• No results found

Secure Socket Layer/ Transport Layer Security (SSL/TLS)

N/A
N/A
Protected

Academic year: 2021

Share "Secure Socket Layer/ Transport Layer Security (SSL/TLS)"

Copied!
20
0
0

Loading.... (view fulltext now)

Full text

(1)

Secure Socket Layer/

Secure Socket Layer/

Transport Layer Security

Transport Layer Security

(SSL/TLS)

(SSL/TLS)

David

David

Sánchez

Sánchez

Universitat Pompeu Fabra

Universitat Pompeu Fabra

(2)

World Wide Web (www)

World Wide Web (www)

Ø

Ø

Client/server services running over the Internet or TCP/IP Intranets

Client/server services running over the Internet or TCP/IP Intra

nets

Ø

Ø

widely used by business, government, individuals

widely used by business, government, individuals

http://news.

http://news.netcraft

netcraft.com/archives/2003/04/09/

.com/archives/2003/04/09/

netcraft_

netcraft

_ssl

ssl

_survey.html

_survey.html

Ø

(3)

Some Web Threats

Some Web Threats

(4)

Web Security Approaches

Web Security Approaches

(5)

TLS Client/Server Model

TLS Client/Server Model

(6)

SSL Introduction

SSL Introduction

Ø

Ø

transport layer security service

transport layer security service

Ø

Ø

originally developed by Netscape

originally developed by Netscape

Ø

Ø

SSLvn

SSLvn

3 designed with public review and industry input

3 designed with public review and industry input

Ø

(7)

SSL Goals

SSL Goals

Ø

Ø

Cryptographic security

Cryptographic security

Ø

Ø

Interoperability

Interoperability

Ø

Ø

Extensibility

Extensibility

Ø

(8)

SSL Security Services

SSL Security Services

Ø

Ø

Server authentication

Server authentication

Ø

Ø

Client authentication or anonymous (for anonymous servers)

Client authentication or anonymous (for anonymous servers)

Ø

Ø

Data integrity

Data integrity

Ø

(9)

SSL Protocol Stack

SSL Protocol Stack

(10)

SSL Key Concepts

SSL Key Concepts

Ø

Ø

SSL session

SSL session

l

l

an association between client & server

an association between client & server

l

l

created by the Handshake Protocol

created by the Handshake Protocol

l

l

define a set of cryptographic parameters

define a set of cryptographic parameters

l

l

may be shared by multiple SSL connections

may be shared by multiple SSL connections

Ø

Ø

SSL connection

SSL connection

l

l

a transient, peer

a transient, peer

-

-

to

to

-

-

peer, communications link

peer, communications link

l

(11)

Session Parameters

Session Parameters

Ø

Ø

Session identifier

Session identifier

Ø

Ø

Peer certificate

Peer certificate

Ø

Ø

Compression method

Compression method

Ø

Ø

Cipher spec

Cipher spec

Ø

(12)

Connection Parameters

Connection Parameters

Ø

Ø

Server and client random

Server and client random

Ø

Ø

Server write MAC secret

Server write MAC secret

Ø

Ø

Client write MAC secret

Client write MAC secret

Ø

Ø

Server write key

Server write key

Ø

Ø

Client write key

Client write key

Ø

Ø

Initialization vectors

Initialization vectors

Ø

(13)

Keying Material

Keying Material

Ø

Ø

Client/server PU certificate, PR…

Client/server PU certificate, PR…

Ø

Ø

Pre-

Pre

-master secret S

master secret S

Ø

Ø

Master secret K

Master secret K

Ø

(14)

SSL Record Protocol

SSL Record Protocol

Services

Services

Ø

Ø

message integrity

message integrity

l

l

using a MAC with shared secret key

using a MAC with shared secret key

l

l

similar to HMAC but with different padding

similar to HMAC but with different padding

Ø

Ø

confidentiality

confidentiality

l

l

using symmetric encryption with a shared secret key defined by

using symmetric encryption with a shared secret key defined by

Handshake Protocol

Handshake Protocol

l

l

AES, IDEA, RC2-

AES, IDEA, RC2

-

40, DES

40, DES

-40, DES, 3DES,

-

40, DES, 3DES, Fortezza

Fortezza, RC4

, RC4-

-40, RC4

40, RC4-

-

128

128

l

(15)

SSL Record Protocol

SSL Record Protocol

Operation

Operation

(16)

SSL Handshake Protocol

SSL Handshake Protocol

Ø

Ø

allows server & client to:

allows server & client to:

l

l

authenticate each other

authenticate each other

l

l

to negotiate encryption & MAC algorithms

to negotiate encryption & MAC algorithms

l

l

to negotiate cryptographic keys to be used

to negotiate cryptographic keys to be used

Ø

Ø

comprises a series of messages in 4 phases

comprises a series of messages in 4 phases

1.

1.

Establish Security Capabilities

Establish Security Capabilities

2.

2.

Server Authentication and Key Exchange

Server Authentication and Key Exchange

3.

3.

Client Authentication and Key Exchange

Client Authentication and Key Exchange

4.

(17)

SSL Handshake Protocol

SSL Handshake Protocol

(18)

SSL Change Cipher Spec

SSL Change Cipher Spec

Protocol

Protocol

Ø

Ø

a single message

a single message

Ø

Ø

updates the cipher suite to be used for a connection after the

updates the cipher suite to be used for a connection after the

handshake protocol

(19)

SSL Alert Protocol

SSL Alert Protocol

Ø

Ø

conveys SSL-

conveys SSL

-related alerts to peer entity

related alerts to peer entity

Ø

Ø

Severity

Severity

l l

Fatal

Fatal

l l

Warning

Warning

Ø

Ø

Specific alerts

Specific alerts

Fatal: unexpected message, bad record

Fatal: unexpected message, bad record

mac

mac

, decompression failure,

, decompression failure,

handshake failure, illegal parameter

(20)

TLS

TLS

Ø

Ø

TLS 1.0 IETF standard RFC 2246 similar to SSLv3

TLS 1.0 IETF standard RFC 2246 similar to SSLv3

l

l

record format version number

record format version number

l

l

uses HMAC for MAC

uses HMAC for MAC

l

l

a pseudo-

a pseudo

-random function expands secrets

random function expands secrets

l

l

additional alert codes

additional alert codes

l

l

some changes in supported ciphers

some changes in supported ciphers

l

l

changes in certificate types & negotiations

changes in certificate types & negotiations

l

l

changes in crypto computations & padding

changes in crypto computations & padding

Ø

References

Related documents

The history of the authorities for heritage management is a history of ongoing control and rationalisation exerted by the local government on Lijiang Ancient Town, all having

Summary In a phase 2 trial of 222 postmenopausal women with osteoporosis aged 55 to 85 years randomized to one of three different doses of abaloparatide-SC, subcutaneous

Join Process Process Automation Process Reengineering Tissue Bank Mngt Chemotherapy Inventory of surgical instruments Single. area/ward More wards Whole Organization

In die lig van Stricker se navorsing wat in meer detail in hoofstuk 5 bespreek sal word en Ikram se stelling dat die tempels die kosmos voorgestel het (sien 4.2), blyk dit egter

Understanding the relations between our energy consumption and the global climate change is highly under-emphasized in educational plans (curricula) in most countries. Bringing

The objective of this study was to implement, document and evaluate the impact of implementing a Hybrid 5S strategy, which is integration of inventory

Local Session Service Coordinator Coordinator Business Management Portal Coordinator Domain Hoster Domain Global Session Service ROIA Client ROIA Process Customer Customer

Y, por último, la relativa desvirtuación de las comedias de Miguel Mihura también se debe a la elección de una estre- lla mediática como Elsa Pataky, cuyos rasgos de una belleza