Chapter 27 Secure Sockets Layer (SSL)
|
|
|
- Bruno Bond
- 10 years ago
- Views:
Transcription
1 Chapter 27 Secure Sockets Layer (SSL) Introduction SSL Operations Phases SSL on the Switch SSL and the Graphical User Interface Configuration Example Command Reference disable ssl debug enable ssl debug set ssl show ssl show ssl counters show ssl sessions
2 27-2 AlliedWare OS Software Reference Introduction Secure Sockets Layer (SSL) is a security protocol that provides a secure and private TCP connection between a client and server. SSL can be used with many higher layer protocols including HTTP, File Transfer Protocol (FTP), and Net News Transfer Protocol (NNTP). Most web browsers and servers support SSL, and its most common deployment is for secure connections between a client and server over the Internet. The switch supports SSL versions 2.0 (client hello only) and 3.0 developed by Netscape, and the Internet Engineering Task Force (IETF) standard for SSL known as SSL version 3.1 or Transport Layer Security (TLS). SSL sits between the HTTP and TCP protocol layers. HTTP communicates with SSL in the same way as with TCP. TCP processes SSL requests like any other protocol requesting its services. SSL provides a secure connection over which web pages can be accessed from an HTTP server. The operation of SSL is transparent to the user, except that the start of the site s URL changes from http to https, and the browser displays a padlock icon. By default, HTTP and HTTPS use the separate well-known ports 80 and 443 respectively. Secure connections over the Internet are important when transmitting confidential data such as credit card details or passwords. SSL allows the client to verify the server s identity before either side sends any sensitive information. SSL also prevents a third party from interfering with the message because only trusted devices have access to unprotected data. By default, SSL lets you securely manage the switch with the Graphical User Interface (GUI) with the Single DES algorithm. SSL Operations SSL uses encryption to ensure the security of data transmission. Encryption is a process that uses an algorithm to encode data so it can be accessed only by trusted devices. An encrypted message remains confidential. All application data messages are authenticated by SSL with a message authentication code (MAC). The MAC is a checksum that is created by the sender and is sent as part of the encrypted message. The recipient re-calculates the MAC, and if the values match, the sender s identity is verified. The MAC also ensures that the message has not been tampered with by a third party because any change to the message changes the MAC. SSL uses asymmetrical (Public Key) encryption to establish a connection between client and server, and symmetrical (Secret Key) encryption for the data transfer phase. SSL does not use RSA directly. SSL uses PKI, which uses RSA. See Chapter 24, Encryption Services and Chapter 29, Public Key Infrastructure (PKI) for details on asymmetrical and symmetrical encryption. Software Version DoS Attack Prevention Edition
3 Secure Sockets Layer (SSL) 27-3 Phases An SSL connection has the following phases: handshake data transfer The handshake exchange happens in the following manner, illustrated in Figure 27-1 on page 27-4: 1. The client sends a CLIENT HELLO to the server. This contains the cryptographic systems that the client can support. 2. The server sends a SERVER HELLO to the client with the server s chosen cryptographic systems. These are used during this session and any sessions that are resumed after being cached. 3. The server sends a CERTIFICATE message that contains its Public Key Certificate. This is an electronic identity document. 4. The server sends a SERVER HELLO DONE to tell the client that it has finished the HELLO transaction. 5. The client sends a CLIENT KEY EXCHANGE that contains a random sequence of numbers that have been encrypted with the server s public key. This encrypted data becomes the secret key. The client verifies the identity of the server because the server must have the matching private key to decode the message that has been encrypted with its public key. 6. The client sends a CHANGE CIPHER SPEC that tells the server that all subsequent messages from the client will be encrypted. This notifies the server that it must start decrypting the data it receives. 7. The client sends an encrypted FINISHED message to notify the server that it has completed the handshake exchange. This message contains a hash of previously transmitted handshake messages. 8. The server sends a CHANGE CIPHER SPEC that tells the client that all subsequent messages from the server will be encrypted. This notifies the client that it must start decrypting data that it receives. 9. The server sends an encrypted FINISHED message to notify the client that it has completed the handshake exchange. This message contains a hash of previously transmitted handshake messages. DoS Attack Prevention Edition Software Version 2.9.1
4 27-4 AlliedWare OS Software Reference Figure 27-1: Handshake exchange 1 Client Hello Server Hello 2 Client Server Certificate Server Hello Done 3 4 Server 5 6 Client Key Exchange Change Cipher Spec Secret Key Exchanged 7 Finished Change Cipher Spec 8 Finished 9 SSL1 SSL caches negotiated sessions so they can be quickly re-established. If a session is resumed, the client sends a CLIENT HELLO to the server, containing the SESSION ID of a previously negotiated session. The server replies with a SERVER HELLO that agrees with the suggested session ID. The two parties then use the secret key retrieved from the cached session and proceed to the data transfer phase. SSL uses certificates for authentication. A Certification Authority (CA) issues certificates after checking that a public key belongs to its claimed owner. See Chapter 29, Public Key Infrastructure (PKI) for more on certificates and Certification Authorities. Messages SSL messages are encapsulated by the Record Layer before being passed to TCP for transmission. The types of SSL messages are: Handshake Change Cipher Spec Alert Application data (HTTP, FTP or NNTP) The handshake initiates an SSL session, during which data is securely transmitted between a client and server. During the handshake: The client and server establish the SSL version they use. The client and server negotiate the cipher suite for the session, which includes encryption, authentication, and key exchange algorithms. The symmetrical key is exchanged. Software Version The client authenticates the server (optionally, the server authenticates the client). DoS Attack Prevention Edition
5 Secure Sockets Layer (SSL) 27-5 Change cipher Spec informs the receiving party that all subsequent messages will be encrypted using previously negotiated security options. The parties use the strongest cryptographic systems that they both support. The alert message is used if the client or server detects an error. Alert messages also inform the other end that the session is about to close. The Alert message contains a severity rating and a description of the alert. Possible reasons for an alert include if either party receives an invalid certificate or an unexpected message. The application message encapsulates the encrypted application data. SSL on the Switch The switch implements the following versions of SSL: Mandatory parts of RFC 2246 (TLSv1), except for DSS encryption Mandatory parts of SSLv3 SSLv2 client hello DES40 and DES encryption algorithms and RSA authentication and key exchange algorithms SHA1 for MAC To use SSL your switch must have PKI, ISAKMP, SSH, and SSL feature licences. If these licences are not already present on your switch, contact your authorised distributor or reseller. The number of ENCO channels on the switch determines the number of SSL sessions that can be active at one time. For details, see ENCO Services on page 24-4 of Chapter 24, Encryption Services. SSL and the Graphical User Interface SSL provides a secure connection over a public network and the Internet. You can configure a switch via a Graphical User Interface (GUI) with a secure connection. This means that sensitive data including passwords and addresses cannot be accessed by malicious parties. You can generate a certificate and its associated private key using the command line, with the add pki certificate command on page of Chapter 29, Public Key Infrastructure (PKI) and the create enco key command on page 24-7 of Chapter 24, Encryption Services. SSL lets you connect securely over an insecure network, but SSL must be initially set up from a private or previously secured interface. DoS Attack Prevention Edition Software Version 2.9.1
6 27-6 AlliedWare OS Software Reference Configuration Example This example describes how to secure the switch s HTTP server with SSL. Once the server is secured, you can use HTTPS when browsing to it from a PC to manage the switch securely via the GUI and to securely download files off the switch. For this configuration to succeed, your switch may need a PKI feature licence. If it is not already on your switch, contact your authorised distributor or reseller. SSL does not require a feature licence. 1. Create a Security Officer user account. Only a user with Security Officer privilege can enable system security and SSL. To add a user with the login name "CIPHER", password "sbr4y3", login=yes, and Security Officer privilege, use the command: add user="cipher" password="sbr4y3" privilege=securityofficer login=yes create config=ssl.cfg restart switch 2. Login as a Security Officer. To login as the user with Security Officer privilege called "CIPHER", use the command: login cipher And then enter the password for "CIPHER", "sbr4y3". 3. Enable system security. To enable system security, use the command: enable system security 4. Create an RSA key pair for this switch. To create an RSA key pair, use the command: create enco key=0 type=rsa length= Set the switch s distinguished name. To set the switch s distinguished name to "cn=switch1,o=my_company,c=us", use the command: set system distinguishedname="cn=switch1, o=my_company,c=us" 6. Set the UTC offset. To set the Universal Coordinated Time to inform the switch that the difference between local time and GMT is 7 hours, use the command: set log utcoffset=7 7. Create a self-signed certificate for the switch. To create a PKI certificate without contacting a CA for browsing to the GUI, use the command: create pki certificate=cer_name keypair=0 serialnumber=12345 subject="cn= , o=my_company, c=us" Software Version DoS Attack Prevention Edition
7 Secure Sockets Layer (SSL) 27-7 This command creates a certificate suitable only for secure switch management via the GUI and downloading files. A pop-up message in the browser window warns that the certificate is not issued by a trusted authority. For details, see Chapter 29, Public Key Infrastructure (PKI). 8. Load self-signed switch certificate. To load the signed switch certificate onto the switch, use the command: add pki certificate=cer_name location=cer_name.cer trust=yes 9. Enable SSL on the HTTP server. To enable SSL on the HTTP server with previously created SSL Key and the port 443, use the command: set http server security=on sslkey=0 port= Configure an IP interface to run SSL over. To configure an IP interface over which SSL is to run, first enable IP using the command: enable ip To make 1 the IP interface and address the interface s IP address, use the command: add ip interface=vlan1 ip= To add an IP route on this interface with a next hop of , use the command: add ip route= interface=vlan1 next= For this example to succeed, the user would have to log in as "cipher" rather than "manager" when connecting to the switch with a web browser. DoS Attack Prevention Edition Software Version 2.9.1
8 27-8 disable ssl debug AlliedWare OS Software Reference Command Reference This section describes the commands available to configure and monitor SSL on the switch. The shortest valid command is denoted by capital letters in the Syntax section. See Conventions on page xxxviii of About this Software Reference in the front of this manual for details of the conventions used to describe command syntax. See Appendix A, Messages for a complete list of messages and their meanings. Note that there is no enable command for SSL. The protocol is enabled with the set http server command on page 5-39 of Chapter 5, Managing Configuration Files and Software Versions by specifying security=on. disable ssl debug Syntax Description Examples DISable SSL DEBug[={ALL PACket STAte TRAce}] This command disables SSL debugging. Debugging is disabled by default. To disable all SSL debugging output, use the command: dis ssl deb To disable debugging for the handshake process, use the command: dis ssl deb=sta Related Commands enable ssl debug show ssl enable ssl debug Syntax Description Examples ENAble SSL DEBug[={ALL PACket STAte TRAce}] This command enables SSL debugging. The all option enables packet, state, and trace debugging. The packet debugging displays a decoded version of the SSL records transmitted and received. This is particularly useful for viewing the handshake sequence. The state debugging displays the progress of the handshake process. The trace debugging displays error and informational messages. The default is all. To enable all SSL debugging output, use the command: ena ssl deb To enable SSL packet debugging, use the command: ena ssl deb=pac Related Commands disable ssl debug show ssl Software Version DoS Attack Prevention Edition
9 Secure Sockets Layer (SSL) set ssl 27-9 set ssl Syntax SET SSL [CAchetimeout=cachetimeout] [DEbugipaddress={ALL ipadd}] [MAXsessions=maxsessions] where: cachetimeout is a decimal number from 60 to 600 ipadd is an IP address in dotted decimal notation maxsessions is a decimal number from 0 to 5000 Description This command sets all of the parameters required to configure SSL. The cachetimeout parameter determines the maximum time that a session is to be retained in the cache. The cache stores information about closed connections so they can be resumed quickly. The default is 300 seconds. The debugipaddress parameter specifies the level of debug output to display. If an IP address is specified, the debug output displays information about traffic sent and received on that IP address. If all is specified, the debug output displays information about traffic on all IP addresses. The default is all. The maxsessions parameter specifies the maximum number of sessions allowed in the session resumption cache. The default is 2000 sessions. Examples To set the timeout period for the session resumption cache to 180 seconds, use the command: set ssl ca=180 If you have a client computer with an IP address of , and you want to examine debugging information about all traffic that has been sent to or from this computer, use the command: set ssl de= Related Commands enable ssl debug show ssl show ssl sessions DoS Attack Prevention Edition Software Version 2.9.1
10 27-10 show ssl AlliedWare OS Software Reference show ssl Syntax Description SHow SSL This command displays current settings and statistical information about SSL. It also displays a table that shows the IP address and port number used for each application (Figure 27-2, Table 27-1). Figure 27-2: Example output from the show ssl command SHOW SSL SSL Configuration: Version... SSLv3, TLSv1 Ciphers Available... DES, RSA Maximum Number of Sessions sessions Cache Timeout seconds Debug IP Address... ALL Debug Mode... PKT,STATE,TRACE Statistics: Current Number of Sessions... 0 Max. Number of Sessions... 1 Last Handshake Time (ms) Av. Handshake Time (ms) Max. Handshake Time (ms) Last App. Data Processing Time (us) Max. App. Data Processing Time (us) Handshakes/Second... 0 Max Handshakes/Second... 0 Servers: ID IP Address Port Application Connections HTTP Server Table 27-1: Parameters in output of the show ssl command Parameter SSL Configuration Version Ciphers Available Meaning General information about SSL The SSL protocols that are supported. The encryption and authentication protocols that are supported. Maximum Number of Sessions The maximum number of SSL connections that can be stored in the session resumption cache. Cache Timeout Debug IP Address Debug Mode The period of time in seconds that a session remains in the session resumption cache. Debugging examines traffic to and from this IP address if one is specified. If ALL is shown, debugging examines traffic from all IP addresses. Whether the current debugging mode is ALL, PACKET, STATE, or TRACE. Software Version DoS Attack Prevention Edition
11 Secure Sockets Layer (SSL) show ssl Table 27-1: Parameters in output of the show ssl command (Continued) Parameter Statistics Current Number of Sessions Max. Number of Sessions Last Handshake Time Av. Handshake Time Max.Handshake Time Last App. Data Processing Time Max. App. Data Processing Time Handshakes/Second Max. Handshakes/Second Servers ID IP Address Port Application Connections Meaning Session information, and connection and packet processing times The number of sessions currently stored in the session resumption cache. The highest number of sessions stored in the session resumption cache since the switch was restarted. The most recent handshake time, measured in milliseconds. The handshake time is the elapsed time between the server receiving a CLIENT HELLO and sending the FINISHED message. The average duration of the last 10 handshake times, measured in milliseconds. If less than 10 handshakes have been performed, the average is calculated from the current total. The longest handshake time, in milliseconds. The period of time, in microseconds, that the switch took to encode, decode or perform an encryption operation. The longest period of time, in microseconds, that the switch took to encode, decode or perform an encryption operation. The approximate number of handshakes processed per second. The highest number of handshakes achieved per second. Entries that relate to SSL servers configured on the switch An identification number that references table entries. The IP address where packets are sent. The TCP port to which the application listens. Identifies the type of service provided by the server. The number of connections owned by the service. Examples Related Commands To display general information about SSL, use the command: sh ssl show ssl counters show ssl sessions DoS Attack Prevention Edition Software Version 2.9.1
12 27-12 show ssl counters AlliedWare OS Software Reference show ssl counters Syntax SHow SSL COUnters Description This command displays counters for SSL (Figure 27-3 on page 27-12, Table 27-2 on page 27-14). The counters reset when the switch is restarted. Figure 27-3: Example output from the show ssl counters command Show SSL Counters TCP: indata outdata inrecord outrecord inchangecs outdatafail... 0 inalert indatapassthrough... 0 inhandshake indatawhilebusy... 0 inappdata indatawhileclosing... 0 inunknown... 0 indatanoconnection... 0 closedafterfatalsent writeinputfail... 0 indatanodata... 0 tcpcloserequest tcpclosed startfailed... 0 closednoconnection... 0 appdata closerequestnoconnection 0 appdatawhilebusy... 0 appdatanoconnection... 0 appdatanodata... 0 processneedmoredata... 0 appflowcontrolblock... 0 processbufferinvalid... 0 processencoerror... 0 tcpestablished appdatapassthrough... 0 processdatainvalid... 0 General: inhsmessages... 4 inunexpected... 0 sslstop... 0 Server: serverstart... 2 inclienthello... 0 outserverhello... 2 insslv2clienthello... 2 outcert... 2 incert... 0 outcertrequest... 0 inclientkeyexchange... 1 outhellodone... 2 incertverify... 0 outchangecs... 1 infinished... 1 outfinished... 1 resumerequest... 0 cachehit... 0 cachemiss... 0 cachefull... 0 nociphermatch... 0 sslversion... 0 sslv2resumerequest... 0 resumediffcipher... 0 nocertloaded... 0 finishbeforeccs... 0 missingmessagecheckfail. 0 hshashfail(md5)... 0 hshashfail(sha)... 0 hshashfail(tls)... 0 badsessionidlen... 0 Client: clientstart... 0 inhellorequest... 0 outclienthello... 0 inserverhello... 0 outcert... 0 incert... 0 outcke... 0 incertrequest... 0 outcertverify... 0 inske... 0 outchangecs... 0 Software Version DoS Attack Prevention Edition
13 Secure Sockets Layer (SSL) show ssl counters Figure 27-3: Example output from the show ssl counters command (Continued) inhellodone... 0 outfinished... 0 inchangecipherspec... 0 infinished... 0 sslversionfail... 0 missingmessagefail... 0 certrequestnorsa... 0 nocert... 0 rxfinbeforechangecs... 0 hshashfail(md5)... 0 hshashfail(sha)... 0 hshashfail(tls)... 0 badsessionidlen... 1 Alerts Received: fatal... 0 warning... 0 closenotify... 0 unexpectedmessage... 0 badrecordmac... 0 decryptionfailed... 0 recordoverflow... 0 decompressionfailure... 0 handshakefailure... 0 nocertificate... 0 badcertificate... 0 unsupportedcert... 0 certrevoked... 0 certexpired... 0 certunknown... 0 illegalparameter... 0 unknownca... 0 accessdenied... 0 decodeerror... 0 decrypterror... 0 exportrestriction... 0 protocolversion... 0 insufficientsecurity... 0 internalerror... 0 usercancelled... 0 norenegotiation... 0 unknownalert... 0 Alerts Sent: total... 1 decryptionfailed... 0 unexpectedmessage... 0 protocolversion... 0 hanshakefailure... 0 nocertificate... 0 certunknown... 0 unsupportedcert... 0 closenotify... 1 badcertificate... 2 Enco: attach... 2 attached... 2 attachfail... 0 detach... 0 detached... 0 resete... 1 resetedone... 1 resetefail... 0 resetd... 1 resetddone... 1 resetdfail... 0 encode... 2 encoded... 2 encodefail... 0 decode... 2 decoded... 2 decodefail... 0 handshake... 1 handshakeok... 1 handshakefail... 0 callbacknoconnection... 0 getkeyok... 2 getkeyfail... 0 getcertgood... 1 getcertfail... 0 addcertgood... 0 newcertnottrusted... 0 addcertnoconnection... 0 certnottrusted... 0 Session Resumption Cache: sessioncreated... 1 sessioncreatefail... 0 sessiondestroy... 0 sessiondestroyfail DoS Attack Prevention Edition Software Version 2.9.1
14 27-14 show ssl counters AlliedWare OS Software Reference Table 27-2: Parameters in output of the show ssl counters command Parameter TCP indata inrecord inchangecs inalert inhandshake inappdata inunknown closedafterfatalsent indatanodata tcpclosed closednoconnection closerequestnoconnection appdatanoconnection processneedmoredata processbufferinvalid tcpestablished processdatainvalid outdata outrecord outdatafail indatapassthrough indatawhilebusy indatawhileclosing indatanoconnection writeinputfail tcpcloserequest startfailed appdata Meaning Counters for TCP The number of TCP packets received by SSL. The number of SSL records received. The number of Change Cipher Spec records received by SSL. The number of Alert records received by SSL. The number of handshake records received by SSL. The number of Application Data records received by SSL. The number of records received by SSL that had an unknown record type. The number of TCP connections closed after SSL sent a fatal alert. The number of times TCP informed SSL that a packet of data had arrived, but no data was found. The number of times TCP s state changed to CLOSE. The number of times SSL failed to find a connection when TCP closed. The number of times an SSL connection was not found when a request to close was received. The number of times SSL failed to find a connection for packets sent from the HTTP server. The number of times SSL required more data to construct a complete record. The number of times a corrupted buffer was received. The number of TCP state changes to ESTABLISHED. The number of times a record with an invalid type was received. The number of records sent to TCP for transmission. The number of records created for transmission. The number of times SSL failed to write data to the TCP output queue. The number of times SSL was in pass through mode and passed a packet to the application unchanged. The number of packets received while SSL was busy. The number of HANDSHAKE or CHANGE CIPHER SPEC records received and rejected because the connection was about to close. The number of packets rejected due to missing connection structure. The number of packets that SSL failed to write to the SSL input queue. The number of application requests to close the TCP connection. The number of times SSL failed to start. The number of packets sent by the application. Software Version DoS Attack Prevention Edition
15 Secure Sockets Layer (SSL) show ssl counters Table 27-2: Parameters in output of the show ssl counters command (Continued) Parameter appdatawhilebusy appdatanodata appflowcontrolblock processencoerror appdatapassthrough Main inhsmessages sslstop inunexpected Server serverstart inclienthello insslv2clienthello incert inclientkeyexchange incertverify infinished outserverhello outcert outcertrequest outhellodone outchangecs outfinished resumerequest cachemiss nociphermatch sslv2resumerequest nocertloaded missingmessagecheckfail hshashfail (sha) Meaning The number of packets of data sent from the HTTP server to SSL while SSL was busy. The number of times the HTTP server requested that SSL send some data, but none was found. The number of times the output flow control has affected the transmission of a packet. The number of times an error was received when attempting to decode a record. The number of packets of data from the HTTP server that passed through unchanged due to pass through mode. General counters for the SSL client and/or server The number of HANDSHAKE messages received. The number of times the SSL stop routine has been entered as a result of TCP closing. The number of unexpected HANDSHAKE messages received. Counters for the SSL server The number of times SSL started as a server. The number of CLIENT HELLO messages received. The number of SSLv2 compatible CLIENT HELLO messages received. The number of CERTIFICATE messages received. The number of CLIENT KEY EXCHANGE messages received. The number of CERTIFICATE VERIFY messages received. The number of FINISHED messages received. The number of SERVER HELLO messages sent. The number of CERTIFICATE messages sent. The number of CERTIFICATE REQUEST messages sent. The number of SERVER HELLO DONE messages sent. The number of CHANGE CIPHER SPEC messages sent. The number of FINISHED messages sent. The number of CLIENT HELLO messages received with a non-zero session ID. The number of times a session was not found in the session resumption cache. (It may have expired). The number of times the server did not support any ciphers offered by the client. The number of times the server sent a message to resume a SSLv2 session (SSLv2 not supported). The number of times the server did not have a certificate to send. The number of required handshake messages not seen. The number of times the client and server did not agree on the SHA portion of the handshake hash. DoS Attack Prevention Edition Software Version 2.9.1
16 27-16 show ssl counters AlliedWare OS Software Reference Table 27-2: Parameters in output of the show ssl counters command (Continued) Parameter badsessionidlen cachehit cachefull sslversion resumediffcipher finishedbeforeccs hshashfail (md5) hshashfail (tls) Client clientstart inhellorequest inserverhello incert incertrequest inske inhellodone inchangecipherspec infinished outclienthello outcert outcke outcertverify outchangecs outfinished sslversionfail certrequestnorsa rxfinbeforechangecs hshashfail (sha) badsessionidlen missingmessagefail nocert Meaning The number of CLIENT HELLO messages received with a session ID longer than 32 bytes. The number of times a session was successfully found in the session resumption cache. The number of attempts to create a new session in the session resumption cache while it was full. The number of CLIENT HELLO messages received that did not support the required SSL version. The number of client attempts to resume or re-handshake with a different cipher. The number of times a FINISHED message was received before a CHANGE CIPHER SPEC. The number of times the client and server did not agree on the MD5 portion of the handshake hash. The number of times the client and server did not agree on the TLS portion of the handshake hash. Counters for the SSL client The number of client implementations initiated. The number of HELLO REQUEST messages received. The number of SERVER HELLO messages received. The number of CERTIFICATE messages received. The number of CERTIFICATE REQUEST messages received. The number of SERVER KEY EXCHANGE messages received. The number of HELLO DONE messages received. The number of CHANGE CIPHER SPEC messages received. The number of FINISHED messages received. The number of CLIENT HELLO messages sent. The number of CERTIFICATE messages sent. The number of CLIENT KEY EXCHANGE messages sent. The number of CERTIFICATE VERIFY messages sent. The number of CHANGE CIPHER SPEC messages sent. The number of FINISHED messages sent. The number of times the server returned an SSL version unsupported by the client. The number of times a CERTIFICATE REQUEST was received that requested an unsupported certificate signature type. The number of times a FINISHED message was received before a CHANGE CIPHER SPEC. The number of times the SHA handshake hash failed. The number of SERVER HELLO messages received with a session ID longer than 32 bytes. The number of times a handshake message required for SSL was not seen. The number of times no certificate was loaded. Software Version DoS Attack Prevention Edition
17 Secure Sockets Layer (SSL) show ssl counters Table 27-2: Parameters in output of the show ssl counters command (Continued) Parameter hshashfail (md5) hshashfail (tls) Alerts Received fatal closenotify badrecordmac recordoverflow handshakefailure badcertificate certrevoked certunknown unknownca decodeerror exportrestriction insufficientsecurity usercancelled unknownalert warning unexpectedmessage decryptionfailed decompressionfailure nocertificate unsupportedcert certexpired illegalparameter accessdenied decrypterror protocolversion internalerror Meaning The number of times the MD5 handshake hash failed. The number of times the PRF handshake used for TLS failed. Counters for alerts received The number of fatal alerts received. The number of notifications that the other party is about to close the connection. The number of times an error was detected with a record s MAC. The number of times a record was received that was larger than allowed by SSL. The number of times the handshake failed. The number of times a certificate was corrupt or had incorrect signatures. The number of times a revoked certificate was received. The number of certificate errors that were unreported by the other certificate alerts (TLS only because SSLv3 uses nocertificate). The number of times the Certificate Authority was not known. The number of times a message could not be decoded because of an incorrect record field. The number of times export restrictions were violated (TLS only). The number of times the cipher suites offered by the client were weaker than those required by the server. The number of times the user cancelled the handshake. The number of times an undefined alert type was received. The number of warning alerts received. The number of unexpected messages received. The number of times decryption failed. The number of times decompression failed. The number of times no certificate was loaded (SSLv3 only because TLS uses certunknown). The number of times the certificate type was not supported. The number of times a certificate had passed its expiry date. The number of times a handshake field was out of range or inconsistent with another field. The number of times access was denied by the other party. The number of times a message failed to decode. The number of times a common SSL version could not be agreed upon. This message is sent by the server. The number of times the other party encountered an internal error. DoS Attack Prevention Edition Software Version 2.9.1
18 27-18 show ssl counters AlliedWare OS Software Reference Table 27-2: Parameters in output of the show ssl counters command (Continued) Parameter norenegotiation Alerts Sent total unexpectedmessage handshakefailure certunknown closenotify decryptionfailed protocolversion nocertificate unsupportedcert badcertificate Enco attach attachfail detached resetedone resetd resetdfail encoded decode decodefail handshakeok callbacknoconnection getkeyfail getcertfail newcertnottrusted Meaning The number of times the client refused a CLIENT HELLO REQUEST. Counters for alerts sent The number of alerts sent. The number of handshake messages received in the incorrect sequence. The number of times the handshake sequence failed to complete due to a fatal error. The number of times the certificate was not loaded (TLS only). The number of notifications that the connection was about to close. The number of times a message could not be decrypted. The number of times the client or server did not support SSLv3 or TLSv1. The number of times the Certificate was not loaded (SSLv3 only). The number of times an unsupported certificate type was received. (This could be anything other than RSA_SIGN). The number of times the certificate was not accepted. This is because the certificate was unknown or not trusted. Counters for encryption and decryption The number of SSL requests to attach a connection to an enco channel. The number of failed attempts to attach to an enco channel. The number of times the connection detached from an enco channel. The number of encode resets done. The number of decode reset requests. The number of decode reset failures. The number of records successfully encoded. The number of records successfully decoded. The number of records that failed to be decoded. The number of successful handshake operations. The number of times the connection in the enco callback function was not found. The number of times an RSA private key was not retrieved from the key ID. The number of times the certificate was not retrieved. The number of times the handshake failed because a certificate was not trusted. Software Version DoS Attack Prevention Edition
19 Secure Sockets Layer (SSL) show ssl counters Table 27-2: Parameters in output of the show ssl counters command (Continued) Parameter certnottrusted attached detach resete resetefail resetddone encode encodefail decoded handshake handshakefail getkeyok getcertgood addcertgood addcertnoconnection Session cache sessioncreated sessiondestroy sessioncreatefail SessionDestroyFail Meaning The number of times a certificate was received that was loaded, but not trusted. To change the trusted status of a certificate, use the set pki certificate command on page of Chapter 29, Public Key Infrastructure (PKI) The number of times the connection successfully attached to an enco channel. The number of detach requests sent to enco. The number of encode reset requests. The number of encode reset failures. The number of times decode was successfully reset. The number of requests to encode a record. The number of records that enco failed to encode. The number of records successfully decoded. The number of requests to perform a handshake operation. The number of times a handshake operation failed. The number of times an RSA private key was successfully retrieved. The number of times a certificate was successfully retrieved. The number of times a certificate was successfully added. The number of add certificate operation failures because there was no connection. Session counters The number of sessions created in the session resumption cache. The number of sessions deleted from the session resumption cache. The number of times the session resumption cache failed to create a new session. The number of the session resumption cache failed to delete a session. The session may have previously timed out. Examples Related Commands To display SSL counters, use the command: sh ssl cou show ssl show ssl sessions DoS Attack Prevention Edition Software Version 2.9.1
20 27-20 show ssl sessions AlliedWare OS Software Reference show ssl sessions Syntax Description SHow SSL SESsions This command displays detailed information about the SSL sessions stored in the session resumption cache (Figure 27-4, Table 27-3). Figure 27-4: Example output from the show ssl sessions command Session Database: SessionId Version CipherSuite TimeCreated TimeToLive ab128672adbbb228c TLSv1 RSA_DES_SHA 16:23: e77bd142892e3d03602d... SSLv3 RSA_DES_SHA 16:24: c09a97e133cfe0d7e... TLSv1 RSA_DES40_SHA 16:23: Table 27-3: Parameters in output of the show ssl sessions command Parameter SessionID Version CipherSuite TimeCreated TimeToLive Meaning The first 10 bytes of the 32-byte Session ID. SSL Version: SSLv3 or TLSv1. Cipher suite used for this session. The time that the session was started, in 24-hour format: hours:minutes:seconds. Approximate time in seconds that the session remains in the session resumption cache. Examples Related Commands To show information about sessions stored in the session resumption cache, use the command: sh ssl ses show ssl show ssl counters Software Version DoS Attack Prevention Edition
Chapter 34 Secure Sockets Layer (SSL)
Chapter 34 Secure Sockets Layer (SSL) Introduction... 34-2 SSL Operations... 34-2 Phases... 34-3 SSL on the Switch... 34-5 SSL and the Graphical User Interface... 34-5 SSL and Load Balancer... 34-5 Configuration
Chapter 51 Secure Sockets Layer (SSL)
Chapter 51 Secure Sockets Layer (SSL) Introduction... 51-2 SSL Operations... 51-2 Phases... 51-3 SSL on the Router... 51-5 SSL and the Graphical User Interface... 51-5 SSL and the load balancer... 51-6
SECURE SOCKETS LAYER (SSL) SECURE SOCKETS LAYER (SSL) SSL ARCHITECTURE SSL/TLS DIFFERENCES SSL ARCHITECTURE. INFS 766 Internet Security Protocols
INFS 766 Internet Security s Lecture 5 SSL Prof. Ravi Sandhu SECURE SOCKETS LAYER (SSL) layered on top of TCP SSL versions 1.0, 2.0, 3.0, 3.1 Netscape protocol later refitted as IETF standard TLS (Transport
SECURE SOCKETS LAYER (SSL)
INFS 766 Internet Security Protocols Lecture 5 SSL Prof. Ravi Sandhu SECURE SOCKETS LAYER (SSL) layered on top of TCP SSL versions 1.0, 2.0, 3.0, 3.1 Netscape protocol later refitted as IETF standard TLS
Secure Socket Layer. Security Threat Classifications
Secure Socket Layer 1 Security Threat Classifications One way to classify Web security threats in terms of the type of the threat: Passive threats Active threats Another way to classify Web security threats
Network Security Essentials Chapter 5
Network Security Essentials Chapter 5 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 5 Transport-Level Security Use your mentality Wake up to reality From the song, "I've Got
Communication Systems SSL
Communication Systems SSL Computer Science Organization I. Data and voice communication in IP networks II. Security issues in networking III. Digital telephony networks and voice over IP 2 Network Security
Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009
16 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009 1 25 Organization Welcome to the New Year! Reminder: Structure of Communication Systems lectures
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
IxLoad TM : Data HTTP, SSL, and FTP
IxLoad TM : Data HTTP, SSL, and FTP IxLoad tests the scalability and performance of content-aware networks and devices by emulating HTTP(S), SSL, and FTP clients and servers. IxLoad can be used to: Test
Secure Socket Layer (SSL) and Transport Layer Security (TLS)
Secure Socket Layer (SSL) and Transport Layer Security (TLS) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available
SSL/TLS. What Layer? History. SSL vs. IPsec. SSL Architecture. SSL Architecture. IT443 Network Security Administration Instructor: Bo Sheng
What Layer? /TLS IT443 Network Security Administration Instructor: Bo Sheng Application TCP IPSec IP LAN layer Application TCP IP LAN layer 1 2 History v2 proposed and deployed in Netscape 1.1 (1995) PCT
Transport Layer Security Protocols
SSL/TLS 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally designed to by Netscape to secure HTTP Version 2 is being replaced by version 3 Subsequently became Internet Standard known
Real-Time Communication Security: SSL/TLS. Guevara Noubir [email protected] CSU610
Real-Time Communication Security: SSL/TLS Guevara Noubir [email protected] CSU610 1 Some Issues with Real-time Communication Session key establishment Perfect Forward Secrecy Diffie-Hellman based PFS
Web Security Considerations
CEN 448 Security and Internet Protocols Chapter 17 Web Security Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University [email protected]
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Transport Level Security
Transport Level Security Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
ERserver. iseries. Securing applications with SSL
ERserver iseries Securing applications with SSL ERserver iseries Securing applications with SSL Copyright International Business Machines Corporation 2000, 2001. All rights reserved. US Government Users
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol
Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Network Layer: IPSec Transport Layer: SSL/TLS Chapter 4: Security on the Application Layer Chapter 5: Security
CSC 774 -- Network Security
CSC 774 -- Network Security Topic 6: Transport Layer Security Dr. Peng Ning CSC 774 Network Security 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally developed to secure http Version
Secure Socket Layer/ Transport Layer Security (SSL/TLS)
Secure Socket Layer/ Transport Layer Security (SSL/TLS) David Sánchez Universitat Pompeu Fabra World Wide Web (www) Client/server services running over the Internet or TCP/IP Intranets nets widely used
CSC 474 Information Systems Security
CSC 474 Information Systems Security Topic 4.5 Transport Layer Security CSC 474 Dr. Peng Ning 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally developed to secure http Version
Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
The Secure Sockets Layer (SSL)
Due to the fact that nearly all businesses have websites (as well as government agencies and individuals) a large enthusiasm exists for setting up facilities on the Web for electronic commerce. Of course
Overview of SSL. Outline. CSC/ECE 574 Computer and Network Security. Reminder: What Layer? Protocols. SSL Architecture
OS Appl. CSC/ECE 574 Computer and Network Security Outline I. Overview II. The Record Protocol III. The Handshake and Other Protocols Topic 8.3 /TLS 1 2 Reminder: What Layer? Overview of 3 4 Protocols
Outline. Transport Layer Security (TLS) Security Protocols (bmevihim132)
Security Protocols (bmevihim132) Dr. Levente Buttyán associate professor BME Híradástechnikai Tanszék Lab of Cryptography and System Security (CrySyS) [email protected], [email protected] Outline - architecture
ms-help://ms.technet.2005mar.1033/winnetsv/tnoffline/prodtechnol/winnetsv/plan/ssl...
Page 1 of 11 Windows Server 2003 SSL/TLS in Windows Server 2003 Chris Crall, Mike Danseglio, and David Mowers Microsoft Corporation Published: July 2003 Abstract The Microsoft Windows Server 2003 operating
Email, SNMP, Securing the Web: SSL
Email, SNMP, Securing the Web: SSL 4 January 2015 Lecture 12 4 Jan 2015 SE 428: Advanced Computer Networks 1 Topics for Today Email (SMTP, POP) Network Management (SNMP) ASN.1 Secure Sockets Layer 4 Jan
SSL Secure Socket Layer
??? SSL Secure Socket Layer - architecture and services - sessions and connections - SSL Record Protocol - SSL Handshake Protocol - key exchange alternatives - analysis of the SSL Record and Handshake
Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
SSL Secure Socket Layer
??? SSL Secure Socket Layer - architecture and services - sessions and connections - SSL Record Protocol - SSL Handshake Protocol - key exchange alternatives - analysis of the SSL Record and Handshake
Chapter 37 Server Load Balancing
Chapter 37 Server Load Balancing Introduction... 37-3 Overview... 37-3 Server Load Balancer on the Switch... 37-5 TCP Virtual Balancer... 37-6 Route-Based Virtual Balancer... 37-6 HTTP Virtual Balancer...
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
Secure Sockets Layer
SSL/TLS provides endpoint authentication and communications privacy over the Internet using cryptography. For web browsing, email, faxing, other data transmission. In typical use, only the server is authenticated
Network Security Part II: Standards
Network Security Part II: Standards Raj Jain Washington University Saint Louis, MO 63131 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 18-1 Overview
SBClient SSL. Ehab AbuShmais
SBClient SSL Ehab AbuShmais Agenda SSL Background U2 SSL Support SBClient SSL 2 What Is SSL SSL (Secure Sockets Layer) Provides a secured channel between two communication endpoints Addresses all three
Chapter 51 Server Load Balancing
Chapter 51 Server Load Balancing Introduction... 51-3 Overview... 51-3 Server Load Balancer on the Router... 51-5 TCP Virtual Balancer... 51-6 Route-Based Virtual Balancer... 51-6 HTTP Virtual Balancer...
Security Engineering Part III Network Security. Security Protocols (I): SSL/TLS
Security Engineering Part III Network Security Security Protocols (I): SSL/TLS Juan E. Tapiador [email protected] Department of Computer Science, UC3M Security Engineering 4th year BSc in Computer Science,
Announcement. Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed.
Announcement Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed. 1 We have learned Symmetric encryption: DES, 3DES, AES,
SSL Handshake Analysis
SSL Handshake Analysis Computer Measurement Group Webinar Nalini Elkins Inside Products, Inc. [email protected] Inside Products, Inc. (831) 659-8360 www.insidethestack.com www.ipproblemfinders.com
Three attacks in SSL protocol and their solutions
Three attacks in SSL protocol and their solutions Hong lei Zhang Department of Computer Science The University of Auckland [email protected] Abstract Secure Socket Layer (SSL) and Transport Layer
CS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang
INF3510 Information Security University of Oslo Spring 2011 Lecture 9 Communication Security Audun Jøsang Outline Network security concepts Communication security Perimeter security Protocol architecture
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
Configuring SSL Termination
CHAPTER 4 This chapter describes the steps required to configure a CSS as a virtual SSL server for SSL termination. It contains the following major sections: Overview of SSL Termination Creating an SSL
Savitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
WS_FTP Professional 12. Security Guide
WS_FTP Professional 12 Security Guide Contents CHAPTER 1 Secure File Transfer Selecting a Secure Transfer Method... 1 About SSL... 2 About SSH... 2 About OpenPGP... 2 Using FIPS 140-2 Validated Cryptography...
Managing and Securing Computer Networks. Guy Leduc. Chapter 4: Securing TCP. connections. connections. Chapter goals: security in practice:
Managing and Securing Computer Networks Guy Leduc Chapter 4: Securing TCP connections Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley, March 2012. (section
Lecture 4: Transport Layer Security (secure Socket Layer)
Lecture 4: Transport Layer Security (secure Socket Layer) Recommended reading: Thomas, SSS and TLS essentials (old but very well written) SSL/TLS: layered view HTTP SMTP TCP/UDP IPsec Network layer security
Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2
Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3
Integrated SSL Scanning
Software Version 9.0 Copyright Copyright 1996-2008. Finjan Software Inc. and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included in this publication are the exclusive
Chapter 5 Managing Configuration Files and Software Versions
Chapter 5 Managing Configuration Files and Software Versions Managing Configuration Files...5-3 Loading Files onto the Switch...5-4 Loading from a Trivial File Transfer Protocol (TFTP) Server... 5-4 Loading
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Network Security Web Security and SSL/TLS. Angelos Keromytis Columbia University
Network Security Web Security and SSL/TLS Angelos Keromytis Columbia University Web security issues Authentication (basic, digest) Cookies Access control via network address Multiple layers SHTTP SSL (TLS)
Communication Security for Applications
Communication Security for Applications Antonio Carzaniga Faculty of Informatics University of Lugano March 10, 2008 c 2008 Antonio Carzaniga 1 Intro to distributed computing: -server computing Transport-layer
SSL A discussion of the Secure Socket Layer
www.harmonysecurity.com [email protected] SSL A discussion of the Secure Socket Layer By Stephen Fewer Contents 1 Introduction 2 2 Encryption Techniques 3 3 Protocol Overview 3 3.1 The SSL Record
Secure Web Appliance. SSL Intercept
Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...
TLS and SRTP for Skype Connect. Technical Datasheet
TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security
mod_ssl Cryptographic Techniques
mod_ssl Overview Reference The nice thing about standards is that there are so many to choose from. And if you really don t like all the standards you just have to wait another year until the one arises
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Security. Learning Objectives. This module will help you...
Security 5-1 Learning Objectives This module will help you... Understand the security infrastructure supported by JXTA Understand JXTA's use of TLS for end-to-end security 5-2 Highlights Desired security
Overview SSL/TLS HTTPS SSH. TLS Protocol Architecture TLS Handshake Protocol TLS Record Protocol. SSH Protocol Architecture SSH Transport Protocol
SSL/TLS TLS Protocol Architecture TLS Handshake Protocol TLS Record Protocol HTTPS SSH SSH Protocol Architecture SSH Transport Protocol Overview SSH User Authentication Protocol SSH Connection Protocol
HTTPS: Transport-Layer Security (TLS), aka Secure Sockets Layer (SSL)
CSCD27 Computer and Network Security HTTPS: Transport-Layer Security (TLS), aka Secure Sockets Layer (SSL) 11 SSL CSCD27 Computer and Network Security 1 CSCD27F Computer and Network Security 1 TLS (Transport-Layer
Integrated SSL Scanning
Version 9.2 SSL Enhancements Copyright 1996-2008. Finjan Software Inc. and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included in this publication are the exclusive
Cleaning Encrypted Traffic
Optenet Documentation Cleaning Encrypted Traffic Troubleshooting Guide iii Version History Doc Version Product Date Summary of Changes V6 OST-6.4.300 01/02/2015 English editing Optenet Documentation
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
Chapter 5 Managing Configuration Files and Software Versions
Chapter 5 Managing Configuration Files and Software Versions Managing Configuration Files...5-3 Loading Files onto the Router...5-4 Loading from a Trivial File Transfer Protocol (TFTP) Server... 5-5 Loading
Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)
Security Protocols Security Protocols Necessary to communicate securely across untrusted network Provide integrity, confidentiality, authenticity of communications Based on previously discussed cryptographic
Websense Content Gateway HTTPS Configuration
Websense Content Gateway HTTPS Configuration web security data security email security Support Webinars 2010 Websense, Inc. All rights reserved. Webinar Presenter Title: Sr. Tech Support Specialist Cisco
ERserver. iseries. Secure Sockets Layer (SSL)
ERserver iseries Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) Copyright International Business Machines Corporation 2000, 2002. All rights reserved. US Government Users Restricted
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
WS_FTP Professional 12. Security Guide
WS_FTP Professional 12 Security Guide Contents CHAPTER 1 Secure File Transfer Selecting a Secure Transfer Method... 1 About SSL... 1 About SSH... 2 About OpenPGP... 2 Using FIPS 140-2 Validated Cryptography...
WEB Security & SET. Outline. Web Security Considerations. Web Security Considerations. Secure Socket Layer (SSL) and Transport Layer Security (TLS)
Outline WEB Security & SET (Chapter 19 & Stalling Chapter 7) Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction (SET) Web Security Considerations
As enterprises conduct more and more
Efficiently handling SSL transactions is one cornerstone of your IT security infrastructure. Do you know how the protocol actually works? Wesley Chou Inside SSL: The Secure Sockets Layer Protocol Inside
Lecture 7: Transport Level Security SSL/TLS. Course Admin
Lecture 7: Transport Level Security SSL/TLS CS 336/536: Computer Network Security Fall 2014 Nitesh Saxena Adopted from previous lecture by Tony Barnard Course Admin HW/Lab 1 Graded; scores posted; to be
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
Understanding Digital Certificates and Secure Sockets Layer (SSL)
Understanding Digital Certificates and Secure Sockets Layer (SSL) Author: Peter Robinson January 2001 Version 1.1 Copyright 2001-2003 Entrust. All rights reserved. Digital Certificates What are they?
Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1
Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1 How the Web Works - HTTP Hypertext transfer protocol (http). Clients request documents (or scripts) through URL. Server response with documents. Documents
WS_FTP Professional 12
WS_FTP Professional 12 Security Guide Contents CHAPTER 1 Secure File Transfer Selecting a Secure Transfer Method...1 About SSL...1 About SSH...2 About OpenPGP...2 Using FIPS 140-2 Validated Cryptography...2
Einführung in SSL mit Wireshark
Einführung in SSL mit Wireshark Chemnitzer Linux-Tage 16. März 2014 Martin Kaiser What? SSL/TLS is the most widely used security protocol on the Internet there's lots of parameters, options, extensions
Secure Socket Layer (SSL) and Trnasport Layer Security (TLS)
Secure Socket Layer (SSL) and Trnasport Layer Security (TLS) CSE598K/CSE545 - Advanced Network Security Prof. McDaniel - Spring 2008 1 SSL/TLS The Secure Socket Layer (SSL) and Transport Layer Security
Authenticity of Public Keys
SSL/TLS EJ Jung 10/18/10 Authenticity of Public Keys Bob s key? private key Bob public key Problem: How does know that the public key she received is really Bob s public key? Distribution of Public Keys!
Network Security - Secure upper layer protocols - Background. Email Security. Question from last lecture: What s a birthday attack? Dr.
Network Security - Secure upper layer protocols - Dr. John Keeney 3BA33 Question from last lecture: What s a birthday attack? might think a m-bit hash is secure but by Birthday Paradox is not the chance
Interested in learning more about security? SSL/TLS: What's Under the Hood. Copyright SANS Institute Author Retains Full Rights
Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. SSL/TLS:
Enabling SSL and Client Certificates on the SAP J2EE Engine
Enabling SSL and Client Certificates on the SAP J2EE Engine Angel Dichev RIG, SAP Labs SAP AG 1 Learning Objectives As a result of this session, you will be able to: Understand the different SAP J2EE Engine
Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security
UNIT 4 SECURITY PRACTICE Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security Slides Courtesy of William Stallings, Cryptography & Network Security,
Configuring Security Features of Session Recording
Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording
How To Understand And Understand The Ssl Protocol (Www.Slapl) And Its Security Features (Protocol)
WEB Security: Secure Socket Layer Cunsheng Ding HKUST, Hong Kong, CHINA C. Ding - COMP581 - L22 1 Outline of this Lecture Brief Information on SSL and TLS Secure Socket Layer (SSL) Transport Layer Security
Chapter 46 Terminal Server
Chapter 46 Terminal Server Introduction... 46-2 TTY Devices... 46-2 Multiple Sessions... 46-4 Accessing Telnet Hosts... 46-5 Command Reference... 46-7 connect... 46-7 disable telnet server... 46-7 disconnect...
GNUTLS. a Transport Layer Security Library This is a Draft document Applies to GnuTLS 1.0.13. by Nikos Mavroyanopoulos
GNUTLS a Transport Layer Security Library This is a Draft document Applies to GnuTLS 1.0.13 by Nikos Mavroyanopoulos ii Copyright c 2001,2002,2003 Nikos Mavroyanopoulos Permission is granted to copy, distribute
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
Enabling Remote Access to the ACE
CHAPTER 2 This chapter describes how to configure remote access to the Cisco Application Control Engine (ACE) module by establishing a remote connection by using the Secure Shell (SSH) or Telnet protocols.
Certificate Management. PAN-OS Administrator s Guide. Version 7.0
Certificate Management PAN-OS Administrator s Guide Version 7.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Security Protocols and Infrastructures. h_da, Winter Term 2011/2012
Winter Term 2011/2012 Chapter 7: Transport Layer Security Protocol Key Questions Application context of TLS? Which security goals shall be achieved? Approaches? 2 Contents Overview Record Protocol Cipher
Security Policy Revision Date: 23 April 2009
Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure
Configuring SSL Termination
CHAPTER3 This chapter describes the steps required to configure a context on the Cisco Application Control Engine (ACE) module as a virtual SSL server for SSL termination. It contains the following major
