Redirecting and modifying SMTP mail with TLS session renegotiation attacks
|
|
|
- Tamsyn Watts
- 9 years ago
- Views:
Transcription
1 Business Unit or Product Name Redirecting and modifying SMTP mail with TLS session renegotiation attacks Wietse Venema Postfix mail server project November 8, IBM Corporation
2 Executive summary The setting: an attacker, a victim, and a server. The attacker sits on the network path between victim and server (ARP 1 spoofing, etc.). The TLS renegotiation attack allows the attacker to prepend data to a TLS session between the victim and server. The attack was originally discussed in the context of HTTP. We present a specific attack that would allow an attacker to redirect and modify SMTP mail that is sent over a TLS session. For the server side, we show what SMTP-over-TLS implementations would be vulnerable to this attack, plus SMTP-level workarounds. We show why the Postfix SMTP server is not affected by this attack. For the client side, we propose SMTP-level workarounds for several session renegotiation attacks. 1 Address Resolution Protocol. This translates IP addresses into e.g., ethernet hardware addresses.
3 Basic TLS session renegotiation for SMTP See appendix for an example of a normal SMTP over TLS session With SMTP, the attacker must initiate TLS session renegotiation. Simplest possible example: the attacker prepends no input to the victim-server session (prepending input comes next). Victim Attacker Server TCP connect SMTP starttls SMTP commands TCP connect SMTP 220 (welcome) SMTP starttls SMTP 220 (starttls reply) Attacker decrypts to victim / encrypts to server Attacker copies encrypted traffic unchanged SMTP 220 (welcome) SMTP 220 (starttls reply) SMTP replies Note: The attacker never knows the victim-server TLS session key.
4 Prepending input to the victim-server session Challenge: prepend input to the SMTP stream, then re-synchronize the victim and the server, so that the SMTP session does not break (or at least, does not break too early). SMTP has two command states (MAIL, other), and one major noncommand state (DATA 1,2 ) that recognizes no SMTP commands. Many SMTP commands are valid only in specific protocol states (exceptions: NOOP, HELO, RSET, QUIT). Most non-error replies are 2xx numerical codes. Most clients accept these in all but one command state (i.e. any xx will do). The most common exception is the DATA command. This uses a 3xx non-error reply code. 3xx Numerical replies are also used with e.g. SASL login commands. 1 Few sites implement the BDAT command. To exploit this, the attacker needs to know precise details about the plaintext length or content of victim SMTP commands and messages. 2 Other non-command modes are used with e.g. SASL logins.
5 Redirecting or modifying SMTP mail with TLS session renegotiation Victim Attacker Server TCP connect SMTP starttls TLS victim hello SMTP 220 (welcome) SMTP 220 (starttls reply) SMTP mail SMTP rcpt SMTP data TLS victim hello TCP connect SMTP starttls SMTP 220 (welcome) SMTP 220 (starttls reply) Attacker prepends mail transaction commands with the attacker s sender or return address, and perhaps also message content TLS handshake... decrypt to victim / encrypt to server SMTP mail from SMTP rcpt to SMTP data content SMTP data end SMTP quit TCP disconnect copy encrypted traffic between victim and server SMTP 250 (mail reply) SMTP 250 (rcpt reply) SMTP 354 (data reply) Server prepends the victim s SMTP commands to the victim s mail content SMTP 250 (data end reply) SMTP 221 (quit reply) TCP disconnect SMTP replies follow TLS handshake
6 Implications of this attack SMTP mail can be redirected and modified even though the server s TLS certificate provides strong assurance that the clientserver channel is secure. To modify , prepend an Internet-style header followed by a MIME segment that hides the victim s real message. Most SMTP clients don t verify server TLS certificates. These clients are already vulnerable to ordinary man-in-the-middle attacks. Here, TLS session renegotiation introduces no new threat. Renegotiation attacks affect only configurations that rely on TLS server certificate verification to secure their SMTP mail traffic. For example, between business partners. After a discussion of the attack s feasibility we discuss a number of possible workarounds.
7 Servers: what makes implementations vulnerable to the SMTP mail redirection/modification attack The attack requires that: The server processes the entire attacker s TCP packet with: The attacker s SMTP (hello, mail, rcpt, data) commands 1. The victim s TLS hello request. The server negotiates a new TLS session with the victim before responding to the SMTP (hello, mail, rcpt, data) commands 2. The server encrypts the SMTP (hello, mail, rcpt, data) replies under the new TLS session key, which is known only to server and victim. Implementations may be vulnerable when the TLS engine processes network input before the SMTP engine requests network input. Postfix-OpenSSL does not work this way, and it is therefore not vulnerable to this attack 1 To work around the attack, the SMTP engine could abort when the SMTP mail command arrives before the reply is sent, in clear violation of the SMTP protocol. 2 To work around the attack, the SMTP engine could abort when a TLS session is renegotiated.
8 Servers: why the SMTP mail redirection/ modification attack fails with Postfix-OpenSSL Assumption: the attacker sends one TCP packet with SMTP (hello, mail, rcpt, data) commands plus the victim s TLS hello request. The Postfix SMTP layer asks the OpenSSL layer for the next input. The OpenSSL layer has no direct access to the network socket. The OpenSSL layer asks the Postfix socket layer for the next TLS record header with data byte count, and then asks for that data. This TLS record contains only the attacker s SMTP commands. The OpenSSL layer does not ask for more input (victim TLS hello). The Postfix SMTP layer gives the SMTP (hello, mail, rcpt, data) replies to the OpenSSL layer. The attack fails because the server sends the SMTP replies before the SSL layer handles the (still unread) victim s TLS hello request. The replies are not encrypted in the victim-server TLS session key.
9 Clients: working around the SMTP mail redirection/ modification attack The attack signature: The server sends SMTP (hello, mail, rcpt, data) replies in the victim-server TLS session, before the victim has sent its own SMTP (hello, mail, rcpt, data) commands. To work around the attack in the SMTP client: Send the command and receive the hello reply. If the network input queue is non-empty, set a flag. Send the SMTP mail command and receive the mail reply. If there is no error, but the flag was set, then assume that the mail reply was received before the mail command was sent.
10 Clients: working around partial command attacks The attacker may prepend an incomplete SMTP command that does not end in <CR><LF>, so that the victim s first command in the TLS session is replaced with the attacker s command. For example: Attacker sends: NOOP<SPACE> Victim sends: Server reads: EHLO client.example<cr><lf> NOOP blah blah<cr><lf> (this is valid SMTP) Server replies: Ok<CR><LF> Unlike the NOOP reply, the real EHLO reply would have no enhanced status code (the in the example). Instead, the EHLO reply would show the server s name, and would list the server s protocol features. The SMTP client can work around this attack by sending its own NOOP command at the beginning of the TLS session, or by rejecting EHLO replies with an unexpected syntax.
11 Credits Wietse Venema proposed the attack to redirect or modify TLSencrypted SMTP mail. Victor Duchovni proposed the COMMAND<SPACE> partial command prepend attack. Victor found that Wietse s attack cannot work with Postfix SMTP servers that are built op top of OpenSSL, because such systems don t use server-side read-ahead. Wietse and Victor concocted detection mechanisms and workarounds. Some may even end up in Postfix.
12 Appendix: normal SMTP over TLS session For simplicity, without ESMTP command pipelining Client TCP connect SMTP starttls SMTP mail from SMTP rcpt to SMTP data content SMTP data end SMTP quit TLS shutdown TCP disconnect Server SMTP 220 (welcome) SMTP 220 (starttls reply) SMTP 250 (mail reply) SMTP 250 (rcpt reply) SMTP 354 (data reply) non-command mode (no reply) SMTP 250 (data end reply) SMTP 221 (quit reply) TLS shutdown TCP disconnect
CipherMail Gateway Quick Setup Guide
CIPHERMAIL EMAIL ENCRYPTION CipherMail Gateway Quick Setup Guide October 10, 2015, Rev: 9537 Copyright 2015, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Typical setups 4 2.1 Direct delivery............................
Email, SNMP, Securing the Web: SSL
Email, SNMP, Securing the Web: SSL 4 January 2015 Lecture 12 4 Jan 2015 SE 428: Advanced Computer Networks 1 Topics for Today Email (SMTP, POP) Network Management (SNMP) ASN.1 Secure Sockets Layer 4 Jan
TLS / SSLv3 renegotiation vulnerability explained
TLS / SSLv3 renegotiation vulnerability explained Thierry ZOLLER [email protected] http://www.g-sec.lu http://blog.zoller.lu G-SEC is a non-commercial and independent group of Information Security Specialists
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Appendix. Web Command Error Codes. Web Command Error Codes
Appendix Web Command s Error codes marked with * are received in responses from the FTP server, and then returned as the result of FTP command execution. -501 Incorrect parameter type -502 Error getting
1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP.
Chapter 2 Review Questions 1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP. 2. Network architecture refers to the organization of the communication process
Cork Institute of Technology Master of Science in Computing in Education National Framework of Qualifications Level 9
Cork Institute of Technology Master of Science in Computing in Education National Framework of Qualifications Level 9 February 2005 System and Network Management (Time: 2 Hours) Answer any THREE questions
Lab 7: Introduction to Pen Testing (NMAP)
Lab 7: Introduction to Pen Testing (NMAP) Aim: To provide a foundation in understanding of email with a focus on NMAP. Time to complete: Up to 60 minutes. Activities: Complete Lab 7: NMAP. Complete Test
Cisco Secure PIX Firewall with Two Routers Configuration Example
Cisco Secure PIX Firewall with Two Routers Configuration Example Document ID: 15244 Interactive: This document offers customized analysis of your Cisco device. Contents Introduction Prerequisites Requirements
Introduction to Computer Networks
Introduction to Computer Networks Chen Yu Indiana University Basic Building Blocks for Computer Networks Nodes PC, server, special-purpose hardware, sensors Switches Links: Twisted pair, coaxial cable,
Scan Report Executive Summary. Part 2. Component Compliance Summary IP Address : 69.43.165.11
Scan Report Executive Summary Part 1. Scan Information Scan Customer Company: Date scan was completed: rsync.net ASV Company: Comodo CA Limited 06-02-2015 Scan expiration date: 08-31-2015 Part 2. Component
JAVAMAIL API - SMTP SERVERS
JAVAMAIL API - SMTP SERVERS http://www.tutorialspoint.com/javamail_api/javamail_api_smtp_servers.htm Copyright tutorialspoint.com SMTP is an acronym for Simple Mail Transfer Protocol. It is an Internet
20.12. smtplib SMTP protocol client
20.12. smtplib SMTP protocol client The smtplib module defines an SMTP client session object that can be used to send mail to any Internet machine with an SMTP or ESMTP listener daemon. For details of
Intro to Firewalls. Summary
Topic 3: Lesson 2 Intro to Firewalls Summary Basic questions What is a firewall? What can a firewall do? What is packet filtering? What is proxying? What is stateful packet filtering? Compare network layer
Apache Partial HTTP Request Denial of Service Vulnerability - Zero Day. SSL Certificate - Subject Common Name Does Not Match Server FQDN
Vulnerability Scan 06 October 2014 at 16:21 URL : http://www.test.co.uk Summary: 34 vulnerabilities found 0 10 24 72 Cookie Does Not Contain The "HTTPOnly" Attribute Cookie Does Not Contain The "secure"
Web Security Considerations
CEN 448 Security and Internet Protocols Chapter 17 Web Security Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University [email protected]
Bit Chat: A Peer-to-Peer Instant Messenger
Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare [email protected] https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one
Final exam review, Fall 2005 FSU (CIS-5357) Network Security
Final exam review, Fall 2005 FSU (CIS-5357) Network Security Instructor: Breno de Medeiros 1. What is an insertion attack against a NIDS? Answer: An insertion attack against a network intrusion detection
INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli 4-25-2002
INTERNET SECURITY: FIREWALLS AND BEYOND Mehernosh H. Amroli 4-25-2002 Preview History of Internet Firewall Technology Internet Layer Security Transport Layer Security Application Layer Security Before
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
Simple Mail Transfer Protocol
Page 1 of 6 Home : Network Programming Simple Mail Transfer Protocol Contents What is SMTP? Basics of SMTP SMTP Commands Relaying of Messages Time Stamps and Return Path in Message Header Mail Exchangers
Session Hijacking Exploiting TCP, UDP and HTTP Sessions
Session Hijacking Exploiting TCP, UDP and HTTP Sessions Shray Kapoor [email protected] Preface With the emerging fields in e-commerce, financial and identity information are at a higher risk of being
SSL A discussion of the Secure Socket Layer
www.harmonysecurity.com [email protected] SSL A discussion of the Secure Socket Layer By Stephen Fewer Contents 1 Introduction 2 2 Encryption Techniques 3 3 Protocol Overview 3 3.1 The SSL Record
The Secure Sockets Layer (SSL)
Due to the fact that nearly all businesses have websites (as well as government agencies and individuals) a large enthusiasm exists for setting up facilities on the Web for electronic commerce. Of course
Introduction. -- some basic concepts and terminology -- examples for attacks on protocols -- main network security services
Introduction -- some basic concepts and terminology -- examples for attacks on protocols -- main network security services (c) Levente Buttyán ([email protected]) Attack, threat, and vulnerability security
1 Introduction: Network Applications
1 Introduction: Network Applications Some Network Apps E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Internet telephone Real-time video
Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX
APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix
Internet Control Protocols Reading: Chapter 3
Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters
Email. Daniel Zappala. CS 460 Computer Networking Brigham Young University
Email Daniel Zappala CS 460 Computer Networking Brigham Young University How Email Works 3/25 Major Components user agents POP, IMAP, or HTTP to exchange mail mail transfer agents (MTAs) mailbox to hold
Books and Beyond. Erhan J Kartaltepe, Paul Parker, and Shouhuai Xu Department of Computer Science University of Texas at San Antonio
How to Secure Your Email Address Books and Beyond Erhan J Kartaltepe, Paul Parker, and Shouhuai Xu p Department of Computer Science University of Texas at San Antonio Outline Email: A Brief Overview The
My FreeScan Vulnerabilities Report
Page 1 of 6 My FreeScan Vulnerabilities Report Print Help For 66.40.6.179 on Feb 07, 008 Thank you for trying FreeScan. Below you'll find the complete results of your scan, including whether or not the
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
Proxies. Chapter 4. Network & Security Gildas Avoine
Proxies Chapter 4 Network & Security Gildas Avoine SUMMARY OF CHAPTER 4 Generalities Forward Proxies Reverse Proxies Open Proxies Conclusion GENERALITIES Generalities Forward Proxies Reverse Proxies Open
Chakchai So-In, Ph.D.
Application Layer Functionality and Protocols Chakchai So-In, Ph.D. Khon Kaen University Department of Computer Science Faculty of Science, Khon Kaen University 123 Mitaparb Rd., Naimaung, Maung, Khon
SMTP Servers. Determine if an email message should be sent to another machine and automatically send it to that machine using SMTP.
SMTP Servers SMTP: Simple Mail Transfer Protocol (TCP Port 25) The Simple Mail Transfer Protocol (SMTP) is an Internet standard for transferring electronic mail between computers. UNIX systems implement
General Network Security
4 CHAPTER FOUR General Network Security Objectives This chapter covers the following Cisco-specific objectives for the Identify security threats to a network and describe general methods to mitigate those
Protocol Rollback and Network Security
CSE 484 / CSE M 584 (Spring 2012) Protocol Rollback and Network Security Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee,
Configuring SSL Termination
CHAPTER 4 This chapter describes the steps required to configure a CSS as a virtual SSL server for SSL termination. It contains the following major sections: Overview of SSL Termination Creating an SSL
Enabling Security Features in Firmware DGW v2.0 June 22, 2011
Enabling Security Features in Firmware DGW v2.0 June 22, 2011 Proprietary 2011 Media5 Corporation Table of Contents Scope... 3 Acronyms and Definitions... 3 Setup Description... 3 Basics of Security Exchanges...
12/8/2015. Review. Final Exam. Network Basics. Network Basics. Network Basics. Network Basics. 12/10/2015 Thursday 5:30~6:30pm Science S-3-028
Review Final Exam 12/10/2015 Thursday 5:30~6:30pm Science S-3-028 IT443 Network Security Administration Instructor: Bo Sheng True/false Multiple choices Descriptive questions 1 2 Network Layers Application
We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall
Chapter 10 Firewall Firewalls are devices used to protect a local network from network based security threats while at the same time affording access to the wide area network and the internet. Basically,
Applications and Services. DNS (Domain Name System)
Applications and Services DNS (Domain Name Service) File Transfer Protocol (FTP) Simple Mail Transfer Protocol (SMTP) Malathi Veeraraghavan Distributed database used to: DNS (Domain Name System) map between
Firewall Introduction Several Types of Firewall. Cisco PIX Firewall
Firewall Introduction Several Types of Firewall. Cisco PIX Firewall What is a Firewall? Non-computer industries: a wall that controls the spreading of a fire. Networks: a designed device that controls
Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012
Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret
Remote login (Telnet):
SFWR 4C03: Computer Networks and Computer Security Feb 23-26 2004 Lecturer: Kartik Krishnan Lectures 19-21 Remote login (Telnet): Telnet permits a user to connect to an account on a remote machine. A client
The Transport Layer. Antonio Carzaniga. October 24, 2014. Faculty of Informatics University of Lugano. 2005 2007 Antonio Carzaniga
The Transport Layer Antonio Carzaniga Faculty of Informatics University of Lugano October 24, 2014 Outline Basic concepts in transport-layer protocols Multiplexing/demultiplexing UDP message format Reliable
Configuring Security for SMTP Traffic
4 Configuring Security for SMTP Traffic Securing SMTP traffic Creating a security profile for SMTP traffic Configuring a local traffic SMTP profile Assigning an SMTP security profile to a local traffic
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual Document Version 1.0 Table of Contents 1 SWAF... 4 1.1 SWAF Features... 4 2 Operations and User Manual... 7 2.1 SWAF Administrator
Network Security Fundamentals
APNIC elearning: Network Security Fundamentals 27 November 2013 04:30 pm Brisbane Time (GMT+10) Introduction Presenter Sheryl Hermoso Training Officer [email protected] Specialties: Network Security IPv6
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Secure Sockets Layer
SSL/TLS provides endpoint authentication and communications privacy over the Internet using cryptography. For web browsing, email, faxing, other data transmission. In typical use, only the server is authenticated
Protocols and Architecture. Protocol Architecture.
Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between
APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10)
APNIC elearning: Network Security Fundamentals 20 March 2013 10:30 pm Brisbane Time (GMT+10) Introduction Presenter/s Nurul Islam Roman Senior Training Specialist [email protected] Specialties: Routing &
Math SMTP Server Configuration
Math SMTP Server Configuration Šarūnas Burdulis Version 1, August 3, 2005 Contents 1 Requirements for SMTP Service at Math 1 2 Exim 4 1 3 Spam Filtering 2 4 Virus Detection 3 5 Authentication and TLS 4
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
- Basic Router Security -
1 Enable Passwords - Basic Router Security - The enable password protects a router s Privileged mode. This password can be set or changed from Global Configuration mode: Router(config)# enable password
Emacs SMTP Library. An Emacs package for sending mail via SMTP. Simon Josefsson, Alex Schroeder
Emacs SMTP Library An Emacs package for sending mail via SMTP Simon Josefsson, Alex Schroeder Copyright c 2003, 2004 Free Software Foundation, Inc. Permission is granted to copy, distribute and/or modify
Communication Security for Applications
Communication Security for Applications Antonio Carzaniga Faculty of Informatics University of Lugano March 10, 2008 c 2008 Antonio Carzaniga 1 Intro to distributed computing: -server computing Transport-layer
accf_smtp: FreeBSD kernel protection measures against SMTP DDoS and DoS attacks
accf_smtp: FreeBSD kernel protection measures against SMTP DDoS and DoS attacks Martin Blapp Abstract: This paper is about a smtp accept filter [1] kernel module to protect mail gateways against overload-
TECHNICAL WHITE PAPER. TLS encryption: Is it really the answer to securing email?
TECHNICAL WHITE PAPER TLS encryption: Is it really the answer to securing email? The digital age has fundamentally changed the way all organisations operate, driving greater efficiency, scalability and
CS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
March 2005. PGP White Paper. Transport Layer Security (TLS) & Encryption: Complementary Security Tools
March 2005 PGP White Paper Transport Layer Security (TLS) & Encryption: Complementary Security Tools PGP White Paper TLS & Encryption 1 Table of Contents INTRODUCTION... 2 HISTORY OF TRANSPORT LAYER SECURITY...
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
Virtual Private Networks
Virtual Private Networks ECE 4886 Internetwork Security Dr. Henry Owen Definition Virtual Private Network VPN! Virtual separation in protocol provides a virtual network using no new hardware! Private communication
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
Final for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
SSL VPN Technology White Paper
SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and
SPAMfighter SMTP Anti Spam Server
SPAMfighter SMTP Anti Spam Server Users Manual Copyright SPAMfighter ApS 2005 Revised 4/27/2006 1 Table of Contents 2 Terminology...3 3 Technology...4 3.1 Tunneling and Interception...4 3.2 Content Classification...5
Clearswift Information Governance
Clearswift Information Governance Implementing the CLEARSWIFT SECURE Encryption Portal on the CLEARSWIFT SECURE Email Gateway Version 1.10 02/09/13 Contents 1 Introduction... 3 2 How it Works... 4 3 Configuration
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
TLS and SRTP for Skype Connect. Technical Datasheet
TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
# Constructors $smtp = Net::SMTP->new('mailhost'); $smtp = Net::SMTP->new('mailhost', Timeout => 60);
NAME Net::SMTP - Simple Mail Transfer Protocol Client SYNOPSIS use Net::SMTP; DESCRIPTION EXAMPLES # Constructors $smtp = Net::SMTP->new('mailhost'); $smtp = Net::SMTP->new('mailhost', Timeout => 60);
Internet Technologies Internet Protocols and Services
QAFQAZ UNIVERSITY Computer Engineering Department Internet Technologies Internet Protocols and Services Dr. Abzetdin ADAMOV Chair of Computer Engineering Department [email protected] http://ce.qu.edu.az/~aadamov
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
Computer Networks CS321
Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics
Firewalls. Chapter 3
Firewalls Chapter 3 1 Border Firewall Passed Packet (Ingress) Passed Packet (Egress) Attack Packet Hardened Client PC Internet (Not Trusted) Hardened Server Dropped Packet (Ingress) Log File Internet Border
Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong
Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application Author: Fung, King Pong MSc in Information Technology The Hong Kong Polytechnic University June 1999 i Abstract Abstract of dissertation
Chapter 7. Address Translation
Chapter 7. Address Translation This chapter describes NetDefendOS address translation capabilities. Dynamic Network Address Translation, page 204 NAT Pools, page 207 Static Address Translation, page 210
Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)
Security Protocols Security Protocols Necessary to communicate securely across untrusted network Provide integrity, confidentiality, authenticity of communications Based on previously discussed cryptographic
Cleaning Encrypted Traffic
Optenet Documentation Cleaning Encrypted Traffic Troubleshooting Guide iii Version History Doc Version Product Date Summary of Changes V6 OST-6.4.300 01/02/2015 English editing Optenet Documentation
Internet Security [1] VU 184.216. Engin Kirda [email protected]
Internet Security [1] VU 184.216 Engin Kirda [email protected] Christopher Kruegel [email protected] Administration Challenge 2 deadline is tomorrow 177 correct solutions Challenge 4 will
UNITED STATES OF AMERICA BEFORE THE FEDERAL TRADE COMMISSION. Julie Brill Maureen K. Ohlhausen Joshua D. Wright Terrell McSweeny
132 3089 UNITED STATES OF AMERICA BEFORE THE FEDERAL TRADE COMMISSION COMMISSIONERS: Edith Ramirez, Chairwoman Julie Brill Maureen K. Ohlhausen Joshua D. Wright Terrell McSweeny In the Matter of DOCKET
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM Okumoku-Evroro Oniovosa Lecturer, Department of Computer Science Delta State University, Abraka, Nigeria Email: [email protected] ABSTRACT Internet security
IxLoad Data Mail (SMTP, POP3, IMAP) Features
IxLoad Data Mail (SMTP, POP3, IMAP) Features Aptixia IxLoad can test the performance of email delivery systems and devices by emulating various email clients, servers and associated protocols. SMTP, POP3
