Multifactor Authentication and Session Resumption in OpenVPN
|
|
|
- Emery Neal
- 10 years ago
- Views:
Transcription
1 Multifactor Authentication and Session Resumption in OpenVPN Report submitted in accordance with the requirements of the Indian Institute of Technology, Kanpur by Harshvardhan Sharma (11299), Shivanshu Agrawal (11688), Srijan R. Shetty (11727) November 2014
2 Abstract OpenVPN is an open source implementation of a Virtual Private Network. Mozilla uses OpenVPN with MFA via deferred C plugins and pythons scripts. However, there are several caveats that require non-plugin based modifications, such as One Time Passwords (OTP) client input and session tracking. The goal of this project has been to research and provide a first class user experience to the end user when using MFA with OpenVPN; including the support for session resumption and backwards compatibility with older versions of OpenVPN. In the long run, the authors would want their implementation of the changes discussed below be merged with the upstream version of OpenVPN. The entire project is GNU GPL Licensed and the source code is available on GitHub[7] The authors also maintain a Wiki page which tracks progress and has more information on the project at MFA. i
3 Contents Abstract Contents Acknowledgement Nomenclature i iii iv iv OpenVPN Introduction Architecture Encryption Authentication Modes Key Methods Networking Protocol Multifactor Authentication Introduction Challenges Implementation Packet Structure MFA Plugin Types Authentication mechanism Backwards Compatibility Configuration Server Client Backwards Compatibility Release Notes Commit Log ii
4 Session Resumption Introduction Challenges Implementation Possible Approaches Session Tokens Configuration Server Client Commit Log A OpenVPN Protocol 11 B Multifactor Authentication 15 B.1 Commit Log C Session Resumption 16 C.1 Commit Log Bibliography 17 Index 17 iii
5 Acknowledgement The authors would like to thank Professor Dheeraj Sanghi for his continued guidance and support, Guillaume Destuynder of Mozilla who mentored the authors despite his hectic schedule and lastly Mozilla for giving the authors an opportunity to work on a project like OpenVPN under its aegis. The authors wish to thank the University of Liverpool Computing Services Department for the development of this L A TEX thesis template. iv
6 OpenVPN 1.1 Introduction A Virtual Private network allows two devices to securely communicate with each other over a possibly insecure public network. This concept when extended to networks allows for secure communications between different private networks over an insecure network (most often the internet), through tunnelling and there by allowing all these private networks to be virtually connected. OpenVPN 1 is a GNU General Public Licensed 2 implementation of a Virtual Private Network written in C maintained by the OpenVPN project. The source of OpenVPN is freely available for modification; thereby encouraging willing developers to contribute to the development of OpenVPN. The changes made, if accepted by the developer community are eventually merged with the upstream version of OpenVPN. 1.2 Architecture Encryption OpenVPN can use either of OpenSSL or PolarSSL for encryption and decryption. The choice of the SSL library can be provided during compilation of OpenVPN binary Authentication Modes OpenVPN provides for two authentication modes: 1. Static Key: In this mode, a key is generated and shared between the users before the establishment of a tunnel. The static key comprises of four independent keys: HMAC send, HMAC receive, encrypt key and decrypt key. 2. TLS: In this mode, a bidirectional session using certificates is established between. On a successful TLS/SSL authentication, both side exchange source material for the key which is used to generate eight different keys (for the client and server). The key generation depends on the key method provided. Key method 1 derives it s source material from OpenSSL RAND bytes while key method 2 derives it from TLS PRF[6] function. Refer to
7 1.2.3 Key Methods The current architecture of OpenVPN supports two key methods: 1. Key Method 1, the legacy key method only checks for the validity of certificates. Refer to Appendix A on page 11 for details. 2. Key Method 2, in addition to checking for the validity of certificates, allows for authentication of the user through username and password. The verification of username and password is delegated to either a script or a plugin which returns a binary result indicating a success or failure. Refer to Appendix A on page 11 for details Networking TLS/SSL protocol mandates a reliable transport layer, while on the other hand the tunnelled IP packets require a unreliable layer beneath them. To overcome this reliability-layer collision, Open- VPN multiplexes both these connections. The SSL/TLS session used for authentication and key exchange is still sent over UDP but with a reliability layer provided by OpenVPN. Multiplexed with SSL/TLS session are the IP packets, which after being encrypted and signed by and HMAC are directly passed over the UDP layer. This ensures that each of these channels gets what it expects from the layer beneath it. Additionally, both these channels are completely independent of each other and hence do not interfere with each other s functioning. SSL/TLS -> Reliability Layer -> \ --tls-auth HMAC \ \ > Multiplexer ----> UDP / Transport IP Encrypt and HMAC / Tunnel -> using OpenSSL EVP --> / Packets interface. Figure 1.1: OpenVPN Networking Note: In recent releases OpenVPN, support TCP as a transport layer as well. 1.3 Protocol OpenVPN uses a custom protocol[1] for communications which is attached in appendix A on page 11 for perusal. 2
8 Multifactor Authentication 2.1 Introduction Multifactor Authentication, henceforth used interchangeably with MFA, hardens access control by challenging a user on at least two out of the following three factors of authentication. 1. Knowledge Factor: The knowledge factor of authentication comprises of authentication methods which tests the user for the knowledge of a pre-shared secret. things only the user knows. For example: ATM Pins, website passwords. 2. Possession Factor: The possession factor of authentication comprises of authentication methods which tests the user for the possession of an entity. things only the user has. For example: Smart cards, ATM Cards. 3. Inherence Factor: The inherence factor of authentication comprises of authentication methods which tests the user for possession of things only the user is. For example: Retinal scans, Fingerprint scans. While conventional methods of authentication only take into account a knowledge factor, (most internet websites which a username password mechanism to authenticate users) multi factor authentication includes at least two different factors from the aforementioned list and might even have multiple authentication methods for a particular factor. 2.2 Challenges 1. Singled Threaded: OpenVPN is single threaded process with an event loop which allows it to handle concurrent connection requests. Every request fires a timer in OpenVPN and if authentication does not succeed before the time quantum expires, the connection is reset. The time-out being tried and tested, was not up for modification. Considering that current MFA schemes like OTP depend upon non-reliable mechanisms like SMS during which the timeout might expire, we made use of the plugin system of OpenVPN which allowed for deferred authentication. Hence overcoming the hurdle of time-out during authentication. (Refer to on page 6 for implementation details.) 3
9 TLS plaintext packet (if key_method == 2): Literal 0 (4 bytes). key_method type (1 byte). key_source structure (pre_master only defined for client -> server). options_string_length, including null (2 bytes). Options string (n bytes, null terminated, client/server options string must match). [The username/password data below is optional] username_string_length, including null (2 bytes). Username string (n bytes, null terminated). password_string_length, including null (2 bytes) Password string (n bytes, null terminated) Figure 2.2: Old Plaintext packet structure 2. MFA Types: Multiple solutions are available for multifactor authentication, hence there was a need to provide an extensible mechanism to use the different available MFA authentication schemes. (Refer to on page 4 for implementation details.) 3. Backwards Compatibility: Considering that not all servers will want to support MFA, all the changes were introduced in a non breaking fashion. (Refer to on page 7 for implementation details.) 4. Defensive Coding: OpenVPN uses a defensive style of coding by using various abstractions for garbage collection, memory allocation to overcome the shortcomings of C and to protect against malicious users and untrusted input. 2.3 Implementation Packet Structure The packet structure of key method 2 - Refer to 2.3 on page 4 - was augmented with the addition of a MFA-username and a MFA-password in the options of TLS plaintext packet (key method 2) - Refer to on page 5 - following username and password fields for AUTH-USERPASS. To ensure backwards compatibility, all augmentations were made at the end of the packet MFA Plugin Types Three new OpenVPN plugin types have been introduced to support MFA. 4
10 TLS plaintext packet (if key_method == 2): Literal 0 (4 bytes). key_method type (1 byte). key_source structure (pre_master only defined for client -> server). options_string_length, including null (2 bytes). Options string (n bytes, null terminated, client/server options string must match). [The username/password data below is optional] username_string_length, including null (2 bytes). Username string (n bytes, null terminated). password_string_length, including null (2 bytes) Password string (n bytes, null terminated). [The MFA data below is optional] mfa_username_string_length, including null (2 bytes). MFA Username string (n bytes, null terminated). mfa_password_string_length, including null (2 bytes) MFA Password string (n bytes, null terminated) Figure 2.3: New plaintext packet structure MFA types OPENVPN PLUGIN AUTH MFA OTP VERIFY A one time password - OTP 3 - consist of only a password which can be conveniently delivered to the user using SMS, an OTP-stick, or an application like Google Authenticator. OPENVPN PLUGIN AUTH MFA USER PASS VERIFY The conventional username-password scheme requires the user to provide both a username and password for multifactor authentication. OPENVPN PLUGIN AUTH MFA PUSH VERIFY No input is required by the user in a push message 4 except the confirmation of a push from a pre selected device. In case of OTP authentication, the username field is set to the Common Name of the user and the OTP is sent as the password. The Common Name is sent as the username in PUSH with an 3 OTPs are a suite of digits, usually 6 to 8 digits long, which work only once and are invalidated after use (HOTP[3]) or valid for a certain period of time (TOTP[5]) 4 A push message is a push notification to a device owned by the user. On accepting the push message, the device sends the response to the server which in turn relays it to the OpenVPN plugin 5
11 empty string as password. The username and password fields are populated with the user supplied values in case of USER-PASS. To allow for maximum extensibility of MFA, the actual implementation of each kind of of MFA is left to the plugin/script writer to prevent a vendor lock down Authentication mechanism At the time of booting, the plugin/script mentioned in the configuration file is registered by Open- VPN s plugin system (only one plugin/script is allowed). During authentication, OpenVPN simply calls the registered plugin/script waits for a success/failure response. On receiving a success, Open- VPN continues on with the rest of the protocol; and on receiving a failure, OpenVPN immediately terminates the client connection by sending the client a SIGTERM signal Backwards Compatibility The following scenarios have been addressed under the backwards compatibility flag: Compatibility Server Client Action New Client, MFA-Enabled MFA-auth Enabled New Server, MFA-enabled New Client, MFA-Disabled auth-failure Old Client old-auth Disabled New Server, MFA-enabled Old Client auth-failure * New Server, MFA-disabled New Client, MFA-Enabled MFA-auth New Client, MFA-disabled old-auth * New Server, MFA-disabled Old Client old-auth * Old Server New Client, MFA-Enabled MFA-auth New Client, MFA-Disabled MFA-auth 2.4 Configuration Server To enable multifactor authentication in the server using a script, the following line needs to be included in the configuration file of the server: mfa-method [method-type] [script file name] [via-env/via-file] Here method-type is one of otp, push or user-pass. For example: mfa-method otp auth.pl via-file Multifactor authentication can also be enabled using plugins, the incantation for the same is: 6
12 mfa-method [method-type] plugin [plugin shared object file] Client To enable multifactor authentication in the client, the following line needs to be included in the configuration file of the client: mfa-method [method-type] Backwards Compatibility The server can allow connections from old clients during the initial transition phase by adding the following line to its configuration file: mfa-backward-compat 2.5 Release Notes 1. OpenVPN should be compiled with the enable-mfa (enabled by default) flag for Multifactor Authentication support. 2. The changes introduced by Multifactor Authentication despite being a complete overhaul of key method 2 constitute only a minor patch according to the Semver specification Commit Log Refer to Appendix B on page 15 for the commit log. 5 Semver or Semantic Versioning is a system of naming software releases as MAJOR.MINOR.PATCH. A major change introduces breaking changes to software. A minor change introduces non breaking features to software. A patch introduces non breaking fixes to the software. 7
13 Session Resumption 3.1 Introduction Multifactor Authentication trades security for convenience. While addition factors of authentication reduces the probability of the impersonation of user even in the face of the loss of password, they increase the complexity of authentication and ergo lead to a bad user experience. To provide a smoother user experience, most web based multifactor authentication flows provide for session resumption. Session resumption allows devices which on which the user has authenticated once using multifactor authentication to transparently store an additional secret the session token between the client and the server. The session token expires after a certain period of time, and provides for the additional factor of authentication without taking recourse to MFA. 3.2 Challenges 1. Security: The session resumption mechanism should be secure and resilient against cryptographic and implementation-based attacks. The session token used should be tied to the client s identity and it should not be possible for any entity other than the server to generate a valid token for any client within a reasonable amount of time. 2. User Experience: The entire process should be transparent to the user. Enabling support for session resumption should require minimal changes to the client and server configuration files. 3. Protocol: The entire procedure of session resumption should fit into the existing OpenVPN protocol so as to maintain backwards compatibility. 3.3 Implementation Possible Approaches There were two possible approaches to implement session resumption: TLS session resumption without server side state[4] or session cookies. We chose the latter for the following reasons: 1. It is widely recognized that TLS Session Resumption is not secure and many theoretical attack 8
14 vectors[8] have been proposed which leverage not the implementation of the feature but the fundamental ideas backing TLS Session Resmption. 2. The community norm seems to favour using only widely deployed features of TLS and not proposed features; and session resumption happens to be not used widely. 3. Session Resumption through cookies is widely used on many websites to maintain login sessions. In the case of OpenVPN, cookies are encrypted before being transferred which provides extra security and prevents session hijacking Session Tokens The chosen method of session resumption makes use of session tickets/tokens which are provided by the server to the client on successful authentication and can be used in future sessions to bypass the authentication. The session token is analogous to cookies used by websites to maintain state. On startup, the server generates a key (48 bytes). When the client successfully authenticates with MFA credentials, the server generates a token which is the HMAC [2] of the client s Common Name and the current UNIX timestamp using the key. The HMAC is calculated by XORing HMAC-SHA1 and HMAC-MD5. This procedure is also used by OpenVPN during tunnel key negotiation. The token and timestamp are sent back to the client in the server s key method 2 packet (See Fig ). The client stores these in a local file. During next authentication the timestamp and the token are sent instead of the MFA credentials. The server verifies that the timestamp is within mfa-session-expiration (Section 3.4) hours and verifies its authenticity by generating the HMAC and comparing it against the received token. If the verification succeeds, authentication is considered successful. If not, the client is prompted for the credentials. The advantage of this approach is that the server does not need to store any information related to the session. Hence no additional file or database is required to add session support. 3.4 Configuration Session Resumption, builds upon Multifactor Authentication, hence configuration parameters of MFA need to be setup for any of the following configuration parameters to have effect Server To enable session resumption in the server, a token expiration time must be provided in the server configuration file. 9
15 Credentials < SESSION 1 Server Client > Session token Session SESSION 2 token Server < Client Figure 3.4: Session resumption mfa-session-expiration [session-validity (in hours)] Client To enable multifactor authentication in the client, a file to store session tokens must be provided in the client configuration file. mfa-session-file [filename] In the absence the above configuration parameter, the user is warned and session resumption is disabled. 3.5 Commit Log Refer to Appendix C on page 16 for the commit log. 10
16 Appendix A OpenVPN Protocol [1] / OpenVPN Protocol, taken from s s l. h in OpenVPN source code. TCP/UDP Packet : This r e p r e s e n t s the top l e v e l e n c a p s u l a t i o n. TCP/UDP packet format : Packet l e n g t h (16 b i t s, unsigned ) TCP only, always sent as p l a i n t e x t. Since TCP i s a stream protocol, the packet l e n g t h words d e f i n e the p a c k e t i z a t i o n o f the stream. Packet opcode / k e y i d (8 b i t s ) TLS only, not used in pre shared s e c r e t mode. packet message type, a P constant ( high 5 b i t s ) k e y i d ( low 3 b i t s, s e e k e y i d in s t r u c t t l s s e s s i o n below f o r comment ). The k e y i d r e f e r s to an a l r e a d y n e g o t i a t e d TLS s e s s i o n. OpenVPN s e a m l e s s l y r e n e g o t i a t e s the TLS s e s s i o n by using a new k e y i d f o r the new s e s s i o n. Overlap ( c o n t r o l l e d by user d e f i n a b l e parameters ) between old and new TLS s e s s i o n s i s allowed, p r o v iding a seamless t r a n s i t i o n during tunnel o p e r a t i o n. Payload ( n bytes ), which may be a P CONTROL, P ACK, or P DATA message. Message types : P CONTROL HARD RESET CLIENT V1 Key method 1, i n i t i a l key from c l i e n t, f o r g e t p r e v i o u s s t a t e. P CONTROL HARD RESET SERVER V1 Key method 1, i n i t i a l key from s e r v e r, f o r g e t p r e v i o u s s t a t e. 11
17 P CONTROL SOFT RESET V1 New key, with a g r a c e f u l t r a n s i t i o n from old to new key in the s e n s e that a t r a n s i t i o n window e x i s t s where both the old or new k e y i d can be used. OpenVPN uses two d i f f e r e n t forms o f k e y i d. The f i r s t form i s 64 b i t s and i s used f o r a l l P CONTROL messages. P DATA messages on the other hand use a shortened k e y i d o f 3 b i t s f o r e f f i c i e n c y r e a s o n s s i n c e the vast majority o f OpenVPN packets in an a c t i v e tunnel w i l l be P DATA messages. The 64 b i t form i s r e f e r r e d to as a s e s s i o n i d, while the 3 b i t form i s r e f e r r e d to as a k e y i d. P CONTROL V1 Control channel packet ( u s u a l l y TLS c i p h e r t e x t ). P ACK V1 Acknowledgement f o r P CONTROL packets r e c e i v e d. P DATA V1 Data channel packet c o n t a i n i n g a c t u a l tunnel data c i p h e r t e x t. P CONTROL HARD RESET CLIENT V2 Key method 2, i n i t i a l key from c l i e n t, f o r g e t p r e v i o u s s t a t e. P CONTROL HARD RESET SERVER V2 Key method 2, i n i t i a l key from s erver, f o r g e t p r e v i o u s s t a t e. P CONTROL and P ACK Payload : The P CONTROL message type i n d i c a t e s a TLS c i p h e r t e x t packet which has been encapsulated i n s i d e o f a r e l i a b i l i t y l a y e r. The r e l i a b i l i t y l a y e r i s implemented as a s t r a i g h t f o r w a r d ACK and r e t r a n s m i t model. P CONTROL message format : l o c a l s e s s i o n i d ( random 64 b i t value to i d e n t i f y TLS s e s s i o n ). HMAC s i g n a t u r e o f e n t i r e e n c a p s u l a t i o n header f o r i n t e g r i t y check i f t l s auth i s s p e c i f i e d ( u s u a l l y 16 or 20 bytes ). packet id f o r r e p l a y p r o t e c t i o n (4 or 8 bytes, i n c l u d e s sequence number and o p t i o n a l t i m e t timestamp ). P ACK p a c k e t i d array l ength (1 byte ). P ACK packet id array ( i f l ength > 0 ). P ACK remote s e s s i o n i d ( i f length > 0 ). message packet id (4 bytes ). TLS payload c i p h e r t e x t ( n bytes ) ( only f o r P CONTROL). Once the TLS s e s s i o n has been i n i t i a l i z e d and authenticated, the TLS channel i s used to exchange random key m a t e r i a l f o r b i d i r e c t i o n a l c i p h e r and HMAC keys which w i l l be used to s e c u r e a c t u a l tunnel packets. OpenVPN c u r r e n t l y implements two key methods. Key method 1 d i r e c t l y 12
18 d e r i v e s keys using random b i t s obtained from the RAND bytes OpenSSL f u n c t i o n. Key method 2 mixes random key m a t e r i a l from both s i d e s o f the connection using the TLS PRF mixing f u n c t i o n. Key method 2 i s the p r e f e r r e d method and i s the d e f a u l t f o r OpenVPN TLS p l a i n t e x t content : TLS p l a i n t e x t packet ( i f key method == 1 ) : Cipher key l e n g t h in bytes (1 byte ). Cipher key ( n bytes ). HMAC key l e n g t h in bytes (1 byte ). HMAC key ( n bytes ). Options s t r i n g ( n bytes, n u l l terminated, c l i e n t / s e r v e r o p t i o n s s t r i n g should match ). TLS p l a i n t e x t packet ( i f key method == 2 ) : L i t e r a l 0 (4 bytes ). key method type ( 1 byte ). k e y s o u r c e s t r u c t u r e ( pre master only d e f i n e d f o r c l i e n t > s e r v e r ). o p t i o n s s t r i n g l e n g t h, i n c l u d i n g n u l l (2 bytes ). Options s t r i n g ( n bytes, n u l l terminated, c l i e n t / s e r v e r o p t i o n s s t r i n g must match ). [ The username / password data below i s optional, record can end at t h i s point. ] u s e r n a m e s t r i n g l e n g t h, i n c l u d i n g n u l l (2 bytes ). Username s t r i n g ( n bytes, n u l l terminated ). p a s s w o r d s t r i n g l e n g t h, i n c l u d i n g n u l l (2 bytes ). Password s t r i n g ( n bytes, n u l l terminated ). The P DATA payload r e p r e s e n t s encrypted, encapsulated tunnel packets which tend to be e i t h e r IP packets or Ethernet frames. This i s e s s e n t i a l l y the payload o f the VPN. P DATA message content : HMAC o f c i p h e r t e x t IV + c i p h e r t e x t ( i f not d i s a b l e d by auth none ). Ciphertext IV ( s i z e i s cipher dependent, i f not d i s a b l e d by no i v ). Tunnel packet c i p h e r t e x t. P DATA p l a i n t e x t p a c k e t i d (4 or 8 bytes, i f not d i s a b l e d by no r e p l a y ). In SSL/TLS mode, 4 bytes are used because the implementation can f o r c e a TLS r e n e g o t a t i o n b e f o r e 2ˆ32 packets are sent. 13
19 In pre shared key mode, 8 bytes are used ( sequence number and t i m e t value ) to allow long term key usage without p a c k e t i d c o l l i s i o n s. User p l a i n t e x t ( n bytes ). Notes : ( 1 ) ACK messages can be encoded in e i t h e r the dedicated P ACK r e cord or they can be prepended to a P CONTROL message. ( 2 ) P DATA and P CONTROL/P ACK use independent packet id sequences because P DATA i s an u n r e l i a b l e channel while P CONTROL/P ACK i s a r e l i a b l e channel. Each use t h e i r own independent HMAC keys. ( 3 ) Note that when t l s auth i s used, a l l message types are p r o t e c t e d with an HMAC s i g n a t u r e, even the i n i t i a l packets o f the TLS handshake. This makes i t easy f o r OpenVPN to throw away bogus packets quickly, without wasting r e s o u r c e s on attempting a TLS handshake which w i l l u l t i m a t e l y f a i l. / 14
20 Appendix B Multifactor Authentication B.1 Commit Log Taken form (Wed Oct 29) bc05baa c l e a r MFA c r e d e n t i a l s in s s l p u r g e a u t h ( Sun Oct 19) c misc f i x e s (Tue Oct 14) 95 f f 0 b 5 Backward c o m p a t i b i l i t y f o r MFA a u t h e n t i c a t i o n (Wed Oct 15) e0bfc77 s /MAX MFA METHODS/MFA TYPE N, send mfa type as i n t (Thu Oct 9) d8 minor cleanup (Thu Oct 9) r e f a c t o r mfa o p t i o n s (Wed Oct 8) 53 d7aec p a s s i n g c r e d e n t i a l s to s c r i p t via f i l e (Wed Oct 1) 6 f298d5 auth by s c r i p t (Wed Oct 1) 397 b7f4 r e f a c t o r e d m f a m e t h o d s l i s t ( Sat Sep 2 7) 504 b0e9 Removed MFA name parameter (Thu Sep 25) 83 c 0 f 4 5 r e s t r i c t the maximum number o f mfa methods to 8 (Wed Sep 24) 1baab9b v e r i f i e d the MFA c r e d e n t i a l s via plugin (Tue Sep 9) 985 d7d1 read and v e r i f y MFA o p t i o n s ( Sun Sep 7) 769 c841 w r i t e MFA o p t i o n s in key method 2 packet ( Fri Sep 5) f10bd46 check mfa type while reading c o n f i g f i l e ( Fri Sep 5) e Get MFA c r e d e n t i a l s from user (Mon Sep 1) 01 dcf59 read MFA o p t i o n s from c o n f i g f i l e 15
21 Appendix C Session Resumption C.1 Commit Log Taken form ( Sat Nov 8) 8995 c27 hard coded key and c o o k i e f o r CN c l i e n t 2 ( Sat Nov 8) db1c1f4 f i x e s in v e r i f y c o o k i e ( ) ( Sat Nov 8) c c f c don t goto e r r o r i f c o o k i e v e r i f i c a t i o n succeeds ( Fri Nov 7) e f c f c l i e n t s i d e f i x e s f o r s e s s i o n support ( Fri Nov 7) ec58441 f i x e s ; token g e n e r a t i o n working ( Fri Nov 7) 4734 d94 use hours f o r mfa s e s s i o n v a l i d i t y ( Fri Nov 7) b46ed78 Bug f i x : auth mfa setup i s now c a l l e d p r o p e r l y everywhere ( Fri Nov 7) b81684d Fix f o r g c f r e e and t v w i t h i n m i n u t e s (Wed Nov 5) e60debd Check f o r c o o k i e e x p i r a t i o n (Wed Nov 5) b32e6b7 Fix f o r m f a s e s s i o n t o k e n s e n t (Wed Nov 5) 2 a668d8 c r e a t e new c o o k i e in key method 2 write (Wed Nov 5) 1 a31f12 f i x e s (Wed Nov 5) 3 a36fb8 v e r i f y and g e nerate f u n c t i o n s f o r checking c o o k i e (Tue Nov 4) 79 d9279 f i x e d a6cfa86 (Tue Nov 4) a6cfa86 WIP: changes in key method 2 read on s e r v e r s i d e (Mon Nov 3) 02 d242f WIP: read c l i e n t c o o k i e from key method 2 packet (Mon Nov 3) c8c1837 WIP: Cookie c r e a t i o n by s e r v e r ; TODO: c r e a t e c o o k i e ( ) (Mon Nov 3) 03 bb698 Fixes f o r p r e v i o u s compilation e r r o r s ( Sun Nov 2) bbf6fad Changed the d i r e c t i v e f o r mfa s e s s i o n ( Sun Nov 2) bade0e4 WIP: Read c l i e n t sent data ( Sat Nov 1) d7a5e2f WIP: Functions f o r p a r s i n g timestamp ( Sat Nov 1) e00da6c SQUASH: Fixes f o r p r e v i o u s commit ( Fri Oct 31) e 5 e f g e n e r a t e IV when s e r v e r s t a r t s up ( Fri Oct 31) b10b95d f i x compiler e r r o r s (Thu Oct 30) 50 f8189 WIP, w r i t e s e s s i o n token in key method 2 packet (Wed Oct 29) e6 WIP: s e s s i o n support (Wed Oct 29) d60887c Module f o r mfa s e s s i o n (Tue Oct 28) 064 a895 Read mfa s e s s i o n o p t i o n s ( Sun Oct 19) c misc f i x e s 16
22 Bibliography [1] OpenVPN Community. Openvpn security overview. Accessed: [2] Internet Engineering Task Force. Hmac: Keyed-hashing for message authentication. Accessed: [3] Internet Engineering Task Force. Hotp: A hmac based one-time password algorithm. Accessed: [4] Internet Engineering Task Force. Tls session resumption without server-side state. Accessed: [5] Internet Engineering Task Force. Totp: Time based one-time password algorithm. Accessed: [6] Internet Engineering Task Force. Transport layer security (tls) protocol v Accessed: [7] Srijan R. Shetty Harshwardhan Sharma, Shivanshu Agarwal. Source code repository. Accessed: [8] Secure Resumption. Triple handshakes considered harmful breaking and fixing authentication over tls. Accessed:
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)
Security Protocols Security Protocols Necessary to communicate securely across untrusted network Provide integrity, confidentiality, authenticity of communications Based on previously discussed cryptographic
Web Security Considerations
CEN 448 Security and Internet Protocols Chapter 17 Web Security Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University [email protected]
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
The Secure Sockets Layer (SSL)
Due to the fact that nearly all businesses have websites (as well as government agencies and individuals) a large enthusiasm exists for setting up facilities on the Web for electronic commerce. Of course
Vidder PrecisionAccess
Vidder PrecisionAccess Security Architecture February 2016 910 E HAMILTON AVENUE. SUITE 410 CAMPBELL, CA 95008 P: 408.418.0440 F: 408.706.5590 WWW.VIDDER.COM Table of Contents I. Overview... 3 II. Components...
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
Transport Layer Security Protocols
SSL/TLS 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally designed to by Netscape to secure HTTP Version 2 is being replaced by version 3 Subsequently became Internet Standard known
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Security Protocols/Standards
Security Protocols/Standards Security Protocols/Standards Security Protocols/Standards How do we actually communicate securely across a hostile network? Provide integrity, confidentiality, authenticity
Transport Level Security
Transport Level Security Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
7.1. Remote Access Connection
7.1. Remote Access Connection When a client uses a dial up connection, it connects to the remote access server across the telephone system. Windows client and server operating systems use the Point to
Network Security Essentials Chapter 5
Network Security Essentials Chapter 5 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 5 Transport-Level Security Use your mentality Wake up to reality From the song, "I've Got
Einführung in SSL mit Wireshark
Einführung in SSL mit Wireshark Chemnitzer Linux-Tage 16. März 2014 Martin Kaiser What? SSL/TLS is the most widely used security protocol on the Internet there's lots of parameters, options, extensions
[SMO-SFO-ICO-PE-046-GU-
Presentation This module contains all the SSL definitions. See also the SSL Security Guidance Introduction The package SSL is a static library which implements an API to use the dynamic SSL library. It
Secure Socket Layer (SSL) and Transport Layer Security (TLS)
Secure Socket Layer (SSL) and Transport Layer Security (TLS) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available
Secure VidyoConferencing SM TECHNICAL NOTE. Protecting your communications. www.vidyo.com 1.866.99.VIDYO
TECHNICAL NOTE Secure VidyoConferencing SM Protecting your communications 2012 Vidyo, Inc. All rights reserved. Vidyo, VidyoTechnology, VidyoConferencing, VidyoLine, VidyoRouter, VidyoPortal,, VidyoRouter,
Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer
Other VPNs TLS/SSL, PPTP, L2TP Advanced Computer Networks SS2005 Jürgen Häuselhofer Overview Introduction to VPNs Why using VPNs What are VPNs VPN technologies... TLS/SSL Layer 2 VPNs (PPTP, L2TP, L2TP/IPSec)
Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku
Univerzita Komenského v Bratislave Fakulta matematiky, fyziky a informatiky Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku ITMS: 26140230008 dopytovo orientovaný projekt Moderné
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
Network Security. Lecture 3
Network Security Lecture 3 Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Security protocols application transport network datalink physical Contents IPSec overview
Bit Chat: A Peer-to-Peer Instant Messenger
Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare [email protected] https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one
Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)
Network Security Securing communications (SSL/TLS and IPSec) Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT) Network communication Who are you
TLS/SSL in distributed systems. Eugen Babinciuc
TLS/SSL in distributed systems Eugen Babinciuc Contents 1. Introduction to TLS/SSL 2. A quick review of cryptography 3. TLS/SSL in distributed systems 4. Conclusions Introduction to TLS/SSL TLS/SSL History
Cleaning Encrypted Traffic
Optenet Documentation Cleaning Encrypted Traffic Troubleshooting Guide iii Version History Doc Version Product Date Summary of Changes V6 OST-6.4.300 01/02/2015 English editing Optenet Documentation
INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang
INF3510 Information Security University of Oslo Spring 2011 Lecture 9 Communication Security Audun Jøsang Outline Network security concepts Communication security Perimeter security Protocol architecture
CS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
PHP Magic Tricks: Type Juggling. PHP Magic Tricks: Type Juggling
Who Am I Chris Smith (@chrismsnz) Previously: Polyglot Developer - Python, PHP, Go + more Linux Sysadmin Currently: Pentester, Consultant at Insomnia Security Little bit of research Insomnia Security Group
Application Note: Onsight Device VPN Configuration V1.1
Application Note: Onsight Device VPN Configuration V1.1 Table of Contents OVERVIEW 2 1 SUPPORTED VPN TYPES 2 1.1 OD VPN CLIENT 2 1.2 SUPPORTED PROTOCOLS AND CONFIGURATION 2 2 OD VPN CONFIGURATION 2 2.1
Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2
BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution
Internet Mail Client Control Library SSL Supplement
Codestone Ltd Internet Mail Client Control Library SSL Supplement Codestone Ltd 2004 Page 1 / 22 Welcome to the Internet Mail Client Control Library SSL Supplement we hope you will find the library to
ViSolve Open Source Solutions
ViSolve Open Source Solutions Best-In-Class Authentication and Authorization Solutions & Services ViSolve Inc. ViSolve Securing Digital Assets Contents Security Overview Security Concerns Security Needs
Security Considerations for DirectAccess Deployments. Whitepaper
Security Considerations for DirectAccess Deployments Whitepaper February 2015 This white paper discusses security planning for DirectAccess deployment. Introduction DirectAccess represents a paradigm shift
Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
SECURE FTP CONFIGURATION SETUP GUIDE
SECURE FTP CONFIGURATION SETUP GUIDE CONTENTS Overview... 3 Secure FTP (FTP over SSL/TLS)... 3 Connectivity... 3 Settings... 4 FTP file cleanup information... 5 Troubleshooting... 5 Tested FTP clients
GlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
SNARE Agent for Windows v 4.2.3 - Release Notes
SNARE Agent for Windows v 4.2.3 - Release Notes Snare is a program that facilitates the central collection and processing of the Windows Event Log information. All three primary event logs (Application,
Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W
Article ID: 5037 Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W Objective IPSec VPN (Virtual Private Network) enables you to securely obtain remote resources by establishing
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
Secure Web Access Solution
Secure Web Access Solution I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. E-CODE SECURE WEB ACCESS SOLUTION... 3 OVERVIEW... 3 PKI SECURE WEB ACCESS... 4 Description...
ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief
ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS Adaptive Authentication in Juniper SSL VPN Environments Solution Brief RSA Adaptive Authentication is a comprehensive authentication platform providing
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
Simple, Secure and Flexible VPN solution for home and business
Simple, Secure and Flexible VPN solution for home and business me Romain Bourgue IT Security and open source fan Works for the french Civil Service since 2003 [email protected] Summary VPN solutions
Strong Authentication for Microsoft SharePoint
Strong Authentication for Microsoft SharePoint with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
Network Security and AAA
ICT Technical Update Module Network Security and AAA Prof. Dr Harsha Sirisena Electrical and Computer Engineering University of Canterbury AAA Introduction Overview A network administrator may allow remote
Viking VPN Guide Linux/UNIX
Viking VPN Guide Linux/UNIX Table Of Contents 1 : VPN Questions answered 2 : Installing the Linux Client 3 : Connecting with the Linux Client 4 : Reporting Problems Version 1.0 : 10/27/2010 Information
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Overview of SSL. Outline. CSC/ECE 574 Computer and Network Security. Reminder: What Layer? Protocols. SSL Architecture
OS Appl. CSC/ECE 574 Computer and Network Security Outline I. Overview II. The Record Protocol III. The Handshake and Other Protocols Topic 8.3 /TLS 1 2 Reminder: What Layer? Overview of 3 4 Protocols
Cisco AnyConnect Secure Mobility Client VPN User Messages, Release 3.1
Cisco AnyConnect Secure Mobility Client VPN User Messages, Release 3.1 October 15, 2012 The following user messages appear on the AnyConnect client GUI. A description follows each message, along with recommended
How To Understand And Understand The Security Of A Key Infrastructure
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used
Security Engineering Part III Network Security. Security Protocols (II): IPsec
Security Engineering Part III Network Security Security Protocols (II): IPsec Juan E. Tapiador [email protected] Department of Computer Science, UC3M Security Engineering 4th year BSc in Computer Science,
Configuration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
ProtectID. for Financial Services
ProtectID for Financial Services StrikeForce Technologies, Inc. 1090 King Georges Post Road #108 Edison, NJ 08837, USA http://www.strikeforcetech.com Tel: 732 661-9641 Fax: 732 661-9647 Introduction 2
SSH Secure Shell. What is SSH?
Security, like correctness, is not an add-on feature. -- Andrew S. Tanenbaum SSH Secure Shell - - Binary Packet Protocol - key exchange - server authentication - - SSH Connection Protocol What is SSH?
Is Your SSL Website and Mobile App Really Secure?
Is Your SSL Website and Mobile App Really Secure? Agenda What is SSL / TLS SSL Vulnerabilities PC/Server Mobile Advice to the Public Hong Kong Computer Emergency Response Team Coordination Centre 香 港 電
Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw
IP Security IPSec, PPTP, OpenVPN Pawel Cieplinski, AkademiaWIFI.pl MUM Wroclaw Introduction www.akademiawifi.pl WCNG - Wireless Network Consulting Group We are group of experienced professionals. Our company
SENSE Security overview 2014
SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2
SSL/TLS. What Layer? History. SSL vs. IPsec. SSL Architecture. SSL Architecture. IT443 Network Security Administration Instructor: Bo Sheng
What Layer? /TLS IT443 Network Security Administration Instructor: Bo Sheng Application TCP IPSec IP LAN layer Application TCP IP LAN layer 1 2 History v2 proposed and deployed in Netscape 1.1 (1995) PCT
z/os Firewall Technology Overview
z/os Firewall Technology Overview Mary Sweat E - Mail: [email protected] Washington System Center OS/390 Firewall/VPN 1 Firewall Technologies Tools Included with the OS/390 Security Server Configuration
Managing Users and Identity Stores
CHAPTER 8 Overview ACS manages your network devices and other ACS clients by using the ACS network resource repositories and identity stores. When a host connects to the network through ACS requesting
Real-Time Communication Security: SSL/TLS. Guevara Noubir [email protected] CSU610
Real-Time Communication Security: SSL/TLS Guevara Noubir [email protected] CSU610 1 Some Issues with Real-time Communication Session key establishment Perfect Forward Secrecy Diffie-Hellman based PFS
How To Understand And Understand The Ssl Protocol (Www.Slapl) And Its Security Features (Protocol)
WEB Security: Secure Socket Layer Cunsheng Ding HKUST, Hong Kong, CHINA C. Ding - COMP581 - L22 1 Outline of this Lecture Brief Information on SSL and TLS Secure Socket Layer (SSL) Transport Layer Security
BlackShield ID Agent for Terminal Services Web and Remote Desktop Web
Agent for Terminal Services Web and Remote Desktop Web 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication
Using Entrust certificates with VPN
Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
Secure Sockets Layer
SSL/TLS provides endpoint authentication and communications privacy over the Internet using cryptography. For web browsing, email, faxing, other data transmission. In typical use, only the server is authenticated
NetIQ Advanced Authentication Framework
NetIQ Advanced Authentication Framework Security Officer Guide Version 5.2.0 1 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 Authenticators Management 4 Card 8 Email OTP
BlackShield ID Agent for Remote Web Workplace
Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,
Configuration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT
Subject Code Department Semester : Network Security : XCS593 : MSc SE : Nineth Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT Part A (2 marks) 1. What are the various layers of an OSI reference
Release Notes for Epilog for Windows Release Notes for Epilog for Windows v1.7/v1.8
Release Notes for Epilog for Windows v1.7/v1.8 InterSect Alliance International Pty Ltd Page 1 of 22 About this document This document provides release notes for Snare Enterprise Epilog for Windows release
SSL Handshake Analysis
SSL Handshake Analysis Computer Measurement Group Webinar Nalini Elkins Inside Products, Inc. [email protected] Inside Products, Inc. (831) 659-8360 www.insidethestack.com www.ipproblemfinders.com
Insecure network services. Firewalls. Two separable topics. Packet filtering. Example: blocking forgeries. Example: blocking outgoing mail
Insecure network services NFS (port 2049) - Read/write entire FS as any non-root user given a dir. handle - Many OSes make handles easy to guess Portmap (port 111) - Relays RPC requests, making them seem
Network Security Part II: Standards
Network Security Part II: Standards Raj Jain Washington University Saint Louis, MO 63131 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 18-1 Overview
Research Article. Research of network payment system based on multi-factor authentication
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):437-441 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research of network payment system based on multi-factor
SECURE SOCKETS LAYER (SSL) SECURE SOCKETS LAYER (SSL) SSL ARCHITECTURE SSL/TLS DIFFERENCES SSL ARCHITECTURE. INFS 766 Internet Security Protocols
INFS 766 Internet Security s Lecture 5 SSL Prof. Ravi Sandhu SECURE SOCKETS LAYER (SSL) layered on top of TCP SSL versions 1.0, 2.0, 3.0, 3.1 Netscape protocol later refitted as IETF standard TLS (Transport
Guideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
Security Policy Revision Date: 23 April 2009
Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure
How To Fix A Username Enumeration On A Vpn On A Pc Or Ipv (Vpn) On A Password Protected Ipv 2 (Vvv) On An Ipv 3 (Vp) On Pc Or Password Protected (V
Common VPN Security Flaws Roy Hills, NTA Monitor Ltd. http://www.nta-monitor.com/ January 2005 Abstract This paper outlines some of the common VPN security flaws that NTA Monitor have found during the
Security Aspects Of Communications To Substations
Security Aspects Of Communications To Substations Mark Adamiak GE Digital Energy, Multilin Herb Falk SISCO 1. Abstract The security of data and information transmitted either point to point or through
Two-Factor Authentication over Mobile: Simplifying Security and Authentication
SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively Table
Strong Authentication for Microsoft TS Web / RD Web
Strong Authentication for Microsoft TS Web / RD Web with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
Overview SSL/TLS HTTPS SSH. TLS Protocol Architecture TLS Handshake Protocol TLS Record Protocol. SSH Protocol Architecture SSH Transport Protocol
SSL/TLS TLS Protocol Architecture TLS Handshake Protocol TLS Record Protocol HTTPS SSH SSH Protocol Architecture SSH Transport Protocol Overview SSH User Authentication Protocol SSH Connection Protocol
Vulnerabilità dei protocolli SSL/TLS
Università degli Studi di Milano Facoltà di Scienze Matematiche, Fisiche e Naturali Dipartimento di Informatica e Comunicazione Vulnerabilità dei protocolli SSL/TLS Andrea Visconti Overview Introduction
Three attacks in SSL protocol and their solutions
Three attacks in SSL protocol and their solutions Hong lei Zhang Department of Computer Science The University of Auckland [email protected] Abstract Secure Socket Layer (SSL) and Transport Layer
Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security
UNIT 4 SECURITY PRACTICE Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security Slides Courtesy of William Stallings, Cryptography & Network Security,
IDENTITY & ACCESS. Providing Cost-Effective Strong Authentication in the Cloud. a brief for cloud service providers
IDENTITY & ACCESS Providing Cost-Effective Strong Authentication in the Cloud a brief for cloud service providers Introduction Interest and use of the cloud to store enterprise resources is growing fast.
Implementing two-factor authentication: Google s experiences. Cem Paya ([email protected]) Information Security Team Google Inc.
Implementing two-factor authentication: Google s experiences Cem Paya ([email protected]) Information Security Team Google Inc. Google services and personalization Identity management at Google 1. Internal
YubiKey Integration for Full Disk Encryption
YubiKey Integration for Full Disk Encryption Pre-Boot Authentication Version 1.2 May 7, 2012 Introduction Disclaimer yubico Yubico is the leading provider of simple, open online identity protection. The
Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords
Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords Author: Paul Seymer CMSC498a Contents 1 Background... 2 1.1 HTTP 1.0/1.1... 2 1.2 Password
Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009
16 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009 1 25 Organization Welcome to the New Year! Reminder: Structure of Communication Systems lectures
Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003
http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with
Building Secure Multi-Factor Authentication
Building Secure Multi-Factor Authentication Three best practices for engineering and product leaders Okta Inc. I 301 Brannan Street, Suite 300 I San Francisco CA, 94107 [email protected] I 1-888-722-7871 Introduction
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan
International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014 1410 Secured Authentication Using Mobile Phone as Security Token Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin
Secure Shell SSH provides support for secure remote login, secure file transfer, and secure TCP/IP and X11 forwarding. It can automatically encrypt,
Secure Shell SSH provides support for secure remote login, secure file transfer, and secure TCP/IP and X11 forwarding. It can automatically encrypt, authenticate, and compress transmitted data. The main
