Lab 7. Answer. Figure 1



Similar documents
Web Security Considerations

Announcement. Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed.

Information Security

Communication Security for Applications

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace

Overview. SSL Cryptography Overview CHAPTER 1

How To Understand And Understand The Ssl Protocol ( And Its Security Features (Protocol)

Lecture 7: Transport Level Security SSL/TLS. Course Admin

Secure Sockets Layer

The Secure Sockets Layer (SSL)

, ) I Transport Layer Security

Security Engineering Part III Network Security. Security Protocols (I): SSL/TLS

Communication Systems SSL

Software Engineering 4C03 Research Project. An Overview of Secure Transmission on the World Wide Web. Sean MacDonald

HTTPS: Transport-Layer Security (TLS), aka Secure Sockets Layer (SSL)

SECURE SOCKETS LAYER (SSL)

CSC Network Security

Secure Socket Layer. Security Threat Classifications

CSC 474 Information Systems Security

Secure Socket Layer (SSL) and Transport Layer Security (TLS)

Real-Time Communication Security: SSL/TLS. Guevara Noubir CSU610

Managing and Securing Computer Networks. Guy Leduc. Chapter 4: Securing TCP. connections. connections. Chapter goals: security in practice:

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

Secure Socket Layer (SSL) and Trnasport Layer Security (TLS)

SSL A discussion of the Secure Socket Layer

Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1

TLS/SSL in distributed systems. Eugen Babinciuc

Transport Layer Security Protocols

SSL Secure Socket Layer

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Protocol Rollback and Network Security

Overview of SSL. Outline. CSC/ECE 574 Computer and Network Security. Reminder: What Layer? Protocols. SSL Architecture

Outline. Transport Layer Security (TLS) Security Protocols (bmevihim132)

Cryptography and Network Security Sicurezza delle reti e dei sistemi informatici SSL/TSL

Network Security Part II: Standards

Authenticity of Public Keys

Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For

Web Security. Mahalingam Ramkumar

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Chapter 7 Transport-Level Security

SSL Secure Socket Layer

Certificate Authorities and Public Keys. How they work and 10+ ways to hack them.

Lecture 4: Transport Layer Security (secure Socket Layer)

Einführung in SSL mit Wireshark

Transport Level Security

Secure Socket Layer/ Transport Layer Security (SSL/TLS)

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Secure Socket Layer (TLS) Carlo U. Nicola, SGI FHNW With extracts from publications of : William Stallings.

Network Security Essentials Chapter 5

TLS-RSA-PSK. Channel Binding using Transport Layer Security with Pre Shared Keys

SECURE SOCKETS LAYER (SSL) SECURE SOCKETS LAYER (SSL) SSL ARCHITECTURE SSL/TLS DIFFERENCES SSL ARCHITECTURE. INFS 766 Internet Security Protocols

Network Security Web Security and SSL/TLS. Angelos Keromytis Columbia University

Secure Socket Layer. Carlo U. Nicola, SGI FHNW With extracts from publications of : William Stallings.

Some solutions commonly used in order to guarantee a certain level of safety and security are:

Chapter 17. Transport-Level Security

Key Management (Distribution and Certification) (1)

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Savitribai Phule Pune University

Maximizing Performance with SPDY & SSL. Billy Hoffman

Computer and Network Security

SSL: Secure Socket Layer

Learning Network Security with SSL The OpenSSL Way

, SNMP, Securing the Web: SSL

Security Protocols/Standards

SSL Handshake Analysis

Low-Level TLS Hacking

Security Protocols and Infrastructures. h_da, Winter Term 2011/2012

Midterm. Name: Andrew user id:

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Introduction to Cryptography

TLS and SRTP for Skype Connect. Technical Datasheet

Security. Learning Objectives. This module will help you...

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

!" # $%!" &$' *'! +&,% -./!&,%!!/ 0!" 1$! Eve. Bob. Alice. Bob. Alice

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

SSL Protect your users, start with yourself

Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1

T Cryptography and Data Security

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

Network Forensic Investigation of HTTPS Protocol

Three attacks in SSL protocol and their solutions

ERserver. iseries. Securing applications with SSL

As enterprises conduct more and more

ISM/ISC Middleware Module

MatrixSSL Developer s Guide

Client Server Registration Protocol

HW/Lab 3: SSL/TLS. CS 336/536: Computer Network Security DUE 11am on Nov 16 (Monday)

WEB Security & SET. Outline. Web Security Considerations. Web Security Considerations. Secure Socket Layer (SSL) and Transport Layer Security (TLS)

Lecture 10: Communications Security

Verifying security protocols using theorem provers

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Cryptography and Network Security IPSEC

Transcription:

Lab 7 1. For each of the first 8 Ethernet frames, specify the source of the frame (client or server), determine the number of SSL records that are included in the frame, and list the SSL record types that are included in the frame. Draw a timing diagram between client and server, with one arrow for each SSL record. Figure 1 No. Frame Source Destination SSL Count SSL Type 1 106 128.238.38.162 216.75.194.220 1 Client Hello 2 108 216.75.194.220 128.238.38.162 1 Server Hello 3 111 216.75.194.220 128.238.38.162 2 Server Hello Done 4 112 128.238.38.162 216.75.194.220 3 Client Key Exchange 5 113 216.75.194.220 128.238.38.162 2 Change Cipher Spec 6 114 128.238.38.162 216.75.194.220 1 Application Data 7 122 216.75.194.220 128.238.38.162 1 Application Data 8 127 216.75.194.220 128.238.38.162 1 Application Data

2. Each of the SSL records begins with the same three fields (with possibly different values). One of these fields is content type and has length of one byte. List all three fields and their lengths. Content Type = 1 byte Version = 2 bytes Length = 2 bytes

3. Expand the ClientHello record. (If your trace contains multiple ClientHello records, expand the frame that contains the first one.) What is the value of the content type? The content type is 22 4. Does the ClientHello record contain a nonce (also known as a challenge )? If so, what is the value of the challenge in hexadecimal notation? 66 df 78 4c 04 8c d6 04 35 dc 44 89 89 46 99 09

5. Does the ClientHello record advertise the cyber suites it supports? If so, in the first listed suite, what are the public key algorithm, the symmetric key algorithm, and the hash algorithm? Public key algorithm: RSA Symmetric key algorithm: RC4 Hash algorithm: MD5 6. Locate the ServerHello SSL record. Does this record specify a chosen cipher suite? What are the algorithms in the chosen cipher suite? Same as above question, Public key algorithm: RSA Symmetric key algorithm: RC4 Hash algorithm: MD5 7. Does this record include a nonce? If so, how long is it? What is the purpose of the client and server nonces in SSL? Yes, it is 32 bits long (28bits data + 4 bits time), it is used for attack preventing.

8. Does this record include a session ID? What is the purpose of the session ID? Yes, the session ID in the record is an identifier for SSL session. This ID could let the client to resume the session later by using the session ID. 9. Does this record contain a certificate, or is the certificate included in a separate record. Does the certificate fit into a single Ethernet frame? No, there is no certificate in this record. The certificate is in the separate record. Yes, the certificate fit into a single Ethernet frame. 10. Locate the client key exchange record. Does this record contain a pre master secret? What is this secret used for? Is the secret encrypted? If so, how? How long is the encrypted secret? Yes, this record contains a pre master secret. The master secret is created using this pre master secret. The master key is used to create session key. The secret is encrypted by public key, the encrypted secret is 120 bytes. 11. What is the purpose of the Change Cipher Spec record? How many bytes is the record in your trace?

The Change Cipher Spec record is used to indicate the content of the next SSL records will be encrypted. It is 6 bytes. 12. In the encrypted handshake record, what is being encrypted? How? All handshake messages and MAC addresses are concatenated and encrypted. They are sent to the server. 13. Does the server also send a change cipher record and an encrypted handshake record to the client? How are those records different from those sent by the client? Yes, the server s encrypted handshake contains all the handshake messages sent from the server. Other contains messages sent from client. 14. How is the application data being encrypted? Do the records containing application data include a MAC? Does Wireshark distinguish between the encrypted application data and the MAC? The symmetric encryption algorithm is used to encrypt the application data. Yes, the records containing application data include a MAC. No, Wireshark did not distinguish between the encrypted application data and the MAC. 15. Comment on and explain anything else that you found interesting in the trace. No more comment, everything as expected.