The Need for a Usable TLS PKI

Size: px
Start display at page:

Download "The Need for a Usable TLS PKI"

Transcription

1 The Need for a Usable TLS PKI Matthew Smith Usable Security and Privacy Lab, Universität Bonn

2 SSL / TLS / HTTPS / CA PKIs The TLS protocol family is a set of cryptographic protocols used to secure Internet traffic They are mainly used in combination with Certificate Authorities based PKIs to validate the public keys of entities Seite 2

3 CAs in the news Prof. Dr. Matthew Smith Seite 3

4 CAs in the news Trustwave to escape 'death penalty' for SSL skeleton key Moz likely to spare certificate-confession biz same fate as DigiNotar 14th February 2012 Firefox 'death sentence' threat to TeliaSonera over government spy claims Mozilla may snub telecom giant's new SSL certs 16th April 2013 Seite 4

5 Heartbleed XKCD Comic Seite 5

6 SSL CCS Injection Vulnerability Masashi Kikuchi of Lepidum CVE OpenSSL s ChangeCipherSpec processing has a serious vulnerability OpenSSL through 1.0.1g OpenSSL through 1.0.0l all versions before OpenSSL 0.9.8y Attackers can eavesdrop and modify communication Attackers can hijack a authenticated session Usable Security and Privacy Lab Universität Bonn Seite 6

7 Complexity is the worst enemy of security The SSL Family SSL 1.0, 2.0 and 3.0 TLS 1.0 TLS 1.1 TLS 1.2 TLS 1.3 (draft) See the Oakland Paper by Beurdouche et al. A Messy State of the Union: Taming the Composite State Machines of TLS Seite 7

8 Other PKIs are also in trouble Seite 8

9 Problems with CAs (whom do we trust?) Approximately trusted root CAs in Firefox, Chrome, IE Explorer, Windows, Mac OS, Linux Extended to ~400 via CA hierarchies 34% never used! 14) HTTPS only as strong as the weakest link Targeted attacks against CAs - a real world threat as Comodo and Diginotar have shown No scopes NSA/China/BND can sign certificates for any domain they wants For more details see our FC paper: You Won't Be Needing These Any More Seite 9

10 Seite 10

11 HTTPS Indicators Seite 11

12 Would you trust? Usable Security and Privacy Lab Universität Bonn Seite 12

13 Would you trust? Usable Security and Privacy Lab Universität Bonn Seite 13

14 Firefox 2 Warning FF2 Warning CyLab Usable Privacy and Security Laboratory 3 Seite 14

15 FF2 Warning What users actually see Adapted from Jonathan Nightingale CyLab Usable Privacy and Security Laboratory 4 Seite 15

16 Seite 16

17 Usable Security Three seminal papers are seen as the origin of Usable Security and Privacy research* Zurko and Simon s: User-Centered Security Adams and Sasse s: Users Are Not the Enemy Whitten and Tygar s Why Johnny Can t Encrypt: A Usability Evaluation of PGP 5.0 All argued that users should not be seen as a problem to be dealt with, but that security experts need to communicate more with users, and adopt user-centered design approaches. * Garfinkel et al. Usable Security, History, Themes, and Challenges, 2014 Seite 17

18 USEC Evaluation Techniques Evaluating Without Users Literature Review Cognitive Walkthrough Heuristic Evaluation Model-Based Evaluation Evaluating With Users Qualitative Conceptual Model Extraction Silent Observation Think Aloud Constructive Interaction Retrospective Testing Interviews Quantitative Controlled Experiments Questionnaires Prof. Smith - Fraunhofer FKIE Seite 18

19 Chapter 1: End-users Seite 19

20 HTTPS Part 1: Security Indicators Seite 20

21 Microsoft IE HTTPS Indicators (old) Mozilla Firefox Safari Seite 21

22 The Emperor s New Security Indicators An evaluation of website authentication and the effect of role playing on usability studies (2007) Seite 22

23 Study Results All participants entered their passwords after HTTPS indicators were removed, including all 27 who were using their own account credentials. Seite 23

24 HTTPS Indicators (newer) Made more visible Security signals Green = all is well But things s<ll change on a regular basis Effec<veness s<ll isn t great Seite 24

25 Android HTTPS Security Indicators Mobile browsers validate TLS cer<ficates correctly display security indicators...and warn the user if something goes wrong Usable Security and Privacy Lab Universität Bonn Seite 25

26 Online Survey To see if users know whether they are surfing on an HTTPS protected website half of the par<cipants got the survey via HTTP the other half via HTTPS exit survey asked whether their connec<on was protected or not To find out if users understood the Browser s warning messages and warn the user if something goes wrong. presented an SSL warning message Usable Security and Privacy Lab Universität Bonn Seite 26

27 ~50% had not seen an SSL warning message on their phone before. Online Survey - Results 745 par<cipants 47.5% of non- IT experts believed they were using a secure Internet connec<on although it was plain HTTP even 34.7% of par<cipants with prior IT educa<on thought this The risk users were warned against was rated with 2.86 (sd=.94) on a scale between 1 and 5 Many par<cipants stated they did not care about warning messages at all. Usable Security and Privacy Lab Universität Bonn Seite 27

28 HTTPS Part 2: Security Warnings Seite 28

29 Crying Wolf: An Empirical Study of SSL Warning Effectiveness (2009) Seite 29

30 Lab Study All recruits were given an online screening survey, and only online banking customers of the one specific bank were allowed to participate. 100 participants CMU students Recruited by fliers, s, and participant list 5 Randomly-assigned conditions: FF2, FF3, IE7, Single page custom warning multi-page custom warning Seite 30

31 Library vs. Bank Library vs Bank Results Ignored Warning 100% 80% 60% 40% 20% Bank Library 0% FF2 FF3 IE7 1-page Multipage In native warning conditions, no significant difference in In native warning conditions, no significant difference in reactions reactions at at library and bank bank In new warning conditions, users more likely to heed warnings at bank than at library In new warning conditions, users more likely to heed warnings at bank than at library Seite 31

32 Newer HTTPS Warnings Seite 32

33 Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness (2013) Seite 33

34 Real World Analysis Studied the click-through rate for malware and HTTPS warnings Malware Firefox 7.2% Chrome 23.2% Phishing Firefox 9.1% Chrome 18.0% HTTPS Firefox 33.0% Chrome 70.2% Seite 34

35 Participatory Design for Security-Related User Interfaces (2015) Seite 35

36 Participatory Design Small groups: Analysing existing HTTPS warnings and problems to find alternative representation 15 participants (aged 22-35, 8 female) in five workshops 1. IT(male) (pilot), 2. IT (female), 3. IT (mixed), 4. Lawyers 5. Mixed (Physicist, Musician,...) Designer as neutral supporter 1. Explanation on technical background (Shared Language) and Brainstorming 2. Creating new designs (Mock-Ups) 3. Ending (Feedback) Seite 36

37 Brainstorming Results All groups mentioned quite similar usability aspects: Text too long and unclear Technical details unnecessary for non-experts Use of colours for recommendations and graphics for explanations helpful Capability to take action should be provided Quotes: This is censorship! A reaction to hard-fail warnings/errors I feel like a slave Security measures mostly protect the device instead of the user Task: Design a better warning! Seite 37

38 IT(male), IT (female), IT (mixed), Lawyers, Mixed Seite 38

39 Quote of the day Guys, look, we are actually doing what we criticized before! Seite 39

40 Here's My Cert, So Trust Me, Maybe? Understanding TLS Errors on the Web (2013) Seite 40

41 Real World Analysis Studied TLS activity of more than 300,000 users collected certificates passively at egress points of ten network sites over a nine-month period validated certificate chains using browser logic locally 98,46% of the filtered connections validate correctly, implying a false warning rate of 1,54% In a scenario with a hypothetical MITMA chance of 1 in connections would produce warnings out of which would be false warnings Seite 41

42 Conclusion By measuring the prevalence of different types of false warnings, we provide a framework for browsers to re-evaluate their current warning mechanisms and conserve user attention. Akhawe et al. Seite 42

43 to 1 We found the attack! Image adapted from Bob Englehart Seite 43

44 PKI problems go deeper than the end-user End-users are only a small part of the TLS ecosystem Administrators are responsible for (mis)configuration webservers Developers are responsible for (mis)using TLS in their applications System architects and developers are responsible for designing error-prone systems Seite 44

45 Chapter 2: Administrators Seite 45

46 Scope of the problem We used HTTPS certificates collected by Google's web-crawler Period of 12 months ~55.7 million different hosts ~4,49 million different X.509 certificates We extracted all certificates that did not validate correctly based on the Firefox browser logic Seite 46

47 Common: Blaming Administrators It s all the administrators fault! Seite 47

48 Administrators are not the enemy! Seite 48

49 Find out where the problems lie ~4,49 million bad certificates We picked a random sample of 50,000 Pruned non-current certs down to 46,145 And contacted the administrators We sent 40,473 s to [email protected] and 5,672 to addresses embedded in the certs. Of the 46,145 s we sent 37,596 could not be delivered to the intended recipient, leaving us with 8,549 successfully delivered surveys 755 complete responses to our survey (~8%) Seite 49

50 Find out where the problems lie Reasons given in survey ~21% sub-domains/virtual hosts/ redirects ~16% to difficult ~16% for a small group of users ~7% NSA, PRISM & co. ~5% untrusted CA ~3% default configuration ~2% mistake Risk perception ~70% very small ~3% very high ~11% didn t know there were warnings Seite 50

51 Administrators wish list Lower Price for CA-signed certificates Price is perceived too high for little effort on the CA s side Free CA-signed certificates Cheaper wildcard certificates Allow CACert More trust in CACert s web of trust model Better Support for Non-Validating Certificates Support for trust-on-first-use, Pinning, TACK Better Tool Support OpenSSL command line tool too complicated Server configuration cumbersome, especially for v-hosts Auto-Update Reminder Notification of problems More details can be found in our ASIA CCS 14 paper: Why eve and mallory (also) love webmasters Seite 51

52 CA Financial Estimates 2013 VeriSign Class 3 Secure Server CA - G $1, EV-SSL Pro $33,258, VeriSign Class 3 International Server CA - G $1, EV-SSL Pro $20,833, VeriSign Class 3 Extended Validation SSL SGC CA $ EV-SSL $9,085, VeriSign Class 3 Secure Server CA - G $1, EV-SSL Pro $2,510, VeriSign International Server CA - Class $1, EV-SSL Pro $2,157, VeriSign Class 3 Extended Validation SSL CA 4681 $ EV-SSL $4,189, VeriSign Class 3 Secure Server 1024-bit CA - G2 628 $1, EV-SSL Pro $815, VeriSign Class 3 Secure Server CA - T1 82 $1, EV-SSL Pro $106, VeriSign Class 3 Extended Validation CA - T1 33 $ EV-SSL $29, $72,986, COMODO High-Assurance Secure Server CA $99.95 SSL $1,687, PositiveSSL CA $99.95 SSL $1,550, COMODO Extended Validation Secure Server CA 2774 $ EV-SSL $1,245, COMODO SSL CA 2248 $99.95 SSL $224, COMODO High Assurance Secure Server CA 880 $99.95 SSL $87, COMODO Extended Validation Secure Server CA $ EV-SSL $79, $4,876, Trustwave Organization Validation CA, Level $ SSL $126, Trustwave Domain Validation CA, Level $ SSL $29, $155, Prof. Dr. Matthew Smith Seite 52

53 Chapter 3: Developers Seite 53

54 Trust me I m an Engineer Seite 54

55 HTTPS Usage on Android The default Android HTTPS API implements correct cer<ficate valida<on. What could possibly go wrong? Seite 55

56 HTTPS Usage on Android and ios A server needs a certificate that was signed by a trusted Certificate Authority (~130 pre-installed CAs) For non-trusted certificates a custom workaround is needed Error handling requires custom code Additional security measures such as pinning or Certificate Transparency require custom code Seite 56

57 It does go wrong... Q: I am getting an error of javax.net.ssl.sslexception: Not trusted server certificate. [...] I have spent 40 hours researching and trying to figure out a workaround for this issue. A: Look at this tutorial stackoverflow.com Seite 57

58 SSL Sta<c Code Analysis Analysis of 13,500 popular, free apps from Google s Play Market 92.8 % of the apps use the Internet permission 91.7 % of networking API calls are HTTP(S) related 0.8 % exclusively HTTPS URLs 46.2 % mix HTTP and HTTPS % of all apps that use HTTPS include code that fails in SSL cer<ficate valida<on 1070 include cri<cal code 790 accept all cer<ficates 284 accept all hostnames Seite 58

59 Manual App Tes<ng Results Cherry- picked 100 apps 21 apps trust all cer<ficates 20 apps accept all hostnames These 41 apps had an install-base of million! Captured creden<als for: American Express, Diners Club, Paypal, bank accounts, Facebook, Twieer, Google, Yahoo, Microsog Live ID, Box, WordPress, remote control servers, arbitrary accounts, and IBM Same<me, among others. More details can be found in our CCS paper: Why eve and mallove love Android Seite 59

60 Trusting all Certificates Correct HTTPS certificate validation is easy just don t do anything... What some Apps do: Seite 60

61 TrustManager Implementa<ons 22 different TrustManager implementa<ons NonValidatingTrustManager FakeTrustManager EasyX509TrustManager NaiveTrustManager TrustManager DummyTrustManager SimpleTrustManager AcceptAllTrustManager OpenTrustManager and all turn effec<ve cer<ficate valida<on off Seite 61

62 An<- Virus Example ZonerAV An<- Virus app for Android Awarded best free an<- virus app for Android by av- test.org Virus signature updates via HTTPS GET The good thing: It uses TLS Unfortunately: The wrong way static&final!hostnameverifier!do_not_verify!=!new!hostnameverifier()!!!! {!!!!!!! public&boolean!verify(string!paramstring,!sslsession!paramsslsession)!!!!!!! {!!!!!!!!!!!!!return&true;!!!!!!! }!! Zoner AV };! Seite 62

63 An<- Virus example Zoner fixed the bug immediately! Seite 63

64 How Do (Good) Apps React to MITMAs? Technically they do not endanger the user However they suffer from serious usability problems Flickr Facebook Seite 64

65 Common: Blaming Developers It s all the developers fault! Seite 65

66 Developers are not the enemy! Seite 66

67 Talking To Developers Finding broken HTTPS in Android and ios apps is good knowing what the root causes are is even beeer We contacted 80 developers of broken apps informed them offered further assistance asked them for an interview 15 developers agreed? Seite 67

68 Novice Developers This app was one of our first mobile apps and when we noticed that there were problems with the SSL certificate, we just implemented the first working solution we found on the Internet. Seite 68

69 Intermediate Developers We use self-signed certificates for testing purposes and the easiest way to make them working is to remove certificate validation. Somehow we must have forgotten to remove that code again when we released our app. Seite 69

70 Expert Developers (kind of...) [...] When I used Wireshark to look at the traffic, Wireshark said that this is a proper SSL protected data stream and I could not see any cleartext information when I manually inspected the packets. So I really cannot see what the problem is here. Seite 70

71 Expert Developers (time constrained) The app accepts all SSL certificates because some users wanted to connect to their blogs with self-signed certs and [ ] because Android does not provide an easy-to-use SSL certificate warning message, it was a lot easier to simply accept all self-signed certificates. vs. Seite 71

72 Developer Survey Summary Self-Signed Certificates Development. Developers commonly wish to use self-signed certificates for testing purposes and hence want to turn off certificate validation during testing. Self-Signed Certificates Production. A few developers wanted to use self-signed certificates in their production app for cost, effort and customer satisfaction reasons. Code Complexity. Developers described the code-level customization features of HTTPS as too complex and requiring too much effort. Certificate Pinning / Trusted Roots. Developers liked the idea of having an easy way to limit the number of trusted certificates and/or certificate authorities. Global Warning Message. Developers requested global HTTPS warning messages since they described building their own warning messages as too challenging. Seite 72

73 A new approach to TLS = custom code required; P = pluggable. Our modifications Existing architecture Central TLS service for Android Force TLS validation Supports self-signed certificates Certificate Pinning Standardised user interaction Alternate Cert validation strategies Force hostname verification Force certificate validation; Configurable by the users android.net.ssl TrustManagerClient (in app) uses replaced by org.apache.http.conn.ssl SSLSocketFactory uses javax.net.ssl TrustManager removed start HTTPS now secure on Android Backwards compatible, except apps that implemented pinning (19 in tested Android apps) updating them to the new pinning sytem is very easy android.net.ssl TrustManagerService (in system) Pluggable Certificate Validation: (CA-based validation, CT, AKI, TACK, etc.) Turn on/o SSLPinning, Accept all certificates on developer devices configures User options Developer options decisions warn if SSL validation fails Warn the user if connection is insecure Human Computer Interface Figure 1: This figure illustrates the process of creating an appified an SSLworld protected network connection. The Seite grey More details can be found in our CSS paper: Rethinking ssl development in 73

74 Chapter 4: System Design Seite 74

75 Problems with CAs (whom do we trust?) Approximately trusted root CAs in Firefox, Chrome, IE Explorer, Windows, Mac OS, Linux Extended to ~400 via CA hierarchies HTTPS only as strong as the weakest link Targeted attacks against CAs - a real world threat Everybody screws up End-users Administrators Developers System Designers? For more details see our FC paper: You Won't Be Needing These Any More Seite 75

76 We need more usable PKIs Up-and-coming PKIs DANE (probably doomed) Certificate Transparency (Google) ARPKI (Perrig et al.) All promise better security All add components (and complexity?) How will developers cope? How will administrators cope? How will users cope? Seite 76

77 Frontiers of USEC Research Studies Current USEC Researcher PKI Usability Research All layers of a PKI must be usable! End Users Administrators Deploy Create Use Software Software Software Software Software Software Software Software Software Systems System Endangers Endangers Developer Frontiers of Usable Security Matthew Smith, University of Bonn & Research Center L3S Seite 77

78 USEC Evaluation Techniques Evaluating Without Users Literature Review Cognitive Walkthrough Heuristic Evaluation Model-Based Evaluation Evaluating With Users Qualitative Conceptual Model Extraction Silent Observation Think Aloud Constructive Interaction Retrospective Testing Interviews Quantitative Controlled Experiments Questionnaires Prof. Smith - Fraunhofer FKIE Seite 78

79 10 Rules for a good Crypto API? Smith & USENIX Hotsec Easy to learn, even without crypto background 2. Easy to use, even without documentation 3. Hard to misuse. Incorrect use should lead to visible errors 4. Hard to circumvent errors except during testing/development 5. Easy to read and maintain code that uses it 6. Sufficiently powerful to satisfy (non-security) requirements 7. Easy to extend Hard to change/override core functionality 8. Appropriate to audience this means people with no crypto experience 9. Assist with/handle end-user interaction conduct developer studies 10. However, where possible integrate into standard APIs so normal developers never have to interact with crypto APIs in the first place Prof. Smith - Fraunhofer FKIE Seite 79

80 End-user PKI Experts are not the Enemy either! Seite 80

Why Eve and Mallory Love Android An Analysis of Android SSL (In)Security

Why Eve and Mallory Love Android An Analysis of Android SSL (In)Security Why Eve and Mallory Love Android An Analysis of Android SSL (In)Security Sascha Fahl Marian Harbach Thomas Muders Lars Baumgärtner Bernd Freisleben Ma:hew Smith Some Android Facts 330 million devices (as

More information

Sascha Fahl, Marian Harbach, Matthew Smith. Usable Security and Privacy Lab Leibniz Universität Hannover

Sascha Fahl, Marian Harbach, Matthew Smith. Usable Security and Privacy Lab Leibniz Universität Hannover Hunting Down Broken SSL in Android Apps Sascha Fahl, Marian Harbach, Matthew Smith Usable Security and Privacy Lab Leibniz Universität Hannover OWASP AppSec 2013 Seite 1 Appification There s an App for

More information

Why Eve and Mallory Love Android An Analysis of Android SSL (In)Security

Why Eve and Mallory Love Android An Analysis of Android SSL (In)Security Why Eve and Mallory Love Android An Analysis of Android SSL (In)Security Sascha Fahl Marian Harbach Thomas Muders Lars Baumgärtner Bernd Freisleben Matthew Smith Some Android Facts 330 million devices

More information

SSL and Browsers: The Pillars of Broken Security

SSL and Browsers: The Pillars of Broken Security SSL and Browsers: The Pillars of Broken Security Ivan Ristic Wolfgang Kandek Qualys, Inc. Session ID: TECH-403 Session Classification: Intermediate SSL, TLS, And PKI SSL (or TLS, if you prefer) is the

More information

Is Your SSL Website and Mobile App Really Secure?

Is Your SSL Website and Mobile App Really Secure? Is Your SSL Website and Mobile App Really Secure? Agenda What is SSL / TLS SSL Vulnerabilities PC/Server Mobile Advice to the Public Hong Kong Computer Emergency Response Team Coordination Centre 香 港 電

More information

SSL implementieren aber sicher!

SSL implementieren aber sicher! SSL implementieren aber sicher! Karlsruher Entwicklertag 2014 21.05.2014 Dr. Yun Ding SSL in the news 2011 2012 2013 2014 BEAST CRIME Lucky 13 Compromised CAs RC4 biases BREACH DRBG Backdoor Apple goto

More information

SSL/TLS: The Ugly Truth

SSL/TLS: The Ugly Truth SSL/TLS: The Ugly Truth Examining the flaws in SSL/TLS protocols, and the use of certificate authorities. Adrian Hayter CNS Hut 3 Team [email protected] Contents Introduction to SSL/TLS Cryptography

More information

Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience

Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Applied Technology Abstract The Web-based approach to system management taken by EMC Unisphere

More information

Best Practice Guide (SSL Implementation) for Mobile App Development 最 佳 行 事 指 引. Jointly published by. Publication version 1.

Best Practice Guide (SSL Implementation) for Mobile App Development 最 佳 行 事 指 引. Jointly published by. Publication version 1. Best Practice Guide (SSL Implementation) for Mobile App Development 流 動 應 用 程 式 (SSL 實 施 ) 最 佳 行 事 指 引 香 港 電 腦 事 故 協 調 中 心 ] Jointly published by [ 專 業 資 訊 保 安 協 會 ] Hong Kong Computer Emergency Response

More information

ALTERNATIVES TO CERTIFICATION AUTHORITIES FOR A SECURE WEB

ALTERNATIVES TO CERTIFICATION AUTHORITIES FOR A SECURE WEB ALTERNATIVES TO CERTIFICATION AUTHORITIES FOR A SECURE WEB Scott Rea DigiCert, Inc. Session ID: SEC-T02 Session Classification: Intermediate BACKGROUND: WHAT IS A CERTIFICATION AUTHORITY? What is a certification

More information

SSL BEST PRACTICES OVERVIEW

SSL BEST PRACTICES OVERVIEW SSL BEST PRACTICES OVERVIEW THESE PROBLEMS ARE PERVASIVE 77.9% 5.2% 19.2% 42.3% 77.9% of sites are HTTP 5.2% have an incomplete chain 19.2% support weak/insecure cipher suites 42.3% support SSL 3.0 83.1%

More information

SSL: Paved With Good Intentions. Richard Moore [email protected]

SSL: Paved With Good Intentions. Richard Moore rich@westpoint.ltd.uk SSL: Paved With Good Intentions Richard Moore [email protected] Why do we need SSL? Privacy Online shopping Online banking Identity Protection Data Integrity Early SSL First public version was SSLv2

More information

AndroSSL: A Platform to Test Android Applications Connection Security

AndroSSL: A Platform to Test Android Applications Connection Security AndroSSL: A Platform to Test Android Applications Connection Security François Gagnon, Marc-Antoine Ferland, Marc-Antoine Fortier, Simon Desloges, Jonathan Ouellet, and Catherine Boileau Cybersecurity

More information

Why Johnny Can't Encrypt: A Usability Study of PGP

Why Johnny Can't Encrypt: A Usability Study of PGP Why Johnny Can't Encrypt: A Usability Study of PGP Jan Sousedek Technische Universität Berlin, Germany Erasmus program Summer semester 2008 Seminar: Internet Security [email protected] Abstract Interfaces

More information

Project X Mass interception of encrypted connections

Project X Mass interception of encrypted connections Project X Mass interception of encrypted connections What? SSL/TLS interception TOR interception ...a thorny path Common Issues Public Key Pinning avoids rogue CA to sign certs Common Issues Google and

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

The Savage Curtain: Mobile SSL Failures

The Savage Curtain: Mobile SSL Failures The Savage Curtain: Mobile SSL Failures Who are these guys? Tony Trummer - Staff Security Engineer aka SecBro Tushar Dalvi - Sr. Security Engineer & Pool Hustler A Private Little War Our employer generally

More information

HTTPS Inspection with Cisco CWS

HTTPS Inspection with Cisco CWS White Paper HTTPS Inspection with Cisco CWS What is HTTPS? Hyper Text Transfer Protocol Secure (HTTPS) is a secure version of the Hyper Text Transfer Protocol (HTTP). It is a combination of HTTP and a

More information

A Proper Foundation: Extended Validation SSL

A Proper Foundation: Extended Validation SSL A Proper Foundation: Extended Validation SSL A critical model for SSL digital certificates and browser trust Get this White Paper Entrust, Inc. All Rights Reserved. 1 1 Contents Context of Internet Security...

More information

ARPKI: Attack Resilient Public-Key Infrastructure

ARPKI: Attack Resilient Public-Key Infrastructure ARPKI: Attack Resilient Public-Key Infrastructure David Basin, Cas Cremers, Tiffany Hyun-Jin Kim, Adrian Perrig, Ralf Sasse, Pawel Szalachowski ETH Zurich, University of Oxford, CMU 1 PUBLIC KEYS AND CERTIFICATES

More information

Securing End-to-End Internet communications using DANE protocol

Securing End-to-End Internet communications using DANE protocol Securing End-to-End Internet communications using DANE protocol Today, the Internet is used by nearly.5 billion people to communicate, provide/get information. When the communication involves sensitive

More information

Cleaning Encrypted Traffic

Cleaning Encrypted Traffic Optenet Documentation Cleaning Encrypted Traffic Troubleshooting Guide iii Version History Doc Version Product Date Summary of Changes V6 OST-6.4.300 01/02/2015 English editing Optenet Documentation

More information

Analysis of the HTTPS Certificate Ecosystem

Analysis of the HTTPS Certificate Ecosystem Analysis of the HTTPS Certificate Ecosystem, James Kasten, Michael Bailey, J. Alex Halderman University of Michigan HTTPS and TLS How does HTTPS and the CA ecosystem fit into our daily lives? Nearly all

More information

Implementation Vulnerabilities in SSL/TLS

Implementation Vulnerabilities in SSL/TLS Implementation Vulnerabilities in SSL/TLS Marián Novotný [email protected] ESET, spol. s r.o. Bratislava, Slovak Republic Abstract SSL/TLS protocol has become a standard way for establishing a secure communication

More information

EECE 412, TERM PROJECT, DECEMBER 2009 1. EECE 412 Term Project: A Study on SSL Warning Effectiveness

EECE 412, TERM PROJECT, DECEMBER 2009 1. EECE 412 Term Project: A Study on SSL Warning Effectiveness EECE 412, TERM PROJECT, DECEMBER 2009 1 EECE 412 Term Project: A Study on SSL Warning Effectiveness Ildar Muslukhov Andreas Sotirakopoulos Levi Stoddard [email protected] [email protected] [email protected]

More information

More on SHA-1 deprecation:

More on SHA-1 deprecation: Dear PTC Axeda Customer, This message specifies Axeda and IDM Agent upgrade requirements and timelines for transitioning Axeda Enterprise Server, Global Access Server (GAS), Policy Server, and Questra

More information

Topics in Network Security

Topics in Network Security Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure

More information

A Study of What Really Breaks SSL HITB Amsterdam 2011

A Study of What Really Breaks SSL HITB Amsterdam 2011 A Study of What Really Breaks SSL HITB Amsterdam 2011 v1.0 Ivan Ristic Michael Small 20 May 2011 Agenda 1. State of SSL 2. Quick intro to SSL Labs 3. SSL Configuration Surveys 4. Survey of Actual SSL Usage

More information

What s Your HTTPS Grade? A Case Study of HTTPS/SSL at Mid Michigan Community College. Brandon Kish @kishba [email protected]

What s Your HTTPS Grade? A Case Study of HTTPS/SSL at Mid Michigan Community College. Brandon Kish @kishba bkish@midmich.edu What s Your HTTPS Grade? A Case Study of HTTPS/SSL at Mid Michigan Community College Brandon Kish @kishba [email protected] About Me Director of Programming Mid Michigan Community College ~4,500 students

More information

Integrated SSL Scanning

Integrated SSL Scanning Software Version 9.0 Copyright Copyright 1996-2008. Finjan Software Inc. and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included in this publication are the exclusive

More information

You Won t Be Needing These Any More: On Removing Unused Certificates From Trust Stores

You Won t Be Needing These Any More: On Removing Unused Certificates From Trust Stores You Won t Be Needing These Any More: On Removing Unused Certificates From Trust Stores Henning Perl 1, Sascha Fahl 1, and Matthew Smith 2 1 Leibniz University Hannover, Germany, {perl, fahl}@dcsec.uni-hannover.de

More information

CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security

CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by

More information

Secure Web Appliance. SSL Intercept

Secure Web Appliance. SSL Intercept Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...

More information

Certificates and network security

Certificates and network security Certificates and network security Tuomas Aura CSE-C3400 Information security Aalto University, autumn 2014 Outline X.509 certificates and PKI Network security basics: threats and goals Secure socket layer

More information

Lesson 10: Attacks to the SSL Protocol

Lesson 10: Attacks to the SSL Protocol Lesson 10: Attacks to the SSL Protocol Luciano Bello - [email protected] Chalmers University Dr. Alfonso Muñoz - [email protected] T>SIC Group. Universidad Politécnica de Madrid Security of the SSL

More information

What in the heck am I getting myself into! Capitalware's MQ Technical Conference v2.0.1.5

What in the heck am I getting myself into! Capitalware's MQ Technical Conference v2.0.1.5 SSL Certificate Management or What in the heck am I getting myself into! Table of Contents What is SSL and TLS? What do SSL and TLS do (and not do)? Keystore and Certificate Lifecycle Certificates Certificate

More information

Extended SSL Certificates

Extended SSL Certificates Introduction Widespread usage of internet has led to the growth of awareness amongst users, who now associate green address bar with security. Though people are able to recognize the green bar, there is

More information

Workday Mobile Security FAQ

Workday Mobile Security FAQ Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy

More information

How to configure SSL proxying in Zorp 3 F5

How to configure SSL proxying in Zorp 3 F5 How to configure SSL proxying in Zorp 3 F5 June 14, 2013 This tutorial describes how to configure Zorp to proxy SSL traffic Copyright 1996-2013 BalaBit IT Security Ltd. Table of Contents 1. Preface...

More information

SBClient SSL. Ehab AbuShmais

SBClient SSL. Ehab AbuShmais SBClient SSL Ehab AbuShmais Agenda SSL Background U2 SSL Support SBClient SSL 2 What Is SSL SSL (Secure Sockets Layer) Provides a secured channel between two communication endpoints Addresses all three

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

SSL Considerations for CAS: Planning, Management, and Troubleshooting. Marvin Addison Middleware Services Virginia Tech October 13, 2010

SSL Considerations for CAS: Planning, Management, and Troubleshooting. Marvin Addison Middleware Services Virginia Tech October 13, 2010 SSL Considerations for CAS: Planning, Management, and Troubleshooting Marvin Addison Middleware Services Virginia Tech October 13, 2010 Agenda Planning and deployment considerations Discussion of Java

More information

How to configure SSL proxying in Zorp 6

How to configure SSL proxying in Zorp 6 How to configure SSL proxying in Zorp 6 April 17, 2015 Abstract This tutorial describes how to configure Zorp to proxy SSL traffic Copyright 1996-2015 BalaBit IT Security Ltd. Table of Contents 1. Preface...

More information

LBSEC. http://www.liveboxcloud.com

LBSEC. http://www.liveboxcloud.com 2014 LBSEC http://www.liveboxcloud.com LiveBox Srl does not release declarations or guarantee regarding this documentation and its use and declines any expressed or implied commercial or suitability guarantee

More information

Basics of SSL Certification

Basics of SSL Certification Introduction To secure transmission of information from browser to a web server, a security protocol is used. SSL (Secure Socket Lock) is one of the most popular and widely accepted security protocols,

More information

PowerChute TM Network Shutdown Security Features & Deployment

PowerChute TM Network Shutdown Security Features & Deployment PowerChute TM Network Shutdown Security Features & Deployment By David Grehan, Sarah Jane Hannon ABSTRACT PowerChute TM Network Shutdown (PowerChute) software works in conjunction with the UPS Network

More information

SSL Server Rating Guide

SSL Server Rating Guide SSL Server Rating Guide version 2009j (20 May 2015) Copyright 2009-2015 Qualys SSL Labs (www.ssllabs.com) Abstract The Secure Sockets Layer (SSL) protocol is a standard for encrypted network communication.

More information

SSL Interception Proxies. Jeff Jarmoc Sr. Security Researcher Dell SecureWorks. and Transitive Trust

SSL Interception Proxies. Jeff Jarmoc Sr. Security Researcher Dell SecureWorks. and Transitive Trust SSL Interception Proxies Jeff Jarmoc Sr. Security Researcher Dell SecureWorks and Transitive Trust About this talk History & brief overview of SSL/TLS Interception proxies How and Why Risks introduced

More information

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org

More information

Apache Security with SSL Using Ubuntu

Apache Security with SSL Using Ubuntu Apache Security with SSL Using Ubuntu These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Some SSL background

More information

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

CS 356 Lecture 27 Internet Security Protocols. Spring 2013 CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

How To Secure A Website With A Password Protected Login Process (Www.Siphone)

How To Secure A Website With A Password Protected Login Process (Www.Siphone) Preventing Spoofing, Phishing and Spamming by Secure Usability and Cryptography ICDCS 07/07/2006 Amir Herzberg Computer Science Department, Bar Ilan University http://amirherzberg.com 04/05/06 http://amirherzberg.com

More information

Configuration Guide for RFMS 3.0 Initial Configuration. WiNG 5 How-To Guide. Digital Certificates. July 2011 Revision 1.0

Configuration Guide for RFMS 3.0 Initial Configuration. WiNG 5 How-To Guide. Digital Certificates. July 2011 Revision 1.0 Configuration Guide for RFMS 3.0 Initial Configuration XXX-XXXXXX-XX WiNG 5 How-To Guide Digital Certificates July 2011 Revision 1.0 MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark

More information

SSL Report: ebfl.srpskabanka.rs (91.240.6.48)

SSL Report: ebfl.srpskabanka.rs (91.240.6.48) Home Projects Qualys.com Contact You are here: Home > Projects > SSL Server Test > SSL Report: (91.240.6.48) Assessed on: Sun, 03 Jan 2016 15:46:07 UTC HIDDEN Clear cache Scan Another» Summary Overall

More information

CSC574 - Computer and Network Security Module: Public Key Infrastructure

CSC574 - Computer and Network Security Module: Public Key Infrastructure CSC574 - Computer and Network Security Module: Public Key Infrastructure Prof. William Enck Spring 2013 1 Meeting Someone New Anywhere in the Internet 2 What is a certificate? A certificate makes an association

More information

M86 Web Filter USER GUIDE for M86 Mobile Security Client. Software Version: 5.0.00 Document Version: 02.01.12

M86 Web Filter USER GUIDE for M86 Mobile Security Client. Software Version: 5.0.00 Document Version: 02.01.12 M86 Web Filter USER GUIDE for M86 Mobile Security Client Software Version: 5.0.00 Document Version: 02.01.12 M86 WEB FILTER USER GUIDE FOR M86 MOBILE SECURITY CLIENT 2012 M86 Security All rights reserved.

More information

BEGINNERS GUIDE TO SSL CERTIFICATES: Making the BEST choice when considering your online security options

BEGINNERS GUIDE TO SSL CERTIFICATES: Making the BEST choice when considering your online security options BEGINNERS GUIDE TO SSL CERTIFICATES: Making the BEST choice when considering your online security options BEGINNERS GUIDE TO SSL CERTIFICATES Introduction Whether you are an individual or a company, you

More information

Integrated SSL Scanning

Integrated SSL Scanning Version 9.2 SSL Enhancements Copyright 1996-2008. Finjan Software Inc. and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included in this publication are the exclusive

More information

How to configure HTTPS proxying in Zorp 5

How to configure HTTPS proxying in Zorp 5 How to configure HTTPS proxying in Zorp 5 June 24, 2014 This tutorial describes how to configure Zorp to proxy HTTPS traffic Copyright 1996-2014 BalaBit IT Security Ltd. Table of Contents 1. Preface...

More information

Criminal charges are not pursued: Hacking PKI

Criminal charges are not pursued: Hacking PKI Criminal charges are not pursued: Hacking PKI Mike Zusman Principal Consultant [email protected] About the Title From StartCom Critical Event Report https://blog.startcom.org/?p=161 Thanks

More information

Legal notices. Legal notices. For legal notices, see http://help.adobe.com/en_us/legalnotices/index.html.

Legal notices. Legal notices. For legal notices, see http://help.adobe.com/en_us/legalnotices/index.html. ADOBE AIR Security Legal notices Legal notices For legal notices, see http://help.adobe.com/en_us/legalnotices/index.html. iii Contents Installing and updating desktop applications...........................................................................

More information

Internal Server Names and IP Address Requirements for SSL:

Internal Server Names and IP Address Requirements for SSL: Internal Server Names and IP Address Requirements for SSL: Guidance on the Deprecation of Internal Server Names and Reserved IP Addresses provided by the CA/Browser Forum June 2012, Version 1.0 Introduction

More information

Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace

Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:

More information

SSL, PKI and Secure Communication

SSL, PKI and Secure Communication SSL, PKI and Secure Communication Aditya Marella 20 th March, 2014 03/19/2014 Usable Privacy and Security 1 Secure Sockets Layer (SSL) Developed by Netscape Sits on top of TCP and below application level

More information

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Using etoken for SSL Web Authentication. SSL V3.0 Overview Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents

More information

Enhancing Web Application Security

Enhancing Web Application Security Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor

More information

An Application Package Configuration Approach to Mitigating Android SSL Vulnerabilities

An Application Package Configuration Approach to Mitigating Android SSL Vulnerabilities An Application Package Configuration Approach to Mitigating Android SSL Vulnerabilities Vasant Tendulkar Department of Computer Science North Carolina State University [email protected] William Enck Department

More information

$920+ GST Paid Annually. e-commerce Website Hosting Service HOSTING:: WHAT YOU GET WORDPRESS:: THEME + PLUG-IN UPDATES

$920+ GST Paid Annually. e-commerce Website Hosting Service HOSTING:: WHAT YOU GET WORDPRESS:: THEME + PLUG-IN UPDATES e-commerce Website Hosting Service HOSTING:: WHAT YOU GET Where you host your website is an extremely important decision to make, if you choose simply on price, you may be making a huge mistake. We encourage

More information

Michael Seltzer COMP 116: Security Final Paper. Client Side Encryption in the Web Browser Mentor: Ming Chow

Michael Seltzer COMP 116: Security Final Paper. Client Side Encryption in the Web Browser Mentor: Ming Chow Michael Seltzer COMP 116: Security Final Paper Client Side Encryption in the Web Browser Mentor: Ming Chow 1 Abstract Web service providers generally look to encryption as a means of ensuring data privacy

More information

Basic Security Considerations for Email and Web Browsing

Basic Security Considerations for Email and Web Browsing Basic Security Considerations for Email and Web Browsing There has been a significant increase in spear phishing and other such social engineering attacks via email in the last quarter of 2015, with notable

More information

How to configure HTTPS proxying in Zorp 6

How to configure HTTPS proxying in Zorp 6 How to configure HTTPS proxying in Zorp 6 April 17, 2015 Abstract This tutorial describes how to configure Zorp to proxy HTTPS traffic Copyright 1996-2015 BalaBit IT Security Ltd. Table of Contents 1.

More information

You re FREE Guide SSL. (Secure Sockets Layer) webvisions www.webvisions.com +65 6868 1168 [email protected]

You re FREE Guide SSL. (Secure Sockets Layer) webvisions www.webvisions.com +65 6868 1168 sales@webvisions.com SSL You re FREE Guide to (Secure Sockets Layer) What is a Digital Certificate? SSL Certificates, also known as public key certificates or Digital Certificates, are essential to secure Internet browsing.

More information

Vulnerabilità dei protocolli SSL/TLS

Vulnerabilità dei protocolli SSL/TLS Università degli Studi di Milano Facoltà di Scienze Matematiche, Fisiche e Naturali Dipartimento di Informatica e Comunicazione Vulnerabilità dei protocolli SSL/TLS Andrea Visconti Overview Introduction

More information

1 Reflection ZFE 5. 2 Security Considerations 13. 3 Troubleshooting the Installation 19. Contents 1

1 Reflection ZFE 5. 2 Security Considerations 13. 3 Troubleshooting the Installation 19. Contents 1 1 Reflection ZFE 5 Introducing Reflection ZFE......................................................... 5 Reflection ZFE components.................................................. 5 System requirements..............................................................

More information

CS 6262 - Network Security: Public Key Infrastructure

CS 6262 - Network Security: Public Key Infrastructure CS 6262 - Network Security: Public Key Infrastructure Professor Patrick Traynor 1/30/13 Meeting Someone New 2 What is a certificate? A certificate makes an association between a user identity/job/ attribute

More information

Using a custom certificate for SSL inspection

Using a custom certificate for SSL inspection Using a custom certificate for SSL inspection This recipe shows how use a FortiGate unit to generate a custom certificate signing request and to get this certificate signed by an enterprise root Certificate

More information

Tips for Banking Online Safely

Tips for Banking Online Safely If proper attention is given to safety and security, banking and monetary activities can be completed online in a convenient and effective fashion. This guide helps to establish procedures for remaining

More information

Tutorial on Smartphone Security

Tutorial on Smartphone Security Tutorial on Smartphone Security Wenliang (Kevin) Du Professor [email protected] Smartphone Usage Smartphone Applications Overview» Built-in Protections (ios and Android)» Jailbreaking and Rooting» Security

More information

9.92 Using HTTPS for building secure web applications v 1.0

9.92 Using HTTPS for building secure web applications v 1.0 2006-12-19 LiTH 9.92 Using HTTPS for building secure web applications v 1.0 Jonas Krogell Abstract Today most websites on the Internet uses normal HTTP for displaying the data for the visitors/users. HTTP

More information

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate

More information

SSL Certificates 101

SSL Certificates 101 Whether you are an individual or a company, you should approach online security in the same way that you would approach physical security for your home or business. Not only does it make you feel safer

More information

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry

More information

NIST ITL July 2012 CA Compromise

NIST ITL July 2012 CA Compromise NIST ITL July 2012 CA Compromise Prepared for: Intelligent People [email protected] 1 NIST ITL Bulletin on CA Compromise http://csrc.nist.gov/publications/nistbul/july-2012_itl-bulletin.pdf These

More information

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:

More information

Digital certificates and SSL

Digital certificates and SSL Digital certificates and SSL 20 out of 33 rated this helpful Applies to: Exchange Server 2013 Topic Last Modified: 2013-08-26 Secure Sockets Layer (SSL) is a method for securing communications between

More information

beginners guide Beginners Guide Certificates the best decision when considering your online security options.

beginners guide Beginners Guide Certificates the best decision when considering your online security options. Beginners Guide to Digital SSL Certificates the best decision when considering your online security options. Beginners Guide to Digital SSL Certificates introduction Whether you are an individual or a

More information

Certificate technology on Pulse Secure Access

Certificate technology on Pulse Secure Access Certificate technology on Pulse Secure Access How-to Guide Published Date July 2015 Contents Introduction: 3 Creating a Certificate signing request (CSR): 3 Import Intermediate CAs: 5 Using Trusted Client

More information

Salesforce1 Mobile Security Guide

Salesforce1 Mobile Security Guide Salesforce1 Mobile Security Guide Version 1, 1 @salesforcedocs Last updated: December 8, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,

More information

Chapter 17. Transport-Level Security

Chapter 17. Transport-Level Security Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics

More information

Secure Transfers. Contents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3

Secure Transfers. Contents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3 Contents SSL-Based Services: HTTPS and FTPS 2 Generating A Certificate 2 Creating A Self-Signed Certificate 3 Obtaining A Signed Certificate 4 Enabling Secure Services 5 A Note About Ports 5 Connecting

More information

Djigzo email encryption. Djigzo white paper

Djigzo email encryption. Djigzo white paper Djigzo email encryption Djigzo white paper Copyright 2009-2011, djigzo.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in transit or

More information

Web Security, Privacy, and Commerce

Web Security, Privacy, and Commerce SECOND EDITION Web Security, Privacy, and Commerce Simson Garfinkel with Gene Spafford O'REILLT Beijing Cambridge Famham Köln Paris Sebastopol Taipei Tokyo Table of Contents Preface xi Part I. Web Technology

More information

TechNote. Contents. Overview. Using a Windows Enterprise Root CA with DPI-SSL. Network Security

TechNote. Contents. Overview. Using a Windows Enterprise Root CA with DPI-SSL. Network Security Network Security Using a Windows Enterprise Root CA with DPI-SSL Contents Overview... 1 Deployment Considerations... 2 Configuration Procedures... 3 Importing the Public CA Certificate for Trust... 3 Importing

More information

By Jan De Clercq. Understanding. and Leveraging SSL-TLS. for Secure Communications

By Jan De Clercq. Understanding. and Leveraging SSL-TLS. for Secure Communications By Jan De Clercq Understanding and Leveraging SSL-TLS for Secure Communications ii Contents Chapter 2: Leveraging SSL/TLS for Secure Web Communications....... 21 Setting Up SSL/TLS on a Web Server..................................

More information

Browser Interfaces and Extended Validation SSL Certificates: An Empirical Study

Browser Interfaces and Extended Validation SSL Certificates: An Empirical Study Browser Interfaces and Extended Validation SSL Certificates: An Empirical Study Robert Biddle, P.C. van Oorschot, Andrew S. Patrick, Jennifer Sobey, Tara Whalen Carleton University, Ottawa, ON, Canada

More information