrity by TLS Non-repudiation or message integrity can be provided, optionally, by higher layers. If privacy protection by TLS is chosen, than TDES (Triple Data Encryption Standard) in the EDE/CBC (Encrypt-Decrypt-Encrypt/Cipher Block Chaining) mode shall be used for symmetric key encryption. Alternatively, DES in the CBC mode may be used, but companies should be aware that this introduces more vulnerability, as there is a known attack on this encryption method Every participant is required to obtain a public key certificate from a CA acceptable to the communicating parties Message integrity and non-repudiation shall be computed on clear text (unencrypted) messages, Entity public key size shall be at least 1024 bits Certification Authority s public key size shall be at least 2048 bits Certificates shall be X.509 version 3. The following ciphersuites will be supported: RSA, NULL, SHA1 (if no privacy protection is desired) RSA, DES - CBC, SHA1 (if privacy protection is desired) Resumable session If non-repudiation protection is needed for CORBA transactions then Telecommunications Non-repudiation Inter-ORB Protocol (TCIF####) shall be used. 7 References TCIF - Telecommunications Industry Forum primarily develops technology specific implementation guidelines for use within the industry to realize a variety of intercommunication services. TCIF Issue 1 Page 14 12/08/1999

15 TCIF Guideline References Use of TCP/IP in Electronic Bonding 7 TCIF Electronic Communications Interactive Agent Functional Specification ISO - The International Organization for Standardization is a worldwide federation of national standards bodies from over 130 countries. The mission of ISO is to promote the development of standardization and related activities in the world with a view to facilitating the international exchange of goods and services, and to developing cooperation in the spheres of intellectual, scientific, technological and economic activity. In the context of this document, technology specified in the following ISO/IEC common text publication is incorporated herein by reference: ISO/IEC 8072:1996 Information technology Open systems interconnection Transport service definition ISO/IEC 8073:1997 Information technology Open Systems Interconnection Protocol for providing the connection-mode transport service ISO/IEC 8326:1996 Information technology Open Systems Interconnection Session service definition ISO/IEC :1996 Information technology Open Systems Interconnection Connection-oriented Session protocol: Protocol specification ISO/IEC 8649:1996 Information technology Open Systems Interconnection Service definition for the Association Control Service Element ISO/IEC :1996 Information technology Open Systems Interconnection Connection-oriented protocol for the Association Control Service Element: Protocol specification ISO/IEC :1996 [ANSI/IEEE Std , 1996 Edition] Information Technology Telecommunications and information exchange between systems Local and metropolitan area networks Specific requirements Part 3: Carrier sense multiple access with collision detection (CSMA/CD) access method and physical layer specification ISO/IEC 8822:1994 Information technology Open Systems Interconnection Presentation service definition ISO/IEC :1994 Information technology Open Systems Interconnection Connection-oriented presentation protocol: Protocol specification ISO/IEC :1995 Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) ISO/IEC 9595:1991 Information technology Open systems Interconnection -- Common management information service definition ISO/IEC :1991 Information technology Open Systems Interconnection Common management information protocol -- Part 1: Specification ANSI - The American National Standards Institute or ANSI is the coordinator and clearinghouse for national standards in the United States. ANSI does not write national standards, it charters organizations called 'Accredited Standards Committees' or ASCs, composed of voluntary representatives from industry, labor, consumer, and government to prepare consensus standards. Upon public comment and approval, ANSI ASCs publish national standards. Issue 1 TCIF /08/1999 Page 15

16 References TCIF Guideline 7 Use of TCP/IP in Electronic Bonding ANSI T OAM&P - Model for Interface Across Jurisdictional Boundaries to Support Electronic Access Service Ordering: Inquiry Function ANSI T STASE-ROSE ANSI T OAM&P - Security for TMN Management Transactions over the TMN Q3 Interface Accredited Standards Committee T1 This committee produces standards for the telecommunications industry. It is accredited by ANSI. T1 TR No. 40 May Security Requirements for Electronic Bonding Between Two TMNs Accredited Standards Committee (ASC) X12 of ANSI This committee is chartered to develop the structure, format, and content of electronic business transactions conducted through Electronic Data Interchange (EDI). This document incorporates, by reference, the various EDI standards produced by this committee IETF - Internet Engineering Task Force RFC 0791 Internet Protocol. RFC 0793 Transmission Control Protocol RFC 1883: Internet Protocol, Version 6 (IPv6) Specification RFC 1006: ISO transport services over TCP: Version: 3 Internet Draft; The SSL Protocol, Version 3.0; Freier, et al.; November 18, 1996 Internet Draft; The TLS Protocol, Version 1.0; Dierks, et al.; March 6, 1997 Note: TLS is currently an Internet Draft. Once it has been adopted as a formal standard, it is intended to supersede and replace the de facto standard - SSL3. Netscape Communications Corporation developed the original specification for SSL3 and contributed it to the IETF. ITU-T - The International Telecommunication Union (ITU) is a treaty based organization operating under the auspices of UNICEF (a branch of the United Nations). The ITU s primary mission is to study, promote, initiate and design global telecommunication services and technology to improve the quality of life for all of the world s inhabitants. During the World Telecommunication Service Conference (WTSC) of 1991, it was reorganized into three sectors: the Technology sector (titled ITU-T), Radio sector (titled ITU-R) and the Telecom Service Bureau sector (titled ITU-TSB) to handle administrative and publication matters. In the context of this document, technology specified in the following ITU and ISO/IEC common text publications are incorporated herein by reference: Rec. Q.811 (1997) Lower layer protocol profiles for the Q3 and X interfaces Rec. Q.812 (1997) Upper layer protocol profiles for the Q3 and X interfaces Rec. X.25 (1996) Interface between Data Terminal Equipment (DTE) and Data Circuit-terminating Equipment (DCE) for terminals operating in the packet mode and connected to public data networks by dedicated circuit TCIF Issue 1 Page 16 12/08/1999

ITU-T Q.812. Amendment 3 (02/00) Protocol profile for electronic communications interactive agent Amendment 3:

ITU-T Q.812. Amendment 3 (02/00) Protocol profile for electronic communications interactive agent Amendment 3: INTERNATIONAL TELECOMMUNICATION UNION ITU-T Q.812 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU Amendment 3 (02/00) SERIES Q: SWITCHING AND SIGNALLING Specifications of signalling system no. 7 Q3 interface

More information

Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999

Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999 Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer February 3, 1999 Frame Relay Frame Relay is an international standard for high-speed access to public wide area data networks

More information

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining

More information

Introduction to Security and PIX Firewall

Introduction to Security and PIX Firewall Introduction to Security and PIX Firewall Agenda Dag 28 Föreläsning LAB PIX Firewall VPN A Virtual Private Network (VPN) is a service offering secure, reliable connectivity over a shared, public network

More information

Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012 Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret

More information

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1 Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions

More information

Communication Security for Applications

Communication Security for Applications Communication Security for Applications Antonio Carzaniga Faculty of Informatics University of Lugano March 10, 2008 c 2008 Antonio Carzaniga 1 Intro to distributed computing: -server computing Transport-layer

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure

More information

INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang

INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang INF3510 Information Security University of Oslo Spring 2011 Lecture 9 Communication Security Audun Jøsang Outline Network security concepts Communication security Perimeter security Protocol architecture

More information

mod_ssl Cryptographic Techniques

mod_ssl Cryptographic Techniques mod_ssl Overview Reference The nice thing about standards is that there are so many to choose from. And if you really don t like all the standards you just have to wait another year until the one arises

More information

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY) E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system

More information

Web Security Considerations

Web Security Considerations CEN 448 Security and Internet Protocols Chapter 17 Web Security Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University mdahshan@ccis.ksu.edu.sa

More information

Chapter 17. Transport-Level Security

Chapter 17. Transport-Level Security Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics

More information

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various

More information

TLS and SRTP for Skype Connect. Technical Datasheet

TLS and SRTP for Skype Connect. Technical Datasheet TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security

More information

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead

More information

Protocol Data Units and Encapsulation

Protocol Data Units and Encapsulation Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing

More information

Network Security Part II: Standards

Network Security Part II: Standards Network Security Part II: Standards Raj Jain Washington University Saint Louis, MO 63131 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 18-1 Overview

More information

WEB Security & SET. Outline. Web Security Considerations. Web Security Considerations. Secure Socket Layer (SSL) and Transport Layer Security (TLS)

WEB Security & SET. Outline. Web Security Considerations. Web Security Considerations. Secure Socket Layer (SSL) and Transport Layer Security (TLS) Outline WEB Security & SET (Chapter 19 & Stalling Chapter 7) Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction (SET) Web Security Considerations

More information

Chapter 9. IP Secure

Chapter 9. IP Secure Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.

More information

Chapter 18. Network Management Basics

Chapter 18. Network Management Basics Network Management Basics > FCAPS Model Chapter 18. Network Management Basics This chapter covers the following topics: FCAPS Model Network Management Architecture Network Management Protocols An Introduction

More information

OSI Protocols. Background. Technology Basics. Media Access CHAPTER

OSI Protocols. Background. Technology Basics. Media Access CHAPTER CHAPTER 20 OSI Protocols Background In the early days of intercomputer communication, networking software was created in a haphazard, ad hoc fashion. When networks grew sufficiently popular, the need to

More information

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected

More information

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Overview of CSS SSL. SSL Cryptography Overview CHAPTER CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers

More information

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES Table of contents 1.0 SOFTWARE 1 2.0 HARDWARE 2 3.0 TECHNICAL COMPONENTS 2 3.1 KEY MANAGEMENT

More information

CSCI 362 Computer and Network Security

CSCI 362 Computer and Network Security The Purpose of ing CSCI 362 Computer and Security Introduction to ing Goals: Remote exchange and remote process control. A few desirable properties: Interoperability, Flexibility, Geographical range, Scalability,

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009 16 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009 1 25 Organization Welcome to the New Year! Reminder: Structure of Communication Systems lectures

More information

Security. Learning Objectives. This module will help you...

Security. Learning Objectives. This module will help you... Security 5-1 Learning Objectives This module will help you... Understand the security infrastructure supported by JXTA Understand JXTA's use of TLS for end-to-end security 5-2 Highlights Desired security

More information

ICTTEN8195B Evaluate and apply network security

ICTTEN8195B Evaluate and apply network security ICTTEN8195B Evaluate and apply network security Release 1 ICTTEN8195B Evaluate and apply network security Modification History Release Release 2 Comments This version first released with ICT10 Integrated

More information

Chapter 7 Transport-Level Security

Chapter 7 Transport-Level Security Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module

More information

SECURE SOCKETS LAYER (SSL) SECURE SOCKETS LAYER (SSL) SSL ARCHITECTURE SSL/TLS DIFFERENCES SSL ARCHITECTURE. INFS 766 Internet Security Protocols

SECURE SOCKETS LAYER (SSL) SECURE SOCKETS LAYER (SSL) SSL ARCHITECTURE SSL/TLS DIFFERENCES SSL ARCHITECTURE. INFS 766 Internet Security Protocols INFS 766 Internet Security s Lecture 5 SSL Prof. Ravi Sandhu SECURE SOCKETS LAYER (SSL) layered on top of TCP SSL versions 1.0, 2.0, 3.0, 3.1 Netscape protocol later refitted as IETF standard TLS (Transport

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

Secure Socket Layer/ Transport Layer Security (SSL/TLS)

Secure Socket Layer/ Transport Layer Security (SSL/TLS) Secure Socket Layer/ Transport Layer Security (SSL/TLS) David Sánchez Universitat Pompeu Fabra World Wide Web (www) Client/server services running over the Internet or TCP/IP Intranets nets widely used

More information

Open System Interconnection (OSI) Protocols

Open System Interconnection (OSI) Protocols CHAPTER 32 Open System Interconnection (OSI) Protocols Background The Open System Interconnection (OSI) protocol suite is comprised of numerous standard protocols that are based on the OSI reference model.

More information

Chapter 2 - The TCP/IP and OSI Networking Models

Chapter 2 - The TCP/IP and OSI Networking Models Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application

More information

NZQA Expiring unit standard 6857 version 4 Page 1 of 5. Demonstrate an understanding of local and wide area computer networks

NZQA Expiring unit standard 6857 version 4 Page 1 of 5. Demonstrate an understanding of local and wide area computer networks Page 1 of 5 Title Demonstrate an understanding of local and wide area computer networks Level 7 Credits 10 Purpose People credited with this unit standard are able to: describe network types and standards;

More information

Communication Systems SSL

Communication Systems SSL Communication Systems SSL Computer Science Organization I. Data and voice communication in IP networks II. Security issues in networking III. Digital telephony networks and voice over IP 2 Network Security

More information

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23 Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest

More information

Data Communication and Computer Network

Data Communication and Computer Network 1 Data communication principles, types and working principles of modems, Network principles, OSI model, functions of data link layer and network layer, networking components, communication protocols- X

More information

Network Security Technology Network Management

Network Security Technology Network Management COMPUTER NETWORKS Network Security Technology Network Management Source Encryption E(K,P) Decryption D(K,C) Destination The author of these slides is Dr. Mark Pullen of George Mason University. Permission

More information

Objectives of Lecture. Network Architecture. Protocols. Contents

Objectives of Lecture. Network Architecture. Protocols. Contents Objectives of Lecture Network Architecture Show how network architecture can be understood using a layered approach. Introduce the OSI seven layer reference model. Introduce the concepts of internetworking

More information

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts Outline INF3510 Information Security Lecture 10: Communications Security Network security concepts Communication security Perimeter security Protocol architecture and security services Example security

More information

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles

More information

Local Area Networks (LANs) Blueprint (May 2012 Release)

Local Area Networks (LANs) Blueprint (May 2012 Release) Local Area Networks (LANs) The CCNT Local Area Networks (LANs) Course April 2012 release blueprint lists the following information. Courseware Availability Date identifies the availability date for the

More information

Presented by Aurang Zeb 14CS-03. Network Management System

Presented by Aurang Zeb 14CS-03. Network Management System Presented by Aurang Zeb 14CS-03 Network Management System INTRODUCTION o We can define network management as monitoring, testing, configuring, and troubleshooting network components to meet a set of requirements.

More information

Spirent Abacus. SIP over TLS Test 编 号 版 本 修 改 时 间 说 明

Spirent Abacus. SIP over TLS Test 编 号 版 本 修 改 时 间 说 明 Spirent Abacus SIP over TLS Test 编 号 版 本 修 改 时 间 说 明 1 1. TLS Interview (Transport Layer Security Protocol) (1) TLS Feature Introduction: 1. TLS is a successor of Secure Sockets Layer (SSL), a cryptographic

More information

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and non-repudiation. How to obtain a digital certificate. Installing

More information

CSE 3461 / 5461: Computer Networking & Internet Technologies

CSE 3461 / 5461: Computer Networking & Internet Technologies Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2

More information

Introduction. Haroula Zouridaki Mohammed Bin Abdullah Waheed Qureshi

Introduction. Haroula Zouridaki Mohammed Bin Abdullah Waheed Qureshi Introduction Haroula Zouridaki Mohammed Bin Abdullah Waheed Qureshi Introduction Comparing Secure Hypertext protocol (S-HTTP) to Secure Socket Layer (SSL) Agenda Waheed opens the presentation introduces

More information

Three attacks in SSL protocol and their solutions

Three attacks in SSL protocol and their solutions Three attacks in SSL protocol and their solutions Hong lei Zhang Department of Computer Science The University of Auckland zhon003@ec.auckland.ac.nz Abstract Secure Socket Layer (SSL) and Transport Layer

More information

Internet Concepts. What is a Network?

Internet Concepts. What is a Network? Internet Concepts Network, Protocol Client/server model TCP/IP Internet Addressing Development of the Global Internet Autumn 2004 Trinity College, Dublin 1 What is a Network? A group of two or more devices,

More information

How To Understand And Understand The Ssl Protocol (Www.Slapl) And Its Security Features (Protocol)

How To Understand And Understand The Ssl Protocol (Www.Slapl) And Its Security Features (Protocol) WEB Security: Secure Socket Layer Cunsheng Ding HKUST, Hong Kong, CHINA C. Ding - COMP581 - L22 1 Outline of this Lecture Brief Information on SSL and TLS Secure Socket Layer (SSL) Transport Layer Security

More information

SECURE SOCKETS LAYER (SSL)

SECURE SOCKETS LAYER (SSL) INFS 766 Internet Security Protocols Lecture 5 SSL Prof. Ravi Sandhu SECURE SOCKETS LAYER (SSL) layered on top of TCP SSL versions 1.0, 2.0, 3.0, 3.1 Netscape protocol later refitted as IETF standard TLS

More information

This course has been retired. View the schedule of current <a href=http://www.ptr.co.uk/networkingcourses.htm>networking

This course has been retired. View the schedule of current <a href=http://www.ptr.co.uk/networkingcourses.htm>networking Introduction to Data Communications & Networking Course Description: This course has been retired. View the schedule of current networking Courses

More information

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) Application Note Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) This document describes how to configure McAfee Firewall Enterprise to provide

More information

Cornerstones of Security

Cornerstones of Security Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to

More information

Lecture 10: Communications Security

Lecture 10: Communications Security INF3510 Information Security Lecture 10: Communications Security Audun Jøsang University of Oslo Spring 2015 Outline Network security concepts Communication security Perimeter security Protocol architecture

More information

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security? 7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk

More information

The OSI Model and the TCP/IP Protocol Suite PROTOCOL LAYERS. Hierarchy. Services THE OSI MODEL

The OSI Model and the TCP/IP Protocol Suite PROTOCOL LAYERS. Hierarchy. Services THE OSI MODEL The OSI Model and the TCP/IP Protocol Suite - the OSI model was never fully implemented. - The TCP/IP protocol suite became the dominant commercial architecture because it was used and tested extensively

More information

CRYPTOGRAPHY IN NETWORK SECURITY

CRYPTOGRAPHY IN NETWORK SECURITY ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can

More information

IPV6 vs. SSL comparing Apples with Oranges

IPV6 vs. SSL comparing Apples with Oranges IPV6 vs. SSL comparing Apples with Oranges Reto E. Haeni r.haeni@cpi.seas.gwu.edu The George Washington University Cyberspace Policy Institute 2033 K Str. Suite 340 N Washington DC 20006 Washington DC,

More information

Chapter 10. Network Security

Chapter 10. Network Security Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce

More information

OSI Reference Model: An Overview

OSI Reference Model: An Overview OSI Reference Model: An Overview Gaurav Bora 1, Saurabh Bora 2, Shivendra Singh 3, Sheikh Mohamad Arsalan 4 ( 1 Department of Electronics, Uttarakhand Technical University, Dehradun, INDIA) ( 2 Department

More information

ISM/ISC Middleware Module

ISM/ISC Middleware Module ISM/ISC Middleware Module Lecture 13: Security for Middleware Applications Dr Geoff Sharman Visiting Professor in Computer Science Birkbeck College Geoff Sharman Sept 07 Lecture 13 Aims to: 2 Show why

More information

Protocols and Architecture. Protocol Architecture.

Protocols and Architecture. Protocol Architecture. Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between

More information

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP) Security Protocols Security Protocols Necessary to communicate securely across untrusted network Provide integrity, confidentiality, authenticity of communications Based on previously discussed cryptographic

More information

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity Basic Security Requirements and Techniques Confidentiality The property that stored or transmitted information cannot be read or altered by an unauthorized party Integrity The property that any alteration

More information

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli 4-25-2002

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli 4-25-2002 INTERNET SECURITY: FIREWALLS AND BEYOND Mehernosh H. Amroli 4-25-2002 Preview History of Internet Firewall Technology Internet Layer Security Transport Layer Security Application Layer Security Before

More information

Network Security Essentials Chapter 5

Network Security Essentials Chapter 5 Network Security Essentials Chapter 5 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 5 Transport-Level Security Use your mentality Wake up to reality From the song, "I've Got

More information

TLS/SSL in distributed systems. Eugen Babinciuc

TLS/SSL in distributed systems. Eugen Babinciuc TLS/SSL in distributed systems Eugen Babinciuc Contents 1. Introduction to TLS/SSL 2. A quick review of cryptography 3. TLS/SSL in distributed systems 4. Conclusions Introduction to TLS/SSL TLS/SSL History

More information

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security UNIT 4 SECURITY PRACTICE Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security Slides Courtesy of William Stallings, Cryptography & Network Security,

More information

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix

More information

Properties of Secure Network Communication

Properties of Secure Network Communication Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able to understand the contents of the transmitted message. Because eavesdroppers may intercept the message,

More information

Network Authentication - 802.1X Secure the Edge of the Network - Technical White Paper

Network Authentication - 802.1X Secure the Edge of the Network - Technical White Paper Bosch Security Systems Video Systems Network Authentication - 802.1X Secure the Edge of the Network - Technical White Paper 4 July 2016 Secure the edge of the network Security devices are mostly located

More information

CCNA Security 1.1 Instructional Resource

CCNA Security 1.1 Instructional Resource CCNA Security 1.1 Instructional Resource Chapter 8 Implementing Virtual Private Networks 2012 Cisco and/or its affiliates. All rights reserved. 1 Describe the purpose and types of VPNs and define where

More information

Secure Sockets Layer

Secure Sockets Layer SSL/TLS provides endpoint authentication and communications privacy over the Internet using cryptography. For web browsing, email, faxing, other data transmission. In typical use, only the server is authenticated

More information

SSL A discussion of the Secure Socket Layer

SSL A discussion of the Secure Socket Layer www.harmonysecurity.com info@harmonysecurity.com SSL A discussion of the Secure Socket Layer By Stephen Fewer Contents 1 Introduction 2 2 Encryption Techniques 3 3 Protocol Overview 3 3.1 The SSL Record

More information

APNIC elearning: IPSec Basics. Contact: training@apnic.net. esec03_v1.0

APNIC elearning: IPSec Basics. Contact: training@apnic.net. esec03_v1.0 APNIC elearning: IPSec Basics Contact: training@apnic.net esec03_v1.0 Overview Virtual Private Networks What is IPsec? Benefits of IPsec Tunnel and Transport Mode IPsec Architecture Security Associations

More information

Point to Multi-Point Protocol (PMPP) Prepared by: NTCIP Steering Group

Point to Multi-Point Protocol (PMPP) Prepared by: NTCIP Steering Group Point to Multi-Point Protocol (PMPP) Prepared by: NTCIP Steering Group May 1996 Draft March 1998 Table of Contents FOREWORD...i Section 1: GENERAL...1-1 1.1 SCOPE...1-1 1.1.1 Background...1-1 1.1.2 Purpose

More information

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3 SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange

More information

Secure Socket Layer. Security Threat Classifications

Secure Socket Layer. Security Threat Classifications Secure Socket Layer 1 Security Threat Classifications One way to classify Web security threats in terms of the type of the threat: Passive threats Active threats Another way to classify Web security threats

More information

UPPER LAYER SWITCHING

UPPER LAYER SWITCHING 52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches

More information

How Virtual Private Networks Work

How Virtual Private Networks Work How Virtual Private Networks Work Document ID: 14106 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information What Makes a VPN? Analogy: Each LAN Is an IsLANd

More information

Transport Level Security

Transport Level Security Transport Level Security Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/

More information

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https

More information

Virtual Private Networks

Virtual Private Networks Virtual Private Networks ECE 4886 Internetwork Security Dr. Henry Owen Definition Virtual Private Network VPN! Virtual separation in protocol provides a virtual network using no new hardware! Private communication

More information

Cryptography and network security CNET4523

Cryptography and network security CNET4523 1. Name of Course 2. Course Code 3. Name(s) of academic staff 4. Rationale for the inclusion of the course/module in the programme Cryptography and network security CNET4523 Major The Great use of local

More information

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer

More information

Network Security. by David G. Messerschmitt. Secure and Insecure Authentication. Security Flaws in Public Servers. Firewalls and Packet Filtering

Network Security. by David G. Messerschmitt. Secure and Insecure Authentication. Security Flaws in Public Servers. Firewalls and Packet Filtering Network Security by David G. Messerschmitt Supplementary section for Understanding Networked Applications: A First Course, Morgan Kaufmann, 1999. Copyright notice: Permission is granted to copy and distribute

More information

ERserver. iseries. Secure Sockets Layer (SSL)

ERserver. iseries. Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) Copyright International Business Machines Corporation 2000, 2002. All rights reserved. US Government Users Restricted

More information

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CET 2600 COURSE TITLE: Network Fundamentals PREREQUISITE(S): CTS 1131 and CTS 1133 COREQUISITE(S): STUDENT

More information

The Secure Sockets Layer (SSL)

The Secure Sockets Layer (SSL) Due to the fact that nearly all businesses have websites (as well as government agencies and individuals) a large enthusiasm exists for setting up facilities on the Web for electronic commerce. Of course

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

Lecture 9 - Network Security TDTS41-2006 (ht1)

Lecture 9 - Network Security TDTS41-2006 (ht1) Lecture 9 - Network Security TDTS41-2006 (ht1) Prof. Dr. Christoph Schuba Linköpings University/IDA Schuba@IDA.LiU.SE Reading: Office hours: [Hal05] 10.1-10.2.3; 10.2.5-10.7.1; 10.8.1 9-10am on Oct. 4+5,

More information

[MS-SSTP]: Secure Socket Tunneling Protocol (SSTP) Intellectual Property Rights Notice for Open Specifications Documentation

[MS-SSTP]: Secure Socket Tunneling Protocol (SSTP) Intellectual Property Rights Notice for Open Specifications Documentation [MS-SSTP]: Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications documentation for protocols, file formats, languages,

More information

Chapter 1: Introduction to Communications What is Data Communications? Data Communication Networks Basic Components of a communications system

Chapter 1: Introduction to Communications What is Data Communications? Data Communication Networks Basic Components of a communications system Dear Student Here is the list of chapter sections that we will be covering for this semester. For each chapter listed in pages below: Any Bold text is required (with all the details in that sections) Any

More information

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols 2011-11-22. ETSF10 Internet Protocols 2011

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols 2011-11-22. ETSF10 Internet Protocols 2011 Internet Security Voice over IP ETSF10 Internet Protocols 2011 Kaan Bür & Jens Andersson Department of Electrical and Information Technology Internet Security IPSec 32.1 SSL/TLS 32.2 Firewalls 32.4 + Voice

More information