A PAKE SRP6 BROWSER EXTENSION
|
|
|
- Horace Franklin
- 9 years ago
- Views:
Transcription
1 A PAKE SRP6 BROWSER EXTENSION Alexandru Gavril Bardas 1 ABSTRACT The username/password paradigm is a well-known authentication mechanism. Probably the most common version in use is the password authentication via an HTML form. The user has to type his/her password directly into a web page from the site to which he/she wishes to authenticate himself/herself. The problem with using this approach is that it relies on the user to determine when it is safe to enter his/her password. If the user authenticates himself/herself to a phishing website by disclosing his/her password, the password is stolen even though the session is fully encrypted. In other words in traditional password authentication, passwords are used only for client-side authentication. Passwordauthenticated key exchange (PAKE) on the other hand, offers password-based mutual authentication. This mutual authentication is different because its client-side authentication cannot be separated from its server-side authentication part. This paper shows that PAKE can represent a practical alternative approach to protect passwords without relying on a Public Key Infrastructure (PKI). Therefore, the goal of this work was to study how to integrate PAKE into web applications, not to develop a standalone PAKE implementation. We analyzed the PAKE client-side implementation within a web browser and tested it with a server-side implementation on a web server. The developed extension is a Mozilla Firefox web browser extension. The implementation is just a proof of concept that shows that a password authenticated key exchange can be done over HTTP and can be used against phishing attacks. 1. INTRODUCTION The username/password paradigm is by far the most commonly used authentication mechanism [3]. From on-line banking and different web accounts (university account, Netflix account etc.) to personal s the use of passwords is present everywhere. There are additional or alternative authentication mechanisms (tokens, biometrics), but they often require additional hardware, which is most of the time considered too expensive for an application. Passwords are weak secrets because their security is limited by its low-entropy. A carefully chosen password has only about bits entropy [3][5]. Therefore passwords are subject to dictionary attacks or even to a simple exhaustive search. Forcing users to choose and remember cryptographically strong passwords may cause more problems than it solves [3][5]. Since they are weak secrets, passwords have to be protected during transmission. SSL/TLS is the widely deployed method used for this purpose. However this method requires a Public Key Infrastructure in place and may be subject to a main-in-the-middle attack [3]. 1 [email protected], Kansas State University
2 Probably the most common authentication mechanism in use is the password authentication via an HTML form [4]. The user has to type his/her password directly into a web page from the site to which he/she wishes to authenticate himself/herself. The problem with using this approach is that it relies on the user to determine when it is safe to enter his/her password. If the user authenticates himself/herself to a phishing website by disclosing his/her password, the password is stolen even though the session is fully encrypted [3]. Most of the time in order to resist phishing and other social engineering attacks, a user uses and relies on the browser s security indicators and warning messages. For instance the URL bar and the site s SSL certificate should be used to authenticate the website and determine when it is safe to enter the password. However studies suggest that many users habitually click through SSL certificate warnings and misunderstand or ignore browser security indicators [4]. In other words the client-side does not authenticate the server-side. In traditional password authentication, passwords are used only for client-side authentication. Password-authenticated key exchange (PAKE) on the other side, offers password-based mutual authentication. This mutual authentication is different because its client-side authentication cannot be separated from its server-side authentication part. If one of these two authentication processes fails, the whole authentication protocol will fail and the session will be aborted. The fact that these two parts are not separable is not very common. For instance, as stated before, the combination of passwords for client-side authentication and certificates for server-side authentication in SSL/TLS is being widely used on the web. However, this combination can be separated: the client-side password-based authentication assumes a preexisting secure channel to the server, which is accomplished through prior server-side authentication. If the server-side authentication is bypassed due to an incorrect checking, the client-side authentication will be insecure. As a result, this approach is vulnerable to phishing attacks. On the other hand, if implemented correctly, PAKE, which does not assume any pre-existing secure channels, will not be vulnerable to this kind of phishing attacks. This work describes the details of integrating PAKE in to the Web. We did not develop a stand-alone implementation of PAKE. Our goal was to study how to integrate PAKE into web applications. In other words we analyzed the PAKE client-side implementation within a web browser and tested it with a server-side implementation on a web server. SRP version 6 is the authentication protocol used in PAKE. The developed extension is a Mozilla Firefox web browser (latest tested version ) extension and was tested using a PHP server-side implementation on Apache. In case the authentication succeeds the traffic between the web server and the client will be encrypted using a common shared session key. 2. BACKGROUND A Password-Authenticated Key Exchange (PAKE) protocol is a cryptographic protocol that allows two parties that share a common secret (a password) to mutually authenticate each other and establish a shared key, without explicitly revealing the password in the process [4].
3 The PAKE research represents an alternative approach to protect passwords without relying on a Public Key Infrastructure (PKI). This research aims to achieve two important goals. First, it allows zero-knowledge proof of the password without revealing it to the other party. Second, it performs authenticated key exchange [3]. In case the password is correct, both sides will be able to establish a common session key that no one else is able to compute. In 1992 the first important milestone was reached in PAKE research. Bellovin and Merrit[5] introduced the Encypted Key Exchange (EKE) protocol. Even though this protocol had some reported weaknesses [3] it showed that the PAKE problem was solvable. In the following years a number of PAKE protocols have been proposed. Many of these protocols were variants of EKE. The few techniques that claim to resist known attacks have been patented by different companies or by Stanford University: EKE was patented by Lucent Technologies, SPEKE by Phoenix Technologies and SRP by Stanford University [3]. The Secure Remote Password (SRP) protocol was first proposed by Tom Wu in The protocol has been revised several times and is currently at version 6. Previous versions of the protocol are: SRP 3 in Wu98, SRP in RFC 2945 and SRP 5. The SRP protocol fulfills the following properties: it allows mutual authentication between the server and the client (server explicitly authenticates the client and vice-versa), it is resistant to online and offline dictionary attacks mounted by an eavesdropper, and it does not require a trusted third party (no PKI infrastructure is needed). The protocol creates a large private key shared between the two parties in a manner similar to Diffie Hellman. Furthermore, it verifies to both parties that the two keys are identical and that both sides have the correct password. SRP version 6 is used for strong password authentication in TLS-SRP and other standards such as EAP [8], and is being standardized in IEEE P1363 [12] and ISO/IEC [13]. Hao and Ryan proposed a protocol called J-PAKE, which authenticates a password with zero-knowledge and then subsequently creates a strong session key if the password is correct. The authors claim that the protocol does not require PKI deployment and protects users from leaking passwords. Moreover they claim that the protocol has computational efficiency comparable to the EKE and SPEKE schemes with clear advantages on security. However they are not comparing J-PAKE with SRP due to different design goals. The goal of using PAKE protocols for web authentication is to help make it easier for users to authenticate websites and reduce the attack surface of social engineering based attacks against their accounts [4]. When using a PAKE protocol, in case the user mistakenly attempts to authenticate himself/herself to a phishing website, the protocol will fail and the user password will remain safe. The phishing website does not have the correct password in order to successfully complete the protocol and establish a session key with the user. Engler et all perform a systematic investigation of various practical issues and challenges in deploying PAKE for web authentication. They claim that although many PAKE protocols have been proposed, there is a little momentum for integrating PAKE protocols
4 into web authentication. They investigated two categories of issues: 1) security issues related to user interface (UI) design and 2) deployment and integration hurdles [4]. Currently there are two proposals for PAKE-based web authentication: TLS-SRP (operates at the transport layer), and HTTPS-PAKE (operates at the application layer). The TLS-SRP extension proposes an integration of PAKE into TLS. Although it can be a good solution for closed applications like VPN or IPP, it is not convenient for general web systems [1]. TLS server authentication is not very powerful because certificates (especially so-called class-1 certificates) can be acquired by any party including phishers. Phishing using HTTPS certified by publicly-accepted PKI is already a real issue, because users do not always pay attention to the subject of issued certificates [1]. Moreover TLS-SRP might not work properly in sites that employ load balancing HTTPS front-ends. Deploying TLS- SRP in this type of architecture will require new network protocols to manage user sessions between HTTPS front-ends and back-end application servers. Another problem with TLS- SRP is that it does not explicitly support authentication to multiple realms within a single domain [4]. Oiwa et. all address the drawbacks of TLS-SRP and propose to implement PAKE at the application layer, over HTTPS. Similar to Engler et all, I will refer to this approach as HTTPS-PAKE. The HTTPS-PAKE protocol design includes using the Public Key Infrastructure. The protocol is inspired by HTTP Digest Authentication, which authenticates users within the HTTP protocol. HTTPS-PAKE works by tunneling the PAKE protocol messages over HTTP, in additional HTTP headers. This approach gives the application layer control over authentication policies without any interaction with TLS. However, HTTPS-PAKE still relies on TLS to provide a secure channel between browsers and servers. When using HTTPS-PAKE authentication, a user s browser first establishes a TLS connection with the server. Then, over the encrypted TLS session, the browser and the server perform a PAKE handshake and establish a PAKE key derived from the user s password [1][4]. HTTPS-PAKE might be vulnerable to stronger threats such as pharmers and network attackers in case the user ignores certificate warnings (as many studies suggest) [4]. 3. PAKE-SRP 6 EXTENSION I. Goals Our primary goal was to implement PAKE at the application layer using SRP 6 as the PAKE protocol (We will refer to this approach as PAKE-SRP 6). We created an extension for a web browser (Mozilla Firefox latest tested version is ) that uses PAKE-SRP 6. In order to test the browser extension we used a web server (Apache ) and PHP to write the server-side PAKE-SRP 6 part. In case the authentication succeeds and the two sides share a common session key, the traffic between the web server and the client will be encrypted. Design goals:
5 The SRP-6 protocol should be strictly followed The authentication will fail in case one of the sides (client or server) is fake Implement a mechanism for users to detect spoofing windows Web traffic will be protected after mutual authentication using K (a secret session key that only the client and the server know) A usual browser will not be able to know and use the key in order to decrypt the content of the page before displaying it We are not claiming that this extension is suited for all needs and computer users. II. Comparison An alternative solution to my PAKE-SRP 6 browser extension is presented by Oiwa et. all. The extensions that they propose for IE and Firefox are using HTTPS-PAKE [11]. HTTPS- PAKE implies using the Public Key Infrastructure (PKI). The Web Wallet approach proposed in Wu et. al. is slightly different from my PAKE-SRP 6 browser extension. The Web Wallet is a browser sidebar, which users can use to submit their sensitive information online [9]. Wu s approach displays the password box only when the browser detects a login page or a user requests to login. Our extension will appear on the screen only if the user clicks the extension button. In this way we are hoping to minimize the effects of a mimicry attack. Such an attack has proved to be efficient on the web wallet approach. Currently Mozilla Firefox developers work on a project that uses the J-PAKE protocol. They are describing J-PAKE as being a technique that allows Alice and Bob to mutually authenticate and agree upon an encryption key, using only a pre-shared secret value. It is a zero-knowledge protocol, meaning this can be done without ever exposing the secret value to the other party [10]. This project might also constitute an alternative to PAKE-SRP 6. However the PAKE-SRP 6 extension will open a separate browser window designed to communicate with websites that support SRP 6. The extension will be launched by the user and not automatically by any applications. 4. SECURE REMOTE PASSWORD PROTOCOL VERSION 6 (SRPV6) OVERVIEW The latest version of the SRP protocol is version 6 and as previously mentioned it is used for strong password authentication in TLS-SRP and other standards such as EAP [8]. Moreover it is being standardized in IEEE P1363 [12] and ISO/IEC [13]. The protocol can be summarized as follows:
6 System parameters: p, g w stands for the user s password; U for user ID; s for salt v for Password Verification Data (v = g x mod p, where x = hash of s and w) In practice v = g x mod p where x = SHA(<salt> SHA(<username>) : <raw_password>) If the authentication succeeds than in Step 6 S c will be equal to S s, that means that the client and the server share a common session key. Step 7 explicitly authenticates the client. The server calculates M 1 = h(a, B, S s ) and checks whether M 1 = M 1 ; if it s not the case than it quits. On the other hand Step 8 explicitly authenticates the server. The client calculates M 2 = h(a, M 1, K c ) and checks whether M 2 = M 2. The client quits in case the equality does not hold. 5. IMPLEMENTATION The PAKE-SRP 6 extension is a Mozilla Firefox browser extension. The extension installation file format is.xpi and can be installed in Firefox by opening the Add-on menu and choosing the option Install from a file (more details on installing and testing the extension are presented in the Appendix). After the installation is completed, an icon will show up in the main browser next to the Mozilla Firefox Start Page icon. In case the user clicks on the PAKE-SRP 6 icon a new bowser window will open. This browser window is designed to support the SRP 6 protocol. The browser window has an URL address bar, a username field, a password field and a Login button. In order to be able to test the extension we also developed a test (toy) server that supports the SRP 6 protocol and is written in PHP. The extension can also load web pages that do not support PAKE-SRP 6
7 authentication but a normal browser will not be able to load a webpage from a server that supports PAKE-SRP 6. PAKE-SRP 6 Firefox Extension Several tools for developing Firefox extensions proved to be very helpful in the development process of the PAKE-SRP 6 extension: XUL Explorer 1.0a1pre (used for designing the graphical interface of the extension) Developer Assistant (Firefox extension that contains a suite of tools for developers: an interactive JavaScript shell, HTML and XUL editors with live preview etc.) Firebug (Firefox extension that enables users to edit, debug, and monitor CSS, HTML, and JavaScript live in web pages) Primarily we used XUL Explorer to design the graphical interface and Javascript to specify the actions of the extension. Text editors like TextWrangler for Mac and Notepad++ for Windows were helpful in managing the Javascript code. The interactive JavaScript shell included in the Developer Assistant and Firebug were very useful for testing certain code snippets before integrating them with the rest of the code. The Firefox Extension PAKE-SRP6.xpi is actually a.zip file and it contains the following folders and files: chrome: o content: images extension_icon.png BigInt.js (Big Integer Library v. 5.4 created by Leemon Baird) browser.xul extension_interface.xul extension_actions.js hex.js rc4.js webtoolkit.sha1.js (Secure Hash Algorithm (SHA1) - chrome.manifest install.rdf The structure of the extension file is specific to Firefox Extensions: a folder named chrome and two files chrome.maifest and install.rdf. At installation time, the two files contain important information for the Firefox browser. The location of the extension files, the supported browser versions and author name are some of the details included in these files. The content folder located in chrome contains the files that build the actual extension:
8 Graphical interface: o browser.xul (graphical interface in the main browser, the PAKE-SRP 6 icon that appears in the main browser), o images folder contains the icon image that is used in the main browser, o extension_interface.xul (extension GUI a new browser window with a URL address bar, a username field, a password field and a Login button) Actions (Javascript): o extension_actions.js (performs the client side SRP 6 protocol computations and manages the communication with the server side) o BigInt.js (Big Integer library is used for the computations performed in extension_actions.js) o hex.js (used for encoding/decoding data to/from hexadecimal format from/to bytes sequence) o rc4.js (used for encrypting/decrypting text given a key using the RC4 stream cipher) o webtoolkit.sha1.js (secure hash function, SHA1, used for hashing strings) In order to establish and maintain a communication with a server that supports the PAKE- SRP 6 extension, we used XPCOM for Firefox. XPCOM is a cross platform component object model. It has multiple language bindings, letting the XPCOM components be used and implemented in JavaScript, Java, and Python in addition to C++. Interfaces in XPCOM are defined in a dialect of IDL called XPIDL. XPCOM itself provides a set of core components and classes, e.g. file and memory management, threads, basic data structures (strings, arrays, variants), etc.[20]. For the PAKE-SRP 6 extension, creating sandboxed HTTP connections [22] and File I/O [23] were two valuable resources during the development process. Using the examples and code snippets provided, we were able to send and receive data over HTTP to/from the server side. In this way the extension is able to follow closely the client-side SRP 6 protocol description provided in Section 4. Server supporting PAKE-SRP 6 The server application for testing the Firefox PAKE-SRP 6 extension is written in PHP with the php_gmp extension installed and enabled. This PHP extension includes functions that allow users to work with arbitrary-length integers using the GNU MP library. This is very helpful for performing the server side computations of the SRP 6 protocol, especially when 1024-bit numbers like the system-wide parameter p are used in the calculations. For more information on how PHP was installed and configured, follow the directions provided in the Appendix section. The test server Server-PAKE-SRP6 contains the following folders and files: Server-PAKE-SRP6: o Crypt: RC4.php o PAKE-SRP6-server.php
9 The RC4.php file is part of the PHP library, phpseclib [26], and implements the RC4 stream cipher. In case the authentication succeeded and a common session key is shared between the two sides, this file is used to encrypt the content that will be sent to the client. The PAKE-SRP-server.php file is the actual test server for the PAKE-SRP 6 extension. This file contains the computation details of the server side SRP 6 authentication protocol and also manages the communication with the client side. Furthermore in order to make the client side aware that it supports PAKE-SRP 6, the server sends the following unencrypted content the first time the client side loads the webpage: <PAKE-SRP6><html><body> <body></html> (For instance: <PAKE-SRP6><html><body>This page requires support for PAKE-SRP 6 over HTTP.</body></html>) By attaching the <PAKE-SRP6> before the HTML content, the client side extension will know that the SRP 6 authentication protocol is supported and therefore it can start the authentication process. In case the authentication process succeeds, the client side will receive the encrypted content from the server. The server will use the RC4 stream cipher and the session key that it shares with the client to encrypt the webpage content. Interaction between the Server Side and the Client Side The client side is initiating the communication with the server. The user opens the PAKE- SRP 6 extension and types the URL of the server, and the user s credentials (username and password). After clicking on the Login button, the extension will initiate a connection to the server. Upon receiving this request, the server will send the unencrypted HTML content to the client. As mentioned before, the unencrypted content is preceded by <PAKE-SRP6>. When the client receives the server s response, it knows that the server-side supports PAKE-SRP 6 authentication. Therefore it will not display the unencrypted content and will follow the protocol steps stated in Section 4. If the received content does not contain the PAKE-SRP 6 header (<PAKE-SRP6>), the browser extension will display an alert telling the user that the SRP 6 authentication protocol is not supported and the received unencrypted content will be displayed in the extension window. In case PAKE-SRP is supported, the first step is sending the username that the user entered. When the server receives this information it will send back the salt for that specific username. In case the username does not exist, the test server will send a fake salt number back. Upon receiving the salt, the client is able to calculate A specified in the protocol description and send it to the server. In case the received A is not empty or zero, the server computes B and sends it back to the client. Now both sides are able to calculate the common session key and exchange M 1 and M 2 in order to verify each other s authenticity. If the authentication process fails at any point, the extension will display an alert informing the user that the authentication failed and the most recent HTML unencrypted content that was received will be displayed in the browser extension ( This page requires support for PAKE- SRP 6 over HTTP. ). Some examples why the authentication process might fail: A or B are empty or zero, M 1 or M 2 cannot be successfully verified or unexpected communication
10 errors. In case the authentication process is successfully completed, the server will encrypt the webpage content using the common session key and send it to the client-side. The client s extension will decrypt the content and display it in the extension window. 6. EVALUATION Security of the Implementation The implementation follows the SRP 6 protocol specification; the authentication process will fail in case one of the sides (client or server) is fake. Furthermore the user is able to detect spoofing windows. If the user doesn t click on the PAKE-SRP 6 extension icon, the extension window will not pop up. In case the same icon is used for a spoofing window then this means that another extension had to be installed by the user on her/his system. Therefore a similar icon will not appear in Firefox unless the user installs another extension. Web traffic is protected after mutual authentication using a secret session key that only the client and the server know. In the implementation, the shared key is used only once by the server and by the client side (only one encrypted webpage content is sent to the client). Therefore the RC4 stream cipher is used in a secure fashion. Attackers will not be able to know and use the key in order to decrypt the content of the webpage. If the user and the server want to use the same session key for multiple encrypted contents then a block cipher like AES should be used. This will slightly complicate the implementation when it comes to using an encrypted channel (most probably the initialization vector, IV, and possible other information has to be sent between the two parties). Limitations SRP 6 alone does not provide a way to establish a common long-term secret between the client and the server side. The two sides have to share a common long-term secret (user s password in this case) that is used every time to generate a new session key. Obviously in case an attacker obtains the password for a specific username then she/he can impersonate both the client and the server side. However if the attacker steals the PVD, v, then she/he can mount an off-line dictionary attack. SRP 6 is subject to server compromise based dictionary attack. Moreover, in case the attacker obtains the username and the salt (which are sent in plain text) for a certain PVD that it obtained from a compromised legitimate server then it can impersonate that server. The provided Firefox browser extension and the test server are not meant to be used for cryptographic purposes beyond testing. First of all, the libraries and classes used for big integers, random numbers and encryption were not rigorously verified. In other words the random number generators may not be secure and may leak information or the big integer classes may behave unexpectedly in certain situations. This implementation is just a proof of concept that shows that a password authenticated key exchange (using the SRP version 6 authentication protocol) can be done over HTTP and can be used against phishing attacks.
11 7. SUMMARY Our primary goal was to integrate PAKE into a web browser by using SRP 6 as the PAKE protocol. There are several web browser extensions available but none of them uses SRP 6. We developed an extension for Mozilla Firefox web browser that uses PAKE-SRP 6. In order to test the browser extension we used a web server (Apache) and PHP to write the server-side PAKE-SRP 6 part. In case the authentication succeeds and the two sides share a common session key, the subsequent communication is done over an encrypted channel. 8. ACKNOWLEDGEMENT I would like to thank Haroun Macalisang for his contribution in the very first version of the implementation and Dr. Eugene Vasserman for his feedback on this work. REFERENCES 1. Y. Oiwa, H. Takagi, H. Watanabe, PAKE-based Mutual HTTP Authentication for Preventing Phishing Attacks, Madrid, Spain, R. Gennaro and Y. Lindell, A Framework for Password-Based Authenticated Key Exchange, Advances in Cryptology EUROCRYPT F. Hao, P. Ryan, J-PAKE: Authenticated Key Exchange Without PKI, Transactions on Computational Science XI Volume 6480/ J. Engler, C. Karlof, E. Shi, D. Song, Is it too late for PAKE?, W2SP Oakland, R.J Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems, New York, Wiley S. Bellovin and M. Merritt, Encrypted Key Exchange: password-based protocols secure against dictionary attacks, IEEE Symposium on Research in Security and Privacy, May T. Wu, The Secure Remote Password Protocol, Internet Society Symposium on Network and Distributed Systems, J. Carlson, B. Aboba, H. Haverinen, EAP SRP-SHA1 Authentication Protocol, IETF Draft, M. Wu, R.C. Miller, G. Little, Web Wallet: Preventing phishing attacks by revealing user intentions, SOUPS, Mozilla Wiki Research Center for Information Security IEEE P ISO/IEC (Information technology, Security techniques, Key management, Part 4: Mechanisms based on weak secrets) The How-to on developing Firefox Extensions XUL Explorer Developer Assistant FireBug DOM Inspector Dr. Xunhua Wang Slides: Password-authenticated Key Exchange: SRP and SPEKE 20. XPCOM API Reference -
12 21. XPCOM Interfaces MDN Creating Sandboxed HTTP Connections MDN File I/O MDN Miscellaneous MozillaZine Phpseclib WAMP Server Firefox - APPENDIX Installing Apache, PHP, Firefox and the PAKE-SRP 6 Extension on Windows (tested on 7 and XP SP3) Step 1 In case you don t have Apache and PHP (with the php_gmp extension enabled) installed on your system, install WampServer2.2 [27] with default settings. Enable php_gmp extension (library) in WAMP (Figure 1): 1. Start WAMP (double click on the desktop icon) 2. Click on the Wamp icon taskbar icon 3. Click on PHP 4. Click on PHP extensions 5. Click on php_gmp Figure 1 Enable php_gmp extension Copy the Server-PAKE-SRP6 folder in C:\wamp\www Step 2
13 In case you don t have Firefox installed on your computer, download Firefox [29] and install it using default settings. The PAKE-SRP 6 extension was tested and is working on version Step 3 Install the Firefox extension by dragging and dropping the PAKE-SRP6.xpi file on the opened Firefox window (Figure 2). Figure 2 Correctly installed Firefox Extension Running the SRP-6 over HTTP implementation Click on the PAKE-SRP6 toolbar icon in the Firefox window. A new window will be opened where the user has to type the URL of the server that supports PAKE-SRP6 over HTTP, the username and the password. The test implementation supports two accounts that are stored on the server. Use: Usename: alex Password: password Testing the PAKE-SRP 6 extension: or Usename: bardas Password: password1 Open Firefox Click on the PAKE-SRP 6 extension Type in the URL of the server that supports the PAKE-SRP 6 (for testing purposes the URL is Type in the username and password (alex and password or bardas and password1) Click Login If everything goes well you will have to get something similar to Figure 3. This message will appear only if the content of the page was decrypted. Therefore a browser that does support PAKE-SRP 6 will not be able to know the key and use this key to decrypt the message before displaying it.
14 Figure 3 Working SRP6 over HTTP implementation
Reparing HTTP authentication for Web security
Reparing HTTP authentication for Web security Yutaka OIWA 1 Overview This position paper proposes improvement efforts for HTTP authentication/authorization mechanisms, to solve various current problems
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
SENSE Security overview 2014
SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2
Dashlane Security Whitepaper
Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1
Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1 How the Web Works - HTTP Hypertext transfer protocol (http). Clients request documents (or scripts) through URL. Server response with documents. Documents
Network Security Essentials Chapter 5
Network Security Essentials Chapter 5 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 5 Transport-Level Security Use your mentality Wake up to reality From the song, "I've Got
3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol
Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Network Layer: IPSec Transport Layer: SSL/TLS Chapter 4: Security on the Application Layer Chapter 5: Security
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications Slides by Connor Schnaith Cross-Site Request Forgery One-click attack, session riding Recorded since 2001 Fourth out of top 25 most
Transport Layer Security Protocols
SSL/TLS 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally designed to by Netscape to secure HTTP Version 2 is being replaced by version 3 Subsequently became Internet Standard known
The Security Behind Sticky Password
The Security Behind Sticky Password Technical White Paper version 3, September 16th, 2015 Executive Summary When it comes to password management tools, concerns over secure data storage of passwords and
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
SSL... 2 2.1. 3 2.2. 2.2.1. 2.2.2. SSL VPN
1. Introduction... 2 2. Remote Access via SSL... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Software and Certificates...10
Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords
Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords Author: Paul Seymer CMSC498a Contents 1 Background... 2 1.1 HTTP 1.0/1.1... 2 1.2 Password
Secure Remote Password (SRP) Authentication
Secure Remote Password (SRP) Authentication Tom Wu Stanford University [email protected] Authentication in General What you are Fingerprints, retinal scans, voiceprints What you have Token cards, smart
Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client
Astaro Security Gateway V8 Remote Access via SSL Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If you are not
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
isupplier PORTAL ACCESS SYSTEM REQUIREMENTS
TABLE OF CONTENTS Recommended Browsers for isupplier Portal Recommended Microsoft Internet Explorer Browser Settings (MSIE) Recommended Firefox Browser Settings Recommended Safari Browser Settings SYSTEM
Sophos UTM. Remote Access via PPTP. Configuring UTM and Client
Sophos UTM Remote Access via PPTP Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without
Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2
BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution
White Paper: Multi-Factor Authentication Platform
White Paper: Multi-Factor Authentication Platform Version: 1.4 Updated: 29/10/13 Contents: About zero knowledge proof authentication protocols: 3 About Pairing-Based Cryptography (PBC) 4 Putting it all
Webmail Using the Hush Encryption Engine
Webmail Using the Hush Encryption Engine Introduction...2 Terms in this Document...2 Requirements...3 Architecture...3 Authentication...4 The Role of the Session...4 Steps...5 Private Key Retrieval...5
Djigzo S/MIME setup guide
Author: Martijn Brinkers Table of Contents...1 Introduction...3 Quick setup...4 Create a CA...4 Fill in the form:...5 Add certificates for internal users...5 Add certificates for external recipients...7
Security Protocols/Standards
Security Protocols/Standards Security Protocols/Standards Security Protocols/Standards How do we actually communicate securely across a hostile network? Provide integrity, confidentiality, authenticity
ERserver. iseries. Secure Sockets Layer (SSL)
ERserver iseries Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) Copyright International Business Machines Corporation 2000, 2002. All rights reserved. US Government Users Restricted
Security Policy Revision Date: 23 April 2009
Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure
Application Note: Onsight Device VPN Configuration V1.1
Application Note: Onsight Device VPN Configuration V1.1 Table of Contents OVERVIEW 2 1 SUPPORTED VPN TYPES 2 1.1 OD VPN CLIENT 2 1.2 SUPPORTED PROTOCOLS AND CONFIGURATION 2 2 OD VPN CONFIGURATION 2 2.1
Web Security. Mahalingam Ramkumar
Web Security Mahalingam Ramkumar Issues Phishing Spreading misinformation Cookies! Authentication Domain name DNS Security Transport layer security Dynamic HTML Java applets, ActiveX, JavaScript Exploiting
Designing a Secure Client-Server System Master of Science Thesis in the Programme Software Engineering & Technology
Designing a Secure Client-Server System Master of Science Thesis in the Programme Software Engineering & Technology FREDRIK ANDERSSON Department of Computer Science and Engineering CHALMERS UNIVERSITY
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https
Chapter 16: Authentication in Distributed System
Chapter 16: Authentication in Distributed System Ajay Kshemkalyani and Mukesh Singhal Distributed Computing: Principles, Algorithms, and Systems Cambridge University Press A. Kshemkalyani and M. Singhal
Cleaning Encrypted Traffic
Optenet Documentation Cleaning Encrypted Traffic Troubleshooting Guide iii Version History Doc Version Product Date Summary of Changes V6 OST-6.4.300 01/02/2015 English editing Optenet Documentation
Whitepaper : Using Unsniff Network Analyzer to analyze SSL / TLS
Whitepaper : Using Unsniff Network Analyzer to analyze SSL / TLS A number of applications today use SSL and TLS as a security layer. Unsniff allows authorized users to analyze these applications by decrypting
OPENID AUTHENTICATION SECURITY
OPENID AUTHENTICATION SECURITY Erik Lagercrantz and Patrik Sternudd Uppsala, May 17 2009 1 ABSTRACT This documents gives an introduction to OpenID, which is a system for centralised online authentication.
Secure Socket Layer (SSL) and Transport Layer Security (TLS)
Secure Socket Layer (SSL) and Transport Layer Security (TLS) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available
Sale Grammar School Remote Desktop Services User Instructions
Sale Grammar School Remote Desktop Services User Instructions Sale Grammar School Remote Desktop Services allows Staff and Students access to a virtual school computer while connected to the internet at
Is Your SSL Website and Mobile App Really Secure?
Is Your SSL Website and Mobile App Really Secure? Agenda What is SSL / TLS SSL Vulnerabilities PC/Server Mobile Advice to the Public Hong Kong Computer Emergency Response Team Coordination Centre 香 港 電
Sophos UTM. Remote Access via SSL. Configuring UTM and Client
Sophos UTM Remote Access via SSL Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without
Web Application Guidelines
Web Application Guidelines Web applications have become one of the most important topics in the security field. This is for several reasons: It can be simple for anyone to create working code without security
Transport Level Security
Transport Level Security Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
LBSEC. http://www.liveboxcloud.com
2014 LBSEC http://www.liveboxcloud.com LiveBox Srl does not release declarations or guarantee regarding this documentation and its use and declines any expressed or implied commercial or suitability guarantee
RFG Secure FTP. Web Interface
RFG Secure FTP Web Interface Step 1: Getting to the Secure FTP Web Interface: Open your preferred web browser and type the following address: http://ftp.raddon.com After you hit enter, you will be taken
Lecture Notes for Advanced Web Security 2015
Lecture Notes for Advanced Web Security 2015 Part 6 Web Based Single Sign-On and Access Control Martin Hell 1 Introduction Letting users use information from one website on another website can in many
http://alice.teaparty.wonderland.com:23054/dormouse/bio.htm
Client/Server paradigm As we know, the World Wide Web is accessed thru the use of a Web Browser, more technically known as a Web Client. 1 A Web Client makes requests of a Web Server 2, which is software
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
ERserver. iseries. Securing applications with SSL
ERserver iseries Securing applications with SSL ERserver iseries Securing applications with SSL Copyright International Business Machines Corporation 2000, 2001. All rights reserved. US Government Users
The Misuse of RC4 in Microsoft Word and Excel
The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore [email protected] Abstract. In this report, we point out a serious security flaw in Microsoft
Authentication Types. Password-based Authentication. Off-Line Password Guessing
Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Two Factor Zero Knowledge Proof Authentication System
Two Factor Zero Knowledge Proof Authentication System Quan Nguyen Mikhail Rudoy Arjun Srinivasan 6.857 Spring 2014 Project Abstract It is often necessary to log onto a website or other system from an untrusted
Recommended Browser Setting for MySBU Portal
The MySBU portal is built using Microsoft s SharePoint technology framework, therefore, for the best viewing experience, Southwest Baptist University recommends the use of Microsoft s Internet Explorer,
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
The Devil is Phishing: Rethinking Web Single Sign On Systems Security. Chuan Yue USENIX Workshop on Large Scale Exploits
The Devil is Phishing: Rethinking Web Single Sign On Systems Security Chuan Yue USENIX Workshop on Large Scale Exploits and Emergent Threats (LEET 2013) Web Single Sign On (SSO) systems Sign in multiple
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Applied Technology Abstract The Web-based approach to system management taken by EMC Unisphere
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential
Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
Sichere Software- Entwicklung für Java Entwickler
Sichere Software- Entwicklung für Java Entwickler Dominik Schadow Senior Consultant Trivadis GmbH 05/09/2012 BASEL BERN LAUSANNE ZÜRICH DÜSSELDORF FRANKFURT A.M. FREIBURG I.BR. HAMBURG MÜNCHEN STUTTGART
Campus VPN. Version 1.0 September 22, 2008
Campus VPN Version 1.0 September 22, 2008 University of North Texas 1 9/22/2008 Introduction This is a guide on the different ways to connect to the University of North Texas Campus VPN. There are several
Installation and usage of SSL certificates: Your guide to getting it right
Installation and usage of SSL certificates: Your guide to getting it right So, you ve bought your SSL Certificate(s). Buying your certificate is only the first of many steps involved in securing your website.
Session Management in Web Applications
Session Management in Web Applications Author: EUROSEC GmbH Chiffriertechnik & Sicherheit Tel: 06173 / 60850, www.eurosec.com EUROSEC GmbH Chiffriertechnik & Sicherheit, 2005 What is Web-based Session
Penetration Testing for iphone Applications Part 1
Penetration Testing for iphone Applications Part 1 This article focuses specifically on the techniques and tools that will help security professionals understand penetration testing methods for iphone
2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries
Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application
ADFS Integration Guidelines
ADFS Integration Guidelines Version 1.6 updated March 13 th 2014 Table of contents About This Guide 3 Requirements 3 Part 1 Configure Marcombox in the ADFS Environment 4 Part 2 Add Relying Party in ADFS
SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client
SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client Version 1.1 1/15/2013 This remote access end user reference guide provides an overview of how to install Citrix receiver (a required
Salesforce1 Mobile Security Guide
Salesforce1 Mobile Security Guide Version 1, 1 @salesforcedocs Last updated: December 8, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
Web Security Considerations
CEN 448 Security and Internet Protocols Chapter 17 Web Security Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University [email protected]
Is your data safe out there? -A white Paper on Online Security
Is your data safe out there? -A white Paper on Online Security Introduction: People should be concerned of sending critical data over the internet, because the internet is a whole new world that connects
TLS and SRTP for Skype Connect. Technical Datasheet
TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security
Layered security in authentication. An effective defense against Phishing and Pharming
1 Layered security in authentication. An effective defense against Phishing and Pharming The most widely used authentication method is the username and password. The advantages in usability for users offered
VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong
VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY AUTHOR: Raúl Siles Founder and Security Analyst at Taddong Hello and welcome to Intypedia. Today we will talk about the exciting world of security
Reading an email sent with Voltage SecureMail. Using the Voltage SecureMail Zero Download Messenger (ZDM)
Reading an email sent with Voltage SecureMail Using the Voltage SecureMail Zero Download Messenger (ZDM) SecureMail is an email protection service developed by Voltage Security, Inc. that provides email
DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5
DEPLOYMENT GUIDE Version 1.1 Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Citrix Presentation Server Prerequisites
How to configure SSL proxying in Zorp 3 F5
How to configure SSL proxying in Zorp 3 F5 June 14, 2013 This tutorial describes how to configure Zorp to proxy SSL traffic Copyright 1996-2013 BalaBit IT Security Ltd. Table of Contents 1. Preface...
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Stealth OpenVPN and SSH Tunneling Over HTTPS
Stealth OpenVPN and SSH Tunneling Over HTTPS Contents Tunneling OpenVPN and SSH via HTTPS for Windows,MAC and Linux... 1 Benefits of HTTPS Tunneling:... 2 Pre-Requisites:... 3 Part A: Step by Step Instructions
BYOD Guidance: BlackBerry Secure Work Space
GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.
CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity
CSC 474 -- Network Security Topic 6.2 User Authentication CSC 474 Dr. Peng Ning 1 User Authentication Basics CSC 474 Dr. Peng Ning 2 Authentication and Identity What is identity? which characteristics
Vulnerabilità dei protocolli SSL/TLS
Università degli Studi di Milano Facoltà di Scienze Matematiche, Fisiche e Naturali Dipartimento di Informatica e Comunicazione Vulnerabilità dei protocolli SSL/TLS Andrea Visconti Overview Introduction
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
2007 Microsoft Office System Document Encryption
2007 Microsoft Office System Document Encryption June 2007 Table of Contents Introduction 1 Benefits of Document Encryption 2 Microsoft 2007 Office system Document Encryption Improvements 5 End-User Microsoft
Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009
16 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009 1 25 Organization Welcome to the New Year! Reminder: Structure of Communication Systems lectures
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
Certified Secure Web Application Secure Development Checklist
www.certifiedsecure.com [email protected] Tel.: +31 (0)70 310 13 40 Loire 128-A 2491 AJ The Hague The Netherlands About Certified Secure Checklist Certified Secure exists to encourage and fulfill
An additional website URL has been added to the districts website address making this gateway easy to access and bookmark for future use.
Veribest ISD Virtual Desktop Integration Installing vworkstation for Remote (Home) Use Section 1: Installing the vworkstation Gateway The convenience of home access to your school district desktop is going
Application Design and Development
C H A P T E R9 Application Design and Development Practice Exercises 9.1 What is the main reason why servlets give better performance than programs that use the common gateway interface (CGI), even though
SSL Server Rating Guide
SSL Server Rating Guide version 2009j (20 May 2015) Copyright 2009-2015 Qualys SSL Labs (www.ssllabs.com) Abstract The Secure Sockets Layer (SSL) protocol is a standard for encrypted network communication.
6. Is it mandatory to have the digital certificate issued from NICCA?...3. 7. Is it mandatory for the sender and receiver to have a NIC email id?...
FAQ FOR S/MIME 1. What is S/MIME?...2 2. What is digital certificate?...2 3. What is an encrypted email?...2 4. Is it mandatory to use this service?...2 5. What I need to do to start using S/MIME service?...2
Online Data Services. Security Guidelines. Online Data Services by Esri UK. Security Best Practice
Online Data Services Security Guidelines Online Data Services by Esri UK Security Best Practice 28 November 2014 Contents Contents... 1 1. Introduction... 2 2. Data Service Accounts, Security and Fair
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise
Using Foundstone CookieDigger to Analyze Web Session Management
Using Foundstone CookieDigger to Analyze Web Session Management Foundstone Professional Services May 2005 Web Session Management Managing web sessions has become a critical component of secure coding techniques.
Install and End User Reference Guide for Direct Access to Citrix Applications
Install and End User Reference Guide for Direct Access to Citrix Applications Version 1.0 7/26/2013 This remote access end user reference guide provides an overview of how to install Citrix receiver (a
