Web Security Considerations



Similar documents
Communication Systems SSL

The Secure Sockets Layer (SSL)

CSC 474 Information Systems Security

CSC Network Security

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

Chapter 17. Transport-Level Security

Communication Security for Applications

Secure Socket Layer/ Transport Layer Security (SSL/TLS)

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

Chapter 7 Transport-Level Security

How To Understand And Understand The Ssl Protocol ( And Its Security Features (Protocol)

Network Security Part II: Standards

Network Security Essentials Chapter 5

Real-Time Communication Security: SSL/TLS. Guevara Noubir CSU610

Transport Layer Security Protocols

SECURE SOCKETS LAYER (SSL)

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Secure Socket Layer. Security Threat Classifications

Overview of SSL. Outline. CSC/ECE 574 Computer and Network Security. Reminder: What Layer? Protocols. SSL Architecture

SSL/TLS. What Layer? History. SSL vs. IPsec. SSL Architecture. SSL Architecture. IT443 Network Security Administration Instructor: Bo Sheng

Security Engineering Part III Network Security. Security Protocols (I): SSL/TLS

Announcement. Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed.

Outline. Transport Layer Security (TLS) Security Protocols (bmevihim132)

Secure Socket Layer (SSL) and Trnasport Layer Security (TLS)

SECURE SOCKETS LAYER (SSL) SECURE SOCKETS LAYER (SSL) SSL ARCHITECTURE SSL/TLS DIFFERENCES SSL ARCHITECTURE. INFS 766 Internet Security Protocols

Cryptography and Network Security Sicurezza delle reti e dei sistemi informatici SSL/TSL

Managing and Securing Computer Networks. Guy Leduc. Chapter 4: Securing TCP. connections. connections. Chapter goals: security in practice:

Secure Sockets Layer

Security Protocols and Infrastructures. h_da, Winter Term 2011/2012

SSL Secure Socket Layer

WEB Security & SET. Outline. Web Security Considerations. Web Security Considerations. Secure Socket Layer (SSL) and Transport Layer Security (TLS)

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Transport Level Security

Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Network Security Web Security and SSL/TLS. Angelos Keromytis Columbia University

Information Security

HTTPS: Transport-Layer Security (TLS), aka Secure Sockets Layer (SSL)

SSL Secure Socket Layer

Overview. SSL Cryptography Overview CHAPTER 1

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Secure Socket Layer. Carlo U. Nicola, SGI FHNW With extracts from publications of : William Stallings.

Lecture 7: Transport Level Security SSL/TLS. Course Admin

SSL: Secure Socket Layer

Software Engineering 4C03 Research Project. An Overview of Secure Transmission on the World Wide Web. Sean MacDonald

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

Secure Socket Layer (SSL) and Transport Layer Security (TLS)

Lab 7. Answer. Figure 1

Security Protocols/Standards

TLS/SSL in distributed systems. Eugen Babinciuc

Secure Socket Layer (TLS) Carlo U. Nicola, SGI FHNW With extracts from publications of : William Stallings.

Overview SSL/TLS HTTPS SSH. TLS Protocol Architecture TLS Handshake Protocol TLS Record Protocol. SSH Protocol Architecture SSH Transport Protocol

Authenticity of Public Keys

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Lecture 4: Transport Layer Security (secure Socket Layer)

Computer and Network Security

Three attacks in SSL protocol and their solutions

ENHANCED SECURITY IN SECURE SOCKET LAYER 3.0 SPECIFICATION

Vulnerabilità dei protocolli SSL/TLS

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

ISA 562 Information System Security

TLS and SRTP for Skype Connect. Technical Datasheet

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

Lecture 10: Communications Security

Cryptography and Network Security IPSEC

Einführung in SSL mit Wireshark

Protocol Rollback and Network Security

Chapter 32 Internet Security

Today s Topics SSL/TLS. Certification Authorities VPN. Server Certificates Client Certificates. Trust Registration Authorities

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace

Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Web Security. Mahalingam Ramkumar

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Embedded SSL. Christophe Kiennert, Pascal Urien. Embedded SSL - Christophe Kiennert, Pascal Urien 1

SSL A discussion of the Secure Socket Layer

Lecture 31 SSL. SSL: Secure Socket Layer. History SSL SSL. Security April 13, 2005

Transport Layer Security (TLS)

Learning Network Security with SSL The OpenSSL Way

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Security. Learning Objectives. This module will help you...

MatrixSSL Developer s Guide

Network Security - Secure upper layer protocols - Background. Security. Question from last lecture: What s a birthday attack? Dr.

Certificates and network security

Chapter 10. Network Security

Low-Level TLS Hacking

, ) I Transport Layer Security

Binding Security Tokens to TLS Channels. A. Langley, Google Inc. D. Balfanz, Google Inc. A. Popov, Microsoft Corp.

ERserver. iseries. Securing applications with SSL

T Cryptography and Data Security

Transport Layer Security

Chapter 27 Secure Sockets Layer (SSL)

Network Security Protocols

Chapter 51 Secure Sockets Layer (SSL)

As enterprises conduct more and more

Spirent Abacus. SIP over TLS Test 编 号 版 本 修 改 时 间 说 明

Chapter 34 Secure Sockets Layer (SSL)

Transcription:

CEN 448 Security and Internet Protocols Chapter 17 Web Security Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University mdahshan@ccis.ksu.edu.sa Web Security Considerations Web is client/server application over Internet Internet is 2-way, unlike traditional publishing Many businesses depend on web Underlying software is very complex browsers, web servers easy to use, configure however, software hide many security flaws Attack on web servers can harm other computers within organization Many users don t know enough to handle risks

Web Security Threats Web Security Approaches IPSec Transparent to applications General purpose Filtering capability SSL/TLS Part of protocol, thus, transparent to applications or embedded into packages (e.g. browsers) Kerberos, S/MIME/PGP Embedded into packages Can be tailored to specific application needs

Secure Socket Layer (SSL) Originated by Netscape (SSLv3) Transport Layer Security developed by IETF TLS = SSLv3.1, backward compatible v3 Discussion is mainly for SSLv3 SSL Architecture Designed to work with TCP Provide end-to-end reliable service Two layers of protocols SSL record protocol provide services to upper protocols SSL Handshake, Change Cipher Spec, Alert used in management of SSL exchanges HTTP can operate on top of SSL

SSL Architecture SSL Connections and Sessions Connection peer-to-peer relationship, transport layer transient associated with one session Session association between client, server created by Handshake Protocol define set of cryptographic security parameters parameters shared by multiple connections avoid negotiating new parameters/connection

Session State Parameters Session identifier Peer certificate X.509v3 certificate of the peer Compression method Cipher spec encryption algorithm (e.g. AES), hash (MD5) Master secret key shared between client, server Is resumable Connection State Parameters Server and client random Server MAC secret Client MAC secret Server write key Client write key Initialization vector IV used with CBC mode Sequence numbers secret keys used in MAC operations secret encryption keys

SSL Record Protocol Provides two services to SSL connections confidentiality: encryption of SSL payloads message integrity: using MAC Steps fragmentation: to blocks of 2 14 bytes compression: optional MAC: of compressed data, secret key used encryption: symmetric block or stream cipher prepending header SSL Record Protocol

SSL Record Format header SSL Record Protocol Payload

Change Cipher Spec Protocol Consists of single message change_cipher_spec single byte, value = 1 Cause pending state to be copied to current updates cipher suite to be used on connection Alert Protocol Convey SSL related alerts to peer entity Alert messages compressed, encrypted Consists of 2 bytes First byte take values warning (1), fatal (2) Fatal SSL terminates connection other connections in same session continue no new connections allowed Second byte contains code of specific alert

Handshake Protocol Most complex part of SSL Allows server and client to authenticate each other negotiate algorithms, keys used (crypt, MAC) Used before any application data transmitted Consists of 4 phases

Phase 1: Establish Security Capabilities Initiate logical connection Establish associated security capabilities client_hello message version: highest supported SSL version CipherSuite: list of supported crypt algorithms in decreasing order of preference server_hello message version: highest supported by both client, server CipherSuite: selected suite from proposed list Phase 2: Server Authentication and Key Exchange certificate message server sends its X.509 certificate or chain certificate_key_exchange message parameters for key exchange required by some algorithms (no shared key) certificate_request message list of acceptable certificate authorities server_done message indicate end of server hello messages

Phase 3: Client Authentication and Key Exchange Client verify server certificate is valid Check that parameters are acceptable certificate_message sent if server requested certificate client_key_exchange message parameters for key exchange certificate_verify message optional, for some certificate types Phase 4: Finish Completes setting up secure connection change_cipher_spec message sent using Change Cipher Spec protocol finished message sent with established algorithms, keys verifies key exchange, auth were successful

TLS Differences From SSL Version number MAC algorithm and scope of calculation Pseudorandom function Alert codes: one unsupported, many added Client certificate types: some unsupported Hash calculation for messages certificate_verify finished Additional References About SSL/TLS, www.cs.bham.ac.uk/~mdr/teaching/modules03/se curity/students/ss8a/ssltls.html SSL/TLS Protocol overview, www.lincoln.edu/math/rmyrick/computernetwork s/inetreference/121.htm Implementing Web Site Client Authentication Using Digital IDs, www.verisign.com/clientauth/kit/details.html Secure Sockets Layer (SSL) Protocol, islab.oregonstate.edu/koc/ece575/99project/ying/ index.htm