Overview SSL/TLS HTTPS SSH. TLS Protocol Architecture TLS Handshake Protocol TLS Record Protocol. SSH Protocol Architecture SSH Transport Protocol



Similar documents
Network Security Essentials Chapter 5

Chapter 17. Transport-Level Security

Chapter 7 Transport-Level Security

SSH Secure Shell. What is SSH?

The Secure Sockets Layer (SSL)

Transport Layer Security Protocols

Transport Level Security

Web Security Considerations

Network Security. Lecture 3

Secure Socket Layer/ Transport Layer Security (SSL/TLS)

Network Security Part II: Standards

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

Secure Socket Layer (SSL) and Transport Layer Security (TLS)

Computer Networks. Secure Systems

Network Security - Secure upper layer protocols - Background. Security. Question from last lecture: What s a birthday attack? Dr.

How To Understand And Understand The Ssl Protocol ( And Its Security Features (Protocol)

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Communication Systems SSL

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

Lecture 10: Communications Security

Secure Socket Layer (SSL) and Trnasport Layer Security (TLS)

Secure Shell SSH provides support for secure remote login, secure file transfer, and secure TCP/IP and X11 forwarding. It can automatically encrypt,

Real-Time Communication Security: SSL/TLS. Guevara Noubir CSU610

Communication Security for Applications

Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Using etoken for SSL Web Authentication. SSL V3.0 Overview

How To Understand And Understand The Security Of A Key Infrastructure

CSC Network Security

CSC 474 Information Systems Security

T Cryptography and Data Security

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

CTS2134 Introduction to Networking. Module Network Security

Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Secure Sockets Layer

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

TLS and SRTP for Skype Connect. Technical Datasheet

Spirent Abacus. SIP over TLS Test 编 号 版 本 修 改 时 间 说 明

Secure Socket Layer. Carlo U. Nicola, SGI FHNW With extracts from publications of : William Stallings.

Security Engineering Part III Network Security. Security Protocols (I): SSL/TLS

For the protocol access paths listed in the following table, the Sentry firmware actively listens on server ports to provide security for the CDU.

Vulnerabilità dei protocolli SSL/TLS

WEB Security & SET. Outline. Web Security Considerations. Web Security Considerations. Secure Socket Layer (SSL) and Transport Layer Security (TLS)

, SNMP, Securing the Web: SSL

SBClient SSL. Ehab AbuShmais

Overview of SSL. Outline. CSC/ECE 574 Computer and Network Security. Reminder: What Layer? Protocols. SSL Architecture

Announcement. Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed.

Overview. SSL Cryptography Overview CHAPTER 1

Network Security Fundamentals

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace

Security Protocols and Infrastructures. h_da, Winter Term 2011/2012

As enterprises conduct more and more

Secure network protocols: how SSL/TLS, SSH, SFTP and FTPS work

TLS/SSL in distributed systems. Eugen Babinciuc

SECURE SOCKETS LAYER (SSL) SECURE SOCKETS LAYER (SSL) SSL ARCHITECTURE SSL/TLS DIFFERENCES SSL ARCHITECTURE. INFS 766 Internet Security Protocols

HTTPS: Transport-Layer Security (TLS), aka Secure Sockets Layer (SSL)

Chapter 32 Internet Security

[SMO-SFO-ICO-PE-046-GU-

SSL/TLS. What Layer? History. SSL vs. IPsec. SSL Architecture. SSL Architecture. IT443 Network Security Administration Instructor: Bo Sheng

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Network Management Card Security Implementation

Standards and Products. Computer Security. Kerberos. Kerberos

Configuring SSH and Telnet

Managing and Securing Computer Networks. Guy Leduc. Chapter 4: Securing TCP. connections. connections. Chapter goals: security in practice:

Secure Socket Layer. Security Threat Classifications

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Cleaning Encrypted Traffic

Outline. Transport Layer Security (TLS) Security Protocols (bmevihim132)

Chapter 10. Network Security

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

Einführung in SSL mit Wireshark

Three attacks in SSL protocol and their solutions

SECURE SOCKETS LAYER (SSL)

CPS Computer Security Lecture 9: Introduction to Network Security. Xiaowei Yang

SSL: Secure Socket Layer

Insecure network services. Firewalls. Two separable topics. Packet filtering. Example: blocking forgeries. Example: blocking outgoing mail

Network Security Web Security and SSL/TLS. Angelos Keromytis Columbia University

Web Security. Mahalingam Ramkumar

File Transfer Protocol (FTP) & SSH

Cryptography and Network Security Sicurezza delle reti e dei sistemi informatici SSL/TSL

Exam Questions SY0-401

Lecture 31 SSL. SSL: Secure Socket Layer. History SSL SSL. Security April 13, 2005

Secure Use of the New NHS Network (N3): Good Practice Guidelines

Grid Computing - X.509

4.1: Securing Applications Remote Login: Secure Shell (SSH) PEM/PGP. Chapter 5: Security Concepts for Networks

SSL Handshake Analysis

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

ms-help://ms.technet.2005mar.1033/winnetsv/tnoffline/prodtechnol/winnetsv/plan/ssl...

ERserver. iseries. Secure Sockets Layer (SSL)

ERserver. iseries. Securing applications with SSL

T Cryptography and Data Security

Lecture 7: Transport Level Security SSL/TLS. Course Admin

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

Introduction to Computer Security

Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace

Transcription:

SSL/TLS TLS Protocol Architecture TLS Handshake Protocol TLS Record Protocol HTTPS SSH SSH Protocol Architecture SSH Transport Protocol Overview SSH User Authentication Protocol SSH Connection Protocol

SSL/TLS Secure Sockets Layer Provides privacy and data integrity Netscape, around 1995 SSLv3 Key size: 128 bit / 40 bit for export TLS: Transport Layer Security Based upon SSLv3 IETF Two versions TLS 1.0 (RFC 2246 & RFC 3546) TLS 1.1 (RFC 4346 & RFC 4366)

TLS Goals Defined in RFC 4346: 1. Cryptographic security 2. Interoperability 3. Extensibility 4. Relative efficiency Session caching 3

TLS Protocol Architecture RFC 4346 Handshake Protocol Change Cipher Spec Protocol Alert Protocol Application Protocol Client / Server authentication Algorithm and key negotiation Record Protocol Confidentiality Message Integrity TCP* UDP: RFC 4347 4

TLS Phases client server Peer negotiation Determine algorithm support Key exchange & Authentication Key exchange Authentication (certificate-based) Using public key encryption Data exchange Using symmetric encryption 5

TLS Handshake Protocol Peer negotiation client server Client hello SSL version Session ID Random Cipher suite Compression method Server hello SSL version Session ID Random Cipher suite Compression method 6

TLS Handshake Protocol Key exchange & Authentication client server certificate server key exchange certificate request server hello done If requested by client, server sends its authentication data plus keys certificate client key exchange If necessary, clients sends its authentication data plus keys certificate verify 7

TLS Change Cipher Spec Protocol client server change cipher spec finished Change cipher spec activates new algorithms Finished verifies new algorithms After server sends Finished, actual data exchange starts change cipher spec finished 8

Ciphers in practice See: The SSL Landscape - A Thorough Analysis of the X.509 PKI Using Active and Passive Measurements - Ralph Holz - IMC2011 9

TLS Record Protocol Application data Fragment Compress Add MAC Encrypt Append header 10

Certificates Create a certificate for your website Ask a CA to sign the certificate Use the certificate if clients access your website

Certificates in practice See: The SSL Landscape - A Thorough Analysis of the X.509 PKI Using Active and Passive Measurements - Ralph Holz - IMC2011 s per 12

Certificate creation Generate public-private key pair Generate CSR: Certificate Signing Request - public key - certificate - signed with private key Website CA 13

Certificate signed by a CA Send CSR Check CSR integrity - using public key Verify identity website Generate certificate - signed with CAs private key Send Certificate Website CA 14

Type of certificates 1. Domain Validated Certificate DV-SSL CA sends validation mail to web master 2. Organisation Validation Certificate OV-SSL CA additionally checks existence of organisation 3. Extended Validation Certificate EV-SSL CA additionally checks if requester is authorized Expensive (> 100 Euro) 15

Certificate types in browsers Browsers show for all certificates the locked sign 1. Domain Validated Certificate Firefox: blue Opera: yellow 2. Extended Validation Certificate Firefox: green IE: green Chrome: green Safari: green 16

SSL connect Certificates Send signed certificate Check certificate - CA trusted? - On certificate revocation list (CRL)? - Check using Online Certificate Status Protocol (OSCP) Browser Website 17

HTTPS Introduced by Netscape Application on top of SSL/TLS Same as normal HTTP protocol RFC 2812 (Informational) Uses port 443 Server requires certificate Clients may also hold their own certificates

SSH NOT an application on top of SSL Replacement for TELNET, rlogin, rsh 1995: version 1, 1996: version 2 SSH Communications Security OpenSSH 2006: IETF secsh WG, many RFCs

SSH Protocol Architecture SSH Applications RFC 4251 SSH-CONNECT SSH Connection Protocol RFC 4254 Logical channels SSH-USERAUTH SSH-TRANS SSH User Authentication Protocol SSH Transport Protocol TCP RFC 4252 RFC 4253 Client authentication Server authentication Confidentiality Integrity Compression (option) 20

SSH Transport Protocol Initial key exchange / Key re-exchange Diffie-Hellman Encryption: Recommended: aes128-cbc Required: 3des-cbc Optional: blowfish-cbc, twofish-cbc, aes192-cbc, aes256-cbc, serpent-cbc, arcfour (RC4), idea-cbc, cast128-cbc, none Server authentication Recommended: hmac-sha1-96 Required: hmac-sha1 Optional: hmac-md5, none Compression: Required: None Optional: zlib (lz77) 21

SSH Transport Protocol - Timeline client server TCP connection setup SSH version string exchange SSH key exchange / algorithm negotiation SSH data exchange key / algorithm re-negotiation TCP connection release time 22

SSH Transport Protocol - Binary Packet Protocol packet length padding length max: 32768 octets payload (may be compressed) max: 35000 octets random padding MAC 23

SSH Transport Protocol - Server authentication Based on the server s host key The client must check this key Models the client has a local database that associates each host name with the corresponding public host key the host name to key association is certified by a trusted CA and the server provides the necessary certificates or the client obtains them from elsewhere check fingerprint of the key over an external channel (e.g., phone) best effort: accept host key without check when connecting the first time to the server save the host key in the local database, and check against the saved key on all future connections to the same server source: www.hit.bme.hu/~buttyan/courses/bmevihi9367/ssh.ppt 24

SSH User Authentication Protocol Methods public key password host based keyboard-interactive (RFC 4256) Time Out period 10 minutes Too many attempts 20 attempts 25

SSH Connection Protocol Multiplexing protocol Opens and closes channels Multiple channels are mapped on a single SSH transport connection Each application uses one or more dedicated channels Allows for out-of-band control: change size of a terminal window application flow control exit code of a server-side process. Each channel is locally identified by channel number Standard channel types include: shell direct-tcpip forwarded-tcpip 26

SSH Applications SSH: Secure Shell SCP: Secure Copy SFTP: Secure FTP SSHFS: Secure SHell FileSystem ISMS: Integrated Security Model for SNMP Port forwarding (tunneling) 27

Port forwarding (Tunneling) client server A Application B Application x client firewall server A Application C B Application SSH Client y SSH Server 22 x 28

SSH References Wikipedia http://en.wikipedia.org/wiki/ssh IETF SECSH WG http://www.ietf.org/html.charters/secsh-charter.html Levente Buttyán, BME-HIT www.hit.bme.hu/~buttyan/courses/bmevihi4372/ssh.pdf SSH: The Definitive Guide http://www.snailbook.com/ 29

SSH versus SSL/TLS SSH: Server authentication mandatory Client authentication: many options Authentication based on SSH keys Provides logical data channel multiplexing SSL/TLS: Server authentication is optional (although generally chosen) Client authentication: only public keys Authentication based on X.509 certificates Does not provide logical data channel multiplexing