Public Key Infrastructures
|
|
|
- Spencer Newton
- 10 years ago
- Views:
Transcription
1 Public Key Infrastructures Ralph Holz Network Architectures and Services Technische Universität München November 2014 Ralph Holz: Public Key Infrastructures 1
2 Part 2: Recent results or: the sorry state of X.509 Ralph Holz: Public Key Infrastructures 2
3 How This Got Our Interest (1) PKI weaknesses in 2008 Early December 2008: Error in Comodo CA: no identity check Reported by Eddy Nigg of StartSSL (a CA) A regional sub-seller just took the credit card number and gave you a certificate No real reaction by Mozilla Late December 2008: whitehat hacks StartSSL CA Technical report: simple flaw in Web front-end Certificate for mozilla.com issued Caught by 2nd line of defence: human checks for high-value domains Ralph Holz: Public Key Infrastructures 3
4 How This Got Our Interest (1) PKI weaknesses in 2008 Early December 2008: Error in Comodo CA: no identity check Reported by Eddy Nigg of StartSSL (a CA) A regional sub-seller just took the credit card number and gave you a certificate No real reaction by Mozilla Late December 2008: whitehat hacks StartSSL CA Technical report: simple flaw in Web front-end Certificate for mozilla.com issued Caught by 2nd line of defence: human checks for high-value domains Ralph Holz: Public Key Infrastructures 3
5 How This Got Our Interest (1) PKI weaknesses in 2008 Early December 2008: Error in Comodo CA: no identity check Reported by Eddy Nigg of StartSSL (a CA) A regional sub-seller just took the credit card number and gave you a certificate No real reaction by Mozilla Late December 2008: whitehat hacks StartSSL CA Technical report: simple flaw in Web front-end Certificate for mozilla.com issued Caught by 2nd line of defence: human checks for high-value domains Ralph Holz: Public Key Infrastructures 3
6 How This Got Our Interest (2) PKI weaknesses in 2009 February 2009 New easy attack on MD5 ( MD5 considered harmful today ) Demonstrated by issuing valid but fake CA certificate Fast reaction by vendors: MD5 to be disabled for signatures by 2012 Spring 2009 J. Nightingale of Mozilla writes crawler to traverse HTTPs sites Goal: determine number of MD5-signed certificates (11%) This piece of software was made public, it s our starting point Ralph Holz: Public Key Infrastructures 4
7 How This Got Our Interest (2) PKI weaknesses in 2009 February 2009 New easy attack on MD5 ( MD5 considered harmful today ) Demonstrated by issuing valid but fake CA certificate Fast reaction by vendors: MD5 to be disabled for signatures by 2012 Spring 2009 J. Nightingale of Mozilla writes crawler to traverse HTTPs sites Goal: determine number of MD5-signed certificates (11%) This piece of software was made public, it s our starting point Ralph Holz: Public Key Infrastructures 4
8 How This Got Our Interest (2) PKI weaknesses in 2009 February 2009 New easy attack on MD5 ( MD5 considered harmful today ) Demonstrated by issuing valid but fake CA certificate Fast reaction by vendors: MD5 to be disabled for signatures by 2012 Spring 2009 J. Nightingale of Mozilla writes crawler to traverse HTTPs sites Goal: determine number of MD5-signed certificates (11%) This piece of software was made public, it s our starting point Ralph Holz: Public Key Infrastructures 4
9 How This Got Our Interest (3) State of Mozilla Root Store Mozilla 2009: Does anyone know who owns this root cert? It turned out there were root certs that no-one could remember No-one could remember when they were accepted, or on which grounds Ideal PKI Root CA Involuntary Bridge CA Root Store Intermediate CAs... End host certs Ralph Holz: Public Key Infrastructures 5
10 Kurt Seifried vs. RapidSSL How to hijack a Web mailer in 3 easy steps Step 1: register address: [email protected] Step 2: ask RapidSSL for certificate for portugalmail.pt, giving this address as your contact Step 3: Watch Domain Validation by probe fail Kurt succeeded. It cost him < 100 USD. Main failure here: Web mailers and CAs have not agreed on protected addresses This issue is now in Mozilla s Problematic practices Ralph Holz: Public Key Infrastructures 6
11 How This Got Our Interest (4) In 2011, the foundations of X.509 were rocked. March 2011: Comodo CA hacked (a sub-seller, again) Attacker claims to come from Iran 10 certificates for high-value domains issued Browser reaction: blacklisting of those certificates in code Neither CRLs nor OCSP trusted enough to work for victims July 2011: DigiNotar CA hacked Attacker claims to be the same one as in March 531 fake certificates, high-value domains E.g., Google, Facebook, Mozilla, CIA, Mossad, Skype Some hints pointed at Man-in-the-middle attack in Iran The Netherlands PKI was operated by DigiNotar... For the first time, a Root CA is removed from a browser for being compromised Ralph Holz: Public Key Infrastructures 7
12 How This Got Our Interest (4) In 2011, the foundations of X.509 were rocked. March 2011: Comodo CA hacked (a sub-seller, again) Attacker claims to come from Iran 10 certificates for high-value domains issued Browser reaction: blacklisting of those certificates in code Neither CRLs nor OCSP trusted enough to work for victims July 2011: DigiNotar CA hacked Attacker claims to be the same one as in March 531 fake certificates, high-value domains E.g., Google, Facebook, Mozilla, CIA, Mossad, Skype Some hints pointed at Man-in-the-middle attack in Iran The Netherlands PKI was operated by DigiNotar... For the first time, a Root CA is removed from a browser for being compromised Ralph Holz: Public Key Infrastructures 7
13 How This Got Our Interest (4) In 2011, the foundations of X.509 were rocked. March 2011: Comodo CA hacked (a sub-seller, again) Attacker claims to come from Iran 10 certificates for high-value domains issued Browser reaction: blacklisting of those certificates in code Neither CRLs nor OCSP trusted enough to work for victims July 2011: DigiNotar CA hacked Attacker claims to be the same one as in March 531 fake certificates, high-value domains E.g., Google, Facebook, Mozilla, CIA, Mossad, Skype Some hints pointed at Man-in-the-middle attack in Iran The Netherlands PKI was operated by DigiNotar... For the first time, a Root CA is removed from a browser for being compromised Ralph Holz: Public Key Infrastructures 7
14 DigiNotar vs. Iran? Ralph Holz: Public Key Infrastructures 8
15 Can We Assess the Quality of this PKI? A good PKI should... allow HTTPs on all WWW hosts... contain only valid certificates... offer good cryptographic security Long keys, only strong hash algorithms, have a sensible setup Short validity periods (1 year) Short certificate chains (but use intermediate certificates) Number of issuers should be reasonable (weakest link!) Ralph Holz: Public Key Infrastructures 9
16 Acquiring Our Data Sets Active scans to measure deployed PKI Scan hosts on Alexa Top 1 million Web sites Nov 2009 Apr 2011: scanned 8 times from Germany March 2011: scans from 8 hosts around the globe Passive monitoring to measure user-encountered PKI Munich Research Network, monitored all SSL/TLS traffic Two 2-week runs in Sep 2010 and Apr 2011 EFF scan of IPv4 space in 2010 Scan of 2-3 months, no domain information Ralph Holz: Public Key Infrastructures 10
17 In the meantime... EFF scan presented at 27C3 Focuses on CA certification structure Scan of IP addresses: does not allow to check match of host names No temporal distribution EFF project: SSL Observatory Ivan Ristic of Qualys presents similar scan Smaller data basis Data set not published as raw data No temporal distribution Could not include it in our analysis Ralph Holz: Public Key Infrastructures 11
18 Our Data Sets Active Scans Passive Monitoring EFF IPv4 scan Location Time (run) Type Certificates Tuebingen, DE November 2009 Active scan 833,661 Tuebingen, DE December 2009 Active scan 819,488 Tuebingen, DE January 2010 Active scan 816,517 Tuebingen, DE April 2010 Active scan 816,605 Munich, DE September 2010 Active scan 829,232 Munich, DE November 2010 Active scan 827,366 Munich, DE April 2011 Active scan 829,707 Munich, DE April 2011 Active scan with SNI 826,098 Shanghai, CN April 2011 Active scan 798,976 Beijing, CN April 2011 Active scan 797,046 Melbourne, AU April 2011 Active scan 833,571 İzmir, TR April 2011 Active scan 825,555 São Paulo, BR April 2011 Active scan 833,246 Moscow, RU April 2011 Active scan 830,765 Santa Barbara, US April 2011 Active scan 834,173 Boston, US April 2011 Active scan 834,054 Munich, DE September 2010 Passive monitoring 183,208 Munich, DE April 2011 Passive monitoring 989,040 EFF servers March June 2010 Active IPv4 scan 11,349, million certificates to evaluate. Ralph Holz: Public Key Infrastructures 12
19 Our Data Sets Active Scans Passive Monitoring EFF IPv4 scan Location Time (run) Type Certificates Tuebingen, DE November 2009 Active scan 833,661 Tuebingen, DE December 2009 Active scan 819,488 Tuebingen, DE January 2010 Active scan 816,517 Tuebingen, DE April 2010 Active scan 816,605 Munich, DE September 2010 Active scan 829,232 Munich, DE November 2010 Active scan 827,366 Munich, DE April 2011 Active scan 829,707 Munich, DE April 2011 Active scan with SNI 826,098 Shanghai, CN April 2011 Active scan 798,976 Beijing, CN April 2011 Active scan 797,046 Melbourne, AU April 2011 Active scan 833,571 İzmir, TR April 2011 Active scan 825,555 São Paulo, BR April 2011 Active scan 833,246 Moscow, RU April 2011 Active scan 830,765 Santa Barbara, US April 2011 Active scan 834,173 Boston, US April 2011 Active scan 834,054 Munich, DE September 2010 Passive monitoring 183,208 Munich, DE April 2011 Passive monitoring 989,040 EFF servers March June 2010 Active IPv4 scan 11,349, million certificates to evaluate. Ralph Holz: Public Key Infrastructures 12
20 Our Data Sets Active Scans Passive Monitoring EFF IPv4 scan Location Time (run) Type Certificates Tuebingen, DE November 2009 Active scan 833,661 Tuebingen, DE December 2009 Active scan 819,488 Tuebingen, DE January 2010 Active scan 816,517 Tuebingen, DE April 2010 Active scan 816,605 Munich, DE September 2010 Active scan 829,232 Munich, DE November 2010 Active scan 827,366 Munich, DE April 2011 Active scan 829,707 Munich, DE April 2011 Active scan with SNI 826,098 Shanghai, CN April 2011 Active scan 798,976 Beijing, CN April 2011 Active scan 797,046 Melbourne, AU April 2011 Active scan 833,571 İzmir, TR April 2011 Active scan 825,555 São Paulo, BR April 2011 Active scan 833,246 Moscow, RU April 2011 Active scan 830,765 Santa Barbara, US April 2011 Active scan 834,173 Boston, US April 2011 Active scan 834,054 Munich, DE September 2010 Passive monitoring 183,208 Munich, DE April 2011 Passive monitoring 989,040 EFF servers March June 2010 Active IPv4 scan 11,349, million certificates to evaluate. Ralph Holz: Public Key Infrastructures 12
21 Our Data Sets Active Scans Passive Monitoring EFF IPv4 scan Location Time (run) Type Certificates Tuebingen, DE November 2009 Active scan 833,661 Tuebingen, DE December 2009 Active scan 819,488 Tuebingen, DE January 2010 Active scan 816,517 Tuebingen, DE April 2010 Active scan 816,605 Munich, DE September 2010 Active scan 829,232 Munich, DE November 2010 Active scan 827,366 Munich, DE April 2011 Active scan 829,707 Munich, DE April 2011 Active scan with SNI 826,098 Shanghai, CN April 2011 Active scan 798,976 Beijing, CN April 2011 Active scan 797,046 Melbourne, AU April 2011 Active scan 833,571 İzmir, TR April 2011 Active scan 825,555 São Paulo, BR April 2011 Active scan 833,246 Moscow, RU April 2011 Active scan 830,765 Santa Barbara, US April 2011 Active scan 834,173 Boston, US April 2011 Active scan 834,054 Munich, DE September 2010 Passive monitoring 183,208 Munich, DE April 2011 Passive monitoring 989,040 EFF servers March June 2010 Active IPv4 scan 11,349, million certificates to evaluate. Ralph Holz: Public Key Infrastructures 12
22 Our Data Sets Active Scans Passive Monitoring EFF IPv4 scan Location Time (run) Type Certificates Tuebingen, DE November 2009 Active scan 833,661 Tuebingen, DE December 2009 Active scan 819,488 Tuebingen, DE January 2010 Active scan 816,517 Tuebingen, DE April 2010 Active scan 816,605 Munich, DE September 2010 Active scan 829,232 Munich, DE November 2010 Active scan 827,366 Munich, DE April 2011 Active scan 829,707 Munich, DE April 2011 Active scan with SNI 826,098 Shanghai, CN April 2011 Active scan 798,976 Beijing, CN April 2011 Active scan 797,046 Melbourne, AU April 2011 Active scan 833,571 İzmir, TR April 2011 Active scan 825,555 São Paulo, BR April 2011 Active scan 833,246 Moscow, RU April 2011 Active scan 830,765 Santa Barbara, US April 2011 Active scan 834,173 Boston, US April 2011 Active scan 834,054 Munich, DE September 2010 Passive monitoring 183,208 Munich, DE April 2011 Passive monitoring 989,040 EFF servers March June 2010 Active IPv4 scan 11,349, million certificates to evaluate. Ralph Holz: Public Key Infrastructures 12
23 Errors in TLS Connection Setup Scans from Germany, Nov 2009 and Apr 2011 % of all connections 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% Other failure Unknown protocol Success Apr2011 Top 1k Nov2009 Top 1k Aug2011 Top 10k Nov2009 Top 10k Apr2011 Top 100k Nov2009 Top 100k Apr2011 Top 1m Nov2009 Top 1m Ralph Holz: Public Key Infrastructures 13
24 Errors in TLS Connection Setup UNKNOWN PROTOCOL Rescanned those hosts and manual sampling Always plain HTTP and always an index.html with HTML 2... Hypothesis: old servers, old configurations More likely to happen in the lower ranks Ralph Holz: Public Key Infrastructures 14
25 Validity of End-Hosts Certificates R 1 Root Store R 2 CA 3 CA 1 I 1 I 4 CA I 2 2 R 3 E 7 E 1 E 2 I 5 I 3 I 6 E 3 E 4 E 5 E 6 Host Certificates Ralph Holz: Public Key Infrastructures 15
26 Validation of Certificate Chains Just check chains, not host names Chain valid Expired Self signed end host certificate Root certificate not in root store No root certificate found Germany.Nov09 Germany.Apr11 China.Apr11 EFF MON1.Sep10 MON2.Apr11 % of all certificates 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% Ralph Holz: Public Key Infrastructures 16
27 Correct Domain Name in Certificate Now also check host names Look in Common Name (CN) and Subject Alternative Name (SAN) Munich, April 2011, only valid chains: 12.2% correct CN 5.9% correct SAN Only 18% of certificates are fully verifiable Positive trend : from 14.9% in 2009 to 18% in 2011 Ralph Holz: Public Key Infrastructures 17
28 Unusual Host Names CN=plesk or similar Found in 7.3% of certificates Verified: Plesk/Parallels panels CN=localhost 4.7% of certificates Very common: redirection to HTTP after HTTPs Ralph Holz: Public Key Infrastructures 18
29 Host Names in Self-signed Certificates Self-signed means: Issuer the same as subject of certificate Requires out-of-band distribution of certificate Active scan 2.2% correct Common Name (CN) 0.5% correct Subject Alternative Name Top 3 most frequent CNs account for > 50% plesk or similar in 27.3% localhost or similar in 25.4% standard installations? Ralph Holz: Public Key Infrastructures 19
30 Certificate Occurrences Many certificates valid for more than one domain Domains served by same IP Some certificates issued for dozens of domains Certificate reuse on multiple machines increases options for attacker Often found on hosters E. g. *.blogger.com, *.wordpress.com Ralph Holz: Public Key Infrastructures 20
31 Certificate Occurrences How often does a certificate occur on X hosts? 0.1 all certificates only valid certificates Pr[ #hosts > X ] e 4 1e Number of hosts per certificate =: X Ralph Holz: Public Key Infrastructures 21
32 Certificate Chains R 1 Root Store R 2 CA 3 CA 1 I 1 I 4 CA I 2 2 R 3 E 7 E 1 E 2 I 5 I 6 I 3 E 5 E 6 Intermediate Certificates E 3 E 4 Ralph Holz: Public Key Infrastructures 22
33 Certificate Chain Lengths 70% Apr11 Nov09 60% MON1 Share in certificates 50% 40% 30% 20% 10% 0% and greater Chain length Finding more positive than negative: Trend to use intermediate certificates more often Allows to keep Root Certificates offline But chains still reasonably short Ralph Holz: Public Key Infrastructures 23
34 Validity Periods CDF of validity periods, active scans Pr[X < validity] Nov2009 Apr Validity (years) Ralph Holz: Public Key Infrastructures 24
35 Validity Periods CDF of validity periods, scans and monitoring Pr[X < validity] Nov2009 Apr2011 MON2, Apr Validity (years) Ralph Holz: Public Key Infrastructures 25
36 Public Key Properties Key types RSA: 99.98% (rest is DSA) About 50% have length 1,024 bit About 45% have length 2,048 bit Clear trend from 1,024 to 2,048 bit Weird encounters 1,504 distinct certificates that share another certificate s key Many traced to a handful of hosting companies Nadiah Henninger s work: Embedded devices, poor entropy! Ralph Holz: Public Key Infrastructures 26
37 Debian Weak Keys (1) Bug of 2008 Generation of random numbers weak (bad initialisation) Only 2 16 public/private key-pairs generated Allows pre-computation of private keys Debian ships blacklist of keys Ralph Holz: Public Key Infrastructures 27
38 Debian Weak Keys (2) Weak randomness in key generation serious bug of % Share of weak keys 0.6% 0.5% 0.4% 0.3% 0.2% 0.1% 0 1/1/2010 Date 1/1/2011 Ralph Holz: Public Key Infrastructures 28
39 Public Key Lengths CDF for RSA key lengths double-log Y axis Pr[X < length] e 04 1e 05 Tue Nov2009 TUM Sep2010 TUM April Key length (bits) Ralph Holz: Public Key Infrastructures 29
40 Symmetric Ciphers Results from monitoring RSA_WITH_RC4_128_MD5 (!) RSA_WITH_AES_128_CBC_SHA DHE_RSA_WITH_AES_256_CBC_SHA RSA_WITH_AES_256_CBC_SHA RSA_WITH_RC4_128_SHA RSA_WITH_3DES_EDE_CBC_SHA (!) RSA_WITH_NULL_SHA DHE_RSA_WITH_CAMELLIA_256_CBC_SHA RSA_WITH_NULL_MD5 (!) DHE_RSA_WITH_AES_128_CBC_SHA others MON1 MON % of connection ciphers (Mostly) in line with results from 2007 by Lee et al. Order of AES and RC4 has shifted, RC4-128 most popular Ralph Holz: Public Key Infrastructures 30
41 Signature Algorithms MD5 is being phased out 100% 90% Prevalence in signatures 80% 70% 60% 50% 40% 30% 20% 10% 0% RSA/SHA1 RSA/MD5 Active scans from Germany Monitoring Active scans from China 1/1/2010 Date 1/1/2011 Ralph Holz: Public Key Infrastructures 31
42 Certificate Issuers Very few CAs account for > 50% of certificates GoDaddy Equifax (several root certificates) Verisign (several roots) plesk' Thawte (several roots) localhost' or similar GeoTrust (several roots) USERTRUST Comodo GlobalSign Share (%) But there are 150+ Root Certificates in Mozilla. Ralph Holz: Public Key Infrastructures 32
43 Certificate Quality We defined 3 categories Good : Correct chains, correct host name Chain 2 No MD5, strong key of > 1024 bit Validity 13 months Acceptable Chain 3, validity 25 months Rest as above Poor : the remainder Ralph Holz: Public Key Infrastructures 33
44 Certificate Quality Share in rank range 50% 40% 30% 20% 10% Valid but poor Acceptable Good Top 1024 Top 2048 Top 4096 Top 8192 Top Top Top Top Top Top Top 1m 0% Validity correlates with rank Share of poor certificates higher among high-ranking sites Ralph Holz: Public Key Infrastructures 34
45 Conclusion In great part, the X.509 PKI is in a sorry state Only 18% of the Top 1 Million Web sites show fully valid certificates Invalid chains Expired certificates are common Often no recognisable Root Certificate Lack of correct domain information information Frequent sharing of certificates between hosts is problematic Much carelessness Ralph Holz: Public Key Infrastructures 35
46 Conclusion Certification practices are very poor. But crypto OK. Some positive developments Very slight trend for fully valid certificates Chains short, intermediate certificates used Key lengths OK Weak MD5 algorithm is being phased out Ralph Holz: Public Key Infrastructures 36
The SSL Landscape. Ralph Holz, Thomas Riedmaier, Lothar Braun, Nils Kammenhuber. Network Architectures and Services Technische Universität München
The SSL Landscape Ralph Holz, Thomas Riedmaier, Lothar Braun, Nils Kammenhuber Network Architectures and Services Technische Universität München Hagenberg, 15 Mar 2012 Ralph Holz, Thomas Riedmaier, Lothar
SSL/TLS: The Ugly Truth
SSL/TLS: The Ugly Truth Examining the flaws in SSL/TLS protocols, and the use of certificate authorities. Adrian Hayter CNS Hut 3 Team [email protected] Contents Introduction to SSL/TLS Cryptography
SSL BEST PRACTICES OVERVIEW
SSL BEST PRACTICES OVERVIEW THESE PROBLEMS ARE PERVASIVE 77.9% 5.2% 19.2% 42.3% 77.9% of sites are HTTP 5.2% have an incomplete chain 19.2% support weak/insecure cipher suites 42.3% support SSL 3.0 83.1%
SSL and Browsers: The Pillars of Broken Security
SSL and Browsers: The Pillars of Broken Security Ivan Ristic Wolfgang Kandek Qualys, Inc. Session ID: TECH-403 Session Classification: Intermediate SSL, TLS, And PKI SSL (or TLS, if you prefer) is the
A Study of What Really Breaks SSL HITB Amsterdam 2011
A Study of What Really Breaks SSL HITB Amsterdam 2011 v1.0 Ivan Ristic Michael Small 20 May 2011 Agenda 1. State of SSL 2. Quick intro to SSL Labs 3. SSL Configuration Surveys 4. Survey of Actual SSL Usage
Internet SSL Survey 2010! Black Hat USA 2010
Internet SSL Survey 2010! Black Hat USA 2010 Ivan Ristic Director of Engineering, Web Application Firewall and SSL [email protected] / @ivanristic July 29th, 2010 (v1.6) Agenda 1. Why do we care about
SSL: Paved With Good Intentions. Richard Moore [email protected]
SSL: Paved With Good Intentions Richard Moore [email protected] Why do we need SSL? Privacy Online shopping Online banking Identity Protection Data Integrity Early SSL First public version was SSLv2
Is Your SSL Website and Mobile App Really Secure?
Is Your SSL Website and Mobile App Really Secure? Agenda What is SSL / TLS SSL Vulnerabilities PC/Server Mobile Advice to the Public Hong Kong Computer Emergency Response Team Coordination Centre 香 港 電
NIST ITL July 2012 CA Compromise
NIST ITL July 2012 CA Compromise Prepared for: Intelligent People [email protected] 1 NIST ITL Bulletin on CA Compromise http://csrc.nist.gov/publications/nistbul/july-2012_itl-bulletin.pdf These
SSL Server Rating Guide
SSL Server Rating Guide version 2009j (20 May 2015) Copyright 2009-2015 Qualys SSL Labs (www.ssllabs.com) Abstract The Secure Sockets Layer (SSL) protocol is a standard for encrypted network communication.
Analysis of the HTTPS Certificate Ecosystem
Analysis of the HTTPS Certificate Ecosystem, James Kasten, Michael Bailey, J. Alex Halderman University of Michigan HTTPS and TLS How does HTTPS and the CA ecosystem fit into our daily lives? Nearly all
Securing the SSL/TLS channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs
OWASP AppSec APAC 2012 The OWASP Foundation http://www.owasp.org Securing the SSL/TLS channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs
Certificate Management. PAN-OS Administrator s Guide. Version 7.0
Certificate Management PAN-OS Administrator s Guide Version 7.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Bugzilla ID: Bugzilla Summary:
Bugzilla ID: Bugzilla Summary: CAs wishing to have their certificates included in Mozilla products must 1) Comply with the requirements of the Mozilla CA certificate policy (http://www.mozilla.org/projects/security/certs/policy/)
Support Advisory: ArubaOS Default Certificate Expiration
Support Advisory: ArubaOS Default Certificate Expiration Issued February 14, 2011 Updated April 8, 2011 This document, including the information it contains and the programs made available through the
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https
More on SHA-1 deprecation:
Dear PTC Axeda Customer, This message specifies Axeda and IDM Agent upgrade requirements and timelines for transitioning Axeda Enterprise Server, Global Access Server (GAS), Policy Server, and Questra
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
SSL Report: ebfl.srpskabanka.rs (91.240.6.48)
Home Projects Qualys.com Contact You are here: Home > Projects > SSL Server Test > SSL Report: (91.240.6.48) Assessed on: Sun, 03 Jan 2016 15:46:07 UTC HIDDEN Clear cache Scan Another» Summary Overall
ARPKI: Attack Resilient Public-Key Infrastructure
ARPKI: Attack Resilient Public-Key Infrastructure David Basin, Cas Cremers, Tiffany Hyun-Jin Kim, Adrian Perrig, Ralf Sasse, Pawel Szalachowski ETH Zurich, University of Oxford, CMU 1 PUBLIC KEYS AND CERTIFICATES
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
Lesson 10: Attacks to the SSL Protocol
Lesson 10: Attacks to the SSL Protocol Luciano Bello - [email protected] Chalmers University Dr. Alfonso Muñoz - [email protected] T>SIC Group. Universidad Politécnica de Madrid Security of the SSL
Public Key Infrastructure (PKI)
Public Key Infrastructure (PKI) In this video you will learn the quite a bit about Public Key Infrastructure and how it is used to authenticate clients and servers. The purpose of Public Key Infrastructure
SSL Interception Proxies. Jeff Jarmoc Sr. Security Researcher Dell SecureWorks. and Transitive Trust
SSL Interception Proxies Jeff Jarmoc Sr. Security Researcher Dell SecureWorks and Transitive Trust About this talk History & brief overview of SSL/TLS Interception proxies How and Why Risks introduced
Project X Mass interception of encrypted connections
Project X Mass interception of encrypted connections What? SSL/TLS interception TOR interception ...a thorny path Common Issues Public Key Pinning avoids rogue CA to sign certs Common Issues Google and
How to configure SSL proxying in Zorp 3 F5
How to configure SSL proxying in Zorp 3 F5 June 14, 2013 This tutorial describes how to configure Zorp to proxy SSL traffic Copyright 1996-2013 BalaBit IT Security Ltd. Table of Contents 1. Preface...
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
Domino and Internet. Security. IBM Collaboration Solutions. Ask the Experts 12/16/2014
Domino and Internet Ask the Experts 12/16/2014 Security IBM Collaboration Solutions Agenda Overview of internet encryption technology Domino's implementation of encryption Demonstration of enabling an
Breaking the Myths of Extended Validation SSL Certificates
BlackHat Briefings, 2009 Breaking the Myths of Extended Validation SSL Certificates Alexander Sotirov phmsecurity.com Mike Zusman intrepidusgroup.com Introduction Chosen-prefix MD5 collisions allowed us
Working with Portecle to update / create a Java Keystore.
Working with Portecle to update / create a Java Keystore. Backup your stoneware.keystore file before starting. Download Portecle from http://sourceforge.net/projects/portecle/ Unzip the files and double
Web Security: Encryption & Authentication
Web Security: Encryption & Authentication Arnon Rungsawang [email protected] Massive Information & Knowledge Engineering Department of Computer Engineering Faculty of Engineering Kasetsart University, Bangkok,
ALTERNATIVES TO CERTIFICATION AUTHORITIES FOR A SECURE WEB
ALTERNATIVES TO CERTIFICATION AUTHORITIES FOR A SECURE WEB Scott Rea DigiCert, Inc. Session ID: SEC-T02 Session Classification: Intermediate BACKGROUND: WHAT IS A CERTIFICATION AUTHORITY? What is a certification
SSL Protect your users, start with yourself
SSL Protect your users, start with yourself Kulsysmn 14 december 2006 Philip Brusten Overview Introduction Cryptographic algorithms Secure Socket Layer Certificate signing service
Websense Content Gateway HTTPS Configuration
Websense Content Gateway HTTPS Configuration web security data security email security Support Webinars 2010 Websense, Inc. All rights reserved. Webinar Presenter Title: Sr. Tech Support Specialist Cisco
Asymmetric cryptosystems fundamental problem: authentication of public keys
Network security Part 2: protocols and systems (a) Authentication of public keys Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015 Asymmetric cryptosystems fundamental
Lecture 13. Public Key Distribution (certification) PK-based Needham-Schroeder TTP. 3. [N a, A] PKb 6. [N a, N b ] PKa. 7.
Lecture 13 Public Key Distribution (certification) 1 PK-based Needham-Schroeder TTP 1. A, B 4. B, A 2. {PKb, B}SKT B}SKs 5. {PK a, A} SKT SKs A 3. [N a, A] PKb 6. [N a, N b ] PKa 7. [N b ] PKb B Here,
The Inconvenient Truth about Web Certificates
The Inconvenient Truth about Web Certificates Nevena Vratonjic, Julien Freudiger, Vincent Bindschaedler and Jean-Pierre Hubaux Abstract HTTPS is the de facto standard for securing Internet communications.
State of PKI for SSL/TLS
State of PKI for SSL/TLS NIST Workshop on Improving Trust in the Online Marketplace Russ Housley Vigil Security, LLC Introduction State of the PKI for SSL/TLS: Mostly working, but too fragile Facing motivated
SBClient SSL. Ehab AbuShmais
SBClient SSL Ehab AbuShmais Agenda SSL Background U2 SSL Support SBClient SSL 2 What Is SSL SSL (Secure Sockets Layer) Provides a secured channel between two communication endpoints Addresses all three
Support Advisory: ArubaOS Default Certificate Expiration
Support Advisory: ArubaOS Default Certificate Expiration Issued October 10, 2013 This document, including the information it contains and the programs made available through the links that it includes,
Maximizing Performance with SPDY & SSL. Billy Hoffman [email protected] @zoompf
Maximizing Performance with SPDY & SSL Billy Hoffman [email protected] @zoompf What is SPDY? Massive Browser Support Massive Server Support Cast of Characters TCP HTTP SSL X.509 Certificate Cryptography
Understanding digital certificates
Understanding digital certificates Mick O Brien and George R S Weir Department of Computer and Information Sciences, University of Strathclyde Glasgow G1 1XH [email protected], [email protected]
KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE. Mihir Bellare UCSD 1
KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE Mihir Bellare UCSD 1 The public key setting Alice M D sk[a] (C) Bob pk[a] C C $ E pk[a] (M) σ $ S sk[a] (M) M, σ Vpk[A] (M, σ) Bob can: send encrypted data
Installation Procedure SSL Certificates in IIS 7
Installation Procedure SSL Certificates in IIS 7 This document will explain the creation and installation procedures for enabling an IIS website to use Secure Socket Layer (SSL). Check IIS for existing
Proto Balance SSL TLS Off-Loading, Load Balancing. User Manual - SSL. http://www.protonet.co.za/
Proto Balance SSL TLS Off-Loading, Load Balancing http://www.protonet.co.za/ User Manual - SSL Copyright c 2003-2010 Shine The Way 238 CC. All rights reserved. March 13, 2010 Contents 1. Introduction........................................................................
Configuring Digital Certificates
CHAPTER 36 This chapter describes how to configure digital certificates and includes the following sections: Information About Digital Certificates, page 36-1 Licensing Requirements for Digital Certificates,
CSC574 - Computer and Network Security Module: Public Key Infrastructure
CSC574 - Computer and Network Security Module: Public Key Infrastructure Prof. William Enck Spring 2013 1 Meeting Someone New Anywhere in the Internet 2 What is a certificate? A certificate makes an association
Chapter 7 Managing Users, Authentication, and Certificates
Chapter 7 Managing Users, Authentication, and Certificates This chapter contains the following sections: Adding Authentication Domains, Groups, and Users Managing Certificates Adding Authentication Domains,
Decrease Your Circle of Trust: An Investigation of PKI CAs on Mobile Devices
SESSION ID: MBS-R03 Decrease Your Circle of Trust: An Investigation of PKI CAs on Mobile Devices Andrew Blaich, PhD Lead Security Analyst Bluebox Security @ablaich Who are you trusting? How much trust
Secure Sockets Layer (SSL) / Transport Layer Security (TLS)
Secure Sockets Layer (SSL) / Transport Layer Security (TLS) Brad Karp UCL Computer Science CS GZ03 / M030 19 th November 2014 What Problems Do SSL/TLS Solve? Two parties, client and server, not previously
Certificate technology on Pulse Secure Access
Certificate technology on Pulse Secure Access How-to Guide Published Date July 2015 Contents Introduction: 3 Creating a Certificate signing request (CSR): 3 Import Intermediate CAs: 5 Using Trusted Client
Integrated SSL Scanning
Software Version 9.0 Copyright Copyright 1996-2008. Finjan Software Inc. and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included in this publication are the exclusive
Encrypted Connections
EMu Documentation Encrypted Connections Document Version 1 EMu Version 4.0.03 www.kesoftware.com 2010 KE Software. All rights reserved. Contents SECTION 1 Encrypted Connections 1 How it works 2 Requirements
Securing End-to-End Internet communications using DANE protocol
Securing End-to-End Internet communications using DANE protocol Today, the Internet is used by nearly.5 billion people to communicate, provide/get information. When the communication involves sensitive
Certificates and network security
Certificates and network security Tuomas Aura CSE-C3400 Information security Aalto University, autumn 2014 Outline X.509 certificates and PKI Network security basics: threats and goals Secure socket layer
Djigzo S/MIME setup guide
Author: Martijn Brinkers Table of Contents...1 Introduction...3 Quick setup...4 Create a CA...4 Fill in the form:...5 Add certificates for internal users...5 Add certificates for external recipients...7
Introduction to Cryptography
Introduction to Cryptography Part 3: real world applications Jean-Sébastien Coron January 2007 Public-key encryption BOB ALICE Insecure M E C C D channel M Alice s public-key Alice s private-key Authentication
How to configure SSL proxying in Zorp 6
How to configure SSL proxying in Zorp 6 April 17, 2015 Abstract This tutorial describes how to configure Zorp to proxy SSL traffic Copyright 1996-2015 BalaBit IT Security Ltd. Table of Contents 1. Preface...
Installing an SSL Certificate Provided by a Certificate Authority (CA) on the BlueSecure Controller (BSC)
Installing an SSL Certificate Provided by a Certificate Authority (CA) on the BlueSecure Controller (BSC) Date: July 2, 2010 Revision: 2.0 Introduction This document explains how to install an SSL Certificate
WEB SERVICES CERTIFICATE GUIDE
WEB SERVICES CERTIFICATE GUIDE 1. Purpose The purpose of this document is to provide information to internal and external users who want to access an era Web Service using the certificate based authentication
Real-Time Communication Security: SSL/TLS. Guevara Noubir [email protected] CSU610
Real-Time Communication Security: SSL/TLS Guevara Noubir [email protected] CSU610 1 Some Issues with Real-time Communication Session key establishment Perfect Forward Secrecy Diffie-Hellman based PFS
IPv4 Shortage Multiple SSL Certificates on a single IP address
GlobalSign. A GMO Internet Inc group company. IPv4 Shortage Multiple SSL Certificates on a single IP address Paul van Brouwershaven EMEA Business Development Director GLOBALSIGN SOLUTIONS Visible Trust
How to configure HTTPS proxying in Zorp 5
How to configure HTTPS proxying in Zorp 5 June 24, 2014 This tutorial describes how to configure Zorp to proxy HTTPS traffic Copyright 1996-2014 BalaBit IT Security Ltd. Table of Contents 1. Preface...
Certificate technology on Junos Pulse Secure Access
Certificate technology on Junos Pulse Secure Access How-to Introduction:... 1 Creating a Certificate signing request (CSR):... 1 Import Intermediate CAs: 3 Using Trusted Client CA on Juno Pulse Secure
Extended SSL Certificates
Introduction Widespread usage of internet has led to the growth of awareness amongst users, who now associate green address bar with security. Though people are able to recognize the green bar, there is
Secure Socket Layer (SSL) and Transport Layer Security (TLS)
Secure Socket Layer (SSL) and Transport Layer Security (TLS) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available
Tutorial on Smartphone Security
Tutorial on Smartphone Security Wenliang (Kevin) Du Professor [email protected] Smartphone Usage Smartphone Applications Overview» Built-in Protections (ios and Android)» Jailbreaking and Rooting» Security
7 Key Management and PKIs
CA4005: CRYPTOGRAPHY AND SECURITY PROTOCOLS 1 7 Key Management and PKIs 7.1 Key Management Key Management For any use of cryptography, keys must be handled correctly. Symmetric keys must be kept secret.
Breaking the Security Myths of Extended Validation SSL Certificates
Breaking the Security Myths of Extended Validation SSL Certificates Alexander Sotirov phreedom.org Mike Zusman intrepidusgroup.com Introduction SSL certificate authorities have been thoroughly broken in
CHAPTER 7 SSL CONFIGURATION AND TESTING
CHAPTER 7 SSL CONFIGURATION AND TESTING 7.1 Configuration and Testing of SSL Nowadays, it s very big challenge to handle the enterprise applications as they are much complex and it is a very sensitive
Integrated SSL Scanning
Version 9.2 SSL Enhancements Copyright 1996-2008. Finjan Software Inc. and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included in this publication are the exclusive
Configuration Guide for RFMS 3.0 Initial Configuration. WiNG 5 How-To Guide. Digital Certificates. July 2011 Revision 1.0
Configuration Guide for RFMS 3.0 Initial Configuration XXX-XXXXXX-XX WiNG 5 How-To Guide Digital Certificates July 2011 Revision 1.0 MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark
mod_ssl Cryptographic Techniques
mod_ssl Overview Reference The nice thing about standards is that there are so many to choose from. And if you really don t like all the standards you just have to wait another year until the one arises
ASA 8.x Manually Install 3rd Party Vendor Certificates for use with WebVPN Configuration Example
ASA 8.x Manually Install 3rd Party Vendor Certificates for use with WebVPN Configuration Example Document ID: 98596 Contents Introduction Prerequisites Requirements Components Used Conventions Configure
Fast, Scalable And Secure Web Hosting For Entrepreneurs
Fast, Scalable And Secure Web Hosting For Entrepreneurs Learn to set up your server and website Wim Bervoets This book is for sale at http://leanpub.com/fastscalableandsecurewebhostingforentrepreneurs
WIRELESS LAN SECURITY FUNDAMENTALS
WIRELESS LAN SECURITY FUNDAMENTALS Jone Ostebo November 2015 #ATM15ANZ @ArubaANZ Learning Goals Authentication with 802.1X But first: We need to understand some PKI And before that, we need a cryptography
Network Security Essentials Chapter 5
Network Security Essentials Chapter 5 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 5 Transport-Level Security Use your mentality Wake up to reality From the song, "I've Got
Quickstream Connectivity Options
A division of Westpac Banking Corporation ABN 33 007 457 141 Quickstream Connectivity Options Document History Date 25-Jun-2003 1-Jul-2003 3-July-2003 18-July-2003 18-Aug-2003 8-Sep-2003 19-Sep-2003 31-Oct-2003
By Jan De Clercq. Understanding. and Leveraging SSL-TLS. for Secure Communications
By Jan De Clercq Understanding and Leveraging SSL-TLS for Secure Communications ii Contents Chapter 2: Leveraging SSL/TLS for Secure Web Communications....... 21 Setting Up SSL/TLS on a Web Server..................................
OpenADR 2.0 Security. Jim Zuber, CTO QualityLogic, Inc.
OpenADR 2.0 Security Jim Zuber, CTO QualityLogic, Inc. Security Overview Client and server x.509v3 certificates TLS 1.2 with SHA256 ECC or RSA cipher suites TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 TLS_RSA_WITH_AES_128_CBC_SHA256
PKI : state of the art and future trends
PKI : state of the art and future trends David Chadwick [email protected] 25 Sept 2013 2010-13 TrueTrust Ltd 1 Contents Review of X.509 state of the art to date What is new in X.509 (2016) What
BEGINNERS GUIDE TO SSL CERTIFICATES: Making the BEST choice when considering your online security options
BEGINNERS GUIDE TO SSL CERTIFICATES: Making the BEST choice when considering your online security options BEGINNERS GUIDE TO SSL CERTIFICATES Introduction Whether you are an individual or a company, you
Certificate Management
Certificate Management Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Analyzing DANE's Response to Known DNSsec Vulnerabilities
Analyzing DANE's Response to Known DNSsec Vulnerabilities Matthew Henry Joseph Kirik Emily Scheerer UMBC UMBC UMBC [email protected] [email protected] [email protected] May 9, 2014 Abstract: SSL/TLS is currently
Protocol Rollback and Network Security
CSE 484 / CSE M 584 (Spring 2012) Protocol Rollback and Network Security Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee,
EMET 4.0 PKI MITIGATION. Neil Sikka DefCon 21
EMET 4.0 PKI MITIGATION Neil Sikka DefCon 21 ABOUT ME Security Engineer on MSRC (Microsoft Security Response Center) I look at 0Days EMET Developer I enjoy doing security research on my free time too:
Managing SSL certificates in the ServerView Suite
Overview - English FUJITSU Software ServerView Suite Managing SSL certificates in the ServerView Suite Secure server management using SSL and PKI Edition September 2015 Comments Suggestions Corrections
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
How to configure HTTPS proxying in Zorp 6
How to configure HTTPS proxying in Zorp 6 April 17, 2015 Abstract This tutorial describes how to configure Zorp to proxy HTTPS traffic Copyright 1996-2015 BalaBit IT Security Ltd. Table of Contents 1.
[SMO-SFO-ICO-PE-046-GU-
Presentation This module contains all the SSL definitions. See also the SSL Security Guidance Introduction The package SSL is a static library which implements an API to use the dynamic SSL library. It
