Today s Topics SSL/TLS. Certification Authorities VPN. Server Certificates Client Certificates. Trust Registration Authorities
|
|
|
- Silvester McDaniel
- 10 years ago
- Views:
Transcription
1 SSL/TLS Today s Topics Server Certificates Client Certificates Certification Authorities Trust Registration Authorities VPN IPSec Client tunnels LAN-to-LAN tunnels
2 Secure Sockets Layer Secure Sockets Layer (version 3.0) According to the specification The primary goal of the SSL Protocol is to provide privacy and reliability between two communicating applications. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.
3 Secure Sockets Layer Designed with four basic goals Cryptographic security Interoperability Extensibility Relative efficiency
4 Secure Sockets Layer SSL has three basic properties: The connection is private. Encryption is used after an initial handshake to define a secret key. Symmetric cryptography is used for data encryption (e.g., DES, RC4, etc.) The peer's identity can be authenticated using asymmetric, or public key, cryptography (e.g., RSA, DSS, etc.). The connection is reliable. Message transport includes a message integrity check using a keyed MAC. Secure hash functions (e.g., SHA, MD5, etc.) are used for MAC computations.
5 SSL/TLS Well then, what is TLS? Transport Layer Security (version 1.0) SSL was developed by Netscape. The standards community wanted their own version, free from any patents/restrictions Thus was born TLS IETF changed the name to avoid showing bias I ll use the two terms interchangeably
6 SSL/TLS ftp://ftp.isi.edu/in-notes/rfc2246.txt The TLS protocol provides communications privacy over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. Sound familiar? TLS v1.0 == SSL v3.1
7 SSL/TLS Users want to connect to servers without the connection being listened to Electronic commerce Grades Health care Other Every server has a certificate Basically a public key Signed by a trusted third party
8 Server Certificates X509 version 3 is the current specification Certs hold three important bits of info Name of Server Public Key of Server Issued by a trusted organization
9 X509 Certificates: example Version Serial Number Algorithm ID Issuer (DN) Period of Validity Subject Subject s Public Key Extensions Issuers Signature 3 04:60:00:00:02 md5withrsaencryption C=US,O=FooBar, OU=my CA Not Before: Nov 17 00:00: GMT Not After : Nov 17 00:00: GMT C=US,O=MyDomain,CN= m 00:e1:73:65:2d:00:77 CA:False 51:e4:df:76:c3:97:20:6c So, What does a certificate look like?
10 -----BEGIN CERTIFICATE----- MIIEpDCCA4ygAwIBAgIBATANBgkqhkiG9w0BAQUFADCBizELMAkGA1UEBhMCVV MxFjAUBgNVBAgTDU1hc3NhY2h1c2V0dHMxGDAWBgNVBAoTD0NQTSBFbnRlcnB yaxnlczelmcmga1ueaxmcq1bnievudgvychjpc2vzierlbw8gq0egdjaumtejmce GCSqGSIb3DQEJARYUY21pc3JhQG9pdC51bWFzcy5lZHUwHhcNMDIwMzA0MTc1 NTIxWhcNMDQxMTI4MTc1NTIxWjCBgzELMAkGA1UEBhMCVVMxFjAUBgNVBAgTD U1hc3NhY2h1c2V0dHMxGDAWBgNVBAoTD0NQTSBFbnRlcnByaXNlczEdMBsGA1U EAxMUZW5pZ21hLm9pdC51bWFzcy5lZHUxIzAhBgkqhkiG9w0BCQEWFGNtaXNyYU BvaXQudW1hc3MuZWR1MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA ze2xp8yzjkua+ya+8qgaksaa82m2crg0k45qkjf/4fugkmh1cchvafgyohtsnz3xpik BgOdvBBve6sivyXuTlIEpfNhERLYsbXRPR5XLWzaB9610r82OIuiMEoMiWw+5+OMx ONO5i48jgLh6R9AO4Ybr7guo2xqkd53Erh+6gmfh73TYWIJm/FQnVw2/CD3LiFA6Be8 TgCBMhSH8eM68vKiHt3DPmFXqPqCX9kqawrgRYjNPIaHD4oFgPi48scXdgD0gaBqC f8onn3clxn9mghu0t/bzjrmhaujftpclrhag82psvyk9wpu7t6beinh2kdnteenlo DskAdRogzVHgwIDAQABo4IBFzCCARMwCQYDVR0TBAIwADAsBglghkgBhvhCAQ0 EHxYdT3BlblNTTCBHZW5lcmF0ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFP8 o/sagvvyad9964jdtygkpcemvmig4bgnvhsmegbawga2afj/zwxogiwdxdsv2hsc gzx3slkz8oygrpigomiglmqswcqydvqqgewjvuzewmbqga1uecbmntwfz c2fjahvzzxr0czeymbyga1uechmpq1bnievudgvychjpc2vzmsuwiwydvqqde xxdue0grw50zxjwcmlzzxmgrgvtbybdqsb2mc4xmsmwiqyjkozihvcnaqkbfh RjbWlzcmFAb2l0LnVtYXNzLmVkdYIBADANBgkqhkiG9w0BAQUFAAOCAQEAyPzrNS 01hNpWDjxwJsu3ouF0t8cNpzpyLBpx5flLmWFSfU7LRtfJtr5yVxXbtDqHbAhfDpsgT6o1 UoUbsJUevCR/u81pC8UHuSsXrXxbxxZbvLlr6RWFKMMLjjGPIyFi2U9NpNOEIcOx9e7 nm/duhx4mwz0jn9xwlkgsxzlsgdz0+wyvdr0z1xvjqa4hpt2xed4bmu8nsqufzm+ okgrbwkwlgdlizejrazaduvb1tzpuoifnpp0o2kh2jqv/pph6uj8ywdfpyoji9ibkyoilot g36tzfje92exmugreeoluormujbgf1kesl6coeoytprxzimwcpu86vbnexp2oq4w== -----END CERTIFICATE-----
11 Certificate: Data: Version: 3 (0x2) Serial Number: (0xabcdef) Signature Algorithm: sha1withrsaencryption Issuer: C=US, ST=Massachusetts, O=Trusted CA Company, CN=Trusted CA v0.1/ [email protected] Validity: Not Before: Mar 4 17:55: GMT Not After : Nov 28 17:55: GMT Subject: C=US, ST=Massachusetts, O=My Enterprises, CN= Subject Public Key Info: Public Key Algorithm: rsaencryption RSA Public Key: (2048 bit) Modulus (2048 bit): 00:cc:4d:97:a7:c6:<.>:f9:35:47:83 Exponent: (0x10001) X509v3 Basic Constraints: CA:FALSE Certificate: Signature Algorithm: sha1withrsaencryption c8:fc:eb:35:2d:ce:95:< >:6e:71:31:3f:6a:10:e3
12 RSA Public key = (n,e) Private key = (n,d) Encryption of a character M i C i = M ie (mod n) Decryption of a cipher character C i n M i = C i d (mod n) e Modulus (2048 bit): 00:e2:62:13:dc:ab:73:f8:42:d8:13:bb:6e:09:19: 75:2e:d8:2b:9f:31:d7:d4:7e:b3:12:84:21:d3:91: 5d:46:99:be:eb:eb:94:38:b5:15:cd:29:4f:e2:20: 8e:01:c9:ce:a9:20:cc:99:1f:33:e5:6b:51:fe:c7: 99:54:31:73:ab:f5:19:92:79:46:a4:7e:da:74:ad: 66:d2:77:ce:85:9f:be:b8:27:2f:77:d4:5d:c2:41: b7:f4:06:10:ea:6d:d0:1d:07:c4:d5:41:fe:28:9f: a7:0e:b2:ed:7b:14:18:3f:1d:af:81:65:97:16:ad: 63:f6:e0:2f:5e:84:75:8a:d3:67:21:c4:ba:a4:5b: 24:d7:34:2c:7a:4a:c7:b4:76:e3:d8:f0:ab:50:81: e8:d0:fc:10:2b:33:56:7b:74:03:d9:31:d5:f1:f4: e4:f2:e5:db:29:ba:7a:29:5f:ac:07:f7:f2:84:4d: 4a:2b Exponent: (0x10001)
13 SSL/TLS Application Protocol (e.g. http) ChangeCiphe r Alert Record Layer Handshake } SSL/TLS TCP IP SSL consists of two protocol layers The Record Layer encapsulates all messages The ChangeCipherSpec protocol indicates the channel is ready for secure communications The Alert protocol indicates errors or other caution conditions have occurred in the connection The Handshake protocol negotiates all options of the session
14 SSL Session Negotiation: Server Authentication Client Server ClientHello ServerHello Certificate ServerHelloDone ClientKeyExchange ChangeCipherSpec Finish ChangeCipherSpec Finish Client is responsible for checking: If the Issuer s signature on the certificate is valid If the certificate is within the period of validity If the Subject (CN) is identical to the server DNS name
15 Client Certificates Basically they are the same as server certs Are you really any different than a server? Again, they need to be signed by a trusted third party (the Issuer) Who do you trust? But, how do we name everyone uniquely? Problem, big problem
16 SSL Session Negotiation: Client and Server Authentication Client ClientHello Server ServerHello Certificate Certificate Request ServerHelloDone Certificate ClientKeyExchange CertificateVerify ChangeCipherSpec Finish ChangeCipherSpec Finish
17 Certification Authority (CA) The CA is the trusted third party We ve talked about trust before All certificates are signed with the CA s private key Including the CA s signing cert Better protect that private key pretty well Can you spell liability? CP/CPS
18 Who do you trust? subject=/c=us/o=verisign, Inc./OU=Class 1 Public Primary Certification Authority - G2/OU=(c) 1998 VeriSign, Inc. - For authorized use only/ou=verisign Trust Network issuer= /C=US/O=VeriSign, Inc./OU=Class 1 Public Primary Certification Authority - G2/OU=(c) 1998 VeriSign, Inc. - For authorized use only/ou=verisign Trust Network subject=/l=internet/o=verisign, Inc./OU=VeriSign Individual Software Publishers CA issuer= /L=Internet/O=VeriSign, Inc./OU=VeriSign Individual Software Publishers CA subject=/c=za/st=western Cape/L=Cape Town/O=Thawte Consulting cc/ou=certification Services Division/CN=Thawte Server CA/ [email protected] issuer= /C=ZA/ST=Western Cape/L=Cape Town/O=Thawte Consulting cc/ou=certification Services Division/CN=Thawte Server CA/ [email protected] subject=/c=us/o=rsa Data Security, Inc./OU=Secure Server Certification Authority issuer= /C=US/O=RSA Data Security, Inc./OU=Secure Server Certification Authority subject=/cn=root SGC Authority issuer= /CN=Root SGC Authority subject=/ou=copyright (c) 1997 Microsoft Corp./OU=Microsoft Corporation/CN=Microsoft Root Authority issuer= /OU=Copyright (c) 1997 Microsoft Corp./OU=Microsoft Corporation/CN=Microsoft Root Authority subject=/c=us/o=msft/cn=microsoft Authenticode(tm) Root Authority issuer= /C=US/O=MSFT/CN=Microsoft Authenticode(tm) Root Authority subject=/c=us/o=mci/ou=internetmci/ou=mall issuer= /C=US/O=MCI/OU=internetMCI/OU=MALL subject=/c=ca/cn=keywitness Canada Inc. [email protected] issuer= /C=CA/CN=Keywitness Canada Inc. [email protected] subject=/c=us/o=keywitness International, Inc./dnQualifier=OID /CN=KeyWitness 2048 Root issuer= /C=US/O=KeyWitness International, Inc./dnQualifier=OID /CN=KeyWitness 2048 Root subject=/c=us/o=gte Corporation/CN=GTE CyberTrust Root issuer= /C=US/O=GTE Corporation/CN=GTE CyberTrust Root subject=/c=us/o=gte Corporation/OU=GTE CyberTrust Solutions, Inc./CN=GTE CyberTrust Global Root issuer= /C=US/O=GTE Corporation/OU=GTE CyberTrust Solutions, Inc./CN=GTE CyberTrust Global Root subject=/c=us/o=at&t/ou=directory Services issuer= /C=US/O=AT&T/OU=Directory Services subject=/o=microsoft Trust Network/OU=Microsoft Corporation/OU=Microsoft Time Stamping Service Root/OU=Copyright (c) 1997 Microsoft Corp. issuer= /O=Microsoft Trust Network/OU=Microsoft Corporation/OU=Microsoft Time Stamping Service Root/OU=Copyright (c) 1997 Microsoft Corp. subject=/c=us/o=verisign, Inc./OU=Class 1 Public Primary Certification Authority issuer= /C=US/O=VeriSign, Inc./OU=Class 1 Public Primary Certification Authority subject=/c=us/o=at&t/ou=certificate Services issuer= /C=US/O=AT&T/OU=Certificate Services
19 Courtesy Netscape
20 Virtual Private Networks (VPN) What is a VPN? a group of two or more computer systems, typically connected to a private network with limited public-network access, that communicates securely over a public network. A combination of tunneling, encryption, authentication and access control technologies and services used to carry traffic over an IP network Encrypted Tunnel Trusted User Untrusted Network Firewall Trusted Server
21 Virtual Private Networks (VPN) What makes a VPN secure? Encryption Strong authentication of remote users and hosts. Mechanisms for hiding or masking information about the private network topology from potential attackers Three basic types: Hardware-based Firewall-based Standalone/Software-based
22 IPSec IPSec is the IP Security standard from the IETF (the people that standardize the Internet) rfc1825 IPSec consists of two different headers Authentication Header (AH) protocol Encapsulating Security Payload (ESP) protocol Both protocols assume the peers using the protocol have a shared key.
23 IPSec Both protocols assume the peers using the protocol share authentication information. In addition there is a protocol for distributing keys called IKE. Internet Key Exchange Why was IPSec designed as two protocols? To encourage wide deployment, even where there are import, export, and usage restrictions on encryption. Cryptoraphy is covered under ITAR.
24 IP Authentication Header (AH) Designed to provide Integrity Authentication Does not provide Confidentiality AH header includes: connection identifier authentication data: signed message digest, calculated over original IP datagram, providing source authentication, data integrity. Next header field: specifies type of data (TCP, UDP, ICMP, etc.) IP Header AH Header TCP/UPD seg Protocol=51 This is a network-layer protocol! Not an application-level protocol.
25 IP Encapsulating Security Payload (ESP) Designed to provide Integrity Authentication Confidentiality Data, ESP trailer encrypted. Next header field is in ESP trailer. ESP authentication field is similar to AH authentication field. Protocol = 50. authenticated IP Header ESP Header TCP/UPD seg ESP trailer ESP Auth Protocol=50 encrypted
26 IKE A hybrid protocol designed to negotiate and provide authenticated keying material for security associations (SA) in a protected manner. An SA is a set of policy and keys used to protect information Based on three previous protocols ISAKMP A framework for authentication and key exchanges, but does not define them. Oakley A described series of key exchanges and the services provided by them. SKEME A versatile key exchange technique providing anonymity, repudiability, and quick key refreshment. IKE is a protocol using part of Oakley and part of SKEME in conjunction with ISAKMP to obtain authenticated keying material. IKE is one implementation of ISAKMP to be used with IPSec
27 IPSec Security Why don t we cover IKE? The protocol is very complex Security s worst enemy is complexity (the) chief complaint in this tract is the minnumbing complexity of the IPSec standards document, and indeed in the protocol itself There is a great deal of known plaintext in IPSec traffic Encrypted TCP/IP header field data.
28 IPSec Security The protocol is very complex Security s worst enemy is complexity (the) chief complaint in this tract is the minnumbing complexity of the IPSec standards document, and indeed in the protocol itself There is a great deal of known plaintext in IPSec traffic Encrypted TCP/IP header field data.
29 Client Tunnels Client runs VPN software IP traffic between Trusted user and VPN concentrator Can establish normally blocked connections between trusted user and server Border firewall only needs to allow VPN traffic destined for the VPN concentrator Encrypted Tunnel Local ISP VPN Concentrator Trusted User Border Router Firewall Firewall Trusted Server WebServer
30 Client Tunnels Client initiates VPN session ( ) Client establishes session key with Client encapsulates traffic (500) (80) E s { ( ) } The whole packet incl. Headers is encapsulated Note: we can only use ESP tunnel-mode here, not AH since we are doing NAT. Local ISP Trusted User System IP: VPN IP: Border Router Firewall Firewall Trusted Server WebServer
31 Authentication Client Tunnels Shared secret All the standard scalability problems Client certificates Storage of client certificates potentially insecure Requires a Certification Authority. Trust???
32 Other VPN Protocols In addition to IPSec, there are a few other protocols worth mentioning PPTP L2F L2TP
33 PPTP Point-to-Point Tunneling protocol PPP encapsulated over IP PPTP was originally developed by a consortium including Microsoft. The protocol was originally designed as an encapsulation mechanism, to allow the transport of non-tcp/ip protocols (such as IPX) over the Internet using Generic Routing Encapsulation (GRE). Version 1 was full of security holes Flawed encryption mechanism non-random keys, session keys weak hash of user password, key lengths too short (non-configurable) Bad password management in mixed Win95/NT environment; static passwords easily compromised Vulnerable to server spoofing attacks because packet authentication not implemented, easy denial-of-service attacks even inside firewalls
34 Other Protcols L2F -- Layer 2 Forwarding Media independent layer 2 tunneling protocol from Cisco A standards based tunneling mechanism for transporting link-layer frames (e.g. HDLC, PPP, SLIP over higher-layer protcols L2TP Layer 2 Transport Protocol Encapsulates PPP frames to be sent over IP, X25, Frame Relay or ATM networks. Requires IPSec to secure underlying IP transport Take one part PPTP, one part L2F, shake liberally
35 LAN-to-LAN Tunnels Sometimes we want to tunnel more than one computer over a single logical link Only the remote concentrator needs a routable IP Generally, this is a whole lot cheaper than leased lines to n different remote offices Sometime referred to as node-to-node tunnels VPN Concentrator Encrypted Tunnel Corporate VPN Local ISP Border Router/ Firewall Border Router Firewall Firewall Trusted Server WebServer
36 VPN Summary There are a lot of products out there, the trick is picking the good ones. Encryption is a necessary, but not sufficient condition for security Security is a process, not a product Don t trust vendors claims (PPTP) A VPN is not a substitute for policies and auditing Better make sure you secure that VPN concentrator.
Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer
Other VPNs TLS/SSL, PPTP, L2TP Advanced Computer Networks SS2005 Jürgen Häuselhofer Overview Introduction to VPNs Why using VPNs What are VPNs VPN technologies... TLS/SSL Layer 2 VPNs (PPTP, L2TP, L2TP/IPSec)
Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)
Security Protocols Security Protocols Necessary to communicate securely across untrusted network Provide integrity, confidentiality, authenticity of communications Based on previously discussed cryptographic
VPN SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region
VPN SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the
Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009
16 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009 1 25 Organization Welcome to the New Year! Reminder: Structure of Communication Systems lectures
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10)
APNIC elearning: Network Security Fundamentals 20 March 2013 10:30 pm Brisbane Time (GMT+10) Introduction Presenter/s Nurul Islam Roman Senior Training Specialist [email protected] Specialties: Routing &
Web Security Considerations
CEN 448 Security and Internet Protocols Chapter 17 Web Security Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University [email protected]
Network Security Fundamentals
APNIC elearning: Network Security Fundamentals 27 November 2013 04:30 pm Brisbane Time (GMT+10) Introduction Presenter Sheryl Hermoso Training Officer [email protected] Specialties: Network Security IPv6
INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang
INF3510 Information Security University of Oslo Spring 2011 Lecture 9 Communication Security Audun Jøsang Outline Network security concepts Communication security Perimeter security Protocol architecture
Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part III-b Contents Part III-b Secure Applications and Security Protocols Practical Security Measures Internet Security IPSEC, IKE SSL/TLS Virtual Private Networks Firewall Kerberos SET Security Measures
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https
Introduction to Security and PIX Firewall
Introduction to Security and PIX Firewall Agenda Dag 28 Föreläsning LAB PIX Firewall VPN A Virtual Private Network (VPN) is a service offering secure, reliable connectivity over a shared, public network
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
APNIC elearning: IPSec Basics. Contact: [email protected]. esec03_v1.0
APNIC elearning: IPSec Basics Contact: [email protected] esec03_v1.0 Overview Virtual Private Networks What is IPsec? Benefits of IPsec Tunnel and Transport Mode IPsec Architecture Security Associations
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Communication Systems SSL
Communication Systems SSL Computer Science Organization I. Data and voice communication in IP networks II. Security issues in networking III. Digital telephony networks and voice over IP 2 Network Security
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Real-Time Communication Security: SSL/TLS. Guevara Noubir [email protected] CSU610
Real-Time Communication Security: SSL/TLS Guevara Noubir [email protected] CSU610 1 Some Issues with Real-time Communication Session key establishment Perfect Forward Secrecy Diffie-Hellman based PFS
CS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
VPN VPN requirements Encryption VPN-Types Protocols VPN and Firewalls
Overview VPN VPN requirements Encryption VPN-Types Protocols VPN and Firewalls Computer Net Lab/Praktikum Datenverarbeitung 2 1 VPN - Definition VPNs (Virtual Private Networks) allow secure data transmission
VPN. VPN For BIPAC 741/743GE
VPN For BIPAC 741/743GE August, 2003 1 The router supports VPN to establish secure, end-to-end private network connections over a public networking infrastructure. There are two types of VPN connections,
Case Study for Layer 3 Authentication and Encryption
CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client
How To Understand And Understand The Ssl Protocol (Www.Slapl) And Its Security Features (Protocol)
WEB Security: Secure Socket Layer Cunsheng Ding HKUST, Hong Kong, CHINA C. Ding - COMP581 - L22 1 Outline of this Lecture Brief Information on SSL and TLS Secure Socket Layer (SSL) Transport Layer Security
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
Certificates and network security
Certificates and network security Tuomas Aura CSE-C3400 Information security Aalto University, autumn 2014 Outline X.509 certificates and PKI Network security basics: threats and goals Secure socket layer
Communication Security for Applications
Communication Security for Applications Antonio Carzaniga Faculty of Informatics University of Lugano March 10, 2008 c 2008 Antonio Carzaniga 1 Intro to distributed computing: -server computing Transport-layer
Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security
UNIT 4 SECURITY PRACTICE Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security Slides Courtesy of William Stallings, Cryptography & Network Security,
Overview. Protocols. VPN and Firewalls
Computer Network Lab 2015 Fachgebiet Technische h Informatik, Joachim Zumbrägel Overview VPN VPN requirements Encryption VPN-Types Protocols VPN and Firewalls VPN-Definition VPNs (Virtual Private Networks)
Transport Level Security
Transport Level Security Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
Protocol Rollback and Network Security
CSE 484 / CSE M 584 (Spring 2012) Protocol Rollback and Network Security Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee,
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Network Security Part II: Standards
Network Security Part II: Standards Raj Jain Washington University Saint Louis, MO 63131 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 18-1 Overview
Authenticity of Public Keys
SSL/TLS EJ Jung 10/18/10 Authenticity of Public Keys Bob s key? private key Bob public key Problem: How does know that the public key she received is really Bob s public key? Distribution of Public Keys!
Chapter 32 Internet Security
Chapter 32 Internet Security Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 32: Outline 32.1 NETWORK-LAYER SECURITY 32.2 TRANSPORT-LAYER SECURITY 32.3
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw
IP Security IPSec, PPTP, OpenVPN Pawel Cieplinski, AkademiaWIFI.pl MUM Wroclaw Introduction www.akademiawifi.pl WCNG - Wireless Network Consulting Group We are group of experienced professionals. Our company
How To Understand And Understand The Security Of A Key Infrastructure
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used
Network Security. Lecture 3
Network Security Lecture 3 Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Security protocols application transport network datalink physical Contents IPSec overview
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4
T-79.159 Cryptography and Data Security
T-79.159 Cryptography and Data Security Lecture 11: Security systems using public keys 11.1 PGP Kaufman et al: Ch 17, 11.2 SSL/TLS 18, 19 11.3 IPSEC Stallings: Ch 16,17 1 Pretty Good Privacy Email encryption
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts
Outline INF3510 Information Security Lecture 10: Communications Security Network security concepts Communication security Perimeter security Protocol architecture and security services Example security
WEB Security & SET. Outline. Web Security Considerations. Web Security Considerations. Secure Socket Layer (SSL) and Transport Layer Security (TLS)
Outline WEB Security & SET (Chapter 19 & Stalling Chapter 7) Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction (SET) Web Security Considerations
Network Security Essentials Chapter 5
Network Security Essentials Chapter 5 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 5 Transport-Level Security Use your mentality Wake up to reality From the song, "I've Got
Software Engineering 4C03 Research Project. An Overview of Secure Transmission on the World Wide Web. Sean MacDonald 0043306
Software Engineering 4C03 Research Project An Overview of Secure Transmission on the World Wide Web Sean MacDonald 0043306 Tuesday April 5, 2005 Introduction Software Engineering 4C03 Research Project
Lecture 10: Communications Security
INF3510 Information Security Lecture 10: Communications Security Audun Jøsang University of Oslo Spring 2015 Outline Network security concepts Communication security Perimeter security Protocol architecture
Announcement. Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed.
Announcement Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed. 1 We have learned Symmetric encryption: DES, 3DES, AES,
Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity
Basic Security Requirements and Techniques Confidentiality The property that stored or transmitted information cannot be read or altered by an unauthorized party Integrity The property that any alteration
Application Note: Onsight Device VPN Configuration V1.1
Application Note: Onsight Device VPN Configuration V1.1 Table of Contents OVERVIEW 2 1 SUPPORTED VPN TYPES 2 1.1 OD VPN CLIENT 2 1.2 SUPPORTED PROTOCOLS AND CONFIGURATION 2 2 OD VPN CONFIGURATION 2 2.1
Secure Sockets Layer
SSL/TLS provides endpoint authentication and communications privacy over the Internet using cryptography. For web browsing, email, faxing, other data transmission. In typical use, only the server is authenticated
Virtual Private Networks
Virtual Private Networks The Ohio State University Columbus, OH 43210 [email protected] http://www.cse.ohio-state.edu/~jain/ 1 Overview Types of VPNs When and why VPN? VPN Design Issues Security
CCNA Security 1.1 Instructional Resource
CCNA Security 1.1 Instructional Resource Chapter 8 Implementing Virtual Private Networks 2012 Cisco and/or its affiliates. All rights reserved. 1 Describe the purpose and types of VPNs and define where
Outline. Transport Layer Security (TLS) Security Protocols (bmevihim132)
Security Protocols (bmevihim132) Dr. Levente Buttyán associate professor BME Híradástechnikai Tanszék Lab of Cryptography and System Security (CrySyS) [email protected], [email protected] Outline - architecture
Virtual Private Networks Solutions for Secure Remote Access. White Paper
Virtual Private Networks Solutions for Secure Remote Access White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information
Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols 2011-11-22. ETSF10 Internet Protocols 2011
Internet Security Voice over IP ETSF10 Internet Protocols 2011 Kaan Bür & Jens Andersson Department of Electrical and Information Technology Internet Security IPSec 32.1 SSL/TLS 32.2 Firewalls 32.4 + Voice
Cisco Which VPN Solution is Right for You?
Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2
Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003
http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with
7.1. Remote Access Connection
7.1. Remote Access Connection When a client uses a dial up connection, it connects to the remote access server across the telephone system. Windows client and server operating systems use the Point to
Virtual Private Networks
Virtual Private Networks ECE 4886 Internetwork Security Dr. Henry Owen Definition Virtual Private Network VPN! Virtual separation in protocol provides a virtual network using no new hardware! Private communication
Secure Socket Layer. Security Threat Classifications
Secure Socket Layer 1 Security Threat Classifications One way to classify Web security threats in terms of the type of the threat: Passive threats Active threats Another way to classify Web security threats
Site to Site Virtual Private Networks (VPNs):
Site to Site Virtual Private Networks Programme NPFIT DOCUMENT RECORD ID KEY Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0002.01 Prog. Director Mark Ferrar Owner Tim Davis Version 1.0
Objectives. Remote Connection Options. Teleworking. Connecting Teleworkers to the Corporate WAN. Providing Teleworker Services
ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Providing Teleworker Services Describe the enterprise requirements for providing teleworker services Explain how
Securing IP Networks with Implementation of IPv6
Securing IP Networks with Implementation of IPv6 R.M.Agarwal DDG(SA), TEC Security Threats in IP Networks Packet sniffing IP Spoofing Connection Hijacking Denial of Service (DoS) Attacks Man in the Middle
INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli 4-25-2002
INTERNET SECURITY: FIREWALLS AND BEYOND Mehernosh H. Amroli 4-25-2002 Preview History of Internet Firewall Technology Internet Layer Security Transport Layer Security Application Layer Security Before
Lecture 7: Transport Level Security SSL/TLS. Course Admin
Lecture 7: Transport Level Security SSL/TLS CS 336/536: Computer Network Security Fall 2014 Nitesh Saxena Adopted from previous lecture by Tony Barnard Course Admin HW/Lab 1 Graded; scores posted; to be
Network Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
Study on Remote Access for Library Based on SSL VPN
, pp.111-122 http://dx.doi.org/10.14257/ijca.2016.9.1.11 Study on Remote Access for Library Based on SSL VPN Mei Zhang Library, Linyi University, Shandong, 276000, China [email protected] Abstract With
IP Security. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49
IP Security Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security
Digi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering
Introduction Digi Connect Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering The Digi Connect supports five features which provide security and IP traffic forwarding when using incoming
Security Engineering Part III Network Security. Security Protocols (I): SSL/TLS
Security Engineering Part III Network Security Security Protocols (I): SSL/TLS Juan E. Tapiador [email protected] Department of Computer Science, UC3M Security Engineering 4th year BSc in Computer Science,
Virtual Private Networks: IPSec vs. SSL
Virtual Private Networks: IPSec vs. SSL IPSec SSL Michael Daye Jr. Instructor: Dr. Lunsford ICTN 4040-001 April 16 th 2007 Virtual Private Networks: IPSec vs. SSL In today s society organizations and companies
Secure Socket Layer (SSL) and Transport Layer Security (TLS)
Secure Socket Layer (SSL) and Transport Layer Security (TLS) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available
Managing and Securing Computer Networks. Guy Leduc. Chapter 4: Securing TCP. connections. connections. Chapter goals: security in practice:
Managing and Securing Computer Networks Guy Leduc Chapter 4: Securing TCP connections Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley, March 2012. (section
Computer and Network Security
Computer and Network Security c Copyright 2000 R E Newman Computer & Information Sciences & Engineering University Of Florida Gainesville, Florida 32611-6120 nemo@ciseufledu Network Security Protocols
Security. Learning Objectives. This module will help you...
Security 5-1 Learning Objectives This module will help you... Understand the security infrastructure supported by JXTA Understand JXTA's use of TLS for end-to-end security 5-2 Highlights Desired security
Security Protocols and Infrastructures. h_da, Winter Term 2011/2012
Winter Term 2011/2012 Chapter 7: Transport Layer Security Protocol Key Questions Application context of TLS? Which security goals shall be achieved? Approaches? 2 Contents Overview Record Protocol Cipher
TLS/SSL in distributed systems. Eugen Babinciuc
TLS/SSL in distributed systems Eugen Babinciuc Contents 1. Introduction to TLS/SSL 2. A quick review of cryptography 3. TLS/SSL in distributed systems 4. Conclusions Introduction to TLS/SSL TLS/SSL History
Cryptography and Network Security Sicurezza delle reti e dei sistemi informatici SSL/TSL
Cryptography and Network Security Sicurezza delle reti e dei sistemi informatici SSL/TSL Security architecture and protocol stack Applicat. (SHTTP) SSL/TLS TCP IPSEC IP Secure applications: PGP, SHTTP,
Security Engineering Part III Network Security. Security Protocols (II): IPsec
Security Engineering Part III Network Security Security Protocols (II): IPsec Juan E. Tapiador [email protected] Department of Computer Science, UC3M Security Engineering 4th year BSc in Computer Science,
Implementing and Managing Security for Network Communications
3 Implementing and Managing Security for Network Communications............................................... Terms you ll need to understand: Internet Protocol Security (IPSec) Authentication Authentication
TLS and SRTP for Skype Connect. Technical Datasheet
TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security
SECURITY IN ELECTRONIC COMMERCE - SOLUTION MULTIPLE-CHOICE QUESTIONS
MULTIPLE-CHOICE QUESTIONS Each question has only one correct answer, which ought to be clearly pointed out with an 'X'. Each question incorrectly answered will be evaluated as minus one third of the mark
CS 393/682 Network Security. Nasir Memon Polytechnic University Module 7 Virtual Private Networks
CS 393/682 Network Security Nasir Memon Polytechnic University Module 7 Virtual Private Networks Course Logistics Midterm next week. Old exams posted Brief review at end of this module HW 4 assigned, due
Chapter 11 Security Protocols. Network Security Threats Security and Cryptography Network Security Protocols Cryptographic Algorithms
Chapter 11 Security Protocols Network Security Threats Security and Cryptography Network Security Protocols Cryptographic Algorithms Chapter 11 Security Protocols Network Security Threats Network Security
3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol
Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Network Layer: IPSec Transport Layer: SSL/TLS Chapter 4: Security on the Application Layer Chapter 5: Security
Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 roadmap 1 What is network security? 2 Principles of cryptography 3 Message integrity, authentication
SECURITY IN ELECTRONIC COMMERCE MULTIPLE-CHOICE QUESTIONS
MULTIPLE-CHOICE QUESTIONS Each question has only one correct answer, which ought to be clearly pointed out with an 'X'. Each question incorrectly answered will be evaluated as minus one third of the mark
ETSF10 Part 3 Lect 2
ETSF10 Part 3 Lect 2 DHCP, DNS, Security Jens A Andersson Electrical and Information Technology DHCP Dynamic Host Configuration Protocol bootp is predecessor Alternative: manual configuration IP address
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
As enterprises conduct more and more
Efficiently handling SSL transactions is one cornerstone of your IT security infrastructure. Do you know how the protocol actually works? Wesley Chou Inside SSL: The Secure Sockets Layer Protocol Inside
Branch Office VPN Tunnels and Mobile VPN
WatchGuard Certified Training Branch Office VPN Tunnels and Mobile VPN Fireware XTM and WatchGuard System Manager v11.7 Revised: January 2013 Updated for: Fireware XTM v11.7 Notice to Users Information
AN OVERVIEW OF REMOTE ACCESS VPNS: ARCHITECTURE AND EFFICIENT INSTALLATION
AN OVERVIEW OF REMOTE ACCESS VPNS: ARCHITECTURE AND EFFICIENT INSTALLATION DR. P. RAJAMOHAN SENIOR LECTURER, SCHOOL OF INFORMATION TECHNOLOGY, SEGi UNIVERSITY, TAMAN SAINS SELANGOR, KOTA DAMANSARA, PJU
Secure Socket Layer/ Transport Layer Security (SSL/TLS)
Secure Socket Layer/ Transport Layer Security (SSL/TLS) David Sánchez Universitat Pompeu Fabra World Wide Web (www) Client/server services running over the Internet or TCP/IP Intranets nets widely used
HTTPS: Transport-Layer Security (TLS), aka Secure Sockets Layer (SSL)
CSCD27 Computer and Network Security HTTPS: Transport-Layer Security (TLS), aka Secure Sockets Layer (SSL) 11 SSL CSCD27 Computer and Network Security 1 CSCD27F Computer and Network Security 1 TLS (Transport-Layer
Secure Socket Layer (TLS) Carlo U. Nicola, SGI FHNW With extracts from publications of : William Stallings.
Secure Socket Layer (TLS) Carlo U. Nicola, SGI FHNW With extracts from publications of : William Stallings. Crypto building blocks AS HS13 2 Abstraction: The secure channel 1., run a key-exchange protocol
Internet Privacy Options
2 Privacy Internet Privacy Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 19 June 2014 Common/Reports/internet-privacy-options.tex, r892 1 Privacy Acronyms
