Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For

Similar documents
Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

SSL/TLS: The Ugly Truth

, ) I Transport Layer Security

Secure Socket Layer/ Transport Layer Security (SSL/TLS)

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Chapter 7 Transport-Level Security

Overview. SSL Cryptography Overview CHAPTER 1

Introduction. Haroula Zouridaki Mohammed Bin Abdullah Waheed Qureshi

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Properties of Secure Network Communication

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Savitribai Phule Pune University

Transport Layer Security Protocols

SSL A discussion of the Secure Socket Layer

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn

Secure Socket Layer. Carlo U. Nicola, SGI FHNW With extracts from publications of : William Stallings.

Transport Level Security

Real-Time Communication Security: SSL/TLS. Guevara Noubir CSU610

Communication Systems SSL

Network Security Essentials Chapter 5

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

Cornerstones of Security

You re FREE Guide SSL. (Secure Sockets Layer) webvisions

Managing SSL certificates in the ServerView Suite

HTTPS: Transport-Layer Security (TLS), aka Secure Sockets Layer (SSL)

How To Understand And Understand The Ssl Protocol ( And Its Security Features (Protocol)

CRYPTOGRAPHY IN NETWORK SECURITY

Overview of SSL. Outline. CSC/ECE 574 Computer and Network Security. Reminder: What Layer? Protocols. SSL Architecture

Lecture 9: Application of Cryptography

Three attacks in SSL protocol and their solutions

Announcement. Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed.

Security Policy Revision Date: 23 April 2009

Introduction to Cryptography

mod_ssl Cryptographic Techniques

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Chapter 17. Transport-Level Security

Web Security: Encryption & Authentication

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Network Security Fundamentals

Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols

TLS and SRTP for Skype Connect. Technical Datasheet

Some solutions commonly used in order to guarantee a certain level of safety and security are:

Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

DRAFT Standard Statement Encryption

CSC Network Security

CSC 474 Information Systems Security

Secure Socket Layer (TLS) Carlo U. Nicola, SGI FHNW With extracts from publications of : William Stallings.

Secure Sockets Layer (SSL) / Transport Layer Security (TLS)

As enterprises conduct more and more

SBClient SSL. Ehab AbuShmais

Security. Learning Objectives. This module will help you...

Security Engineering Part III Network Security. Security Protocols (I): SSL/TLS

Secure Sockets Layer

Understanding Digital Certificates and Secure Sockets Layer (SSL)

Enabling SSL and Client Certificates on the SAP J2EE Engine

Protocol Rollback and Network Security

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Lab 7. Answer. Figure 1

How To Encrypt Data With Encryption

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

[SMO-SFO-ICO-PE-046-GU-

Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities

Network Security. Outline of the Tutorial

Web Security Considerations

Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1

Authenticity of Public Keys

Sync Security and Privacy Brief

CSE/EE 461 Lecture 23

Chapter 9 Key Management 9.1 Distribution of Public Keys Public Announcement of Public Keys Publicly Available Directory

Outline. Transport Layer Security (TLS) Security Protocols (bmevihim132)

SECURITY IN NETWORKS

An Introduction to Cryptography as Applied to the Smart Grid

Cryptography and Network Security Sicurezza delle reti e dei sistemi informatici SSL/TSL

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Network Security Web Security and SSL/TLS. Angelos Keromytis Columbia University

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Is Your SSL Website and Mobile App Really Secure?

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Security Digital Certificate Manager

CSCE 465 Computer & Network Security

What is network security?

Ciphire Mail. Abstract

Chapter 7: Network security

Chapter 10. Network Security

Software Engineering 4C03 Research Project. An Overview of Secure Transmission on the World Wide Web. Sean MacDonald

Lukasz Pater CMMS Administrator and Developer

CS 758: Cryptography / Network Security

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

SSL Protect your users, start with yourself

Web Security. Mahalingam Ramkumar

Cryptographic Services Guide

ERserver. iseries. Secure Sockets Layer (SSL)

Authentication Types. Password-based Authentication. Off-Line Password Guessing

ERserver. iseries. Securing applications with SSL

Transcription:

Secure Socket Layer

Secure Socket Layer Introduction Overview of SSL What SSL is Useful For

Introduction Secure Socket Layer (SSL) Industry-standard method for protecting web communications. - Data encryption - Server authentication - Message integrity - Optional client authentication

TCP/IP Designed by DOD during Cold War Robust - Multiple paths to any destination - Packets can arrive out of order with no problem - Automatically retry if data doesn t reach destination - Automatic recovery from node or line failure Data is routed through many nodes

The Problem Any intermediary node could: Eavesdrop - Intercept sensitive information Tamper - Alter information - False messages Impersonate - Pretend to be destination

The Solution A system that: Encrypts data - A variety of encryption methods are available Checks message integrity - Two hashing methods are used Authenticates participants https

Versions SSL 1.0 - Limited to 40-bit keys (legal restriction) SSL 2.0-168-bit keys (Triple DES) SSL 3.0 - FORTEZZA support TLS 1.0 (Transport Layer Security) - Based on SSL 3.0 (internal version number is 3.1) - Non-interoperable with SSL, only minor differences

Overview of SSL SSL record protocol - Format to transmit data - Used during handshake phase and SSL session SSL handshake protocol - Authenticate server to client - Negotiate cryptographic algorithms - Optionally authenticate client to server - Public-key encryption to generate shared secrets - Establish encrypted SSL connection

Hashes Used in conjunction with cipher keys - Cipher key encrypts/decrypts data - Hash comparison ensures message integrity MD5-128-bit hash - Special pairs of messages with same hash SHA-1-160-bit hash - Believed to be cryptographically secure

Key-Exchange Algorithms Algorithm determines keys used Algorithms - RSA Rivest, Shamir, Adleman - KEA Key Exchange Algorithm - DH Diffie-Hellman - KRB5 Kerberos 5

Ciphers Cryptographic algorithms SSL supports several ciphers Ciphers can be enabled/disabled - Part of handshake is determining which to use - Server admin can disable less-secure methods Prevent third-party interception Check message integrity

Cipher Keys Pseudo-random number Used during encryption and decryption Key length one component of strength - Longer: more possible keys, more work to guess key Symmetric Key - Same key to encrypt and decrypt messages Public Key - One key to encrypt, a different one to decrypt

Key Length 40-bit Keys - 1 Trillion (10^12) keys - Breakable in a week with average PC (1997) - Legal limit for exportable suites until 1999 256-bit Keys - 116 Quattuorvigintillion (10^75) keys - Hundreds of trillions of years with same computer

Cipher Suites AES - 128, 192, or 256-bit keys - Supersedes DES - No known, practical attacks DES and Triple-DES (3DES) - 56-bit (DES) or 168-bit (3DES) keys - DES Vulnerable to brute force attacks IDEA - 128-bit keys - No known, good attacks

Cipher Suites RC2 - Variable key length (40 to 128-bit) - Vulnerable to related-key attack RC4 - Variable key length (40 to 256-bit) - Statistically, first few bytes are non-random SKIPJACK - 80-bit keys - Classified until 1998 - Vulnerable to impossible differential cryptanalysis

Certificates Used for Identity Verification - Public Key - Serial Number - Validity Period (cert. valid from to ) - Distinguishing Name (DN) - Issuer s DN - Issuer s Digital Signature

SSL Handshaking One of SSL s strength is extensibility - Range of hash/key exchange/cipher combinations Client and Server need to agree on one Server needs to prove identity Client might need to prove identity

Starting Handshake Client initiates contact by sending: - SSL version (determines available cipher suites) - Cipher settings (further limits cipher suites) - Randomly generated data - Any other information that might be needed - Request for server authentication Client Server

Server Responds Server responds to request with: - Server s SSL version - Server s cipher settings - Another piece of randomly generated data - Any other information needed - Server s Certificate (used to authenticate server) - Server may request client authentication Client Server

Server Authentication Is today s date within the validity period? Is the Issuer trusted? - List of trusted Certificate Authorities (CA) - Issuer s DN - Issuer s public key - Issuer s digital signature CA s public key validate digital sig.? Does server s DN match cert. s DN?

Trusted CA List Clients keep list of trusted CAs - Issuer s DN - Issuer s public key - Issuer s digital signature If Issuer s DN in list all is good If not, check certificate chain - CA Hierarchies

CA Hierarchy University Fine Arts Science Library Staff Labs Networking

CA Hierarchies Labs Group not in list of trusted CAs - Labs Group is subordinate to Library, check Library University Fine Arts Science Library Staff Unknown Labs CA Networking

CA Hierarchies Library is also not in list of trusted CAs - Library is subordinate to University, check University University Fine Arts Science Unknown LibraryCA Staff Unknown Labs CA Networking

CA Hierarchies University is in list of trusted CAs - Original Issuer (Labs Group) checks out University Fine Arts Science Library Staff Labs Networking

Authentication Everything checks out - Server is who it says it is, continue Something s wrong - Warn the user that authenticated and encrypted connection cannot be established

Premaster Secret Client generates Premaster Secret - 2 bytes is the SSL version, other 46 are random Encrypt P.S. with server s public key Send encrypted P.S. to server If client authentication was requested - Sign a hash of all SSL messages so far - Send signed data and client certificate with P.S.

Client Authentication Optional Does client s public key validate sig.? Is today s date within validity period? Is issuing CA trusted? Does CA s public key validate sig.? Is user s certificate listed in LDAP entry? - Optional Is client authorized for the service? - Access Control Lists (ACLs)

Master Secret Premaster Secret - Server decrypts with private key Server & Client generate Master Secret - Same P.S. - Same steps - Independent of each other

Session Keys Server & Client generate session keys - Use master secret - Symmetric keys to encrypt and decrypt data Why Symmetric cryptography? - Faster than Public Key cryptography - Since Server & Client don t transmit actual key it is secure enough

Finishing Handshake Client done - Message that all future messages will be encrypted - Sends encrypted message that handshake is done Server done - Message that all future messages will be encrypted - Sends encrypted message that handshake is done SSL Session begins - Session keys used to encrypt and decrypt data - Session keys also used to validate messages

Uses of SSL/TLS ecommerce - Banking - Online stores secure mail (U.CC) secure news radmind - DHCP - Three levels of security (0, 1, 2)

Campus Resources University Internal CA - Managed by ISO Uses - Available for servers/applications - Radius - Time - VPN - SSL Web Servers - No certificates for individuals at this time

Campus Certificate Public certificate - ITAC web site (available in handout) - Adds U to list of trusted CAs Generating a certificate - email ca@utah.edu - Contact information - Application to use the certificate - Either FQDN of host or a certificate request file

Best Practices Hosts must meet ISO requirements - Vulnerability scans run before cert is issued - Periodic scans afterwards Currently no best practice document - ISO is accepting recommendations Do not use PEAP - Plain text password storage

Issues Self-Signed Certificates and Mac OS X - Does not automatically accept self-signed certificates - Security feature - Manually install certificate to KeyChain - Requires that cert be available for download To Add a Self-Signed Certificate - Download - Make sure the cert names ends in.cer or.dem - Double-Click on the certificate - Add to Keychain