SSL/TLS Programming. sslclient.c. /* A simple SSL client. It connects and then forwards data from/to the terminal to/from the server */
|
|
|
- Sylvia Cummings
- 10 years ago
- Views:
Transcription
1 SSL/TLS Programming sslclient.c /* A simple SSL client. It connects and then forwards data from/to the terminal to/from the server */ #define CA_LIST "root.pem" #define ServerHOST "deneb" #define RANDOM "random.pem" #define PORT #define ClientKEYFILE "client.pem" #define ClientPASSWORD "oducsc" int main (argc,argv) int argc; char **argv BIO *sbio; int sock; /* Build our SSL context*/ ctx = initialize_ctx (ClientKEYFILE, ClientPASSWORD); /* Connect the TCP socket*/ sock = tcp_connect (); /* Connect the SSL socket */ ssl = SSL_new (ctx); sbio = BIO_new_socket (sock, BIO_NOCLOSE); SSL_set_bio (ssl, sbio, sbio); SSL_connect (ssl); check_cert_chain (ssl, ServerHOST);
2 /* read and write */ read_write (ssl, sock); int tcp_connect () /* struct hostent *hp; struct sockaddr_in addr; int sock; hp = gethostbyname (ServerHOST); memset (&addr,0,sizeof(addr)); addr.sin_addr = *(struct in_addr*)hp->h_addr_list[0]; addr.sin_family = AF_INET; addr.sin_port = htons(serverport); sock = socket(af_inet,sock_stream,ipproto_tcp); connect (sock, (struct sockaddr *)&addr, sizeof(addr); return sock; Read from the keyboard and write to the server Read from the server and write to the keyboard */ void read_write (ssl, sock) int r, c2sl=0; int shutdown_wait=0; char c2s[bufsizz], s2c[bufsizz]; while (1) /* Check for input on the console*/ c2sl = read (0, c2s, BUFSIZZ); if (c2sl == 0 ) goto end;
3 /* If we've got data to write then try to write it*/ SSL_write (ssl, c2s, c2sl); /* Now check if there's data to read */ do r = SSL_read (ssl, s2c, BUFSIZZ); switch (SSL_get_error (ssl, r) ) case SSL_ERROR_NONE: fwrite (s2c, 1, r, stdout); break; case SSL_ERROR_ZERO_RETURN: /* End of data */ goto end; break; default: berr_exit("ssl read problem"); while ( SSL_pending (ssl) ); /* end of while (1) */ end: SSL_shutdown (ssl); SSL_free (ssl); close (sock); return; common.c SSL_CTX *initialize_ctx (keyfile, password) char *keyfile; char *password; SSL_METHOD *meth; if (!bio_err)
4 /* Global system initialization*/ SSL_library_init (); SSL_load_error_strings (); /* An error write context */ bio_err = BIO_new_fp (stderr, BIO_NOCLOSE) /* Create our context*/ meth = SSLv3_method (); ctx = SSL_CTX_new (meth); /* Load our keys and certificates*/ SSL_CTX_use_certificate_file ( ctx, keyfile, SSL_FILETYPE_PEM); pass = password; SSL_CTX_set_default_passwd_cb (ctx, password_cb); SSL_CTX_use_PrivateKey_file (ctx, keyfile, SSL_FILETYPE_PEM); /* Load the CAs we trust*/ SSL_CTX_load_verify_locations (ctx, CA_LIST,0); SSL_CTX_set_verify_depth (ctx,1); SSL_CTX_set_verify (ctx, SSL_VERIFY_PEER SSL_VERIFY_FAIL_IF_NO_PEER_CERT, verify_callback); /* Load randomness */ RAND_load_file (RANDOM,1024*1024); return ctx; int verify_callback (int ok, X509_STORE_CTX *store) char data[256]; /* if (ok) /* to debug */ if (!ok) X509 *cert = X509_STORE_CTX_get_current_cert(store); int depth = X509_STORE_CTX_get_error_depth(store); int err = X509_STORE_CTX_get_error(store); fprintf(stderr, "-Error with certificate at depth: %i\n", depth); X509_NAME_oneline(X509_get_issuer_name(cert), data, 256);
5 fprintf(stderr, " issuer = %s\n", data); X509_NAME_oneline(X509_get_subject_name(cert), data, 256); fprintf(stderr, " subject = %s\n", data); fprintf(stderr, " err %i:%s\n", err, X509_verify_cert_error_string(err) ); return ok; /* Check that the common name matches the host name*/ void check_cert_chain (ssl, host) char *host; X509 *peer; char peer_cn[256]; if ( SSL_get_verify_result (ssl)!= X509_V_OK ) berr_exit ("Certificate doesn't verify"); /*Check the common name*/ peer = SSL_get_peer_certificate (ssl); X509_NAME_get_text_by_NID ( X509_get_subject_name (peer), NID_commonName, peer_cn, 256); if (strcasecmp (peer_cn, host)) err_exit ("Common name doesn't match host name"); sslserver.c /* A multiprocess SSL server */ #define ServerKEYFILE "server.pem" #define ClientPASSWORD "oducsc" #define DHFILE "dh1024.pem"
6 #define CA_LIST "root.pem" #define ClientHOST "vega" #define RANDOM "random.pem" #define ServerPORT int main (argc,argv) int argc; char **argv; int sock,s; BIO *sbio; int r; pid_t pid; /* Build our SSL context*/ ctx = initialize_ctx (ServerKEYFILE, ServerPASSWORD); load_dh_params (ctx, DHFILE); generate_eph_rsa_key (ctx); sock = tcp_listen (); while (1) s = accept (sock, 0, 0); sbio = BIO_new_socket (s, BIO_NOCLOSE); ssl = SSL_new(ctx); SSL_set_bio (ssl, sbio, sbio); SSL_accept (ssl); check_cert_chain (ssl, ClientHOST); echo (ssl); int tcp_listen () int sock; struct sockaddr_in sin;
7 sock = socket (AF_INET,SOCK_STREAM,0); memset (&sin,0,sizeof(sin)); sin.sin_addr.s_addr = INADDR_ANY; sin.sin_family = AF_INET; sin.sin_port = htons(serverport); if ( bind (sock, (struct sockaddr *)&sin, sizeof(sin))<0) berr_exit("couldn't bind"); listen (sock,5); return (sock); void load_dh_params (ctx, file) char *file; DH *ret=0; BIO *bio; bio = BIO_new_file (file, "r"); ret = PEM_read_bio_DHparams (bio,null,null,null); BIO_free (bio); SSL_CTX_set_tmp_dh (ctx,ret); void generate_eph_rsa_key (ctx) RSA *rsa; void echo (ssl) rsa=rsa_generate_key(512,rsa_f4,null,null); SSL_CTX_set_tmp_rsa(ctx,rsa); RSA_free(rsa);
8 char buf[bufsizz]; int r,len,offset; while (1) /* First read data */ r=ssl_read (ssl, buf, BUFSIZZ); switch ( SSL_get_error (ssl,r) ) case SSL_ERROR_NONE: len=r; break; case SSL_ERROR_ZERO_RETURN: goto end; default: berr_exit ("SSL read problem"); /* Now keep writing until we've written everything*/ offset=0; while (len) /* while (1) */ end: SSL_shutdown(ssl); SSL_free(ssl) r = SSL_write (ssl, buf+offset, len); switch (SSL_get_error (ssl,r)) case SSL_ERROR_NONE: len-=r; offset+=r; break; default: berr_exit("ssl write problem"); Generating the required.pem files: #define DHFILE #define RANDOM "dh1024.pem" "random.pem"
9 #define CA_LIST #define ServerKEYFILE #define ClientKEYFILE "root.pem" "server.pem" "client.pem" To create the dh512.pem or dh1024.pem: % openssl dhparam -check -text out dh512.pem % openssl dhparam -check -text out dh1024.pem To create the random.pem: % cp ~/cs772/random.pem. To create the root.pem: % cat ca_key.pem ca_cert.pem > root.pem To create the server.pem & client.pem: First generate a cert request, make sure to specify: "localhost" or the actual host name, e.g., "cash.cs.odu.edu" as the CN name. Sign the certificates from the CA and then do the following: % cat server_privatekey.pem server_cert.pem ca_cert.pem > server.pem % cat cleint_privatekey.pem client_cert.pem ca_cert.pem > client.pem
Angels (OpenSSL) and D(a)emons. Athula Balachandran Wolfgang Richter
Angels (OpenSSL) and D(a)emons Athula Balachandran Wolfgang Richter PJ1 Final Submission SSL server-side implementation CGI Daemonize SSL Stuff you already know! Standard behind secure communication on
Security OpenSSL SSL. Roberta Daidone. [email protected]
Security OpenSSL SSL Roberta Daidone [email protected] What are we going to do? Use BIO objects to create SSL connections. Create an SSL connection. Let the client authenticate the server and
Programming OpenSSL. The Server Perspective. by Sean Walton. Copyright 2001 Sean Walton
Programming OpenSSL The Server Perspective by Sean Walton Host Addressing & Ports Hosts use addresses to interconnect. TCP/IP uses a 4-byte number for Ids. 128.98.2.254 TCP adds ports to addresses for
Netzwerksicherheit Übung 6 SSL/TLS, OpenSSL
Netzwerksicherheit Übung 6 SSL/TLS, Thomas Schneider Computer Networks and Communication Systems Dept. of Computer Sciences, University of Erlangen-Nuremberg, Germany 10. 14.12.2007 Thomas Schneider: Netzwerksicherheit
Writing a C-based Client/Server
Working the Socket Writing a C-based Client/Server Consider for a moment having the massive power of different computers all simultaneously trying to compute a problem for you -- and still being legal!
Shteryana Shopova, [email protected] Programming with OpenSSL and libcrypto in examples
Shteryana Shopova, [email protected] Programming with OpenSSL and libcrypto in examples BurgasLab, Burgas April, 2014 secured communications the need for secured communications world war II Enigma cipher
Implementing Network Software
Implementing Network Software Outline Sockets Example Process Models Message Buffers Spring 2007 CSE 30264 1 Sockets Application Programming Interface (API) Socket interface socket : point where an application
BSD Sockets Interface Programmer s Guide
BSD Sockets Interface Programmer s Guide Edition 6 B2355-90136 HP 9000 Networking E0497 Printed in: United States Copyright 1997 Hewlett-Packard Company. Legal Notices The information in this document
Introduction to Socket programming using C
Introduction to Socket programming using C Goal: learn how to build client/server application that communicate using sockets Vinay Narasimhamurthy [email protected] CLIENT SERVER MODEL Sockets are
Overview. Socket Programming. Using Ports to Identify Services. UNIX Socket API. Knowing What Port Number To Use. Socket: End Point of Communication
Overview Socket Programming EE 122: Intro to Communication Networks Vern Paxson TAs: Lisa Fowler, Daniel Killebrew, Jorge Ortiz Socket Programming: how applications use the network Sockets are a C-language
openssl egg Bindings to the OpenSSL SSL/TLS library Extension for Chicken Scheme Version 1.1.1 Thomas Chust
openssl egg Bindings to the OpenSSL SSL/TLS library Extension for Chicken Scheme Version 1.1.1 Thomas Chust i Table of Contents 1 About this egg............................ 1 1.1 Version history..............................................
An Implementation of CASP A Technology Independent Lightweight Signaling Protocol
An Implementation of CASP A Technology Independent Lightweight Signaling Protocol Master s Project Report Computer Science Department University of Kentucky By: Shahid Saleem Mohammed Under guidance of:
Lecture 3 Programming with OpenSSL
Lecture 3 Programming with OpenSSL Patrick P. C. Lee Tsinghua Summer Course 2010 3-1 Roadmap OpenSSL Why Cryptosystems Fail? Tsinghua Summer Course 2010 3-2 SSL and OpenSSL SSL is the security protocol
System calls. Problem: How to access resources other than CPU
System calls Problem: How to access resources other than CPU - Disk, network, terminal, other processes - CPU prohibits instructions that would access devices - Only privileged OS kernel can access devices
NS3 Lab 1 TCP/IP Network Programming in C
NS3 Lab 1 TCP/IP Network Programming in C Dr Colin Perkins School of Computing Science University of Glasgow http://csperkins.org/teaching/ns3/ 13/14 January 2015 Introduction The laboratory exercises
Lab 4: Socket Programming: netcat part
Lab 4: Socket Programming: netcat part Overview The goal of this lab is to familiarize yourself with application level programming with sockets, specifically stream or TCP sockets, by implementing a client/server
Socket Programming. Kameswari Chebrolu Dept. of Electrical Engineering, IIT Kanpur
Socket Programming Kameswari Chebrolu Dept. of Electrical Engineering, IIT Kanpur Background Demultiplexing Convert host-to-host packet delivery service into a process-to-process communication channel
Lecture 17. Process Management. Process Management. Process Management. Inter-Process Communication. Inter-Process Communication
Process Management Lecture 17 Review February 25, 2005 Program? Process? Thread? Disadvantages, advantages of threads? How do you identify processes? How do you fork a child process, the child process
TCP/IP - Socket Programming
TCP/IP - Socket Programming [email protected] Jim Binkley 1 sockets - overview sockets simple client - server model look at tcpclient/tcpserver.c look at udpclient/udpserver.c tcp/udp contrasts normal master/slave
Network Programming with Sockets. Anatomy of an Internet Connection
Network Programming with Sockets Anatomy of an Internet Connection Client socket address 128.2.194.242:51213 socket address 208.216.181.15:80 Client Connection socket pair (128.2.194.242:51213, 208.216.181.15:80)
Hardware Prerequisites Atmel SAM W25 Xplained Pro Evaluation Kit Atmel IO1 extension Micro-USB Cable (Micro-A / Micro-B)
USER GUIDE Software Programming Guide for SAM W25 Xplained Pro Atmel SmartConnect Prerequisites Hardware Prerequisites Atmel SAM W25 Xplained Pro Evaluation Kit Atmel IO1 extension Micro-USB Cable (Micro-A
NetSec Exercise 8 Communication Mixes
NetSec Exercise 8 Communication Mixes Thomas Schneider Computer Networks and Communication Systems Dept. of Computer Sciences, University of Erlangen-Nuremberg, Germany 8. 11.1.2008 Thomas Schneider: NetSec
Porting applications & DNS issues. socket interface extensions for IPv6. Eva M. Castro. [email protected]. dit. Porting applications & DNS issues UPM
socket interface extensions for IPv6 Eva M. Castro [email protected] Contents * Introduction * Porting IPv4 applications to IPv6, using socket interface extensions to IPv6. Data structures Conversion functions
Quick Note 040. Create an SSL Tunnel with Certificates on a Digi TransPort WR router using Protocol Switch.
Quick Note 040 Create an SSL Tunnel with Certificates on a Digi TransPort WR router using Protocol Switch. Digi Support January 2014 1 Contents 1 Introduction... 2 1.1 Outline... 2 1.2 Assumptions... 2
Tutorial on Socket Programming
Tutorial on Socket Programming Computer Networks - CSC 458 Department of Computer Science Seyed Hossein Mortazavi (Slides are mainly from Monia Ghobadi, and Amin Tootoonchian, ) 1 Outline Client- server
METU Department of Computer Engineering
METU Department of Computer Engineering CEng 332 - System Programming and Support Environments Spring 2007-2008 Final (Take Home / Due: Jun 16, 10:00 AM/5 pages) Name: No: Signature: Note: You are not
Socket Programming. Srinidhi Varadarajan
Socket Programming Srinidhi Varadarajan Client-server paradigm Client: initiates contact with server ( speaks first ) typically requests service from server, for Web, client is implemented in browser;
VPN Gateway Research in Wireless Network Based on SSL Technology
, pp.17-26 http://dx.doi.org/10.14257/ijunesst.2015.8.4.03 VPN Gateway Research in Wireless Network Based on SSL Technology Xingkui Wang 1 and Xinguang Peng 2 1 College of Computer Science and Technology,Taiyuan
OpenSSL. Version 4.2.4. January 28, 2010
OpenSSL Version 4.2.4 January 28, 2010 (require openssl) The openssl library provides glue for the OpenSSL library with the Scheme port system. It provides functions nearly identically to the standard
Networks. Inter-process Communication. Pipes. Inter-process Communication
Networks Mechanism by which two processes exchange information and coordinate activities Inter-process Communication process CS 217 process Network 1 2 Inter-process Communication Sockets o Processes can
Cloud Services. Introduction...2 Overview...2 Simple Setup...2
Contents Introduction...2 Overview...2 Simple Setup...2 Requirements... 3 Installation... 3 Test the connection... 4 Open from another workstation... 5 Security considerations...6 Installation...6 Server
Cloud Services. Introduction...2 Overview...2. Security considerations... 2. Installation...3 Server Configuration...4
Contents Introduction...2 Overview...2 Security considerations... 2 Installation...3 Server Configuration...4 Management Client Connection...4 General Settings... 4 Enterprise Architect Client Connection
OpenSSL: Secure Communication
OpenSSL: Secure Communication Version 5.92 January 25, 2014 (require openssl) package: base The openssl library provides glue for the OpenSSL library with the Racket port system. It provides functions
Best practices in IPv6 enabled networking software development. <[email protected]>
Best practices in IPv6 enabled networking software development 1 The IPv6 Protocol 1 New version of the Internet Protocol Devised by IETF to replace IPv4 It solves all the problems of IPv4 Address space
IPv6 Enabling CIFS/SMB Applications
IPv6 Enabling CIFS/SMB Applications 2010 Storage Developers Conference Santa Clara Dr David Holder CEng FIET MIEEE [email protected] http://www.erion.co.uk Background Erion David Holder Over twelve
Socket Programming in C/C++
September 24, 2004 Contact Info Mani Radhakrishnan Office 4224 SEL email mradhakr @ cs. uic. edu Office Hours Tuesday 1-4 PM Introduction Sockets are a protocol independent method of creating a connection
Elementary Name and Address. Conversions
Elementary Name and Address Domain name system Conversions gethostbyname Function RES_USE_INET6 resolver option gethostbyname2 Function and IPv6 support gethostbyaddr Function uname and gethostname Functions
Quick Note 041. Digi TransPort to Digi TransPort VPN Tunnel using OpenSSL certificates.
Quick Note 041 Digi TransPort to Digi TransPort VPN Tunnel using OpenSSL certificates. Digi Support January 2014 1 Contents 1 Introduction... 2 1.1 Outline... 2 1.2 Assumptions... 2 1.3 Corrections...
UNIX. Sockets. mgr inż. Marcin Borkowski
UNIX Sockets Introduction to Sockets Interprocess Communication channel: descriptor based two way communication can connect processes on different machines Three most typical socket types (colloquial names):
Packet Sniffing and Spoofing Lab
SEED Labs Packet Sniffing and Spoofing Lab 1 Packet Sniffing and Spoofing Lab Copyright c 2014 Wenliang Du, Syracuse University. The development of this document is/was funded by the following grants from
SSL Peach Pit User Guide. Peach Fuzzer, LLC. Version 3.7.64
SSL Peach Pit User Guide Peach Fuzzer, LLC Version 3.7.64 Copyright 2015 Peach Fuzzer, LLC. All rights reserved. This document may not be distributed or used for commercial purposes without the explicit
AT12181: ATWINC1500 Wi-Fi Network Controller - AP Provision Mode. Introduction. Features. Atmel SmartConnect APPLICATION NOTE
Atmel SmartConnect AT12181: ATWINC1500 Wi-Fi Network Controller - AP Provision Mode APPLICATION NOTE Introduction This application note explains how to build the state-of-art Internet of Things (IoT) applications
UNIX Sockets. COS 461 Precept 1
UNIX Sockets COS 461 Precept 1 Clients and Servers Client program Running on end host Requests service E.g., Web browser Server program Running on end host Provides service E.g., Web server GET /index.html
Introduction to Socket Programming Part I : TCP Clients, Servers; Host information
Introduction to Socket Programming Part I : TCP Clients, Servers; Host information Keywords: sockets, client-server, network programming-socket functions, OSI layering, byte-ordering Outline: 1.) Introduction
How To Write On A Non-Blocking File On A Thumbtongue (Windows) (Windows 2) (Macintosh) (Amd64) (Apple) (Powerpoint) (Networking) (Unix) (Program) (
Using TCP Through Sockets David Mazières Revised by Frank Dabek and Eric Petererson 1 Introduction This document provides an introduction to using sockets on Unix systems with a focus on asynchronous I/O.
Programmation Systèmes Cours 9 UNIX Domain Sockets
Programmation Systèmes Cours 9 UNIX Domain Sockets Stefano Zacchiroli [email protected] Laboratoire PPS, Université Paris Diderot 2013 2014 URL http://upsilon.cc/zack/teaching/1314/progsyst/
INTRODUCTION UNIX NETWORK PROGRAMMING Vol 1, Third Edition by Richard Stevens
INTRODUCTION UNIX NETWORK PROGRAMMING Vol 1, Third Edition by Richard Stevens Read: Chapters 1,2, 3, 4 Communications Client Example: Ex: TCP/IP Server Telnet client on local machine to Telnet server on
ICT SEcurity BASICS. Course: Software Defined Radio. Angelo Liguori. SP4TE lab. [email protected]
Course: Software Defined Radio ICT SEcurity BASICS Angelo Liguori [email protected] SP4TE lab 1 Simple Timing Covert Channel Unintended information about data gets leaked through observing the
ELEN 602: Computer Communications and Networking. Socket Programming Basics
1 ELEN 602: Computer Communications and Networking Socket Programming Basics A. Introduction In the classic client-server model, the client sends out requests to the server, and the server does some processing
Unix Network Programming
Introduction to Computer Networks Polly Huang EE NTU http://cc.ee.ntu.edu.tw/~phuang [email protected] Unix Network Programming The socket struct and data handling System calls Based on Beej's Guide
Crypto Lab Public-Key Cryptography and PKI
SEED Labs 1 Crypto Lab Public-Key Cryptography and PKI Copyright c 2006-2014 Wenliang Du, Syracuse University. The development of this document is/was funded by three grants from the US National Science
SSL Tunnels. Introduction
SSL Tunnels Introduction As you probably know, SSL protects data communications by encrypting all data exchanged between a client and a server using cryptographic algorithms. This makes it very difficult,
Sun Java System Web Server 6.1 Using Self-Signed OpenSSL Certificate. Brent Wagner, Seeds of Genius October 2007
Sun Java System Web Server 6.1 Using Self-Signed OpenSSL Certificate Brent Wagner, Seeds of Genius October 2007 Edition: 1.0 October 2007 All rights reserved. This product or document is protected by copyright
Networks class CS144 Introduction to Computer Networking Goal: Teach the concepts underlying networks Prerequisites:
CS144 Introduction to Computer Networking Instructors: Philip Levis and David Mazières CAs: Juan Batiz-Benet, Behram Mistree, Hariny Murli, Matt Sparks, and Tony Wu Section Leader: Aki Kobashi [email protected]
Avoid the SSLippery Slope of Default SSL
Copyright 2014 Splunk Inc. Avoid the SSLippery Slope of Default SSL Duane Waddle, IT Specialist, UltraMegaCorp George Starcher, Security Engineer, Peak Hosting SSL Refresher Provides bulk encryption of
IIS 6.0SSL Certificate Deployment Guide
IIS 6.0SSL Certificate Deployment Guide StartCom CA Limited Contents 1.Generate the CSR by customer.... 3 1.1 Generate the private key files and CSR files... 3 1.2 Create a new certificate request... 3
The POSIX Socket API
The POSIX Giovanni Agosta Piattaforme Software per la Rete Modulo 2 G. Agosta The POSIX Outline Sockets & TCP Connections 1 Sockets & TCP Connections 2 3 4 G. Agosta The POSIX TCP Connections Preliminaries
Configuring iplanet 6.0 Web Server For SSL and non-ssl Redirect
Introduction Configuring iplanet 6.0 Web Server For SSL and non-ssl Redirect This document describes the process for configuring an iplanet web server for the following situation: Require that clients
UNICORE UFTPD server UNICORE UFTPD SERVER. UNICORE Team
UNICORE UFTPD server UNICORE UFTPD SERVER UNICORE Team Document Version: 1.0.0 Component Version: 2.3.2 Date: 14 09 2015 UNICORE UFTPD server Contents 1 UNICORE UFTP 1 1.1 UFTP features...................................
Generating and Installing SSL Certificates on the Cisco ISA500
Application Note Generating and Installing SSL Certificates on the Cisco ISA500 This application note describes how to generate and install SSL certificates on the Cisco ISA500 security appliance. It includes
Client / Server Programming with TCP/IP Sockets
Client / Server Programming with TCP/IP Sockets Author: Rajinder Yadav Date: Sept 9, 2007 Revision: Mar 11, 2008 Web: http://devmentor.org Email: [email protected] Table of Content Networks... 2 Diagram
Socket Programming. Request. Reply. Figure 1. Client-Server paradigm
Socket Programming 1. Introduction In the classic client-server model, the client sends out requests to the server, and the server does some processing with the request(s) received, and returns a reply
Apache, SSL and Digital Signatures Using FreeBSD
Apache, SSL and Digital Signatures Using FreeBSD AfNOG 2007 Unix System Administration April 26, 2007 Hervey Allen Network Startup Resource Center Some SSL background Invented by Netscape for secure commerce.
University of Amsterdam
University of Amsterdam MSc System and Network Engineering Research Project One Investigating the Potential for SCTP to be used as a VPN Transport Protocol by Joseph Darnell Hill February 7, 2016 Abstract
Programming With Sockets 2
Programming With Sockets 2 This chapter presents the socket interface and illustrates them with sample programs. The programs demonstrate the Internet domain sockets. What Are Sockets page 12 Socket Tutorial
Verify LDAP over SSL/TLS (LDAPS) and CA Certificate Using Ldp.exe
Verify LDAP over SSL/TLS (LDAPS) and CA Certificate Using Ldp.exe Document ID: 118761 Contributed by Nazmul Rajib and Binyam Demissie, Cisco TAC Engineers. Jan 14, 2015 Contents Introduction How to Verify
Enterprise SSL Support
01 Enterprise SSL Support This document describes the setup of SSL (Secure Sockets Layer) over HTTP for Enterprise clients, servers and integrations. 1. Overview Since the release of Enterprise version
AVR32753: AVR32 UC3 How to connect to an SSL-server. 32-bit Microcontrollers. Application Note. Features. 1 Introduction
AVR32753: AVR32 UC3 How to connect to an SSL-server Features Basic HTTPS connection to a web server running on a PC - POLARSSL Library with support of: Block and stream ciphers: AES, ARC4 DES/3DES Public-key
How to Configure Web Authentication on a ProCurve Switch
An HP ProCurve Networking Application Note How to Configure Web Authentication on a ProCurve Switch Contents 1. Introduction... 2 2. Prerequisites... 2 3. Network diagram... 2 4. Configuring the ProCurve
webmethods Certificate Toolkit
Title Page webmethods Certificate Toolkit User s Guide Version 7.1.1 January 2008 webmethods Copyright & Document ID This document applies to webmethods Certificate Toolkit Version 7.1.1 and to all subsequent
Secure Network Server Programming on Unix
Secure Network Server Programming on Unix Andreas Krennmair [email protected] Borland Software Corporation, Linz, Austria December 2006 Contents 1 Introduction 1 2 Design and Implementation 2 2.1 General
LAB :: Secure HTTP traffic using Secure Sockets Layer (SSL) Certificate
LAB :: Secure HTTP traffic using Secure Sockets Layer (SSL) Certificate In this example we are using apnictraining.net as domain name. # super user command. $ normal user command. X replace with your group
CS 213, Fall 2000 Lab Assignment L5: Logging Web Proxy Assigned: Nov. 28, Due: Mon. Dec. 11, 11:59PM
CS 213, Fall 2000 Lab Assignment L5: Logging Web Proxy Assigned: Nov. 28, Due: Mon. Dec. 11, 11:59PM Jason Crawford ([email protected]) is the lead person for this assignment. Introduction A web proxy
Creating Certificate Authorities and self-signed SSL certificates
Creating Certificate Authorities and self-signed SSL certificates http://www.tc.umn.edu/-brams006/selfsign.html Creating Certificate Authorities and self-signed SSL certificates Following is a step-by-step
Domain Name System (1)! gethostbyname (2)! gethostbyaddr (2)!
Lecture 5 Overview Last Lecture Socket Options and elementary UDP sockets This Lecture Name and address conversions & IPv6 Source: Chapter 11 Next Lecture Multicast Source: Chapter 12 1 Domain Name System
Steps to configure SiteMinder Policy Server to connect to CA Directory using LDAPS
Steps to configure SiteMinder Policy Server to connect to CA Directory using LDAPS Goal: 1. Policy Server to communicate with CA Directory r8.1 via LDAPS. Prerequisites: 1. CA Directory r81 installed.
Learning Network Security with SSL The OpenSSL Way
Learning Network Security with SSL The OpenSSL Way Shalendra Chhabra [email protected]. Computer Science and Enginering University of California, Riverside http://www.cs.ucr.edu/ schhabra Slides Available
LAB :: Secure HTTP traffic using Secure Sockets Layer (SSL) Certificate
LAB :: Secure HTTP traffic using Secure Sockets Layer (SSL) Certificate In this example we are using df-h.net as domain name. # super user command. $ normal user command. X replace with your group no.
Elementary Name and Address Conversions
Elementary Name and Address Conversions Domain name system gethostbyname Function RES_USE_INET6 resolver option gethostbyname2 Function and IPv6 support gethostbyaddr Function uname and gethostname Functions
CSE 333 SECTION 6. Networking and sockets
CSE 333 SECTION 6 Networking and sockets Goals for Today Overview of IP addresses Look at the IP address structures in C/C++ Overview of DNS Write your own (short!) program to do the domain name IP address
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
DESIGN AND IMPLEMENT AND ONLINE EXERCISE FOR TEACHING AND DEVELOPMENT OF A SERVER USING SOCKET PROGRAMMING IN C
DESIGN AND IMPLEMENT AND ONLINE EXERCISE FOR TEACHING AND DEVELOPMENT OF A SERVER USING SOCKET PROGRAMMING IN C Elena Ruiz Gonzalez University of Patras University of Granada ERASMUS STUDENT:147 1/100
Email Update Instructions
Email Update Instructions Table of Contents Email Client Settings The Basics... 2 Outlook 2013... 2 Outlook 2007... 4 Outlook Express... 6 Windows Mail... 7 Thunderbird 3... 9 Apple Mail... 11 1 Email
MatrixSSL Developer s Guide
MatrixSSL Developer s Guide This document discusses developing with MatrixSSL. It includes instructions on integrating MatrixSSL into an application and a description of the configurable options for modifying
IT304 Experiment 2 To understand the concept of IPC, Pipes, Signals, Multi-Threading and Multiprocessing in the context of networking.
Aim: IT304 Experiment 2 To understand the concept of IPC, Pipes, Signals, Multi-Threading and Multiprocessing in the context of networking. Other Objective of this lab session is to learn how to do socket
HP OpenView Adapter for SSL Using Radia
HP OpenView Adapter for SSL Using Radia Radia SSL Adapter Guide Software Version: 2.0 for the UNIX and Windows operating systems Manufacturing Part Number: T3424-90064 August 2004 Copyright 2004 Hewlett-Packard
VMCI Sockets Programming Guide VMware ESX/ESXi 4.x VMware Workstation 7.x VMware Server 2.0
VMware ESX/ESXi 4.x VMware Workstation 7.x VMware Server 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.
Apache Security with SSL Using Ubuntu
Apache Security with SSL Using Ubuntu These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Some SSL background
Kernel Intrusion Detection System
Kernel Intrusion Detection System Rodrigo Rubira Branco [email protected] [email protected] Monica's Team!! Brazilian famous H.Q. story Amazon Forest Yeah, Brazilian country! Soccer Brazilian
Concurrent Server Design Alternatives
CSCE 515: Computer Network Programming ------ Advanced Socket Programming Wenyuan Xu Concurrent Server Design Alternatives Department of Computer Science and Engineering University of South Carolina Ref:
How do I use Push Notifications with ios?
How do I use Push Notifications with ios? This lesson describes how to set up Push Notifications for ios devices, using a LiveCode and PHP. There are numerous steps involved in this process that touch
Generalised Socket Addresses for Unix Squeak 3.9 11
Generalised Socket Addresses for Unix Squeak 3.9 11 Ian Piumarta 2007 06 08 This document describes several new SocketPlugin primitives that allow IPv6 (and arbitrary future other) address formats to be
KMIP installation Guide. DataSecure and KeySecure Version 6.1.2. 2012 SafeNet, Inc. 007-012120-001
KMIP installation Guide DataSecure and KeySecure Version 6.1.2 2012 SafeNet, Inc. 007-012120-001 Introduction This guide provides you with the information necessary to configure the KMIP server on the
Ciphermail Gateway Separate Front-end and Back-end Configuration Guide
CIPHERMAIL EMAIL ENCRYPTION Ciphermail Gateway Separate Front-end and Back-end Configuration Guide June 19, 2014, Rev: 8975 Copyright 2010-2014, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction
WebLogic Server 6.1: How to configure SSL for PeopleSoft Application
WebLogic Server 6.1: How to configure SSL for PeopleSoft Application 1) Start WebLogic Server... 1 2) Access Web Logic s Server Certificate Request Generator page.... 1 3) Fill out the certificate request
An Introductory 4.4BSD Interprocess Communication Tutorial
PSD:20-1 An Introductory 4.4BSD Interprocess Communication Tutorial Stuart Sechrest Computer Science Research Group Computer Science Division Department of Electrical Engineering and Computer Science University
How To Configure Virtual Host with Load Balancing and Health Checking
How To Configure Virtual Host with Load How To Configure Virtual Host with Load Balancing and Health Checking Balancing and Health Checking Applicable Version: 10.02.0 Build 473 onwards Overview This article
Configuring HTTPs Connection in SAP PI 7.10
Configuring HTTPs Connection in SAP PI 7.10 Applies to: SAP NetWeaver 7.1x For more information, visit the SOA Management homepage. Summary In the new version on SAP PI there are several changes in Https
Cisco Expressway Certificate Creation and Use
Cisco Expressway Certificate Creation and Use Deployment Guide Cisco Expressway X8.1 D15061.01 December 2013 Contents Introduction 3 PKI introduction 3 Overview of certificate use on the Expressway 3 Certificate
