wcs,ssl and tls
wcs,ssl and tls
CONSIDERATIONS
The World Wide Web is fundamentally a
client/server application running over theInternet and
TCP/IP intranets.
•1. The Internet is two-way. Unlike traditional
publish in environments—even electronic publishing
systems involving teletext, voice response, or fax-
back—the Web is vulnerable to attacks on the Web
servers over the Internet.
2.The Web is increasingly serving as a highly visible
outlet for corporate and product information
3.Although Web browsers are very easy to use, Web
servers are relatively easy to configure and manage
4.A Web server can be exploited as a launching pad
into the corporation’s or agency’s entire computer
complex.
5.Casual and untrained (in security matters) users are
common clients for Web-based services
Secure Socket Layer (SSL)
• KEY POINTS
• Secure Socket Layer (SSL) provides security services
between TCP and applications that use TCP. The Internet
standard version is called Transport Layer Service (TLS).
• SSL/TLS provides confidentiality using symmetric
encryption and message integrity using a message
authentication code.
• SSL/TLS includes protocol mechanisms to enable two TCP
users to determine the security mechanisms and services
they will use.
• HTTPS (HTTP over SSL) refers to the combination of
HTTP and SSL to implement secure communication
between a Web browser and a Web server.
• Secure Shell (SSH) provides secure remote logon and other
secure client/server facilities.
SSL (Secure Socket Layer)
• SSL designed to make use of transport layer
security service
• originally developed by Netscape
• version 3 designed with public input
• subsequently became Internet standard known as
TLS (Transport Layer Security)
• uses TCP to provide a reliable end-to-end service
• SSL has two layers of protocols
SSL Architecture
SSL Architecture
• SSL connection
• A connection is a transport (in the OSI layering
model definition) that provides a suitable type of
service. For SSL, such connections are peer-to-peer
relationships. The connections are transient. Every
connection is associated with one session
• SSL session
• an association between client & server
• created by the Handshake Protocol
• define a set of cryptographic parameters
• may be shared by multiple SSL connections
A session state is defined
by the following
parameters.
• Session identifier: An arbitrary byte sequence chosen by the
server to identify an active or resumable session state.
• Peer certificate: An X509.v3 certificate of the peer. This
element of the state may be null.
• Compression method: The algorithm used to compress data
prior to encryption.
• Cipher spec: Specifies the bulk data encryption algorithm
(such as null, AES, etc.) and a hash algorithm (such as MD5
or SHA-1) used for MAC calculation. It also defines
cryptographic attributes such as the hash_size.
• Master secret: 48-byte secret shared between the
client and server. •
• Public key – Everyone can see it, no need to protect it. (for
encryption function)
• Private key – Stays in computer, must be protected. (for
decryption function)
Key pairs can be of the following types:
•User Key – If public key and private key remain with the user.
•Host Key – If public key and private key are on a remote system.
•Session key – Used when large amount of data is to be transmitted.
How SSH Works ?
Public keys from the local computers (system) are passed to the server which is to
be accessed.
Server then identifies if the public key is registered.
If so, the server then creates a new secret key and encrypts it with the public key
which was send to it via local computer.This encrypted code is send to the local
computer.
Summary
• have considered:
• need for web security
• SSL/TLS transport layer security protocols
• HTTPS
• secure shell (SSH)