How to get SSL into Apache?
|
|
|
- Megan Erin Wilkerson
- 9 years ago
- Views:
Transcription
1 Tutorial at Open Source Convent 99/08/22 Holger Reif
2 What is SSL? SSL = Secure Socket Layer Socket == concept of Unix network API Means for securing The Web? Means for securing _any_ connection oriented communication Most often used to secure HTTP (transport protocol for the web) Other Protocols use SSL as well (NNTP, POP3, IMAP,...) Holger Reif <[email protected]> 2/80
3 Properties authenticates server optionally authenticate client protect confidentiality (privacy) protect integrity (reliability) end-2-end security for communication Holger Reif 3/80
4 Typical Applications that use SSL e-commerce - ordering payment protect form input sent to server sensitive personal data? protect credit card information SET is different secure web-based intranet access secure transmission of confidential content Holger Reif <[email protected]> 4/80
5 What can SSL do for you? protect data transmitted to and from your server reduce some spoofing attacks provide reliable authentication show your security and privacy awareness Holger Reif 5/80
6 What can SSL not do for you? protect your server from being hacked protect data on your server from being stolen provide non-repudiation make you a security genius secure your server!!! Holger Reif <[email protected]> 6/80
7 Competitor: Secure HTTP (S-HTTP) Attempt by Terisa Systems Variety of features Client/Server Authentication Spontaneous Encryption Request/Response Nonrepudiation better concept then HTTPS and fitted needs better for HTTP no browser support it s dead! Holger Reif <[email protected]> 7/80
8 Comparison HTTP, HTTPS, SHTTP unprotected content protected content unprotected lines HTTP S-HTTP protected lines HTTPS Holger Reif 8/80
9 History of SSL developed and introduced by Netscape 1994 version 1 had serious security flaws and was never used 1994 version 2 in Navigator battle against PCT by MS (Private Communications Technology) 1996 version 3 in Navigator 3 - public review TLS (transport layer security) a.k.a. SSL 3.1 by IETF Holger Reif <[email protected]> 9/80
10 Design Goals of SSL Cryptographic secure to much snake oil out there Interoperability Can two person speaking same protocol communicate? Extensibility What about new requirements? Relative efficiency don t require to much resources! Holger Reif <[email protected]> 10/80
11 Ways to reach the goal Symmetric Encryption Asymmetric Authentication digital signatures clear specification Parameter negotiation Handshake parameter reuse Holger Reif 11/80
12 Excursion: Crypto Primer Basic Algorithms Symmetric (Secret Key) Cryptography Asymmetric (Public Key) Cryptography Hash Functions Their Use Session keys / Enveloping Digital signatures Certificates, x.509, CAs, cert chains and CRLs Strength of ciphers Key length Holger Reif <[email protected]> 12/80
13 Symmetric (Secret Key) Cryptography same key! encrypt decrypt TextTextTextText TextTextTextText TextTextTextText TextTextTextText TextTextTextText TextTextTextText TextText Gfdskljb,.Wq09ufs vsaüdsafghfdhdsgd safwtrweökljadsjk saölhwqölntqälwki aubgaöklvnhsaldjö ghqpghölskncxybk hfdkhsgcykvhcrge dsafdgdfz657erghf TextTextTextText TextTextTextText TextTextTextText TextTextTextText TextTextTextText TextTextTextText TextText sender recipient Holger Reif 13/80
14 Symmetric (Secret Key) Cryptography (contd.) same key for both sender and recipient key needs to kept secret!!! Problem: key distribution doesn t scale work fast (Mbytes per second) mostly bit shuffling, depending on key examples: DES (56 bit), 3-DES (112 bit), RC4 (128 Bit) Holger Reif <[email protected]> 14/80
15 Asymmetric (Public Key) Cryptography public key key pair (public + private) encrypt decrypt TextTextTextText TextTextTextText TextTextTextText TextTextTextText TextTextTextText TextTextTextText TextText Gfdskljb,.Wq09ufs vsaüdsafghfdhdsgd safwtrweökljadsjk saölhwqölntqälwki aubgaöklvnhsaldjö ghqpghölskncxybk hfdkhsgcykvhcrge dsafdgdfz657erghf TextTextTextText TextTextTextText TextTextTextText TextTextTextText TextTextTextText TextTextTextText TextText sender recipient Holger Reif <[email protected]> 15/80
16 Asymmetric (Public Key) Cryptography (contd.) Recipient has key pair (public + private part) Sender needs public key Public key needs only to kept authentic (not secret!) underlaying math problem e.g. factoring a product of two large primes (RSA) you can make public key operations fast slow private key operations (dozends a sec.) Examples: RSA, Diffie-Hellmann Holger Reif <[email protected]> 16/80
17 Hash Functions no keys involved one way function can t regenerate original from the hash compresses size down to 128 or 160 Bit generates a fingerprint of the text changing one bit in the text changes half the bits of the hash work fast (Mbytes per second) Examples: MD5, SHA-1 Holger Reif <[email protected]> 17/80
18 Use of cryptographic functions Session keys / Enveloping Digital signatures Certificates, x.509, CAs and cert chains Holger Reif <[email protected]> 18/80
19 Data encryption: Session keys and Enveloping Problem secret key crypto: key distribution public: speed Solution: put your text in an envelope! securely agree on a (symmetric) session key with your Public Key fast bulk encryption with that symmetric key long term key exchange key (rarely used) compromise of short term Session key harmless Holger Reif <[email protected]> 19/80
20 Digital signatures Idea: use your private key to show your will Problem: private key operations slow on huge documents Solution: generate a hash encrypt this hash with your private key Holger Reif <[email protected]> 20/80
21 Digital signatures (contd.) SIgning Verification Data Data MD5 MD5 MD5-Hash MD5-Hash comparison Signatur correct? private key public key MD5-Hash? RSA RSA Signature Signature Holger Reif 21/80
22 Certificates Problem: how do I know it s your pub key? Solution: use a passport! Certificate is a digital passport contains identity of holder public key of the holder tied together with an issuers signature opt.: name of the issuer opt.: administrative information like date of issuance and validity opt.: allowed usage (type of pass) Holger Reif <[email protected]> 22/80
23 Certificates (contd.) How to prove to be the valid holder of the cert (no picture included)? prove possession of private key encrypt a challenge verifier checks with pub key taken from cert Your key is your identity Holger Reif <[email protected]> 23/80
24 X.509 Important format for certificates Coined by ITU (Intl. Telcom. Union) broad usage SSL/TLS S/MIME IPSec current version: V3 v1 starting v2 provided for better identification of used keys v3 provides for extensions Holger Reif 24/80
25 Example: X.509 certificate Data: Version: 1 (0x0) Serial Number: (0x3b4b) Signature Algorithm: md5withrsaencryption Issuer: C=ZA, ST=Western Cape, L=Cape Town, O=Thawte Consulting cc, OU=Certification Services Division, CN=Thawte Server CA/ [email protected] Validity Not Before: Jan 22 15:14: GMT Not After : Feb 5 15:14: GMT Subject: C=DE, ST=Bavaria, L=Dachau, O=The OpenSSL Project, OU=Security Services Division, CN= Holger Reif <[email protected]> 25/80
26 Example: X.509 certificate (contd.) Subject Public Key Info: Public Key Algorithm: rsaencryption RSA Public Key: (1024 bit) Modulus (1024 bit): 00:cd:04:8f:03:df:f1:dc:0c:30:63:bf:14:e8:59:... 11:05:ac:8c:42:2a:97:10:da:ba:01:7e:62:aa:39: 51:2f:93:fa:f0:48:36:47:ed Exponent: (0x10001) Signature Algorithm: md5withrsaencryption 8d:5d:b5:cf:0e:b1:d3:11:1a:5f:bf:fa:7b:ed:b8:e1:24:2e:... 35:3b:19:d4:30:13:b8:6c:2c:ea:b4:c2:3f:e8:98:8e:35:44: c5:79 Holger Reif 26/80
27 Certification Authorities Problem: how do I verify the validity of the cert? Solution: check the signature of the issuer Problem: How do I know issuer s pub key? Doesn t he has a certificate itself... Endless loop??? You need to trust somebody Trusted third parties identify the individual for you and issue them with a certificate Certification Authorities embedded into browsers or clients Holger Reif <[email protected]> 27/80
28 Certificate chains How to adopt the model of hierarchies? Organizations different roles and pruposes Solution: hierarchical CAs Consequence: certificate chains intermediate CA end user end user Root CA intermediate CA end user end user Holger Reif 28/80
29 C=ZA ST=Western Cape L=Cape Town O=Thawte Consulting OU=Certification Services Division CN=Thawte Personal Basic CA Validity to Certificate chains example the root cert C=ZA ST=Western Cape L=Durbanville O=Thawte Consulting OU=Thawte SB RSA IK :55 CN=Thawte Server Basic RSA Issuer Validity to the intermediate (issuing) cert my personal cert CN=Thawte Fre Member Validity to Holger Reif 29/80
30 Certificate Revocation Lists (CRL) Problem: What happens if a certified key is stolen and can be misused? Solution: issuer has a blacklist of invalid (revoked) certificates -> CRL Must be checked additionally CRL contains Issuer s name date of issue serial numbers of revoked certificates signature of issuer Holger Reif <[email protected]> 30/80
31 Strength of ciphers how to attack a cipher key length key length comparison Holger Reif <[email protected]> 31/80
32 How to attack a cipher? search through all possible solutions (brute force) go through key space SSL challenge 8/1996 break 40-Bit RC4 DES challenge at RSA conference in January break 56 bit DES find a principle problem in the algorithm complete compromise shortcut to be faster than brute force Holger Reif <[email protected]> 32/80
33 Key length strength of modern crypto only lies in keys (otherwise: security by obscurity) key length ==> strength strength == effort to break a cryptographically secure message effort measured in time, space, computing power etc. relation length/strength different various algorithms Holger Reif <[email protected]> 33/80
34 Key length comparison symmetric encryption: only brute force 128 Bit == 2^128 possible keys asymmetric encryption: mathematical tricks (factoring,...) 1024 Bit == 200 digit number factoring provided no better technique than factoring known! Digests: birthday attack 160 Bit Holger Reif 34/80
35 Legal Patents, trade secrets and the like export control usage restrictions Holger Reif 35/80
36 Patents, trade secrets and the like RSADSI has a patent on RSA algorithm (expiring 2000/09/20) in USA IDEA is patented across Europe (Ascom) RC2, RC4 is considered a trade secret by RSADSI several other cryptographic algorithms are protected as well Ask your lawyer! Holger Reif <[email protected]> 36/80
37 Export control (strong) crypto is treated as munitions munitions can t be easily exported from USA except for weak cryptography except to Canada (general exception) except for foreign subsidiaries of US companies (on request) except for financial purposes (on request) "export crippled" Wasenaar agreement public domain software is not export controlled countries may have stricter handling (cf. USA) Ask your lawyer! Holger Reif <[email protected]> 37/80
38 Usage restrictions e.g. France had restrictions in use of crypto until currently (now only declaration is needed) e.g. Russia demands a license to develop or use crypto check Crypto Law Survey by Bert-Jaap Koops at Ask your lawyer! Holger Reif <[email protected]> 38/80
39 SSL Protocol Overview Protocol components Session concept Ciphersuite concept Handshake Protocol Holger Reif 39/80
40 Protocol components Application Handshake protocol Alert protocol Change cipher spec protocol Record Layer TCP Layer IP Layer App data protocol SSL/TLS layer Socket interface network stack Holger Reif 40/80
41 Protocol components (contd.) Record layer (Record protocol) requires reliable transport (no missing packets, correct order) Blocking, compression, encryption, integrity Handshake protocol (Re-)Negotiate parameters Alert protocol Notify about possible problems Change cipher spec protocol short cut Holger Reif 41/80
42 Session concept secret values premaster / master secret Ciphersuite see next slide cryptographic parameters encryption keys integrity preserving keys initialization vectors Session Keys / Enveloping!!! Holger Reif <[email protected]> 42/80
43 Ciphersuite concept compression algorithm key exchange algorithm authentication algorithm encryption algorithm MAC algorithm examples EXP-RC4-MD5 Kx=RSA(512), Au=RSA, Enc=RC4(40), Mac=MD5, exp DES-CBC3-SHA Kx=RSA, Au=RSA, Enc=3DES(168), Mac=SHA1 Holger Reif 43/80
44 Handshake Protocol hello messages Certificate messages Key Exchange Messages Finished messages Holger Reif 44/80
45 Handshake Protocol (graphic) ClientHello Certificate ClientKeyExchange CertificateVerify ChangeCipherSpec Finished Application Data (HelloRequest) ServerHello Certificate CertificateRequest ServerKeyExchange ServerHelloDone ChangeCipherSpec Finished Application Data bright messages for session continuing not needed bold messages only for server authentication italic messages only for client authentication Holger Reif 45/80
46 Handshake Protocol (contd.) hello messages start with negotiation exchange random values agree on algorithms check for session resumption. Holger Reif 46/80
47 Handshake Protocol (contd.) Certificate messages. Key Exchange Messages Exchange certificates and cryptographic information to allow the client and server to authenticate themselves. Exchange the necessary cryptographic parameters to allow the client and server to agree on shared key Holger Reif 47/80
48 Handshake Protocol (contd.) Finished messages Allow the client and server to verify that their peer has calculated the same security parameters and that the handshake occurred without tampering by an attacker. Holger Reif 48/80
49 SSL processing picture taken from mod_ssl manual Holger Reif 49/80
50 SSL and Browsers The obvious picture How to get a better browser Proxy solutions Holger Reif <[email protected]> 50/80
51 The obvious picture most popular browsers (Netscape Navigator, MS Internet Explorer) are from USA export crippled Opera from Norway only for Win platform (yet) Lynx+SSL (patches are from US...) Lynx enhanced with OpenSSL Does anybody really uses this? curl Mosaic 2.6 was patched with SSLeay Holger Reif 51/80
52 How to get a better browser? Fortify Patch your Netscape Have a full strength Crypto Service provider Win + MSIE Get US-Versions of the browsers ftp.hacktic.nl ftp.replay.com Holger Reif <[email protected]> 52/80
53 Proxy solutions strong SSL server strong encryption Security Proxy weak encr. Your Browser Your Computer SafePassage stunnel Holger Reif 53/80
54 SSL and Apache History Architecture Holger Reif 54/80
55 History Past development comparison of solutions Holger Reif 55/80
56 Development in past time Hockey Raven SSL Raven SSL RH SWS RH SWS Apache-SSL Apache-SSL U.S. 1.0 mod_ssl mod_ssl Stronghold Sioux 1.1 Stronghold 1.0 (free) Holger Reif 56/80
57 Comparison Product Apache-SSL mod_ssl RH SS Raven SSL Stronghold Hockey Author B. Laurie R. Engeschall RedHat Covalent C2 Net M. Steiger Location UK DE US US US US License open-source open-source commercial commercial commercial commercial Price $0 $0 $249 $357 $995 $149 (bundle) Availability world wide world wide US only US only world wide US only US Usage restricted restricted unlimited unlimited unlimited Unlimited Support voluntary, always free voluntary, always free conceding, 90 d. free conceding, 90 d. free conceding, 90 d. free conceding, 90 d. free SSL Engine OpenSSL (+ RSAref) OpenSSL (+ RSAref) OpenSSL + BSafe OpenSSL + BSafe SSLeay OpenSSL + BSafe Version Holger Reif <[email protected]> 57/80
58 General Architecture 3 parts: Apache, SSL provider, glue Plain old Apache glue SSL Provider why not just one distribution? remember: munitions is export controlled Hooks are disallowed as well Holger Reif <[email protected]> 58/80
59 mod_ssl specific architecture Holger Reif 59/80
60 OpenSSL How to build History Components recent developments Holger Reif 60/80
61 How to build (in real time)./configure make make test (optional) make install (optional) Holger Reif 61/80
62 History of OpenSSL / SSLeay SSLeay done by Eric Young and (partly) Tim Hudson First public release 0.4 at 1995/05/31 major releases each year only free tool for implementing SSL development partly founded by C2Net Development stopped mid 1999 OpenSSL started end of 1998 active development committed to Open Source Holger Reif <[email protected]> 62/80
63 Components General purpose Big Number library General Purpose Basic Crypto library (ciphers) ASN.1 functions General Purpose High Level Crypto library (PKCS) X.509 library General purpose utilities (openssl command) SSL/TLS library Holger Reif 63/80
64 Recent development better support for various standards PKCS#7 (S/MIME) PKCS#12 (certificate import/export) renegotiations handling certificate extension handling new algorithms OAEP cleanups (compiler warnings, configuration handling) Holger Reif 64/80
65 mod_ssl recent development how to build Basic Configuration Where do I get my certificate from? Advanced Topics Future development Holger Reif <[email protected]> 65/80
66 Recent mod_ssl development shared memory session cache DH/DSA support CRL support session renegotiation SSL related status available more SSL env vars for CGI programs Holger Reif 66/80
67 How to build (in real-time) configure cd../apache make Holger Reif 67/80
68 How to configure it s easy, really! examining adopted httpd.conf Holger Reif <[email protected]> 68/80
69 How to configure - Basic Options SSLEngine on SSLMutex file:/app/sources/apache_1.3.6/logs/ssl_mutex Holger Reif <[email protected]> 69/80
70 How to configure - See what happens SSLLog /app/sources/apache_1.3.6/logs/ssl_engine_lo g SSLLogLevel info Holger Reif <[email protected]> 70/80
71 How to configure - Set Key and certificate SSLCertificateFile /app/sources/apache_1.3.6/conf/ssl.crt/server. crt SSLCertificateKeyFile /app/sources/apache_1.3.6/conf/ssl.key/server. key SSLPassPhraseDialog builtin Holger Reif <[email protected]> 71/80
72 How to configure - Decrease load SSLSessionCache dbm:/app/sources/apache_1.3.6/logs/ssl_scac he SSLSessionCacheTimeout 300 Holger Reif <[email protected]> 72/80
73 How to configure - Improve Security SSLRandomSeed startup builtin SSLRandomSeed connect builtin Holger Reif <[email protected]> 73/80
74 How to configure - The certificate Make cert (real time demonstration) Request a cert from Thawte Holger Reif <[email protected]> 74/80
75 The certificate - rolling your own make certificate Holger Reif <[email protected]> 75/80
76 The certificate - request one at Thawte You should have Generate a key pair $ openssl genrsa -des3 -out server.key 1024 See what s the content $ openssl rsa -noout -text -in server.key Remove the protection from the key $ openssl rsa -in server.key -out server.key.unsecure Generate the request from existing key $ openssl req -new -key server.key -out server.csr Examine the content $ openssl req -noout -text -in server.csr Go to a CA of your choice Holger Reif <[email protected]> 76/80
77 The certificate - request at Thawte (contd.) Proceed through different steps (see Annex) paste in cert request select contact persons payment and address information finished and summary status page load cert install cert Holger Reif <[email protected]> 77/80
78 What to do next Some more advanced examples and their effect Client auth Check the certs of your clients PRNG seeding provide source for real randomness Advanced features GID DSO get strong encryption from newer export browsers compile mod_ssl as dynamic module Holger Reif 78/80
79 Future developments Improved per directory renegotiations less cryptographic operations Full HTTPS support for mod_proxy gather data from a SSL hosts SSLListen Directive add the SSL with just one directive LDAP support Improved stability See README.Wishes Holger Reif <[email protected]> 79/80
80 Closure Any questions? (+ mailing list) (+ mailing list) (+ mailing list) comp. Holger Reif 80/80
The Beautiful Features of SSL And Why You Want to Use Them?
The Beautiful Features of SSL And Why You Want to Use Them? Holger Reif 1999/08/24 Content What is SSL? Apache based SSL servers mod_ssl Crypto basics SSL basics Server certificates and
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Communication Systems SSL
Communication Systems SSL Computer Science Organization I. Data and voice communication in IP networks II. Security issues in networking III. Digital telephony networks and voice over IP 2 Network Security
Web Security Considerations
CEN 448 Security and Internet Protocols Chapter 17 Web Security Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University [email protected]
Communication Security for Applications
Communication Security for Applications Antonio Carzaniga Faculty of Informatics University of Lugano March 10, 2008 c 2008 Antonio Carzaniga 1 Intro to distributed computing: -server computing Transport-layer
Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009
16 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009 1 25 Organization Welcome to the New Year! Reminder: Structure of Communication Systems lectures
Real-Time Communication Security: SSL/TLS. Guevara Noubir [email protected] CSU610
Real-Time Communication Security: SSL/TLS Guevara Noubir [email protected] CSU610 1 Some Issues with Real-time Communication Session key establishment Perfect Forward Secrecy Diffie-Hellman based PFS
Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1
Encryption, Data Integrity, Digital Certificates, and SSL Developed by Jerry Scott 2002 SSL Primer-1-1 Ideas Behind Encryption When information is transmitted across intranets or the Internet, others can
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
CSC 474 Information Systems Security
CSC 474 Information Systems Security Topic 4.5 Transport Layer Security CSC 474 Dr. Peng Ning 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally developed to secure http Version
CSC 774 -- Network Security
CSC 774 -- Network Security Topic 6: Transport Layer Security Dr. Peng Ning CSC 774 Network Security 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally developed to secure http Version
SSL Secure Socket Layer
??? SSL Secure Socket Layer - architecture and services - sessions and connections - SSL Record Protocol - SSL Handshake Protocol - key exchange alternatives - analysis of the SSL Record and Handshake
Managing and Securing Computer Networks. Guy Leduc. Chapter 4: Securing TCP. connections. connections. Chapter goals: security in practice:
Managing and Securing Computer Networks Guy Leduc Chapter 4: Securing TCP connections Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley, March 2012. (section
SSL A discussion of the Secure Socket Layer
www.harmonysecurity.com [email protected] SSL A discussion of the Secure Socket Layer By Stephen Fewer Contents 1 Introduction 2 2 Encryption Techniques 3 3 Protocol Overview 3 3.1 The SSL Record
WEB Security & SET. Outline. Web Security Considerations. Web Security Considerations. Secure Socket Layer (SSL) and Transport Layer Security (TLS)
Outline WEB Security & SET (Chapter 19 & Stalling Chapter 7) Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction (SET) Web Security Considerations
How To Understand And Understand The Ssl Protocol (Www.Slapl) And Its Security Features (Protocol)
WEB Security: Secure Socket Layer Cunsheng Ding HKUST, Hong Kong, CHINA C. Ding - COMP581 - L22 1 Outline of this Lecture Brief Information on SSL and TLS Secure Socket Layer (SSL) Transport Layer Security
Lecture 31 SSL. SSL: Secure Socket Layer. History SSL SSL. Security April 13, 2005
Lecture 31 Security April 13, 2005 Secure Sockets Layer (Netscape 1994) A Platform independent, application independent protocol to secure TCP based applications Currently the most popular internet crypto-protocol
mod_ssl Cryptographic Techniques
mod_ssl Overview Reference The nice thing about standards is that there are so many to choose from. And if you really don t like all the standards you just have to wait another year until the one arises
Security Engineering Part III Network Security. Security Protocols (I): SSL/TLS
Security Engineering Part III Network Security Security Protocols (I): SSL/TLS Juan E. Tapiador [email protected] Department of Computer Science, UC3M Security Engineering 4th year BSc in Computer Science,
SSL: Secure Socket Layer
SSL: Secure Socket Layer Steven M. Bellovin February 12, 2009 1 Choices in Key Exchange We have two basic ways to do key exchange, public key (with PKI or pki) or KDC Which is better? What are the properties
Network Security Web Security and SSL/TLS. Angelos Keromytis Columbia University
Network Security Web Security and SSL/TLS Angelos Keromytis Columbia University Web security issues Authentication (basic, digest) Cookies Access control via network address Multiple layers SHTTP SSL (TLS)
Secure Sockets Layer
SSL/TLS provides endpoint authentication and communications privacy over the Internet using cryptography. For web browsing, email, faxing, other data transmission. In typical use, only the server is authenticated
Secure Socket Layer. Security Threat Classifications
Secure Socket Layer 1 Security Threat Classifications One way to classify Web security threats in terms of the type of the threat: Passive threats Active threats Another way to classify Web security threats
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https
Outline. Transport Layer Security (TLS) Security Protocols (bmevihim132)
Security Protocols (bmevihim132) Dr. Levente Buttyán associate professor BME Híradástechnikai Tanszék Lab of Cryptography and System Security (CrySyS) [email protected], [email protected] Outline - architecture
Securing Your Apache Web Server With a Thawte Digital Certificate
Contents Securing Your Apache Web Server With a Thawte Digital Certificate 1. Overview 2. Research 3. System requirements 4. Generate your private key 5. Generate your Certificate Signing Request 6. Using
CS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Authenticity of Public Keys
SSL/TLS EJ Jung 10/18/10 Authenticity of Public Keys Bob s key? private key Bob public key Problem: How does know that the public key she received is really Bob s public key? Distribution of Public Keys!
Announcement. Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed.
Announcement Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed. 1 We have learned Symmetric encryption: DES, 3DES, AES,
SECURE SOCKETS LAYER (SSL)
INFS 766 Internet Security Protocols Lecture 5 SSL Prof. Ravi Sandhu SECURE SOCKETS LAYER (SSL) layered on top of TCP SSL versions 1.0, 2.0, 3.0, 3.1 Netscape protocol later refitted as IETF standard TLS
Software Engineering 4C03 Research Project. An Overview of Secure Transmission on the World Wide Web. Sean MacDonald 0043306
Software Engineering 4C03 Research Project An Overview of Secure Transmission on the World Wide Web Sean MacDonald 0043306 Tuesday April 5, 2005 Introduction Software Engineering 4C03 Research Project
Transport Layer Security Protocols
SSL/TLS 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally designed to by Netscape to secure HTTP Version 2 is being replaced by version 3 Subsequently became Internet Standard known
Secure Socket Layer. Carlo U. Nicola, SGI FHNW With extracts from publications of : William Stallings.
Secure Socket Layer Carlo U. Nicola, SGI FHNW With extracts from publications of : William Stallings. Abstraction: Crypto building blocks NS HS13 2 Abstraction: The secure channel 1., run a key-exchange
[SMO-SFO-ICO-PE-046-GU-
Presentation This module contains all the SSL definitions. See also the SSL Security Guidance Introduction The package SSL is a static library which implements an API to use the dynamic SSL library. It
Certificates and network security
Certificates and network security Tuomas Aura CSE-C3400 Information security Aalto University, autumn 2014 Outline X.509 certificates and PKI Network security basics: threats and goals Secure socket layer
Overview of SSL. Outline. CSC/ECE 574 Computer and Network Security. Reminder: What Layer? Protocols. SSL Architecture
OS Appl. CSC/ECE 574 Computer and Network Security Outline I. Overview II. The Record Protocol III. The Handshake and Other Protocols Topic 8.3 /TLS 1 2 Reminder: What Layer? Overview of 3 4 Protocols
Secure Socket Layer (SSL) and Transport Layer Security (TLS)
Secure Socket Layer (SSL) and Transport Layer Security (TLS) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available
SSL Protect your users, start with yourself
SSL Protect your users, start with yourself Kulsysmn 14 december 2006 Philip Brusten Overview Introduction Cryptographic algorithms Secure Socket Layer Certificate signing service
Cryptography and Network Security Sicurezza delle reti e dei sistemi informatici SSL/TSL
Cryptography and Network Security Sicurezza delle reti e dei sistemi informatici SSL/TSL Security architecture and protocol stack Applicat. (SHTTP) SSL/TLS TCP IPSEC IP Secure applications: PGP, SHTTP,
IBM i Version 7.3. Security Digital Certificate Manager IBM
IBM i Version 7.3 Security Digital Certificate Manager IBM IBM i Version 7.3 Security Digital Certificate Manager IBM Note Before using this information and the product it supports, read the information
Learning Network Security with SSL The OpenSSL Way
Learning Network Security with SSL The OpenSSL Way Shalendra Chhabra [email protected]. Computer Science and Enginering University of California, Riverside http://www.cs.ucr.edu/ schhabra Slides Available
Secure Socket Layer/ Transport Layer Security (SSL/TLS)
Secure Socket Layer/ Transport Layer Security (SSL/TLS) David Sánchez Universitat Pompeu Fabra World Wide Web (www) Client/server services running over the Internet or TCP/IP Intranets nets widely used
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
ISA 562 Information System Security
Outline ISA 562 Information System Security PKI SSL PKI SSL ISA 562 1 ISA 562 2 Motivation 1- Key Distribution Problem In a secret key cryptosystem, the secret key must be transmitted via a secure channel
Today s Topics SSL/TLS. Certification Authorities VPN. Server Certificates Client Certificates. Trust Registration Authorities
SSL/TLS Today s Topics Server Certificates Client Certificates Certification Authorities Trust Registration Authorities VPN IPSec Client tunnels LAN-to-LAN tunnels Secure Sockets Layer Secure Sockets Layer
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
Secure Socket Layer (SSL) and Trnasport Layer Security (TLS)
Secure Socket Layer (SSL) and Trnasport Layer Security (TLS) CSE598K/CSE545 - Advanced Network Security Prof. McDaniel - Spring 2008 1 SSL/TLS The Secure Socket Layer (SSL) and Transport Layer Security
Lecture 7: Transport Level Security SSL/TLS. Course Admin
Lecture 7: Transport Level Security SSL/TLS CS 336/536: Computer Network Security Fall 2014 Nitesh Saxena Adopted from previous lecture by Tony Barnard Course Admin HW/Lab 1 Graded; scores posted; to be
SSL/TLS. What Layer? History. SSL vs. IPsec. SSL Architecture. SSL Architecture. IT443 Network Security Administration Instructor: Bo Sheng
What Layer? /TLS IT443 Network Security Administration Instructor: Bo Sheng Application TCP IPSec IP LAN layer Application TCP IP LAN layer 1 2 History v2 proposed and deployed in Netscape 1.1 (1995) PCT
Security. Learning Objectives. This module will help you...
Security 5-1 Learning Objectives This module will help you... Understand the security infrastructure supported by JXTA Understand JXTA's use of TLS for end-to-end security 5-2 Highlights Desired security
SBClient SSL. Ehab AbuShmais
SBClient SSL Ehab AbuShmais Agenda SSL Background U2 SSL Support SBClient SSL 2 What Is SSL SSL (Secure Sockets Layer) Provides a secured channel between two communication endpoints Addresses all three
Introduction. Haroula Zouridaki Mohammed Bin Abdullah Waheed Qureshi
Introduction Haroula Zouridaki Mohammed Bin Abdullah Waheed Qureshi Introduction Comparing Secure Hypertext protocol (S-HTTP) to Secure Socket Layer (SSL) Agenda Waheed opens the presentation introduces
As enterprises conduct more and more
Efficiently handling SSL transactions is one cornerstone of your IT security infrastructure. Do you know how the protocol actually works? Wesley Chou Inside SSL: The Secure Sockets Layer Protocol Inside
SSL/TLS: The Ugly Truth
SSL/TLS: The Ugly Truth Examining the flaws in SSL/TLS protocols, and the use of certificate authorities. Adrian Hayter CNS Hut 3 Team [email protected] Contents Introduction to SSL/TLS Cryptography
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1
Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1 How the Web Works - HTTP Hypertext transfer protocol (http). Clients request documents (or scripts) through URL. Server response with documents. Documents
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
Key Management and Distribution
Key Management and Distribution Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering
Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:
Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security
UNIT 4 SECURITY PRACTICE Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security Slides Courtesy of William Stallings, Cryptography & Network Security,
Security Protocols and Infrastructures. h_da, Winter Term 2011/2012
Winter Term 2011/2012 Chapter 7: Transport Layer Security Protocol Key Questions Application context of TLS? Which security goals shall be achieved? Approaches? 2 Contents Overview Record Protocol Cipher
ERserver. iseries. Securing applications with SSL
ERserver iseries Securing applications with SSL ERserver iseries Securing applications with SSL Copyright International Business Machines Corporation 2000, 2001. All rights reserved. US Government Users
Transport Level Security
Transport Level Security Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
Secure Socket Layer (TLS) Carlo U. Nicola, SGI FHNW With extracts from publications of : William Stallings.
Secure Socket Layer (TLS) Carlo U. Nicola, SGI FHNW With extracts from publications of : William Stallings. Crypto building blocks AS HS13 2 Abstraction: The secure channel 1., run a key-exchange protocol
Protocol Rollback and Network Security
CSE 484 / CSE M 584 (Spring 2012) Protocol Rollback and Network Security Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee,
The Secure Sockets Layer (SSL)
Due to the fact that nearly all businesses have websites (as well as government agencies and individuals) a large enthusiasm exists for setting up facilities on the Web for electronic commerce. Of course
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Lecture 4: Transport Layer Security (secure Socket Layer)
Lecture 4: Transport Layer Security (secure Socket Layer) Recommended reading: Thomas, SSS and TLS essentials (old but very well written) SSL/TLS: layered view HTTP SMTP TCP/UDP IPsec Network layer security
Network Security Essentials Chapter 5
Network Security Essentials Chapter 5 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 5 Transport-Level Security Use your mentality Wake up to reality From the song, "I've Got
Building a Secure RedHat Apache Server HOWTO
Table of Contents Building a Secure RedHat Apache Server HOWTO...1 Richard Sigle, [email protected] 1. Purpose/Scope of this Guide...1 2. Introduction to Secure Sockets Layer/Private Key Infrastructure...1
ERserver. iseries. Secure Sockets Layer (SSL)
ERserver iseries Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) Copyright International Business Machines Corporation 2000, 2002. All rights reserved. US Government Users Restricted
Djigzo S/MIME setup guide
Author: Martijn Brinkers Table of Contents...1 Introduction...3 Quick setup...4 Create a CA...4 Fill in the form:...5 Add certificates for internal users...5 Add certificates for external recipients...7
HTTPS: Transport-Layer Security (TLS), aka Secure Sockets Layer (SSL)
CSCD27 Computer and Network Security HTTPS: Transport-Layer Security (TLS), aka Secure Sockets Layer (SSL) 11 SSL CSCD27 Computer and Network Security 1 CSCD27F Computer and Network Security 1 TLS (Transport-Layer
Managing SSL certificates in the ServerView Suite
Overview - English FUJITSU Software ServerView Suite Managing SSL certificates in the ServerView Suite Secure server management using SSL and PKI Edition September 2015 Comments Suggestions Corrections
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
Network Security Protocols
Network Security Protocols EE657 Parallel Processing Fall 2000 Peachawat Peachavanish Level of Implementation Internet Layer Security Ex. IP Security Protocol (IPSEC) Host-to-Host Basis, No Packets Discrimination
IT Networks & Security CERT Luncheon Series: Cryptography
IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI
Safety 1st Mobile Security. Markus Kopf payleven
Safety 1st Mobile Security Markus Kopf payleven Mobile Threat //
Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part III-b Contents Part III-b Secure Applications and Security Protocols Practical Security Measures Internet Security IPSEC, IKE SSL/TLS Virtual Private Networks Firewall Kerberos SET Security Measures
CSE/EE 461 Lecture 23
CSE/EE 461 Lecture 23 Network Security David Wetherall [email protected] Last Time Naming Application Presentation How do we name hosts etc.? Session Transport Network Domain Name System (DNS) Data
Cleaning Encrypted Traffic
Optenet Documentation Cleaning Encrypted Traffic Troubleshooting Guide iii Version History Doc Version Product Date Summary of Changes V6 OST-6.4.300 01/02/2015 English editing Optenet Documentation
3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol
Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Network Layer: IPSec Transport Layer: SSL/TLS Chapter 4: Security on the Application Layer Chapter 5: Security
Digital Certificates Demystified
Digital Certificates Demystified Alyson Comer IBM Corporation System SSL Development Endicott, NY Email: [email protected] February 7 th, 2013 Session 12534 (C) 2012, 2013 IBM Corporation Trademarks The
Securing your Online Data Transfer with SSL
Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4. What does
Apache Security with SSL Using Ubuntu
Apache Security with SSL Using Ubuntu These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Some SSL background
SSL Secure Socket Layer
??? SSL Secure Socket Layer - architecture and services - sessions and connections - SSL Record Protocol - SSL Handshake Protocol - key exchange alternatives - analysis of the SSL Record and Handshake
Apache, SSL and Digital Signatures Using FreeBSD
Apache, SSL and Digital Signatures Using FreeBSD AfNOG 2007 Unix System Administration April 26, 2007 Hervey Allen Network Startup Resource Center Some SSL background Invented by Netscape for secure commerce.
Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application INDEX 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4.
This section describes how to use SSL Certificates with SOA Gateway running on Linux.
This section describes how to use with SOA Gateway running on Linux. Setup Introduction Step 1: Set up your own CA Step 2: SOA Gateway Server key and certificate Server Configuration Setup To enable the
Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For
Secure Socket Layer Secure Socket Layer Introduction Overview of SSL What SSL is Useful For Introduction Secure Socket Layer (SSL) Industry-standard method for protecting web communications. - Data encryption
Savitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
Key Management and Distribution
and Distribution CSS322: Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 January 2011 CSS322Y10S2L12, Steve/Courses/CSS322/Lectures/key.tex,
Network Security Part II: Standards
Network Security Part II: Standards Raj Jain Washington University Saint Louis, MO 63131 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 18-1 Overview
Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999
Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer February 3, 1999 Frame Relay Frame Relay is an international standard for high-speed access to public wide area data networks
Information Security
SE 4472 / ECE 9064 Information Security Week 11: Transport Layer Security (TLS): Putting it all together Fall 2015 Prof. Aleksander Essex Security at the Transport Layer Where we started in this course:
Security Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
