Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1



Similar documents
Transport Layer Security Protocols

Network Security Web Security and SSL/TLS. Angelos Keromytis Columbia University

WEB Security & SET. Outline. Web Security Considerations. Web Security Considerations. Secure Socket Layer (SSL) and Transport Layer Security (TLS)

Overview of SSL. Outline. CSC/ECE 574 Computer and Network Security. Reminder: What Layer? Protocols. SSL Architecture

Chapter 7 Transport-Level Security

Web Security Considerations

Network Security Essentials Chapter 5

Communication Security for Applications

Security Protocols/Standards

Announcement. Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed.

Chapter 17. Transport-Level Security

The Secure Sockets Layer (SSL)

CSC Network Security

CSC 474 Information Systems Security

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

Web Security. Mahalingam Ramkumar

Communication Systems SSL

Secure Socket Layer/ Transport Layer Security (SSL/TLS)

How To Understand And Understand The Ssl Protocol ( And Its Security Features (Protocol)

Transport Level Security

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Real-Time Communication Security: SSL/TLS. Guevara Noubir CSU610

Outline. Transport Layer Security (TLS) Security Protocols (bmevihim132)

SSL/TLS. What Layer? History. SSL vs. IPsec. SSL Architecture. SSL Architecture. IT443 Network Security Administration Instructor: Bo Sheng

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

SECURE SOCKETS LAYER (SSL) SECURE SOCKETS LAYER (SSL) SSL ARCHITECTURE SSL/TLS DIFFERENCES SSL ARCHITECTURE. INFS 766 Internet Security Protocols

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Secure Socket Layer (SSL) and Trnasport Layer Security (TLS)

Secure Sockets Layer

Security Engineering Part III Network Security. Security Protocols (I): SSL/TLS

Secure Socket Layer. Security Threat Classifications

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

SECURE SOCKETS LAYER (SSL)

HTTPS: Transport-Layer Security (TLS), aka Secure Sockets Layer (SSL)

Managing and Securing Computer Networks. Guy Leduc. Chapter 4: Securing TCP. connections. connections. Chapter goals: security in practice:

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace

Overview SSL/TLS HTTPS SSH. TLS Protocol Architecture TLS Handshake Protocol TLS Record Protocol. SSH Protocol Architecture SSH Transport Protocol

SSL Secure Socket Layer

Lecture 7: Transport Level Security SSL/TLS. Course Admin

Secure Socket Layer. Carlo U. Nicola, SGI FHNW With extracts from publications of : William Stallings.

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Introduction. Haroula Zouridaki Mohammed Bin Abdullah Waheed Qureshi

Secure Socket Layer (SSL) and Transport Layer Security (TLS)

, ) I Transport Layer Security

Network Security Part II: Standards

SSL Secure Socket Layer

SSL: Secure Socket Layer

SSL A discussion of the Secure Socket Layer

TLS and SRTP for Skype Connect. Technical Datasheet

Cryptography and Network Security Sicurezza delle reti e dei sistemi informatici SSL/TSL

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

Lecture 10: Communications Security

Is your data safe out there? -A white Paper on Online Security

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Chapter 10. Network Security

Lab 7. Answer. Figure 1

SSL Handshake Analysis


Einführung in SSL mit Wireshark

Information Security

T Cryptography and Data Security

Vulnerabilità dei protocolli SSL/TLS

Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

Asymetrical keys. Alices computer generates a key pair. A public key: XYZ (Used to encrypt) A secret key: ABC98765 (Used to decrypt)

Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173

1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications

Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Savitribai Phule Pune University

, SNMP, Securing the Web: SSL

As enterprises conduct more and more

Three attacks in SSL protocol and their solutions

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn

OPENID AUTHENTICATION SECURITY

Overview. SSL Cryptography Overview CHAPTER 1

Secure Socket Layer (TLS) Carlo U. Nicola, SGI FHNW With extracts from publications of : William Stallings.

SSL and TLS. An Overview of A Secure Communications Protocol. Simon Horman aka Horms. horms@valinux.co.jp horms@verge.net.au horms@debian.

CrashPlan Security SECURITY CONTEXT TECHNOLOGY

ERserver. iseries. Secure Sockets Layer (SSL)

mod_ssl Cryptographic Techniques

GS1 Trade Sync Connectivity guide

TLS/SSL in distributed systems. Eugen Babinciuc

ERserver. iseries. Securing applications with SSL

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For

Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1

Lecture 4: Transport Layer Security (secure Socket Layer)

Network Security - Secure upper layer protocols - Background. Security. Question from last lecture: What s a birthday attack? Dr.

Chapter 51 Secure Sockets Layer (SSL)

Criteria for web application security check. Version

The increasing popularity of mobile devices is rapidly changing how and where we

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Chapter 32 Internet Security

Internet Privacy Options

What is network security?

Chapter 34 Secure Sockets Layer (SSL)

T Cryptography and Data Security

Transcription:

Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1

How the Web Works - HTTP Hypertext transfer protocol (http). Clients request documents (or scripts) through URL. Server response with documents. Documents are not interpreted by http. Stateless protocol, request are independent. Tecniche di Sicurezza dei Sistemi 2

How the Web Works: Other Elements Hyper-text markup language (html). Other application specific document. E.G., MIME, graphics, video/audio, postscript, Java applets, etc. Browsers. Display html documents and embedded graphics. Run Java program. Start helper applications.... Tecniche di Sicurezza dei Sistemi 3

Web Vulnerabilities http://www.w3.org/security/faq Revealing private information on server Intercept of client information Execute unauthorized programs Denial of service... Tecniche di Sicurezza dei Sistemi 4

Web Vulnerabilities: cgi-bin cgi-bin: server-side side includes If random arguments are allowed Web server program should run under a particular UID (e.g., www, nobody) Tecniche di Sicurezza dei Sistemi 5

Web Security Authentication: Basic (username, password) Can be used along with cookie Digest Access control via addresses Multi-layered: layered: S-http (secure http), just for http Proposed by CommerceNet,, pretty much dead SSL (TLS), generic for TCP https: http over SSL IPSec Tecniche di Sicurezza dei Sistemi 6

HTTP Authentication - Basic Client doesn t know which method Client attempts access (GET, PUT, ) normally Server returns 401 unauthorized Realm: protection space Client tries again with (user:password) Passwords in the clear Repeated for each access Tecniche di Sicurezza dei Sistemi 7

From Basic Authentication to Forms and Cookies Not all sites use basic authentication Many instead ask the user to type username/password into a HTML form Server looks up the user and sends back a cookie The browser (client) resends the cookie on subsequent requests Tecniche di Sicurezza dei Sistemi 8

HTTP Access Control - Digest Server sends www-authenticate parameters: Realm Domain Nonce, new for each 401 response E.G. H(client-IP:timestamp:server IP:timestamp:server-secret) secret) Algorithm E.G., MD5 Tecniche di Sicurezza dei Sistemi 9

HTTP Access Control - Digest Client sends authorization response: Same nonce H(A1), where a1=user:realm:password, and other information Steal H(A1) Only good for realm Tecniche di Sicurezza dei Sistemi 10

SSL Overview For any TCP protocol: HTTP (https:// port 443), NNTP, telnet, etc. Secure byte stream. Optional (but common) public key server authentication. Optional client authentication. Hash: combined MD5 and SHA. Encryption optional. Now: TLS (IETF WG). Tecniche di Sicurezza dei Sistemi 11

SSL Architecture Two layers: SSL record protocol provides basic security services 3 3 higher-layer protocols: Handshake, change cipher spec, alert Connection A A transport with some service, associated with a session Session Created by handshake, defines cryptographic security parameters for multiple connections Tecniche di Sicurezza dei Sistemi 12

Session and Connection Session parameters: ID, peer certificate, compression method, cipher spec, master secret, Is resumable. Connection parameters: Server and client random, server write MAC secret, client write MAC secret, server write key, client write key, IV, sequence number. Tecniche di Sicurezza dei Sistemi 13

SSL Record Protocol 2 services: Confidentiality, message integrity Layered protocol: Fragment application data into blocks Compress data Apply message authentication code (MAC) = h(m s) for message m and secret s Encrypt with client (cw( cw) ) or server (sw( sw) ) write key Transmit over TCP Specify content type for higher protocols Tecniche di Sicurezza dei Sistemi 14

Handshake Protocol Establish security capabilities Protocol version, session ID, cipher suite, compression method, IV Server authentication and key exchange Send certificate, key exchange, request client certificate Client authentication and key exchange Send certificate, key exchange, certificate verification Finish Tecniche di Sicurezza dei Sistemi 15

Cryptographic Computations Master secret creation. A A pre-master master-secret secret is exchanged first. RSA, or Diffie-Hellman Hellman. Both sides compute master secret based on pre-master master-secret. secret. Generation of cryptographic parameters. Client/server write MAC secrets, client/server write keys, client/server write IV are generated from master secret. Tecniche di Sicurezza dei Sistemi 16

Cryptographic Computations: Details (1) Client generates a 48-byte pre-master master- secret s p Master secret: s m =MD5(s p SHA( A s p r c r s )) MD5(s p SHA( BB s p r c r s )) MD5(s p SHA( CCC s p r c r s )) Where r c,s,s:client, server random Tecniche di Sicurezza dei Sistemi 17

Cryptographic Computations: Details (2) Session key: same as above, but use the master secret in place of s p to generate byte stream to cut out: Client, server MAC secret Client, server write key Client, server IV Tecniche di Sicurezza dei Sistemi 18