Top Banner
Socket Layer Security
24

Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)

Dec 15, 2015

Download

Documents

Loren Healey
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)

Socket Layer Security

Page 2: Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)

In this Presentation:need for web securitySSL/TLS transport layer security protocolsHTTPSsecure shell (SSH)

Page 3: Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)

Web SecurityWeb now widely used by business,

government, individualsbut Internet & Web are vulnerablehave a variety of threats

integrityconfidentialitydenial of serviceauthentication

need added security mechanisms

Page 4: Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)

Web Traffic Security Approaches

Page 5: Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)

SSL (Secure Socket Layer)transport layer security serviceoriginally developed by Netscapeversion 3 designed with public inputsubsequently became Internet standard

known as TLS (Transport Layer Security)uses TCP to provide a reliable end-to-end

serviceSSL has two layers of protocols

Page 6: Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)

SSL Architecture

Page 7: Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)

SSL ArchitectureSSL connection

a transient, peer-to-peer, communications linkassociated with 1 SSL session

SSL sessionan association between client & servercreated by the Handshake Protocoldefine a set of cryptographic parametersmay be shared by multiple SSL connections

Page 8: Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)

SSL Record Protocol Servicesconfidentiality

using symmetric encryption with a shared secret key defined by Handshake Protocol

AES, IDEA, RC2-40, DES-40, DES, 3DES, Fortezza, RC4-40, RC4-128

message is compressed before encryptionmessage integrity

using a MAC with shared secret keysimilar to HMAC but with different padding

Page 9: Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)

SSL Record Protocol Operation

Page 10: Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)

SSL Change Cipher Spec Protocolone of 3 SSL specific protocols which use the

SSL Record protocola single messagecauses pending state to become currenthence updating the cipher suite in use

Page 11: Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)

SSL Alert Protocolconveys SSL-related alerts to peer entityseverity

warning or fatal

specific alert fatal: unexpected message, bad record mac,

decompression failure, handshake failure, illegal parameter

warning: close notify, no certificate, bad certificate, unsupported certificate, certificate revoked, certificate expired, certificate unknown

compressed & encrypted like all SSL data

Page 12: Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)

SSL Handshake Protocol allows server & client to:

authenticate each other to negotiate encryption & MAC algorithms to negotiate cryptographic keys to be used

comprises a series of messages in phases1. Establish Security Capabilities2. Server Authentication and Key Exchange3. Client Authentication and Key Exchange4. Finish

Page 13: Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)

SSL Handshake Protocol

Page 14: Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)

Cryptographic Computationsmaster secret creation

a one-time 48-byte valuegenerated using secure key exchange (RSA /

Diffie-Hellman) and then hashing infogeneration of cryptographic parameters

client write MAC secret, a server write MAC secret, a client write key, a server write key, a client write IV, and a server write IV

generated by hashing master secret

Page 15: Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)

TLS (Transport Layer Security)IETF standard RFC 2246 similar to SSLv3with minor differences

in record format version numberuses HMAC for MACa pseudo-random function expands secrets

based on HMAC using SHA-1 or MD5has additional alert codessome changes in supported cipherschanges in certificate types & negotiationschanges in crypto computations & padding

Page 16: Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)

HTTPSHTTPS (HTTP over SSL)

combination of HTTP & SSL/TLS to secure communications between browser & server documented in RFC2818 no fundamental change using either SSL or TLS

use https:// URL rather than http://and port 443 rather than 80

encryptsURL, document contents, form data, cookies,

HTTP headers

Page 17: Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)

HTTPS Useconnection initiation

TLS handshake then HTTP request(s)connection closure

have “Connection: close” in HTTP recordTLS level exchange close_notify alertscan then close TCP connectionmust handle TCP close before alert exchange

sent or completed

Page 18: Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)

Secure Shell (SSH)protocol for secure network communications

designed to be simple & inexpensiveSSH1 provided secure remote logon facility

replace TELNET & other insecure schemesalso has more general client/server capability

SSH2 fixes a number of security flawsdocumented in RFCs 4250 through 4254SSH clients & servers are widely availablemethod of choice for remote login/ X tunnels

Page 19: Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)

SSH Protocol Stack

Page 20: Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)

SSH Transport Layer Protocolserver authentication occurs at transport

layer, based on server/host key pair(s)server authentication requires clients to know

host keys in advance packet exchange

establish TCP connection can then exchange data

identification string exchange, algorithm negotiation, key exchange, end of key exchange, service request

using specified packet format

Page 21: Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)

SSH User Authentication Protocolauthenticates client to serverthree message types:

SSH_MSG_USERAUTH_REQUESTSSH_MSG_USERAUTH_FAILURE SSH_MSG_USERAUTH_SUCCESS

authentication methods usedpublic-key, password, host-based

Page 22: Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)

SSH Connection Protocolruns on SSH Transport Layer Protocolassumes secure authentication connectionused for multiple logical channels

SSH communications use separate channelseither side can open with unique id numberflow controlledhave three stages:

opening a channel, data transfer, closing a channelfour types:

session, x11, forwarded-tcpip, direct-tcpip.

Page 23: Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)

SSH Connection Protocol Exchange

Page 24: Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)

Port Forwardingconvert insecure TCP connection into a

secure SSH connectionSSH Transport Layer Protocol establishes a

TCP connection between SSH client & serverclient traffic redirected to local SSH, travels

via tunnel, then remote SSH delivers to serversupports two types of port forwarding

local forwarding – hijacks selected trafficremote forwarding – client acts for server