3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol



Similar documents
Web Security Considerations

Secure Socket Layer/ Transport Layer Security (SSL/TLS)

The Secure Sockets Layer (SSL)

Communication Systems SSL

Transport Layer Security Protocols

Network Security Essentials Chapter 5

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

Chapter 17. Transport-Level Security

Security Protocols/Standards

CSC Network Security

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

CSC 474 Information Systems Security

Security Engineering Part III Network Security. Security Protocols (I): SSL/TLS

Chapter 7 Transport-Level Security

Communication Security for Applications

How To Understand And Understand The Ssl Protocol ( And Its Security Features (Protocol)

Secure Socket Layer (SSL) and Trnasport Layer Security (TLS)

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace

Secure Socket Layer (SSL) and Transport Layer Security (TLS)

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Transport Level Security

Network Security Part II: Standards

Real-Time Communication Security: SSL/TLS. Guevara Noubir CSU610

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Lecture 7: Transport Level Security SSL/TLS. Course Admin

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Announcement. Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed.

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

HTTPS: Transport-Layer Security (TLS), aka Secure Sockets Layer (SSL)

WEB Security & SET. Outline. Web Security Considerations. Web Security Considerations. Secure Socket Layer (SSL) and Transport Layer Security (TLS)

Managing and Securing Computer Networks. Guy Leduc. Chapter 4: Securing TCP. connections. connections. Chapter goals: security in practice:

SSL/TLS. What Layer? History. SSL vs. IPsec. SSL Architecture. SSL Architecture. IT443 Network Security Administration Instructor: Bo Sheng

Overview of SSL. Outline. CSC/ECE 574 Computer and Network Security. Reminder: What Layer? Protocols. SSL Architecture

Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1

Overview. SSL Cryptography Overview CHAPTER 1

SECURE SOCKETS LAYER (SSL)

SECURE SOCKETS LAYER (SSL) SECURE SOCKETS LAYER (SSL) SSL ARCHITECTURE SSL/TLS DIFFERENCES SSL ARCHITECTURE. INFS 766 Internet Security Protocols

Secure Sockets Layer

TLS/SSL in distributed systems. Eugen Babinciuc

Secure Socket Layer. Carlo U. Nicola, SGI FHNW With extracts from publications of : William Stallings.

TLS and SRTP for Skype Connect. Technical Datasheet

Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

Einführung in SSL mit Wireshark

Key Management (Distribution and Certification) (1)

Web Security. Mahalingam Ramkumar

, ) I Transport Layer Security

Overview SSL/TLS HTTPS SSH. TLS Protocol Architecture TLS Handshake Protocol TLS Record Protocol. SSH Protocol Architecture SSH Transport Protocol

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Secure Socket Layer. Security Threat Classifications

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Secure Socket Layer (TLS) Carlo U. Nicola, SGI FHNW With extracts from publications of : William Stallings.

Chapter 32 Internet Security

Spirent Abacus. SIP over TLS Test 编 号 版 本 修 改 时 间 说 明

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

Network Security Web Security and SSL/TLS. Angelos Keromytis Columbia University

Three attacks in SSL protocol and their solutions

Lab 7. Answer. Figure 1

SSL Handshake Analysis

Lecture 10: Communications Security

, SNMP, Securing the Web: SSL

Outline. Transport Layer Security (TLS) Security Protocols (bmevihim132)

Vulnerabilità dei protocolli SSL/TLS

SSL A discussion of the Secure Socket Layer

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For

Understanding Digital Certificates and Secure Sockets Layer (SSL)

SSL: Secure Socket Layer

SSL/TLS: The Ugly Truth

Lecture 4: Transport Layer Security (secure Socket Layer)

Chapter 10. Network Security

Software Engineering 4C03 Research Project. An Overview of Secure Transmission on the World Wide Web. Sean MacDonald

Early Recognition of Encrypted Applications

ETSF10 Part 3 Lect 2

Security Protocols and Infrastructures. h_da, Winter Term 2011/2012

Network Security - Secure upper layer protocols - Background. Security. Question from last lecture: What s a birthday attack? Dr.

Protocol Rollback and Network Security

Cryptography and Network Security Sicurezza delle reti e dei sistemi informatici SSL/TSL

Netzwerksicherheit: Anwendungen

Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

4.1: Securing Applications Remote Login: Secure Shell (SSH) PEM/PGP. Chapter 5: Security Concepts for Networks

Lecture 9 - Network Security TDTS (ht1)

Cornerstones of Security

Virtual Private Networks

As enterprises conduct more and more

ERserver. iseries. Securing applications with SSL

Chapter 51 Secure Sockets Layer (SSL)

Standards and Products. Computer Security. Kerberos. Kerberos

CRYPTOGRAPHY IN NETWORK SECURITY

Chapter 34 Secure Sockets Layer (SSL)

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

CS 3251: Computer Networking 1 Security Protocols I

Computer Networks. Secure Systems

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

SSL Secure Socket Layer

Learning Network Security with SSL The OpenSSL Way

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols ETSF10 Internet Protocols 2011

Introduction. Haroula Zouridaki Mohammed Bin Abdullah Waheed Qureshi

SSL Protect your users, start with yourself

Transcription:

Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Network Layer: IPSec Transport Layer: SSL/TLS Chapter 4: Security on the Application Layer Chapter 5: Security Concepts for Networks 3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol Page 1

Secure Socket Layer (SSL) SSL, initially developed by Netscape, provides authentication, data integrity, and privacy between two applications (not complete hosts as in IPSec) SSL is located on top of TCP/IP and has become a de-facto standard for securitysensitive applications over intranets or the Internet Most widely used as secure transport layer for HTTP traffic, e.g. e-commerce Version 3.1 of SSL is known as TLS Special port numbers are assigned to applications which use SSL, e.g. https = 443, telnets = 992 SSL comprises four mechanisms: SSL Handshake Protocol (authentication, negotiates an encryption algorithm and cryptographic keys) SSL Record Protocol (data encryption and compression) SSL Change Cipher Spec (signal the begin of encryption) SSL Alert Protocol (reaction to error situations) Page 2

Handshake Protocol Responsible for secure session establishment between two applications. Session means: Association between a client and a server Can comprise several connections Definition of encryption and compression algorithms for these connections Contains a master secret for all connections (from which keys for the connections are generated) The handshake protocol has the following tasks: 1.) Negotiation of an encryption algorithm 2.) Mutual authentication 3.) Key exchange Page 3

Session Establishment client_hello, cipher suites, R A Hello message of Alice, including: A set of possible encryption and compression algorithms (start of negotiation) A random number R A Answer message of Bob, including: certificate, cipher suite, R B Certificate of Bob (authentication, often RSA) Chosen algorithms (end of negotiation, often 3DES) Alice {S} B, hash of K and the handshake messages Bob A random number R B Alice chooses a random number S, computes a master secret K = f(s, R A, R B ) and sends to Bob: S encrypted with Bob s public key A hash (MD5) of K the messages before to proof knowing K and K corresponds to the handshake keyed hash of the handshake messages Bob responds with a hash of the messages before, encrypted with a key generated from K, R A, and R B Page 4

Session Keys and Change Cipher Spec K, R A, and R B are used to generate 6 keys: Two keys for encryption Two keys for integrity Two keys as initalization vector The two keys are used to treat both communication directions different, e.g. for encryption: Alice does encryption with her so-called write key and decryption with her read key Bob also has a write and a read key, but his write key is Alice s read key and vice versa Same for integrity At the end of handshake: Together with the last message, Bob sends a change cipher spec Only one byte, signaling that all following messages now are encrypted with the mechanism/keys from the handshake phase Page 5

Record Protocol Responsible for encryption and compression of all messages following the change cipher spec as follows: 1. Break down data to be transferred in block of fixed length 2. Compression 3. Append a Message Authentication Code (MAC) computed with the integrity key 4. Encryption using the encryption key 5. Add SSL header which contains: Content Type (e.g. HTTPS) Protocol Version Number Length, Sequence Number Page 6

Alert Protocol Lehrstuhl für Informatik 4 Only needed in case of errors defines error messages and actions to be taken Level 1: Warning No special actions defined Maybe displayed to the user Level 2: Fatal Connection will be closed No more connections are opened within the current session Examples are unexpected message bad record MAC decryption/decompression failure handshake failure Page 7

Transport Layer Security (TLS) TLS in basic version is SSLv3.1 with some additions: Addition of Kerberos Cipher Suites Upgrading to TLS Within HTTP/1.1 to change to encryption within an existing TCP connection HTTP Over TLS for separating secure and unsecure traffic Addition of AES Addition of new alert messages Page 8

Comparison IPSec and SSL IPSec SSL Network Layer Implemented transparently for the user Can be automated Transport Layer Interaction with the user (e.g. acceptance of certificates) Central management Management by application or user Independent of certain mechanisms (encryption, compression, hash...) Conclusion: it is impossible to state that one mechanism is better than the other they are thought for different scenarios Variety of security mechanisms necessary in the Internet! Page 9