Multifactor Authentication and Session Resumption in OpenVPN

Size: px
Start display at page:

Download "Multifactor Authentication and Session Resumption in OpenVPN"

Transcription

1 Multifactor Authentication and Session Resumption in OpenVPN Report submitted in accordance with the requirements of the Indian Institute of Technology, Kanpur by Harshvardhan Sharma (11299), Shivanshu Agrawal (11688), Srijan R. Shetty (11727) November 2014

2 Abstract OpenVPN is an open source implementation of a Virtual Private Network. Mozilla uses OpenVPN with MFA via deferred C plugins and pythons scripts. However, there are several caveats that require non-plugin based modifications, such as One Time Passwords (OTP) client input and session tracking. The goal of this project has been to research and provide a first class user experience to the end user when using MFA with OpenVPN; including the support for session resumption and backwards compatibility with older versions of OpenVPN. In the long run, the authors would want their implementation of the changes discussed below be merged with the upstream version of OpenVPN. The entire project is GNU GPL Licensed and the source code is available on GitHub[7] The authors also maintain a Wiki page which tracks progress and has more information on the project at MFA. i

3 Contents Abstract Contents Acknowledgement Nomenclature i iii iv iv OpenVPN Introduction Architecture Encryption Authentication Modes Key Methods Networking Protocol Multifactor Authentication Introduction Challenges Implementation Packet Structure MFA Plugin Types Authentication mechanism Backwards Compatibility Configuration Server Client Backwards Compatibility Release Notes Commit Log ii

4 Session Resumption Introduction Challenges Implementation Possible Approaches Session Tokens Configuration Server Client Commit Log A OpenVPN Protocol 11 B Multifactor Authentication 15 B.1 Commit Log C Session Resumption 16 C.1 Commit Log Bibliography 17 Index 17 iii

5 Acknowledgement The authors would like to thank Professor Dheeraj Sanghi for his continued guidance and support, Guillaume Destuynder of Mozilla who mentored the authors despite his hectic schedule and lastly Mozilla for giving the authors an opportunity to work on a project like OpenVPN under its aegis. The authors wish to thank the University of Liverpool Computing Services Department for the development of this L A TEX thesis template. iv

6 OpenVPN 1.1 Introduction A Virtual Private network allows two devices to securely communicate with each other over a possibly insecure public network. This concept when extended to networks allows for secure communications between different private networks over an insecure network (most often the internet), through tunnelling and there by allowing all these private networks to be virtually connected. OpenVPN 1 is a GNU General Public Licensed 2 implementation of a Virtual Private Network written in C maintained by the OpenVPN project. The source of OpenVPN is freely available for modification; thereby encouraging willing developers to contribute to the development of OpenVPN. The changes made, if accepted by the developer community are eventually merged with the upstream version of OpenVPN. 1.2 Architecture Encryption OpenVPN can use either of OpenSSL or PolarSSL for encryption and decryption. The choice of the SSL library can be provided during compilation of OpenVPN binary Authentication Modes OpenVPN provides for two authentication modes: 1. Static Key: In this mode, a key is generated and shared between the users before the establishment of a tunnel. The static key comprises of four independent keys: HMAC send, HMAC receive, encrypt key and decrypt key. 2. TLS: In this mode, a bidirectional session using certificates is established between. On a successful TLS/SSL authentication, both side exchange source material for the key which is used to generate eight different keys (for the client and server). The key generation depends on the key method provided. Key method 1 derives it s source material from OpenSSL RAND bytes while key method 2 derives it from TLS PRF[6] function. Refer to

7 1.2.3 Key Methods The current architecture of OpenVPN supports two key methods: 1. Key Method 1, the legacy key method only checks for the validity of certificates. Refer to Appendix A on page 11 for details. 2. Key Method 2, in addition to checking for the validity of certificates, allows for authentication of the user through username and password. The verification of username and password is delegated to either a script or a plugin which returns a binary result indicating a success or failure. Refer to Appendix A on page 11 for details Networking TLS/SSL protocol mandates a reliable transport layer, while on the other hand the tunnelled IP packets require a unreliable layer beneath them. To overcome this reliability-layer collision, Open- VPN multiplexes both these connections. The SSL/TLS session used for authentication and key exchange is still sent over UDP but with a reliability layer provided by OpenVPN. Multiplexed with SSL/TLS session are the IP packets, which after being encrypted and signed by and HMAC are directly passed over the UDP layer. This ensures that each of these channels gets what it expects from the layer beneath it. Additionally, both these channels are completely independent of each other and hence do not interfere with each other s functioning. SSL/TLS -> Reliability Layer -> \ --tls-auth HMAC \ \ > Multiplexer ----> UDP / Transport IP Encrypt and HMAC / Tunnel -> using OpenSSL EVP --> / Packets interface. Figure 1.1: OpenVPN Networking Note: In recent releases OpenVPN, support TCP as a transport layer as well. 1.3 Protocol OpenVPN uses a custom protocol[1] for communications which is attached in appendix A on page 11 for perusal. 2

8 Multifactor Authentication 2.1 Introduction Multifactor Authentication, henceforth used interchangeably with MFA, hardens access control by challenging a user on at least two out of the following three factors of authentication. 1. Knowledge Factor: The knowledge factor of authentication comprises of authentication methods which tests the user for the knowledge of a pre-shared secret. things only the user knows. For example: ATM Pins, website passwords. 2. Possession Factor: The possession factor of authentication comprises of authentication methods which tests the user for the possession of an entity. things only the user has. For example: Smart cards, ATM Cards. 3. Inherence Factor: The inherence factor of authentication comprises of authentication methods which tests the user for possession of things only the user is. For example: Retinal scans, Fingerprint scans. While conventional methods of authentication only take into account a knowledge factor, (most internet websites which a username password mechanism to authenticate users) multi factor authentication includes at least two different factors from the aforementioned list and might even have multiple authentication methods for a particular factor. 2.2 Challenges 1. Singled Threaded: OpenVPN is single threaded process with an event loop which allows it to handle concurrent connection requests. Every request fires a timer in OpenVPN and if authentication does not succeed before the time quantum expires, the connection is reset. The time-out being tried and tested, was not up for modification. Considering that current MFA schemes like OTP depend upon non-reliable mechanisms like SMS during which the timeout might expire, we made use of the plugin system of OpenVPN which allowed for deferred authentication. Hence overcoming the hurdle of time-out during authentication. (Refer to on page 6 for implementation details.) 3

9 TLS plaintext packet (if key_method == 2): Literal 0 (4 bytes). key_method type (1 byte). key_source structure (pre_master only defined for client -> server). options_string_length, including null (2 bytes). Options string (n bytes, null terminated, client/server options string must match). [The username/password data below is optional] username_string_length, including null (2 bytes). Username string (n bytes, null terminated). password_string_length, including null (2 bytes) Password string (n bytes, null terminated) Figure 2.2: Old Plaintext packet structure 2. MFA Types: Multiple solutions are available for multifactor authentication, hence there was a need to provide an extensible mechanism to use the different available MFA authentication schemes. (Refer to on page 4 for implementation details.) 3. Backwards Compatibility: Considering that not all servers will want to support MFA, all the changes were introduced in a non breaking fashion. (Refer to on page 7 for implementation details.) 4. Defensive Coding: OpenVPN uses a defensive style of coding by using various abstractions for garbage collection, memory allocation to overcome the shortcomings of C and to protect against malicious users and untrusted input. 2.3 Implementation Packet Structure The packet structure of key method 2 - Refer to 2.3 on page 4 - was augmented with the addition of a MFA-username and a MFA-password in the options of TLS plaintext packet (key method 2) - Refer to on page 5 - following username and password fields for AUTH-USERPASS. To ensure backwards compatibility, all augmentations were made at the end of the packet MFA Plugin Types Three new OpenVPN plugin types have been introduced to support MFA. 4

10 TLS plaintext packet (if key_method == 2): Literal 0 (4 bytes). key_method type (1 byte). key_source structure (pre_master only defined for client -> server). options_string_length, including null (2 bytes). Options string (n bytes, null terminated, client/server options string must match). [The username/password data below is optional] username_string_length, including null (2 bytes). Username string (n bytes, null terminated). password_string_length, including null (2 bytes) Password string (n bytes, null terminated). [The MFA data below is optional] mfa_username_string_length, including null (2 bytes). MFA Username string (n bytes, null terminated). mfa_password_string_length, including null (2 bytes) MFA Password string (n bytes, null terminated) Figure 2.3: New plaintext packet structure MFA types OPENVPN PLUGIN AUTH MFA OTP VERIFY A one time password - OTP 3 - consist of only a password which can be conveniently delivered to the user using SMS, an OTP-stick, or an application like Google Authenticator. OPENVPN PLUGIN AUTH MFA USER PASS VERIFY The conventional username-password scheme requires the user to provide both a username and password for multifactor authentication. OPENVPN PLUGIN AUTH MFA PUSH VERIFY No input is required by the user in a push message 4 except the confirmation of a push from a pre selected device. In case of OTP authentication, the username field is set to the Common Name of the user and the OTP is sent as the password. The Common Name is sent as the username in PUSH with an 3 OTPs are a suite of digits, usually 6 to 8 digits long, which work only once and are invalidated after use (HOTP[3]) or valid for a certain period of time (TOTP[5]) 4 A push message is a push notification to a device owned by the user. On accepting the push message, the device sends the response to the server which in turn relays it to the OpenVPN plugin 5

11 empty string as password. The username and password fields are populated with the user supplied values in case of USER-PASS. To allow for maximum extensibility of MFA, the actual implementation of each kind of of MFA is left to the plugin/script writer to prevent a vendor lock down Authentication mechanism At the time of booting, the plugin/script mentioned in the configuration file is registered by Open- VPN s plugin system (only one plugin/script is allowed). During authentication, OpenVPN simply calls the registered plugin/script waits for a success/failure response. On receiving a success, Open- VPN continues on with the rest of the protocol; and on receiving a failure, OpenVPN immediately terminates the client connection by sending the client a SIGTERM signal Backwards Compatibility The following scenarios have been addressed under the backwards compatibility flag: Compatibility Server Client Action New Client, MFA-Enabled MFA-auth Enabled New Server, MFA-enabled New Client, MFA-Disabled auth-failure Old Client old-auth Disabled New Server, MFA-enabled Old Client auth-failure * New Server, MFA-disabled New Client, MFA-Enabled MFA-auth New Client, MFA-disabled old-auth * New Server, MFA-disabled Old Client old-auth * Old Server New Client, MFA-Enabled MFA-auth New Client, MFA-Disabled MFA-auth 2.4 Configuration Server To enable multifactor authentication in the server using a script, the following line needs to be included in the configuration file of the server: mfa-method [method-type] [script file name] [via-env/via-file] Here method-type is one of otp, push or user-pass. For example: mfa-method otp auth.pl via-file Multifactor authentication can also be enabled using plugins, the incantation for the same is: 6

12 mfa-method [method-type] plugin [plugin shared object file] Client To enable multifactor authentication in the client, the following line needs to be included in the configuration file of the client: mfa-method [method-type] Backwards Compatibility The server can allow connections from old clients during the initial transition phase by adding the following line to its configuration file: mfa-backward-compat 2.5 Release Notes 1. OpenVPN should be compiled with the enable-mfa (enabled by default) flag for Multifactor Authentication support. 2. The changes introduced by Multifactor Authentication despite being a complete overhaul of key method 2 constitute only a minor patch according to the Semver specification Commit Log Refer to Appendix B on page 15 for the commit log. 5 Semver or Semantic Versioning is a system of naming software releases as MAJOR.MINOR.PATCH. A major change introduces breaking changes to software. A minor change introduces non breaking features to software. A patch introduces non breaking fixes to the software. 7

13 Session Resumption 3.1 Introduction Multifactor Authentication trades security for convenience. While addition factors of authentication reduces the probability of the impersonation of user even in the face of the loss of password, they increase the complexity of authentication and ergo lead to a bad user experience. To provide a smoother user experience, most web based multifactor authentication flows provide for session resumption. Session resumption allows devices which on which the user has authenticated once using multifactor authentication to transparently store an additional secret the session token between the client and the server. The session token expires after a certain period of time, and provides for the additional factor of authentication without taking recourse to MFA. 3.2 Challenges 1. Security: The session resumption mechanism should be secure and resilient against cryptographic and implementation-based attacks. The session token used should be tied to the client s identity and it should not be possible for any entity other than the server to generate a valid token for any client within a reasonable amount of time. 2. User Experience: The entire process should be transparent to the user. Enabling support for session resumption should require minimal changes to the client and server configuration files. 3. Protocol: The entire procedure of session resumption should fit into the existing OpenVPN protocol so as to maintain backwards compatibility. 3.3 Implementation Possible Approaches There were two possible approaches to implement session resumption: TLS session resumption without server side state[4] or session cookies. We chose the latter for the following reasons: 1. It is widely recognized that TLS Session Resumption is not secure and many theoretical attack 8

14 vectors[8] have been proposed which leverage not the implementation of the feature but the fundamental ideas backing TLS Session Resmption. 2. The community norm seems to favour using only widely deployed features of TLS and not proposed features; and session resumption happens to be not used widely. 3. Session Resumption through cookies is widely used on many websites to maintain login sessions. In the case of OpenVPN, cookies are encrypted before being transferred which provides extra security and prevents session hijacking Session Tokens The chosen method of session resumption makes use of session tickets/tokens which are provided by the server to the client on successful authentication and can be used in future sessions to bypass the authentication. The session token is analogous to cookies used by websites to maintain state. On startup, the server generates a key (48 bytes). When the client successfully authenticates with MFA credentials, the server generates a token which is the HMAC [2] of the client s Common Name and the current UNIX timestamp using the key. The HMAC is calculated by XORing HMAC-SHA1 and HMAC-MD5. This procedure is also used by OpenVPN during tunnel key negotiation. The token and timestamp are sent back to the client in the server s key method 2 packet (See Fig ). The client stores these in a local file. During next authentication the timestamp and the token are sent instead of the MFA credentials. The server verifies that the timestamp is within mfa-session-expiration (Section 3.4) hours and verifies its authenticity by generating the HMAC and comparing it against the received token. If the verification succeeds, authentication is considered successful. If not, the client is prompted for the credentials. The advantage of this approach is that the server does not need to store any information related to the session. Hence no additional file or database is required to add session support. 3.4 Configuration Session Resumption, builds upon Multifactor Authentication, hence configuration parameters of MFA need to be setup for any of the following configuration parameters to have effect Server To enable session resumption in the server, a token expiration time must be provided in the server configuration file. 9

15 Credentials < SESSION 1 Server Client > Session token Session SESSION 2 token Server < Client Figure 3.4: Session resumption mfa-session-expiration [session-validity (in hours)] Client To enable multifactor authentication in the client, a file to store session tokens must be provided in the client configuration file. mfa-session-file [filename] In the absence the above configuration parameter, the user is warned and session resumption is disabled. 3.5 Commit Log Refer to Appendix C on page 16 for the commit log. 10

16 Appendix A OpenVPN Protocol [1] / OpenVPN Protocol, taken from s s l. h in OpenVPN source code. TCP/UDP Packet : This r e p r e s e n t s the top l e v e l e n c a p s u l a t i o n. TCP/UDP packet format : Packet l e n g t h (16 b i t s, unsigned ) TCP only, always sent as p l a i n t e x t. Since TCP i s a stream protocol, the packet l e n g t h words d e f i n e the p a c k e t i z a t i o n o f the stream. Packet opcode / k e y i d (8 b i t s ) TLS only, not used in pre shared s e c r e t mode. packet message type, a P constant ( high 5 b i t s ) k e y i d ( low 3 b i t s, s e e k e y i d in s t r u c t t l s s e s s i o n below f o r comment ). The k e y i d r e f e r s to an a l r e a d y n e g o t i a t e d TLS s e s s i o n. OpenVPN s e a m l e s s l y r e n e g o t i a t e s the TLS s e s s i o n by using a new k e y i d f o r the new s e s s i o n. Overlap ( c o n t r o l l e d by user d e f i n a b l e parameters ) between old and new TLS s e s s i o n s i s allowed, p r o v iding a seamless t r a n s i t i o n during tunnel o p e r a t i o n. Payload ( n bytes ), which may be a P CONTROL, P ACK, or P DATA message. Message types : P CONTROL HARD RESET CLIENT V1 Key method 1, i n i t i a l key from c l i e n t, f o r g e t p r e v i o u s s t a t e. P CONTROL HARD RESET SERVER V1 Key method 1, i n i t i a l key from s e r v e r, f o r g e t p r e v i o u s s t a t e. 11

17 P CONTROL SOFT RESET V1 New key, with a g r a c e f u l t r a n s i t i o n from old to new key in the s e n s e that a t r a n s i t i o n window e x i s t s where both the old or new k e y i d can be used. OpenVPN uses two d i f f e r e n t forms o f k e y i d. The f i r s t form i s 64 b i t s and i s used f o r a l l P CONTROL messages. P DATA messages on the other hand use a shortened k e y i d o f 3 b i t s f o r e f f i c i e n c y r e a s o n s s i n c e the vast majority o f OpenVPN packets in an a c t i v e tunnel w i l l be P DATA messages. The 64 b i t form i s r e f e r r e d to as a s e s s i o n i d, while the 3 b i t form i s r e f e r r e d to as a k e y i d. P CONTROL V1 Control channel packet ( u s u a l l y TLS c i p h e r t e x t ). P ACK V1 Acknowledgement f o r P CONTROL packets r e c e i v e d. P DATA V1 Data channel packet c o n t a i n i n g a c t u a l tunnel data c i p h e r t e x t. P CONTROL HARD RESET CLIENT V2 Key method 2, i n i t i a l key from c l i e n t, f o r g e t p r e v i o u s s t a t e. P CONTROL HARD RESET SERVER V2 Key method 2, i n i t i a l key from s erver, f o r g e t p r e v i o u s s t a t e. P CONTROL and P ACK Payload : The P CONTROL message type i n d i c a t e s a TLS c i p h e r t e x t packet which has been encapsulated i n s i d e o f a r e l i a b i l i t y l a y e r. The r e l i a b i l i t y l a y e r i s implemented as a s t r a i g h t f o r w a r d ACK and r e t r a n s m i t model. P CONTROL message format : l o c a l s e s s i o n i d ( random 64 b i t value to i d e n t i f y TLS s e s s i o n ). HMAC s i g n a t u r e o f e n t i r e e n c a p s u l a t i o n header f o r i n t e g r i t y check i f t l s auth i s s p e c i f i e d ( u s u a l l y 16 or 20 bytes ). packet id f o r r e p l a y p r o t e c t i o n (4 or 8 bytes, i n c l u d e s sequence number and o p t i o n a l t i m e t timestamp ). P ACK p a c k e t i d array l ength (1 byte ). P ACK packet id array ( i f l ength > 0 ). P ACK remote s e s s i o n i d ( i f length > 0 ). message packet id (4 bytes ). TLS payload c i p h e r t e x t ( n bytes ) ( only f o r P CONTROL). Once the TLS s e s s i o n has been i n i t i a l i z e d and authenticated, the TLS channel i s used to exchange random key m a t e r i a l f o r b i d i r e c t i o n a l c i p h e r and HMAC keys which w i l l be used to s e c u r e a c t u a l tunnel packets. OpenVPN c u r r e n t l y implements two key methods. Key method 1 d i r e c t l y 12

18 d e r i v e s keys using random b i t s obtained from the RAND bytes OpenSSL f u n c t i o n. Key method 2 mixes random key m a t e r i a l from both s i d e s o f the connection using the TLS PRF mixing f u n c t i o n. Key method 2 i s the p r e f e r r e d method and i s the d e f a u l t f o r OpenVPN TLS p l a i n t e x t content : TLS p l a i n t e x t packet ( i f key method == 1 ) : Cipher key l e n g t h in bytes (1 byte ). Cipher key ( n bytes ). HMAC key l e n g t h in bytes (1 byte ). HMAC key ( n bytes ). Options s t r i n g ( n bytes, n u l l terminated, c l i e n t / s e r v e r o p t i o n s s t r i n g should match ). TLS p l a i n t e x t packet ( i f key method == 2 ) : L i t e r a l 0 (4 bytes ). key method type ( 1 byte ). k e y s o u r c e s t r u c t u r e ( pre master only d e f i n e d f o r c l i e n t > s e r v e r ). o p t i o n s s t r i n g l e n g t h, i n c l u d i n g n u l l (2 bytes ). Options s t r i n g ( n bytes, n u l l terminated, c l i e n t / s e r v e r o p t i o n s s t r i n g must match ). [ The username / password data below i s optional, record can end at t h i s point. ] u s e r n a m e s t r i n g l e n g t h, i n c l u d i n g n u l l (2 bytes ). Username s t r i n g ( n bytes, n u l l terminated ). p a s s w o r d s t r i n g l e n g t h, i n c l u d i n g n u l l (2 bytes ). Password s t r i n g ( n bytes, n u l l terminated ). The P DATA payload r e p r e s e n t s encrypted, encapsulated tunnel packets which tend to be e i t h e r IP packets or Ethernet frames. This i s e s s e n t i a l l y the payload o f the VPN. P DATA message content : HMAC o f c i p h e r t e x t IV + c i p h e r t e x t ( i f not d i s a b l e d by auth none ). Ciphertext IV ( s i z e i s cipher dependent, i f not d i s a b l e d by no i v ). Tunnel packet c i p h e r t e x t. P DATA p l a i n t e x t p a c k e t i d (4 or 8 bytes, i f not d i s a b l e d by no r e p l a y ). In SSL/TLS mode, 4 bytes are used because the implementation can f o r c e a TLS r e n e g o t a t i o n b e f o r e 2ˆ32 packets are sent. 13

19 In pre shared key mode, 8 bytes are used ( sequence number and t i m e t value ) to allow long term key usage without p a c k e t i d c o l l i s i o n s. User p l a i n t e x t ( n bytes ). Notes : ( 1 ) ACK messages can be encoded in e i t h e r the dedicated P ACK r e cord or they can be prepended to a P CONTROL message. ( 2 ) P DATA and P CONTROL/P ACK use independent packet id sequences because P DATA i s an u n r e l i a b l e channel while P CONTROL/P ACK i s a r e l i a b l e channel. Each use t h e i r own independent HMAC keys. ( 3 ) Note that when t l s auth i s used, a l l message types are p r o t e c t e d with an HMAC s i g n a t u r e, even the i n i t i a l packets o f the TLS handshake. This makes i t easy f o r OpenVPN to throw away bogus packets quickly, without wasting r e s o u r c e s on attempting a TLS handshake which w i l l u l t i m a t e l y f a i l. / 14

20 Appendix B Multifactor Authentication B.1 Commit Log Taken form (Wed Oct 29) bc05baa c l e a r MFA c r e d e n t i a l s in s s l p u r g e a u t h ( Sun Oct 19) c misc f i x e s (Tue Oct 14) 95 f f 0 b 5 Backward c o m p a t i b i l i t y f o r MFA a u t h e n t i c a t i o n (Wed Oct 15) e0bfc77 s /MAX MFA METHODS/MFA TYPE N, send mfa type as i n t (Thu Oct 9) d8 minor cleanup (Thu Oct 9) r e f a c t o r mfa o p t i o n s (Wed Oct 8) 53 d7aec p a s s i n g c r e d e n t i a l s to s c r i p t via f i l e (Wed Oct 1) 6 f298d5 auth by s c r i p t (Wed Oct 1) 397 b7f4 r e f a c t o r e d m f a m e t h o d s l i s t ( Sat Sep 2 7) 504 b0e9 Removed MFA name parameter (Thu Sep 25) 83 c 0 f 4 5 r e s t r i c t the maximum number o f mfa methods to 8 (Wed Sep 24) 1baab9b v e r i f i e d the MFA c r e d e n t i a l s via plugin (Tue Sep 9) 985 d7d1 read and v e r i f y MFA o p t i o n s ( Sun Sep 7) 769 c841 w r i t e MFA o p t i o n s in key method 2 packet ( Fri Sep 5) f10bd46 check mfa type while reading c o n f i g f i l e ( Fri Sep 5) e Get MFA c r e d e n t i a l s from user (Mon Sep 1) 01 dcf59 read MFA o p t i o n s from c o n f i g f i l e 15

21 Appendix C Session Resumption C.1 Commit Log Taken form ( Sat Nov 8) 8995 c27 hard coded key and c o o k i e f o r CN c l i e n t 2 ( Sat Nov 8) db1c1f4 f i x e s in v e r i f y c o o k i e ( ) ( Sat Nov 8) c c f c don t goto e r r o r i f c o o k i e v e r i f i c a t i o n succeeds ( Fri Nov 7) e f c f c l i e n t s i d e f i x e s f o r s e s s i o n support ( Fri Nov 7) ec58441 f i x e s ; token g e n e r a t i o n working ( Fri Nov 7) 4734 d94 use hours f o r mfa s e s s i o n v a l i d i t y ( Fri Nov 7) b46ed78 Bug f i x : auth mfa setup i s now c a l l e d p r o p e r l y everywhere ( Fri Nov 7) b81684d Fix f o r g c f r e e and t v w i t h i n m i n u t e s (Wed Nov 5) e60debd Check f o r c o o k i e e x p i r a t i o n (Wed Nov 5) b32e6b7 Fix f o r m f a s e s s i o n t o k e n s e n t (Wed Nov 5) 2 a668d8 c r e a t e new c o o k i e in key method 2 write (Wed Nov 5) 1 a31f12 f i x e s (Wed Nov 5) 3 a36fb8 v e r i f y and g e nerate f u n c t i o n s f o r checking c o o k i e (Tue Nov 4) 79 d9279 f i x e d a6cfa86 (Tue Nov 4) a6cfa86 WIP: changes in key method 2 read on s e r v e r s i d e (Mon Nov 3) 02 d242f WIP: read c l i e n t c o o k i e from key method 2 packet (Mon Nov 3) c8c1837 WIP: Cookie c r e a t i o n by s e r v e r ; TODO: c r e a t e c o o k i e ( ) (Mon Nov 3) 03 bb698 Fixes f o r p r e v i o u s compilation e r r o r s ( Sun Nov 2) bbf6fad Changed the d i r e c t i v e f o r mfa s e s s i o n ( Sun Nov 2) bade0e4 WIP: Read c l i e n t sent data ( Sat Nov 1) d7a5e2f WIP: Functions f o r p a r s i n g timestamp ( Sat Nov 1) e00da6c SQUASH: Fixes f o r p r e v i o u s commit ( Fri Oct 31) e 5 e f g e n e r a t e IV when s e r v e r s t a r t s up ( Fri Oct 31) b10b95d f i x compiler e r r o r s (Thu Oct 30) 50 f8189 WIP, w r i t e s e s s i o n token in key method 2 packet (Wed Oct 29) e6 WIP: s e s s i o n support (Wed Oct 29) d60887c Module f o r mfa s e s s i o n (Tue Oct 28) 064 a895 Read mfa s e s s i o n o p t i o n s ( Sun Oct 19) c misc f i x e s 16

22 Bibliography [1] OpenVPN Community. Openvpn security overview. Accessed: [2] Internet Engineering Task Force. Hmac: Keyed-hashing for message authentication. Accessed: [3] Internet Engineering Task Force. Hotp: A hmac based one-time password algorithm. Accessed: [4] Internet Engineering Task Force. Tls session resumption without server-side state. Accessed: [5] Internet Engineering Task Force. Totp: Time based one-time password algorithm. Accessed: [6] Internet Engineering Task Force. Transport layer security (tls) protocol v Accessed: [7] Srijan R. Shetty Harshwardhan Sharma, Shivanshu Agarwal. Source code repository. Accessed: [8] Secure Resumption. Triple handshakes considered harmful breaking and fixing authentication over tls. Accessed:

Chapter 17. Transport-Level Security

Chapter 17. Transport-Level Security Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics

More information

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP) Security Protocols Security Protocols Necessary to communicate securely across untrusted network Provide integrity, confidentiality, authenticity of communications Based on previously discussed cryptographic

More information

Web Security Considerations

Web Security Considerations CEN 448 Security and Internet Protocols Chapter 17 Web Security Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University [email protected]

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

The Secure Sockets Layer (SSL)

The Secure Sockets Layer (SSL) Due to the fact that nearly all businesses have websites (as well as government agencies and individuals) a large enthusiasm exists for setting up facilities on the Web for electronic commerce. Of course

More information

Vidder PrecisionAccess

Vidder PrecisionAccess Vidder PrecisionAccess Security Architecture February 2016 910 E HAMILTON AVENUE. SUITE 410 CAMPBELL, CA 95008 P: 408.418.0440 F: 408.706.5590 WWW.VIDDER.COM Table of Contents I. Overview... 3 II. Components...

More information

Chapter 10. Network Security

Chapter 10. Network Security Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce

More information

Transport Layer Security Protocols

Transport Layer Security Protocols SSL/TLS 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally designed to by Netscape to secure HTTP Version 2 is being replaced by version 3 Subsequently became Internet Standard known

More information

Chapter 7 Transport-Level Security

Chapter 7 Transport-Level Security Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell

More information

Security Protocols/Standards

Security Protocols/Standards Security Protocols/Standards Security Protocols/Standards Security Protocols/Standards How do we actually communicate securely across a hostile network? Provide integrity, confidentiality, authenticity

More information

Transport Level Security

Transport Level Security Transport Level Security Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/

More information

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:

More information

7.1. Remote Access Connection

7.1. Remote Access Connection 7.1. Remote Access Connection When a client uses a dial up connection, it connects to the remote access server across the telephone system. Windows client and server operating systems use the Point to

More information

Network Security Essentials Chapter 5

Network Security Essentials Chapter 5 Network Security Essentials Chapter 5 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 5 Transport-Level Security Use your mentality Wake up to reality From the song, "I've Got

More information

Einführung in SSL mit Wireshark

Einführung in SSL mit Wireshark Einführung in SSL mit Wireshark Chemnitzer Linux-Tage 16. März 2014 Martin Kaiser What? SSL/TLS is the most widely used security protocol on the Internet there's lots of parameters, options, extensions

More information

[SMO-SFO-ICO-PE-046-GU-

[SMO-SFO-ICO-PE-046-GU- Presentation This module contains all the SSL definitions. See also the SSL Security Guidance Introduction The package SSL is a static library which implements an API to use the dynamic SSL library. It

More information

Secure Socket Layer (SSL) and Transport Layer Security (TLS)

Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Socket Layer (SSL) and Transport Layer Security (TLS) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available

More information

Secure VidyoConferencing SM TECHNICAL NOTE. Protecting your communications. www.vidyo.com 1.866.99.VIDYO

Secure VidyoConferencing SM TECHNICAL NOTE. Protecting your communications. www.vidyo.com 1.866.99.VIDYO TECHNICAL NOTE Secure VidyoConferencing SM Protecting your communications 2012 Vidyo, Inc. All rights reserved. Vidyo, VidyoTechnology, VidyoConferencing, VidyoLine, VidyoRouter, VidyoPortal,, VidyoRouter,

More information

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer Other VPNs TLS/SSL, PPTP, L2TP Advanced Computer Networks SS2005 Jürgen Häuselhofer Overview Introduction to VPNs Why using VPNs What are VPNs VPN technologies... TLS/SSL Layer 2 VPNs (PPTP, L2TP, L2TP/IPSec)

More information

Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku

Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku Univerzita Komenského v Bratislave Fakulta matematiky, fyziky a informatiky Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku ITMS: 26140230008 dopytovo orientovaný projekt Moderné

More information

Criteria for web application security check. Version 2015.1

Criteria for web application security check. Version 2015.1 Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-

More information

Network Security. Lecture 3

Network Security. Lecture 3 Network Security Lecture 3 Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Security protocols application transport network datalink physical Contents IPSec overview

More information

Bit Chat: A Peer-to-Peer Instant Messenger

Bit Chat: A Peer-to-Peer Instant Messenger Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare [email protected] https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one

More information

Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)

Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT) Network Security Securing communications (SSL/TLS and IPSec) Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT) Network communication Who are you

More information

TLS/SSL in distributed systems. Eugen Babinciuc

TLS/SSL in distributed systems. Eugen Babinciuc TLS/SSL in distributed systems Eugen Babinciuc Contents 1. Introduction to TLS/SSL 2. A quick review of cryptography 3. TLS/SSL in distributed systems 4. Conclusions Introduction to TLS/SSL TLS/SSL History

More information

Cleaning Encrypted Traffic

Cleaning Encrypted Traffic Optenet Documentation Cleaning Encrypted Traffic Troubleshooting Guide iii Version History Doc Version Product Date Summary of Changes V6 OST-6.4.300 01/02/2015 English editing Optenet Documentation

More information

INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang

INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang INF3510 Information Security University of Oslo Spring 2011 Lecture 9 Communication Security Audun Jøsang Outline Network security concepts Communication security Perimeter security Protocol architecture

More information

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

CS 356 Lecture 27 Internet Security Protocols. Spring 2013 CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

PHP Magic Tricks: Type Juggling. PHP Magic Tricks: Type Juggling

PHP Magic Tricks: Type Juggling. PHP Magic Tricks: Type Juggling Who Am I Chris Smith (@chrismsnz) Previously: Polyglot Developer - Python, PHP, Go + more Linux Sysadmin Currently: Pentester, Consultant at Insomnia Security Little bit of research Insomnia Security Group

More information

Application Note: Onsight Device VPN Configuration V1.1

Application Note: Onsight Device VPN Configuration V1.1 Application Note: Onsight Device VPN Configuration V1.1 Table of Contents OVERVIEW 2 1 SUPPORTED VPN TYPES 2 1.1 OD VPN CLIENT 2 1.2 SUPPORTED PROTOCOLS AND CONFIGURATION 2 2 OD VPN CONFIGURATION 2 2.1

More information

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2 BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution

More information

Internet Mail Client Control Library SSL Supplement

Internet Mail Client Control Library SSL Supplement Codestone Ltd Internet Mail Client Control Library SSL Supplement Codestone Ltd 2004 Page 1 / 22 Welcome to the Internet Mail Client Control Library SSL Supplement we hope you will find the library to

More information

ViSolve Open Source Solutions

ViSolve Open Source Solutions ViSolve Open Source Solutions Best-In-Class Authentication and Authorization Solutions & Services ViSolve Inc. ViSolve Securing Digital Assets Contents Security Overview Security Concerns Security Needs

More information

Security Considerations for DirectAccess Deployments. Whitepaper

Security Considerations for DirectAccess Deployments. Whitepaper Security Considerations for DirectAccess Deployments Whitepaper February 2015 This white paper discusses security planning for DirectAccess deployment. Introduction DirectAccess represents a paradigm shift

More information

Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace

Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:

More information

SECURE FTP CONFIGURATION SETUP GUIDE

SECURE FTP CONFIGURATION SETUP GUIDE SECURE FTP CONFIGURATION SETUP GUIDE CONTENTS Overview... 3 Secure FTP (FTP over SSL/TLS)... 3 Connectivity... 3 Settings... 4 FTP file cleanup information... 5 Troubleshooting... 5 Tested FTP clients

More information

GlobalSCAPE DMZ Gateway, v1. User Guide

GlobalSCAPE DMZ Gateway, v1. User Guide GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical

More information

Security vulnerabilities in the Internet and possible solutions

Security vulnerabilities in the Internet and possible solutions Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in

More information

SNARE Agent for Windows v 4.2.3 - Release Notes

SNARE Agent for Windows v 4.2.3 - Release Notes SNARE Agent for Windows v 4.2.3 - Release Notes Snare is a program that facilitates the central collection and processing of the Windows Event Log information. All three primary event logs (Application,

More information

Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W

Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W Article ID: 5037 Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W Objective IPSec VPN (Virtual Private Network) enables you to securely obtain remote resources by establishing

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

Secure Web Access Solution

Secure Web Access Solution Secure Web Access Solution I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. E-CODE SECURE WEB ACCESS SOLUTION... 3 OVERVIEW... 3 PKI SECURE WEB ACCESS... 4 Description...

More information

ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief

ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS Adaptive Authentication in Juniper SSL VPN Environments Solution Brief RSA Adaptive Authentication is a comprehensive authentication platform providing

More information

Topics in Network Security

Topics in Network Security Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure

More information

Simple, Secure and Flexible VPN solution for home and business

Simple, Secure and Flexible VPN solution for home and business Simple, Secure and Flexible VPN solution for home and business me Romain Bourgue IT Security and open source fan Works for the french Civil Service since 2003 [email protected] Summary VPN solutions

More information

Strong Authentication for Microsoft SharePoint

Strong Authentication for Microsoft SharePoint Strong Authentication for Microsoft SharePoint with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard

More information

Network Security and AAA

Network Security and AAA ICT Technical Update Module Network Security and AAA Prof. Dr Harsha Sirisena Electrical and Computer Engineering University of Canterbury AAA Introduction Overview A network administrator may allow remote

More information

Viking VPN Guide Linux/UNIX

Viking VPN Guide Linux/UNIX Viking VPN Guide Linux/UNIX Table Of Contents 1 : VPN Questions answered 2 : Installing the Linux Client 3 : Connecting with the Linux Client 4 : Reporting Problems Version 1.0 : 10/27/2010 Information

More information

Client Server Registration Protocol

Client Server Registration Protocol Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are

More information

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1 Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions

More information

Overview of SSL. Outline. CSC/ECE 574 Computer and Network Security. Reminder: What Layer? Protocols. SSL Architecture

Overview of SSL. Outline. CSC/ECE 574 Computer and Network Security. Reminder: What Layer? Protocols. SSL Architecture OS Appl. CSC/ECE 574 Computer and Network Security Outline I. Overview II. The Record Protocol III. The Handshake and Other Protocols Topic 8.3 /TLS 1 2 Reminder: What Layer? Overview of 3 4 Protocols

More information

Cisco AnyConnect Secure Mobility Client VPN User Messages, Release 3.1

Cisco AnyConnect Secure Mobility Client VPN User Messages, Release 3.1 Cisco AnyConnect Secure Mobility Client VPN User Messages, Release 3.1 October 15, 2012 The following user messages appear on the AnyConnect client GUI. A description follows each message, along with recommended

More information

How To Understand And Understand The Security Of A Key Infrastructure

How To Understand And Understand The Security Of A Key Infrastructure Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used

More information

Security Engineering Part III Network Security. Security Protocols (II): IPsec

Security Engineering Part III Network Security. Security Protocols (II): IPsec Security Engineering Part III Network Security Security Protocols (II): IPsec Juan E. Tapiador [email protected] Department of Computer Science, UC3M Security Engineering 4th year BSc in Computer Science,

More information

Configuration Guide BES12. Version 12.2

Configuration Guide BES12. Version 12.2 Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining

More information

ProtectID. for Financial Services

ProtectID. for Financial Services ProtectID for Financial Services StrikeForce Technologies, Inc. 1090 King Georges Post Road #108 Edison, NJ 08837, USA http://www.strikeforcetech.com Tel: 732 661-9641 Fax: 732 661-9647 Introduction 2

More information

SSH Secure Shell. What is SSH?

SSH Secure Shell. What is SSH? Security, like correctness, is not an add-on feature. -- Andrew S. Tanenbaum SSH Secure Shell - - Binary Packet Protocol - key exchange - server authentication - - SSH Connection Protocol What is SSH?

More information

Is Your SSL Website and Mobile App Really Secure?

Is Your SSL Website and Mobile App Really Secure? Is Your SSL Website and Mobile App Really Secure? Agenda What is SSL / TLS SSL Vulnerabilities PC/Server Mobile Advice to the Public Hong Kong Computer Emergency Response Team Coordination Centre 香 港 電

More information

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us

More information

IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw

IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw IP Security IPSec, PPTP, OpenVPN Pawel Cieplinski, AkademiaWIFI.pl MUM Wroclaw Introduction www.akademiawifi.pl WCNG - Wireless Network Consulting Group We are group of experienced professionals. Our company

More information

SENSE Security overview 2014

SENSE Security overview 2014 SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2

More information

SSL/TLS. What Layer? History. SSL vs. IPsec. SSL Architecture. SSL Architecture. IT443 Network Security Administration Instructor: Bo Sheng

SSL/TLS. What Layer? History. SSL vs. IPsec. SSL Architecture. SSL Architecture. IT443 Network Security Administration Instructor: Bo Sheng What Layer? /TLS IT443 Network Security Administration Instructor: Bo Sheng Application TCP IPSec IP LAN layer Application TCP IP LAN layer 1 2 History v2 proposed and deployed in Netscape 1.1 (1995) PCT

More information

z/os Firewall Technology Overview

z/os Firewall Technology Overview z/os Firewall Technology Overview Mary Sweat E - Mail: [email protected] Washington System Center OS/390 Firewall/VPN 1 Firewall Technologies Tools Included with the OS/390 Security Server Configuration

More information

Managing Users and Identity Stores

Managing Users and Identity Stores CHAPTER 8 Overview ACS manages your network devices and other ACS clients by using the ACS network resource repositories and identity stores. When a host connects to the network through ACS requesting

More information

Real-Time Communication Security: SSL/TLS. Guevara Noubir [email protected] CSU610

Real-Time Communication Security: SSL/TLS. Guevara Noubir noubir@ccs.neu.edu CSU610 Real-Time Communication Security: SSL/TLS Guevara Noubir [email protected] CSU610 1 Some Issues with Real-time Communication Session key establishment Perfect Forward Secrecy Diffie-Hellman based PFS

More information

How To Understand And Understand The Ssl Protocol (Www.Slapl) And Its Security Features (Protocol)

How To Understand And Understand The Ssl Protocol (Www.Slapl) And Its Security Features (Protocol) WEB Security: Secure Socket Layer Cunsheng Ding HKUST, Hong Kong, CHINA C. Ding - COMP581 - L22 1 Outline of this Lecture Brief Information on SSL and TLS Secure Socket Layer (SSL) Transport Layer Security

More information

BlackShield ID Agent for Terminal Services Web and Remote Desktop Web

BlackShield ID Agent for Terminal Services Web and Remote Desktop Web Agent for Terminal Services Web and Remote Desktop Web 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication

More information

Using Entrust certificates with VPN

Using Entrust certificates with VPN Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark

More information

Secure Sockets Layer

Secure Sockets Layer SSL/TLS provides endpoint authentication and communications privacy over the Internet using cryptography. For web browsing, email, faxing, other data transmission. In typical use, only the server is authenticated

More information

NetIQ Advanced Authentication Framework

NetIQ Advanced Authentication Framework NetIQ Advanced Authentication Framework Security Officer Guide Version 5.2.0 1 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 Authenticators Management 4 Card 8 Email OTP

More information

BlackShield ID Agent for Remote Web Workplace

BlackShield ID Agent for Remote Web Workplace Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,

More information

Configuration Guide BES12. Version 12.3

Configuration Guide BES12. Version 12.3 Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing

More information

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT Subject Code Department Semester : Network Security : XCS593 : MSc SE : Nineth Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT Part A (2 marks) 1. What are the various layers of an OSI reference

More information

Release Notes for Epilog for Windows Release Notes for Epilog for Windows v1.7/v1.8

Release Notes for Epilog for Windows Release Notes for Epilog for Windows v1.7/v1.8 Release Notes for Epilog for Windows v1.7/v1.8 InterSect Alliance International Pty Ltd Page 1 of 22 About this document This document provides release notes for Snare Enterprise Epilog for Windows release

More information

SSL Handshake Analysis

SSL Handshake Analysis SSL Handshake Analysis Computer Measurement Group Webinar Nalini Elkins Inside Products, Inc. [email protected] Inside Products, Inc. (831) 659-8360 www.insidethestack.com www.ipproblemfinders.com

More information

Insecure network services. Firewalls. Two separable topics. Packet filtering. Example: blocking forgeries. Example: blocking outgoing mail

Insecure network services. Firewalls. Two separable topics. Packet filtering. Example: blocking forgeries. Example: blocking outgoing mail Insecure network services NFS (port 2049) - Read/write entire FS as any non-root user given a dir. handle - Many OSes make handles easy to guess Portmap (port 111) - Relays RPC requests, making them seem

More information

Network Security Part II: Standards

Network Security Part II: Standards Network Security Part II: Standards Raj Jain Washington University Saint Louis, MO 63131 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 18-1 Overview

More information

Research Article. Research of network payment system based on multi-factor authentication

Research Article. Research of network payment system based on multi-factor authentication Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):437-441 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research of network payment system based on multi-factor

More information

SECURE SOCKETS LAYER (SSL) SECURE SOCKETS LAYER (SSL) SSL ARCHITECTURE SSL/TLS DIFFERENCES SSL ARCHITECTURE. INFS 766 Internet Security Protocols

SECURE SOCKETS LAYER (SSL) SECURE SOCKETS LAYER (SSL) SSL ARCHITECTURE SSL/TLS DIFFERENCES SSL ARCHITECTURE. INFS 766 Internet Security Protocols INFS 766 Internet Security s Lecture 5 SSL Prof. Ravi Sandhu SECURE SOCKETS LAYER (SSL) layered on top of TCP SSL versions 1.0, 2.0, 3.0, 3.1 Netscape protocol later refitted as IETF standard TLS (Transport

More information

Guideline for setting up a functional VPN

Guideline for setting up a functional VPN Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the

More information

Security Policy Revision Date: 23 April 2009

Security Policy Revision Date: 23 April 2009 Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure

More information

How To Fix A Username Enumeration On A Vpn On A Pc Or Ipv (Vpn) On A Password Protected Ipv 2 (Vvv) On An Ipv 3 (Vp) On Pc Or Password Protected (V

How To Fix A Username Enumeration On A Vpn On A Pc Or Ipv (Vpn) On A Password Protected Ipv 2 (Vvv) On An Ipv 3 (Vp) On Pc Or Password Protected (V Common VPN Security Flaws Roy Hills, NTA Monitor Ltd. http://www.nta-monitor.com/ January 2005 Abstract This paper outlines some of the common VPN security flaws that NTA Monitor have found during the

More information

Security Aspects Of Communications To Substations

Security Aspects Of Communications To Substations Security Aspects Of Communications To Substations Mark Adamiak GE Digital Energy, Multilin Herb Falk SISCO 1. Abstract The security of data and information transmitted either point to point or through

More information

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

Two-Factor Authentication over Mobile: Simplifying Security and Authentication SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively Table

More information

Strong Authentication for Microsoft TS Web / RD Web

Strong Authentication for Microsoft TS Web / RD Web Strong Authentication for Microsoft TS Web / RD Web with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard

More information

Overview SSL/TLS HTTPS SSH. TLS Protocol Architecture TLS Handshake Protocol TLS Record Protocol. SSH Protocol Architecture SSH Transport Protocol

Overview SSL/TLS HTTPS SSH. TLS Protocol Architecture TLS Handshake Protocol TLS Record Protocol. SSH Protocol Architecture SSH Transport Protocol SSL/TLS TLS Protocol Architecture TLS Handshake Protocol TLS Record Protocol HTTPS SSH SSH Protocol Architecture SSH Transport Protocol Overview SSH User Authentication Protocol SSH Connection Protocol

More information

Vulnerabilità dei protocolli SSL/TLS

Vulnerabilità dei protocolli SSL/TLS Università degli Studi di Milano Facoltà di Scienze Matematiche, Fisiche e Naturali Dipartimento di Informatica e Comunicazione Vulnerabilità dei protocolli SSL/TLS Andrea Visconti Overview Introduction

More information

Three attacks in SSL protocol and their solutions

Three attacks in SSL protocol and their solutions Three attacks in SSL protocol and their solutions Hong lei Zhang Department of Computer Science The University of Auckland [email protected] Abstract Secure Socket Layer (SSL) and Transport Layer

More information

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security UNIT 4 SECURITY PRACTICE Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security Slides Courtesy of William Stallings, Cryptography & Network Security,

More information

IDENTITY & ACCESS. Providing Cost-Effective Strong Authentication in the Cloud. a brief for cloud service providers

IDENTITY & ACCESS. Providing Cost-Effective Strong Authentication in the Cloud. a brief for cloud service providers IDENTITY & ACCESS Providing Cost-Effective Strong Authentication in the Cloud a brief for cloud service providers Introduction Interest and use of the cloud to store enterprise resources is growing fast.

More information

Implementing two-factor authentication: Google s experiences. Cem Paya ([email protected]) Information Security Team Google Inc.

Implementing two-factor authentication: Google s experiences. Cem Paya (cemp@google.com) Information Security Team Google Inc. Implementing two-factor authentication: Google s experiences Cem Paya ([email protected]) Information Security Team Google Inc. Google services and personalization Identity management at Google 1. Internal

More information

YubiKey Integration for Full Disk Encryption

YubiKey Integration for Full Disk Encryption YubiKey Integration for Full Disk Encryption Pre-Boot Authentication Version 1.2 May 7, 2012 Introduction Disclaimer yubico Yubico is the leading provider of simple, open online identity protection. The

More information

Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords

Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords Author: Paul Seymer CMSC498a Contents 1 Background... 2 1.1 HTTP 1.0/1.1... 2 1.2 Password

More information

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009 16 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009 1 25 Organization Welcome to the New Year! Reminder: Structure of Communication Systems lectures

More information

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with

More information

Building Secure Multi-Factor Authentication

Building Secure Multi-Factor Authentication Building Secure Multi-Factor Authentication Three best practices for engineering and product leaders Okta Inc. I 301 Brannan Street, Suite 300 I San Francisco CA, 94107 [email protected] I 1-888-722-7871 Introduction

More information

Firewalls, Tunnels, and Network Intrusion Detection

Firewalls, Tunnels, and Network Intrusion Detection Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls

More information

Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan

Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014 1410 Secured Authentication Using Mobile Phone as Security Token Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin

More information

Secure Shell SSH provides support for secure remote login, secure file transfer, and secure TCP/IP and X11 forwarding. It can automatically encrypt,

Secure Shell SSH provides support for secure remote login, secure file transfer, and secure TCP/IP and X11 forwarding. It can automatically encrypt, Secure Shell SSH provides support for secure remote login, secure file transfer, and secure TCP/IP and X11 forwarding. It can automatically encrypt, authenticate, and compress transmitted data. The main

More information