TLS handshake method based on SIP
|
|
|
- Ethan Bryan
- 10 years ago
- Views:
Transcription
1 Proceedings of the International Multiconference on ISSN Computer Science and Information Technology, pp PIPS TLS handshake method based on SIP Tadashi Kaji 1, Kazuyoshi Hoshino 2, Takahiro Fujishiro 1, Osamu Takata 1, Akifumi Yato 1, Keisuke Takeuchi 3, Satoru Tezuka 1 1 Systems Development Laboratory, Hitachi, Ltd., 890 Kashimada, Saiwai, Kawasaki, Kanagawa JAPAN [email protected] 2 Network Systems Solutions Division, Hitachi, Ltd., 890 Kashimada, Saiwai, Kawasaki, Kanagawa JAPAN 3 Central Research Laboratory, Hitachi, Ltd., Higashi Koigakubo, Kokubunji, Tokyo , Japan Abstract. As the result that there are many security problems around the Internet, various security measures are required to protect communications over the Internet. TLS is widely used to protect application layer protocol. However, TLS requires a handshake process to establish a TLS session. And the handshake process costs because of PKI based authentication and key calculation for each TLS session. This paper proposes the effective TLS handshake method based on SIP and TLS session resume. In this method, SIP server performs the PKI based authentication and key calculation for all TLS sessions on behalf of TLS server and TLS client. 1 Introduction As the result that the Internet becomes a business infrastructure, many security problems are raised around the Internet. Against these problems, a lot of security measures are required to protect communications over the Internet. For this purpose, many security protocols and infrastructures are developed and standardized to protect communication data. TLS [1] and Ipsec [4] are well known secure communication protocols and both are standardized by IETF. TLS is widely used to protect application layer protocol like HTTP, FTP and so on. Thus, many activities in regard to TLS have been done like improvement of TLS protocol to adopt certain environment, implementation technique to accelerate data transmission or session establishment, applications using TLS and so on. For example, there are some proposals to modify the specification of TLS to adopt mobile phone environment. Especially, WTLS [3] is standardized by OMA. And the mechanisms for caching handshake information on TLS clients were proposed to reduce the cost of handshake process [2]. On the other hand, new applications have been developed around the Internet continuously. (ex. IP telephony, P2P file sharing and so on.) SIP [5] is known as a protocol to establish IP telephony (VoIP) sessions. However, SIP has not only a capability to establish voice or video sessions, but also a capability to establish and control various kinds of communications [6 9]. 467
2 468 Tadashi Kaji, Kazuyoshi Hoshino, Takahiro Fujishiro, Osamu Takata, Akifumi Yato, Keisuke Takeuchi, Satoru Tezuka This paper proposes TLS handshake method based on SIP, which is the method for SIP to control TLS sessions. The proposed method works more effectively than current TLS handshake protocol, especially in the case that one TLS client establishes multiple TLS sessions with same TLS server or in the case that several entities communicate with each other by TLS. 2 Problems of TLS handshake TLS performs handshake process before starting application data exchange between TLS server and TLS client. During the handshake process, TLS server and client perform peer authentication, exchange a set of available cipher suites each other, select the cipher suite and calculate the session key to encrypt/decrypt application data. (Hereinafter, security policy or SP denotes a set of available cipher suites and security association or SA denotes a selected cipher suite and its session keys. Negotiation of security association denotes the selection of cipher suite and calculation of session keys) Generally, the handshake process takes a lot of cost to verify the authenticity of the peer because the peer authentication of TLS is based on PKI. And also, key calculation in negotiation of security association is a costly process because public key encryption/decryption or DH key exchange methods are used. The resuming session, known as TLS session resume shown in Figure 1 can improve the performance [12, 13]. TLS client Hello Request message(optional) Client Hello message(sessionid) Server Hello message(sessionid) TLS server Change Cipher Spec message Finished message Change Cipher Spec message Finished message Fig. 1. Exchanged messages for resuming session The overview of resuming session is as follows: (1) TLS server sends Hello Request message to TLS client. (This is optional.) (2) TLS client sends Client Hello message contains session ID, which is an ID of resuming session, to TLS server. (3) TLS server sends Server Hello message contains same session ID to TLS client if TLS server finds any security association, which corresponds to the session ID indicated by Client Hello message. (4) TLS client sends Change Cipher Spec message and Finished message. (5) TLS server sends Change Cipher Spec message and Finished message if TLS server can decrypt Finished message, which is received from TLS client, successfully. (6) TLS client and TLS server transmit application data if TLS client can decrypt Finished message, which is received from TLS server, successfully. The problem of the TLS session resume is that the resuming session skips not only the peer authentication, but also both of the authorization of session and the negotiation of security association. However, in many cases, the authorization of the session and the negotiation of security association do not depend on peer entity, but
3 TLS handshake method based on SIP 469 depends on certain session. Therefore the authorization and negotiation processes are required to perform by each session. 3 Proposed TLS handshake method based on SIP This section describes the proposed TLS handshake method based on SIP and TLS session resume to resolve problems mentioned in section Overview of proposed method The basic idea of the proposed TLS handshake method is to introduce a SIP server as the entity that performs costly process (peer authentication and security association generation) for TLS session on behalf of TLS client and TLS server to reduce these costs. SIP Server (1) Authentication by SIP TLS Client (2) Distribution of SA by SIP (3) Confirmation of SA sharing by TLS Handshake (1) Authentication by SIP TLS Server Fig. 2. Overview of proposed method Figure 2 overviews the proposed TLS handshake method. To establish a TLS session between TLS server and TLS client, the proposed method takes three phases: authentication, key distribution and SA confirmation. At first, authentication phase is performed. SIP server authenticates TLS client and TLS server respectively. If authentication is success, SIP server establishes and keeps SIP sessions with TLS client and TLS server. And TLS client (TLS server) registers security policy to SIP server via the SIP session. Next, key distribution phase is performed. SIP server generates a security association for TLS session between TLS client and TLS server and distributes it to TLS client and TLS server through the SIP sessions. This phase is triggered when TLS client tries to communicate with TLS server. And then, SA confirmation phase is performed. As the resuming session procedure, TLS server and TLS client confirm if they share a security association. This phase follows the key distribution phase immediately. If this phase finishes successfully, TLS server and TLS client starts the application data transmission over the established TLS session. It notes that the SIP messages exchanged in the proposed method will not contain SDP message, but contain XML to transmit security policy and security association. 3.2 Authentication phase Message sequences and system behaviors In authentication phase, TLS client (or TLS server) establish a TLS session with SIP server in the normal way at first. And then they exchange some SIP messages via the TLS session.
4 470 Tadashi Kaji, Kazuyoshi Hoshino, Takahiro Fujishiro, Osamu Takata, Akifumi Yato, Keisuke Takeuchi, Satoru Tezuka Figure 3 shows message sequence during authentication phase of TLS client. TLS client SIP server Establish TLS session REGISTER message 200 OK message MESSAGE message 200 OK message - Store SP Fig. 3. Message sequence during authentication phase (1) At first, TLS client establishes a TLS session with SIP server in the normal way. Mutual authentication is performed during the TLS session establishment. (2) Then, TLS client sends a REGISTER message to SIP server. (3) SIP server authenticates a sender of REGISTER message (i.e., TLS client), and returns a response message ( 200 OK ) if authentication is success. (4) TLS client authenticates a sender of the response message (i.e., SIP server) when the message is received. (5) And if authentication is success, MESSAGE message with security policy (i.e., a set of available cipher suites for TLS session) are sent to SIP server for key distribution phase. (6) SIP server stores the security policy and returns a response message Messages In authentication phase, four types of messages are exchanged: RESISGER message, RESISGER response message, MESSAGE message and MESSAGE response message. (a) REGISTER message REGISTER message defined in [5] is sent from TLS client (TLS server) to SIP server. (b) REGISTER response message REGISTER response message defined in [5] is sent from SIP server to the sender of REGISTER. If SIP server accepts the REGISGER message, 200 OK message is sent as REGISTER response message. (c) MESSAGE message MESSAGE message defined in [10] is sent from TLS client (TLS server) to SIP server. The body of this message carries security policy like Figure 4. <TLS> <Cipher Suite>TLS_RSA_WITH_AES_128_CBC_SHA</Cipher Suite> <Cipher Suite>TLS_RSA_WITH_3DES_EDE_CBC_SHA</Cipher Suite> </TLS> Fig. 4. Example of security policy in MESSAGE message during authentication phase The security policy in Figure 4 states that TLS client (or TLS server) has two available cipher suites for TLS session: one is the cipher suite TLS_RSA_WITH_AES_128_CBC_SHA defined in [11] and another is the cipher suite TLS_RSA_WITH_3DES_EDE_CBC_SHA defined in [1].
5 TLS handshake method based on SIP 471 (d) MESSAGE response message MESSAGE response message defined in [10] is sent from SIP server to the sender of MESSAGE message. If SIP server accepts the MESSAGE message, 200 OK message is sent as MESSAGE response message. 3.3 Key distribution phase Message sequences and system behaviors In key distribution phase, TLS client, TLS server and SIP server exchange SIP messages via SIP sessions which are established during authentication phase. Figure 5 shows message sequence during key distribution phase as follows: (1) In Figure 5, TLS client sends an INVITE message to SIP server to request TLS session establishment with TLS server at first. (2) SIP server, which receives INVITE message from TLS client, generates a security association from security policies of TLS client and TLS server. If no security association is generated (ex. there is no available algorithms), SIP server returns 4xx response to TLS client. Otherwise, SIP server sends INVITE message, which contains the security association, to TLS server. (3) TLS server that receives the INVITE message from SIP server stores the security association and returns a response message ( 200 OK ). (4) SIP server that receives the response message from TLS server adds the security association to the response message and sends the response message with the security association to TLS client. (5) If TLS client that receives 200 OK response message, TLS client stores the security association. Otherwise, TLS client disposes of the message. (6) Finally, (if TLS client stores the security association successfully,) TLS client sends ACK message to TLS server via SIP server. TLS client INVITE message 200 OK message -Store SA ACK message SIP server - Generate SA INVITE message with SA 200 OK message - Add SA to response message ACK message TLS server -Store SA Fig. 5. Message sequence during key distribution phase Messages In key distribution phase, three types of messages are exchanged: INVITE message, INVITE response message and ACK message. (a) INVITE message INVITE message defined in [5] and is sent from TLS client to TLS server via SIP server. This message is used to notify that TLS client ask TLS session establishment to TLS server via SIP server. The body of this message is used to carry security association from SIP server to TLS server like Figure 6. The security association in Figure 6 is a candidate of security association. The security association contains a session ID that is wedged between <SessionID> and </SessionID>, a selected cipher suite that is
6 472 Tadashi Kaji, Kazuyoshi Hoshino, Takahiro Fujishiro, Osamu Takata, Akifumi Yato, Keisuke Takeuchi, Satoru Tezuka wedged between <CipherSuite> and </CipherSuite>, a master secret value that is wedged between <MasterSecret> and </MasterSecret>, the life time of this security association that is wedged between <Lifetime> and </Lifetime>, TLS client information for this session, that is wedged between <ClientInfo> and </ClientInfo> include a random value for this TLS session, and TLS server information for this session, that is wedged between <ServerInfo> and </ServerInfo> include a random value for this TLS session. TLS client information and TLS server information may contain IP address and port number used for this TLS session. <TLS> <SessionID> @bar.hitachi.com</SessionID> <Cipher Suite>TLS_RSA_WITH_AES_128_CBC_SHA</Cipher Suite> <MasterSecret>MK8wuzC5jiMQEwTVH MQAwADgA8w</MasterSecret> <Lifetime>36000</Lifetime> <Client Info> <random>ajckmaewtvj0xgxuh2dl 5wZWcwMQA</random> </Client Info> <Server Info> <random>egixadgadf4yaahnazbnt BiMQA3ALMA</random> </Server Info> </TLS> Fig. 6. Example of security association in INVITE message during key distribution phase (b) INVITE response message format INVITE response message defined in [5] is sent from TLS server to TLS client via SIP server. If TLS server accepts the INVITE request, the status of this response message is 200OK. The body of this message is also used to carry security association from SIP server to TLS client like Figure 6. (c) ACK message format ACK message defined in [5] is sent from TLS client to TLS server via SIP server to notify that TLS client receive the INVITE response message to TLS server. 3.4 SA confirmation phase Message sequences and system behaviors In SA confirmation phase, TLS client and TLS server exchange TLS Handshake messages shown as Figure 1. Namely, the following messages are exchanged between TLS client and TLS server. (1) TLS client refers the security association shared at key distribution phase and sends Client Hello message with the session ID of security association to TLS server. (2) TLS server, which receives Client Hello message, returns Server Hello message with same session ID to TLS client if TLS server can find the security association, which corresponds to the session ID. (3) Then, TLS client sends Change Cipher Spec message and Finished message. (4) TLS server sends Change Cipher Spec message and Finished message if TLS server can decrypt Finished message that received from TLS client (5) TLS client and TLS server transmit application data if TLS client can decrypt Finished message that received from TLS server Messages In SA confirmation phase, four types of messages are exchanged: Client Hello message, Server Hello message, Change Cipher Spec massage and Finished message. These messages are compliant with
7 TLS handshake method based on SIP 473 RFC2246. And Client Hello message and Server Hello message contains the session ID of the security association shared at key distribution phase. 4. Evaluations This section describes evaluations of the proposed TLS handshake method from the number of authentication and the cost of SA sharing. 4.1 The number of authentication The proposed method can reduce a number of peer authentications than the traditional TLS handshake method. Because TLS server and TLS client are authenticated by SIP server in advance of the initiation of TLS session establishment and there is no authentication in key distribution phase. This has the advantage in the case that TLS client establishes multiple TLS sessions with same TLS server (case 1) or in the case that several entities communicate with each other by TLS (case 2). In regard to case 1, it supposes that there are m types of applications are running on TLS client and TLS server. In this case, the traditional TLS handshake method needs 2m times of authentication processes because each TLS session needs 2 authentication processes and there are m TLS sessions totally. On the other hand, the proposed TLS handshake method needs only 4 times of authentication processes because this method does not depend on the number of TLS sessions between TLS client and TLS server, but depends on the number of SIP sessions. There are 2 SIP sessions and one SIP session needs 2 authentication processes (one is for SIP server to authenticate TLS client (TLS server) and another is for TLS client (TLS server) to authenticate SIP server). In regard to case 2, it supposes that there are n terminals running on the application that communicates with n-1 isomorphic applications on other n-1 terminals. In this case, the traditional TLS needs n(n-1) times of authentication processes because there are n(n-1)/2 TLS sessions totally. On the other hand, the proposed method needs only 2n times of authentication processes because there are n SIP sessions totally. Table 1 shows that the proposed method is fewer authentications than the traditional TLS handshake if the number of terminals or applications is 3 or more. Because the authentication process takes a lot of time and cost for cryptographic calculations or user's interactions (ex. entering PIN), the proposed method can establish TLS session more effectively than the traditional TLS handshake. Table 1. Comparison of authentication between the proposed method and the traditional TLS Case1: TLS client establishes multiple TLS sessions with same TLS server Case 2: Several entities communicate with each other by TLS Proposed method Traditional TLS # of terminals 2 2 # of applications m m # of TLS sessions m m # of SIP sessions 2 # of authentications 4 2m # of terminals n n # of applications 1 1 # of TLS sessions n(n 1) n(n 1) # of SIP sessions n # of authentications 2n 2 n(n 1)
8 474 Tadashi Kaji, Kazuyoshi Hoshino, Takahiro Fujishiro, Osamu Takata, Akifumi Yato, Keisuke Takeuchi, Satoru Tezuka 4.2 The cost of SA sharing The proposed method can also reduce the cost of SA sharing than the traditional TLS handshake method. In the traditional TLS handshake method, TLS client and TLS server exchange redundant data because the negotiation of security association and the key exchange are integrated. For example, although Client Hello message contains 32 bytes random data, this is not mandatory in the case that RSA is selected as key exchange method. In addition, because the traditional TLS handshake method supposes that there is no secure session and no shared secret between TLS client and TLS server, TLS client and TLS server require to process public key cryptography to share the secret. On the other hand, the proposed method requires for both TLS client and TLS server to register their security policies to SIP server in advance of the initiation of TLS session establishment. Therefore, SIP server can select available cipher suite and then generate the security association. In addition, because there are secure sessions between TLS client (TLS server) and SIP server in the proposed method, SIP server can transmit the security association to TLS client (TLS server) directly. 5. Conclusion This paper proposed another TLS handshake method, which is based on SIP and TLS session resume. This proposed method divides the processing of TLS handshake into three phases: authentication, key distribution and SA confirmation, and the first two phases are performed over SIP and the last one phase is performed over TLS session resume. This method reduces the cost of peer authentication because SIP server authenticates TLS client (TLS server) on behalf of TLS server (TLS client). This method also reduces the cost of key distribution between TLS client and TLS server though the authorization of the session or the negotiation of security association is performed for each session. Acknowledgments This paper contains the result of R&D of technologies for advanced network authentication technologies for secure communication platform based on user authentication (Ministry of Internal Affairs and Communications, Japan). References 1. T. Dierks etc., RFC2246, The TLS Protocol Version 1.0, IETF (1999). 2. H. Shacham etc., Client Side Caching for TLS, ACM Transactions on Information and System Security, Vol. 7, No. 4, November 2004, pp OMA, Wireless Transport Layer Security, OMA (2001). 4. S. Kent etc., RFC2401, Security Architecture for the Internet Protocol, IETF (1998). 5. J. Rosenberg, etc., RFC3261, SIP: Session Initiation Protocol, IETF (2002). 6. H. Schulzrinne, Signaling for internet telephony services, Proc. of Opensig'96 (1996). 7. N. Kausar etc., An architecture of Conference Control Functions, Proc. of Photonics East, Boston, Massachusetts, September 20 22, E. M. Schooler, Case study: multimedia conference control in a packet switched teleconferencing system, Journal of Internetworking: Research and Experience, vol. 4, pp , June ISI reprint series ISI/RS
9 TLS handshake method based on SIP H. Schulzrinne etc., Application Layer Mobility using SIP, Mobile Computing and Communications Review (MC2R), Volume 4, Number 3, July E. B. Campbell etc., RFC3428 Session Initiation Protocol (SIP) Extension for Instant Messaging, IETF (2002). 11. P. Chown, RFC3268 Advanced Encryption Standard (AES) Ciphersuites for Transport Layer Security (TLS), IETF (2002). 12. A. Goldberg, etc., Secure web server performance dramatically improved by caching SSL session keys, Proceedings of the Workshop on Internet Server Performance (1998). 13. C. Coarfa, etc., Performance Analysis of TLS Web Servers, Network and Distributed Systems Security Symposium '02 (2002).
TLS and SRTP for Skype Connect. Technical Datasheet
TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security
SECURING VOIP COMMUNICATIONS IN AN OPEN NETWORK
SECURING VOIP COMMUNICATIONS IN AN OPEN NETWORK Mukund Sarma 1 1 Dept. of Computer Science and Engineering, Amrita Vishwa Vidyapeetham, Amrita School of Engineering, Amritanagar, Coimbatore, India, 641112.
Communication Systems SSL
Communication Systems SSL Computer Science Organization I. Data and voice communication in IP networks II. Security issues in networking III. Digital telephony networks and voice over IP 2 Network Security
Web Security Considerations
CEN 448 Security and Internet Protocols Chapter 17 Web Security Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University [email protected]
CSC 774 -- Network Security
CSC 774 -- Network Security Topic 6: Transport Layer Security Dr. Peng Ning CSC 774 Network Security 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally developed to secure http Version
Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009
16 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009 1 25 Organization Welcome to the New Year! Reminder: Structure of Communication Systems lectures
CSC 474 Information Systems Security
CSC 474 Information Systems Security Topic 4.5 Transport Layer Security CSC 474 Dr. Peng Ning 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally developed to secure http Version
How To Understand And Understand The Ssl Protocol (Www.Slapl) And Its Security Features (Protocol)
WEB Security: Secure Socket Layer Cunsheng Ding HKUST, Hong Kong, CHINA C. Ding - COMP581 - L22 1 Outline of this Lecture Brief Information on SSL and TLS Secure Socket Layer (SSL) Transport Layer Security
3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol
Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Network Layer: IPSec Transport Layer: SSL/TLS Chapter 4: Security on the Application Layer Chapter 5: Security
Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
SSL/TLS. What Layer? History. SSL vs. IPsec. SSL Architecture. SSL Architecture. IT443 Network Security Administration Instructor: Bo Sheng
What Layer? /TLS IT443 Network Security Administration Instructor: Bo Sheng Application TCP IPSec IP LAN layer Application TCP IP LAN layer 1 2 History v2 proposed and deployed in Netscape 1.1 (1995) PCT
The Secure Sockets Layer (SSL)
Due to the fact that nearly all businesses have websites (as well as government agencies and individuals) a large enthusiasm exists for setting up facilities on the Web for electronic commerce. Of course
Communication Security for Applications
Communication Security for Applications Antonio Carzaniga Faculty of Informatics University of Lugano March 10, 2008 c 2008 Antonio Carzaniga 1 Intro to distributed computing: -server computing Transport-layer
Transport Layer Security Protocols
SSL/TLS 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally designed to by Netscape to secure HTTP Version 2 is being replaced by version 3 Subsequently became Internet Standard known
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1
Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1 How the Web Works - HTTP Hypertext transfer protocol (http). Clients request documents (or scripts) through URL. Server response with documents. Documents
Secure Socket Layer/ Transport Layer Security (SSL/TLS)
Secure Socket Layer/ Transport Layer Security (SSL/TLS) David Sánchez Universitat Pompeu Fabra World Wide Web (www) Client/server services running over the Internet or TCP/IP Intranets nets widely used
Announcement. Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed.
Announcement Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed. 1 We have learned Symmetric encryption: DES, 3DES, AES,
Network Security Part II: Standards
Network Security Part II: Standards Raj Jain Washington University Saint Louis, MO 63131 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 18-1 Overview
Overview of SSL. Outline. CSC/ECE 574 Computer and Network Security. Reminder: What Layer? Protocols. SSL Architecture
OS Appl. CSC/ECE 574 Computer and Network Security Outline I. Overview II. The Record Protocol III. The Handshake and Other Protocols Topic 8.3 /TLS 1 2 Reminder: What Layer? Overview of 3 4 Protocols
Lecture 7: Transport Level Security SSL/TLS. Course Admin
Lecture 7: Transport Level Security SSL/TLS CS 336/536: Computer Network Security Fall 2014 Nitesh Saxena Adopted from previous lecture by Tony Barnard Course Admin HW/Lab 1 Graded; scores posted; to be
Embedded SSL. Christophe Kiennert, Pascal Urien. Embedded SSL - Christophe Kiennert, Pascal Urien 1
Embedded SSL Christophe Kiennert, Pascal Urien 1 Introduction TLS/SSL is the Holy Grail of WEB security Many applications may be secured by SSL HTTP, FTP, SIP, SMTP, POP, TLS is secured, but what about
Spirent Abacus. SIP over TLS Test 编 号 版 本 修 改 时 间 说 明
Spirent Abacus SIP over TLS Test 编 号 版 本 修 改 时 间 说 明 1 1. TLS Interview (Transport Layer Security Protocol) (1) TLS Feature Introduction: 1. TLS is a successor of Secure Sockets Layer (SSL), a cryptographic
Managing and Securing Computer Networks. Guy Leduc. Chapter 4: Securing TCP. connections. connections. Chapter goals: security in practice:
Managing and Securing Computer Networks Guy Leduc Chapter 4: Securing TCP connections Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley, March 2012. (section
Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols 2011-11-22. ETSF10 Internet Protocols 2011
Internet Security Voice over IP ETSF10 Internet Protocols 2011 Kaan Bür & Jens Andersson Department of Electrical and Information Technology Internet Security IPSec 32.1 SSL/TLS 32.2 Firewalls 32.4 + Voice
Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
Secure Sockets Layer
SSL/TLS provides endpoint authentication and communications privacy over the Internet using cryptography. For web browsing, email, faxing, other data transmission. In typical use, only the server is authenticated
SIP, Session Initiation Protocol used in VoIP
SIP, Session Initiation Protocol used in VoIP Page 1 of 9 Secure Computer Systems IDT658, HT2005 Karin Tybring Petra Wahlund Zhu Yunyun Table of Contents SIP, Session Initiation Protocol...1 used in VoIP...1
SECURE SOCKETS LAYER (SSL) SECURE SOCKETS LAYER (SSL) SSL ARCHITECTURE SSL/TLS DIFFERENCES SSL ARCHITECTURE. INFS 766 Internet Security Protocols
INFS 766 Internet Security s Lecture 5 SSL Prof. Ravi Sandhu SECURE SOCKETS LAYER (SSL) layered on top of TCP SSL versions 1.0, 2.0, 3.0, 3.1 Netscape protocol later refitted as IETF standard TLS (Transport
WEB Security & SET. Outline. Web Security Considerations. Web Security Considerations. Secure Socket Layer (SSL) and Transport Layer Security (TLS)
Outline WEB Security & SET (Chapter 19 & Stalling Chapter 7) Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction (SET) Web Security Considerations
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang
INF3510 Information Security University of Oslo Spring 2011 Lecture 9 Communication Security Audun Jøsang Outline Network security concepts Communication security Perimeter security Protocol architecture
A Comparative Study of Signalling Protocols Used In VoIP
A Comparative Study of Signalling Protocols Used In VoIP Suman Lasrado *1, Noel Gonsalves *2 Asst. Prof, Dept. of MCA, AIMIT, St. Aloysius College (Autonomous), Mangalore, Karnataka, India Student, Dept.
Network Security Essentials Chapter 5
Network Security Essentials Chapter 5 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 5 Transport-Level Security Use your mentality Wake up to reality From the song, "I've Got
Chapter 27 Secure Sockets Layer (SSL)
Chapter 27 Secure Sockets Layer (SSL) Introduction... 27-2 SSL Operations... 27-2 Phases... 27-3 SSL on the Switch... 27-5 SSL and the Graphical User Interface... 27-5 Configuration Example... 27-6 Command
TECHNICAL CHALLENGES OF VoIP BYPASS
TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish
As enterprises conduct more and more
Efficiently handling SSL transactions is one cornerstone of your IT security infrastructure. Do you know how the protocol actually works? Wesley Chou Inside SSL: The Secure Sockets Layer Protocol Inside
Security Engineering Part III Network Security. Security Protocols (I): SSL/TLS
Security Engineering Part III Network Security Security Protocols (I): SSL/TLS Juan E. Tapiador [email protected] Department of Computer Science, UC3M Security Engineering 4th year BSc in Computer Science,
VoIP Security. Seminar: Cryptography and Security. 07.06.2006 Michael Muncan
VoIP Security Seminar: Cryptography and Security Michael Muncan Overview Introduction Secure SIP/RTP Zfone Skype Conclusion 1 Introduction (1) Internet changed to a mass media in the middle of the 1990s
SIP: Ringing Timer Support for INVITE Client Transaction
SIP: Ringing Timer Support for INVITE Client Transaction Poojan Tanna ([email protected]) Motorola India Private Limited Outer Ring Road, Bangalore, India 560 037 Abstract-The time for which the Phone
Outline. Transport Layer Security (TLS) Security Protocols (bmevihim132)
Security Protocols (bmevihim132) Dr. Levente Buttyán associate professor BME Híradástechnikai Tanszék Lab of Cryptography and System Security (CrySyS) [email protected], [email protected] Outline - architecture
Chapter 34 Secure Sockets Layer (SSL)
Chapter 34 Secure Sockets Layer (SSL) Introduction... 34-2 SSL Operations... 34-2 Phases... 34-3 SSL on the Switch... 34-5 SSL and the Graphical User Interface... 34-5 SSL and Load Balancer... 34-5 Configuration
SSL Handshake Analysis
SSL Handshake Analysis Computer Measurement Group Webinar Nalini Elkins Inside Products, Inc. [email protected] Inside Products, Inc. (831) 659-8360 www.insidethestack.com www.ipproblemfinders.com
Security Policy Revision Date: 23 April 2009
Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure
SECURE SOCKETS LAYER (SSL)
INFS 766 Internet Security Protocols Lecture 5 SSL Prof. Ravi Sandhu SECURE SOCKETS LAYER (SSL) layered on top of TCP SSL versions 1.0, 2.0, 3.0, 3.1 Netscape protocol later refitted as IETF standard TLS
User authentication in SIP
User authentication in SIP Pauli Vesterinen Helsinki University of Technology [email protected] Abstract Today Voice over Internet Protocol (VoIP) is used in large scale to deliver voice and multimedia
Chapter 51 Secure Sockets Layer (SSL)
Chapter 51 Secure Sockets Layer (SSL) Introduction... 51-2 SSL Operations... 51-2 Phases... 51-3 SSL on the Router... 51-5 SSL and the Graphical User Interface... 51-5 SSL and the load balancer... 51-6
SSL Secure Socket Layer
??? SSL Secure Socket Layer - architecture and services - sessions and connections - SSL Record Protocol - SSL Handshake Protocol - key exchange alternatives - analysis of the SSL Record and Handshake
SSL: Secure Socket Layer
SSL: Secure Socket Layer Steven M. Bellovin February 12, 2009 1 Choices in Key Exchange We have two basic ways to do key exchange, public key (with PKI or pki) or KDC Which is better? What are the properties
Overview SSL/TLS HTTPS SSH. TLS Protocol Architecture TLS Handshake Protocol TLS Record Protocol. SSH Protocol Architecture SSH Transport Protocol
SSL/TLS TLS Protocol Architecture TLS Handshake Protocol TLS Record Protocol HTTPS SSH SSH Protocol Architecture SSH Transport Protocol Overview SSH User Authentication Protocol SSH Connection Protocol
Understanding Digital Certificates and Wireless Transport Layer Security (WTLS)
Understanding Digital Certificates and Wireless Transport Layer Security (WTLS) Author: Allan Macphee January 2001 Version 1.1 Copyright 2001-2003 Entrust. All rights reserved. Digital Certificates What
Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts
Outline INF3510 Information Security Lecture 10: Communications Security Network security concepts Communication security Perimeter security Protocol architecture and security services Example security
Secure Socket Layer. Security Threat Classifications
Secure Socket Layer 1 Security Threat Classifications One way to classify Web security threats in terms of the type of the threat: Passive threats Active threats Another way to classify Web security threats
Asymetrical keys. Alices computer generates a key pair. A public key: XYZ123345 (Used to encrypt) A secret key: ABC98765 (Used to decrypt)
Encryption keys Symmetrical keys Same key used for encryption and decryption Exchange of symmetrical keys between parties difficult without risk of interception Asymmetrical keys One key for encryption
Lecture 10: Communications Security
INF3510 Information Security Lecture 10: Communications Security Audun Jøsang University of Oslo Spring 2015 Outline Network security concepts Communication security Perimeter security Protocol architecture
Transport Level Security
Transport Level Security Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues
Firewall-Friendly VoIP Secure Gateway and VoIP Security Issues v Noriyuki Fukuyama v Shingo Fujimoto v Masahiko Takenaka (Manuscript received September 26, 2003) IP telephony services using VoIP (Voice
Real-Time Communication Security: SSL/TLS. Guevara Noubir [email protected] CSU610
Real-Time Communication Security: SSL/TLS Guevara Noubir [email protected] CSU610 1 Some Issues with Real-time Communication Session key establishment Perfect Forward Secrecy Diffie-Hellman based PFS
Einführung in SSL mit Wireshark
Einführung in SSL mit Wireshark Chemnitzer Linux-Tage 16. März 2014 Martin Kaiser What? SSL/TLS is the most widely used security protocol on the Internet there's lots of parameters, options, extensions
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
SIP : Session Initiation Protocol
: Session Initiation Protocol EFORT http://www.efort.com (Session Initiation Protocol) as defined in IETF RFC 3261 is a multimedia signaling protocol used for multimedia session establishment, modification
Secure Socket Layer (SSL) and Transport Layer Security (TLS)
Secure Socket Layer (SSL) and Transport Layer Security (TLS) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available
CS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Security. Learning Objectives. This module will help you...
Security 5-1 Learning Objectives This module will help you... Understand the security infrastructure supported by JXTA Understand JXTA's use of TLS for end-to-end security 5-2 Highlights Desired security
Secure Socket Layer (SSL) and Trnasport Layer Security (TLS)
Secure Socket Layer (SSL) and Trnasport Layer Security (TLS) CSE598K/CSE545 - Advanced Network Security Prof. McDaniel - Spring 2008 1 SSL/TLS The Secure Socket Layer (SSL) and Transport Layer Security
Configuring SIP Support for SRTP
Configuring SIP Support for SRTP This chapter contains information about the SIP Support for SRTP feature. The Secure Real-Time Transfer protocol (SRTP) is an extension of the Real-Time Protocol (RTP)
EE4607 Session Initiation Protocol
EE4607 Session Initiation Protocol Michael Barry [email protected] [email protected] Outline of Lecture IP Telephony the need for SIP Session Initiation Protocol Addressing SIP Methods/Responses Functional
Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)
Security Protocols Security Protocols Necessary to communicate securely across untrusted network Provide integrity, confidentiality, authenticity of communications Based on previously discussed cryptographic
Cryptography and Network Security Sicurezza delle reti e dei sistemi informatici SSL/TSL
Cryptography and Network Security Sicurezza delle reti e dei sistemi informatici SSL/TSL Security architecture and protocol stack Applicat. (SHTTP) SSL/TLS TCP IPSEC IP Secure applications: PGP, SHTTP,
Savitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
Prevention of Anomalous SIP Messages
International Journal of Future Computer and Communication, Vol., No., October 03 Prevention of Anomalous SIP Messages Ming-Yang Su and Chung-Chun Chen Abstract Voice over internet protocol (VoIP) communication
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
Analysis of SIP Traffic Behavior with NetFlow-based Statistical Information
Analysis of SIP Traffic Behavior with NetFlow-based Statistical Information Changyong Lee, Hwankuk-Kim, Hyuncheol Jeong, Yoojae Won Korea Information Security Agency, IT Infrastructure Protection Division
, ) I Transport Layer Security
Secure Sockets Layer (SSL, ) I Transport Layer Security _ + (TLS) Network Security Products S31213 UNCLASSIFIED Location of SSL -L Protocols TCP Ethernet IP SSL Header Encrypted SSL data= HTTP " Independent
NAT TCP SIP ALG Support
The feature allows embedded messages of the Session Initiation Protocol (SIP) passing through a device that is configured with Network Address Translation (NAT) to be translated and encoded back to the
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Network Security Protocols
Network Security Protocols EE657 Parallel Processing Fall 2000 Peachawat Peachavanish Level of Implementation Internet Layer Security Ex. IP Security Protocol (IPSEC) Host-to-Host Basis, No Packets Discrimination
Alcatel OmniPCX Enterprise R11 Supported SIP RFCs
Alcatel OmniPCX Enterprise R11 Supported SIP RFCs Product & Offer Large & Medium Enterprise Ref: 8AL020033225TCASA ed3 ESD/ Mid & Large Enterprise Product Line Management October 2013 OmniPCX Enterprise
ERserver. iseries. Securing applications with SSL
ERserver iseries Securing applications with SSL ERserver iseries Securing applications with SSL Copyright International Business Machines Corporation 2000, 2001. All rights reserved. US Government Users
Three attacks in SSL protocol and their solutions
Three attacks in SSL protocol and their solutions Hong lei Zhang Department of Computer Science The University of Auckland [email protected] Abstract Secure Socket Layer (SSL) and Transport Layer
TLS/SSL in distributed systems. Eugen Babinciuc
TLS/SSL in distributed systems Eugen Babinciuc Contents 1. Introduction to TLS/SSL 2. A quick review of cryptography 3. TLS/SSL in distributed systems 4. Conclusions Introduction to TLS/SSL TLS/SSL History
SIP: Ringing Timer Support for INVITE Client Transaction
SIP: Ringing Timer Support for INVITE Client Transaction Poojan Tanna ([email protected]) Motorola India Private Limited Outer Ring Road, Bangalore, India 560 037 Abstract-The time for which the Phone
Secure Socket Layer. Carlo U. Nicola, SGI FHNW With extracts from publications of : William Stallings.
Secure Socket Layer Carlo U. Nicola, SGI FHNW With extracts from publications of : William Stallings. Abstraction: Crypto building blocks NS HS13 2 Abstraction: The secure channel 1., run a key-exchange
Computer System Management: Hosting Servers, Miscellaneous
Computer System Management: Hosting Servers, Miscellaneous Amarjeet Singh October 22, 2012 Partly adopted from Computer System Management Slides by Navpreet Singh Logistics Any doubts on project/hypo explanation
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1 Dorgham Sisalem, Jiri Kuthan Fraunhofer Institute for Open Communication Systems (FhG Fokus) Kaiserin-Augusta-Allee
Understanding Digital Certificates and Secure Sockets Layer (SSL)
Understanding Digital Certificates and Secure Sockets Layer (SSL) Author: Peter Robinson January 2001 Version 1.1 Copyright 2001-2003 Entrust. All rights reserved. Digital Certificates What are they?
Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security
UNIT 4 SECURITY PRACTICE Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security Slides Courtesy of William Stallings, Cryptography & Network Security,
First Semester Examinations 2011/12 INTERNET PRINCIPLES
PAPER CODE NO. EXAMINER : Martin Gairing COMP211 DEPARTMENT : Computer Science Tel. No. 0151 795 4264 First Semester Examinations 2011/12 INTERNET PRINCIPLES TIME ALLOWED : Two Hours INSTRUCTIONS TO CANDIDATES
An Overview of Communication Manager Transport and Storage Encryption Algorithms
An Overview of Communication Manager Transport and Storage Encryption Algorithms Abstract The following paper provides a description of the standard algorithms that are implemented within Avaya Communication
ERserver. iseries. Secure Sockets Layer (SSL)
ERserver iseries Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) Copyright International Business Machines Corporation 2000, 2002. All rights reserved. US Government Users Restricted
Properties of Secure Network Communication
Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able to understand the contents of the transmitted message. Because eavesdroppers may intercept the message,
SSL Secure Socket Layer
??? SSL Secure Socket Layer - architecture and services - sessions and connections - SSL Record Protocol - SSL Handshake Protocol - key exchange alternatives - analysis of the SSL Record and Handshake
Secure VoIP Transmission through VPN Utilization
Secure VoIP Transmission through VPN Utilization Prashant Khobragade Department of Computer Science & Engineering RGCER Nagpur, India [email protected] Disha Gupta Department of Computer Science
Security Protocols/Standards
Security Protocols/Standards Security Protocols/Standards Security Protocols/Standards How do we actually communicate securely across a hostile network? Provide integrity, confidentiality, authenticity
Secured Communications using Linphone & Flexisip
Secured Communications using Linphone & Flexisip Solution description Office: Le Trident Bat D 34, avenue de l Europe 38100 Grenoble France Tel. : +33 (0)9 52 63 65 05 Headquarters: 12, allée des Genêts
