Transport layer security TRANSPORT LAYER SECURITY Seminar Report Submitted in partial fulfilment of the requirements for the award of the degree of Bachelor of Technology in Computer Science and Engineering of Cochin University Of Science And Technology by RAJESH KUMAR DIVISION OF COMPUTER SCIENCE Division of Computer Engineering,SOE Page 1
Transport Layer Security (TLS) is a protocol that ensures privacy between communicating applications and their users on the Internet. When a server and client communicate, TLS ensures that no third party may eavesdrop or tamper with any message. TLS is the successor to the Secure Sockets Layer (SSL).
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Transport layer security
TRANSPORT LAYER SECURITY
Seminar Report
Submitted in partial fulfilment of the requirements
for the award of the degree of
Bachelor of Technology
in
Computer Science and Engineering
of
Cochin University Of Science And Technology
by
RAJESH KUMAR
DIVISION OF COMPUTER SCIENCE
SCHOOL OF ENGINEERING
COCHIN UNIVERSITY OF SCIENCE AND TECHNOLOGY
KOCHI-682022
AUGUST 2010
DIVISION OF COMPUTER SCIENCE
Division of Computer Engineering,SOEPage 1
Transport layer security
SCHOOL OF ENGINEERING
COCHIN UNIVERSITY OF SCIENCE AND TECHNOLOGY
KOCHI-682022
Certificate Certified that this is a bonafide record of the seminar
entitled
"TRANSPORT LAYER SECURITY"
presented by the following student
“RAJESH KUMAR”
of the VII semester, Computer Science and Engineering in the year 2010
in partial fulfillment of the requirements in the award of Degree of
Bachelor of Technology in Computer Science and Engineering of Cochin
University of Science and Technology.
Mrs. SHEENA MATHEW Dr. DAVID PETER
SEMINAR GUIDE HEAD ODIVISION
Division of Computer Engineering,SOEPage 2
Transport layer security
ACKNOWLEDGEMENT
I thank GOD almighty for guiding me throughout the seminar. I would like to thank all those
who have contributed to the completion of t he seminar and helped me with valuable
suggestions for improvement.
I am extremely grateful to Dr. David Peter, Head Of Division, Division of Computer
Science, for providing me with best facilities and atmosphere for the creative work guidance
and encouragement.. I would like to thank my guide, Mrs. Sheena mathew ,Division of
Computer Science, for all help and support extend to me. I thank all Staff members of my
college and friends for extending their cooperation during my seminar.
Above all I would like to thank my parents without whose blessings, I would not have been
able to accomplish my goal.
RAJESH KUMAR
Division of Computer Engineering,SOEPage 3
Transport layer security
ABSTRACT
Transport Layer Security (TLS) is a protocol that ensures privacy between
communicating applications and their users on the Internet. When a server and client
communicate, TLS ensures that no third party may eavesdrop or tamper with any message.
TLS is the successor to the Secure Sockets Layer (SSL). The protocol is composed of
two layers: the TLS Record Protocol and the TLS Handshake Protocol. At the lowest level,
layered on top of some reliable transport protocol (e.g., TCP), is the TLS Record Protocol
The TLS protocol allows client/server applications to communicate across a network in a way
designed to prevent eavesdropping and temparing .
A TLS client and server negotiate a stateful connection by using a handshaking procedure.
During this handshake, the client and server agree on various parameters used to establish the
connection's security.
• The handshake begins when a client connects to a TLS-enabled server requesting a secure
connection, and presents a list of supported ciphersuites.
• From this list, the server picks the strongest cipher and hash function that it also supports and
notifies the client of the decision.
• The server sends back its identification in the form of a digital certificate. The certificate
usually contains the server name, the trusted certificate authority(CA), and the server's public
encryption key.
• The client may contact the server that issued the certificate (the trusted CA as above) and
confirm that the certificate is valid before proceeding.
• In order to generate the session keys used for the secure connection, the client encrypts a
random number (RN) with the server's public key (PbK), and sends the result to the server.
Only the server should be able to decrypt it (with its private key (PvK)): this is the one fact
that makes the keys hidden from third parties, since only the server and the client have access
to this data. The client knows PbK and RN, and the server knows PvK and (after decryption
of the client's message) RN. A third party is only able to know RN if PvK has been
compromised.
• From the random number, both parties generate key material for encryption and decryption.
This concludes the handshake and begins the secured connection, which is encrypted and
decrypted with the key material until the connection closes.
If any one of the above steps fails, the TLS handshake fails, and the connection is not created.
Division of Computer Engineering,SOEPage 6
Transport layer security
CHAPTER 2
HISTORY AND DEVELOPMENT
2.1 Secure Network Programming API
Early research efforts toward transport layer security included the Secure Network
Programming (SNP) application programming inteface (API), which in 1993 explored the
approach of having a secure transport layer API closely resembling berkeley sockets, to
facilitate retrofitting preexisting network applications with security measures.
2.2 SSL versions 1, 2, and 3
The SSL protocol was originally developed by netscape Version 1.0 was never publicly
released; version 2.0 was released in February 1995 but "contained a number of security
flaws which ultimately led to the design of SSL version 3.0" (Rescorla 2001). SSL version
3.0 was released in 1996
2.3 TLS version 1.0
TLS 1.0 was first defined in RFC 2246 in January 1999 as an upgrade to SSL Version 3.0. As
stated in the RFC, "the differences between this protocol and SSL 3.0 are not dramatic, but
they are significant enough that TLS 1.0 and SSL 3.0 do not interoperate." TLS 1.0 does
include a means by which a TLS implementation can downgrade the connection to SSL 3.0.
2.4 TLS version 1.1
TLS 1.1 was defined in RFC 4346 in April 2006. It is an update from TLS version 1.0.
Significant differences in this version include:
• Added protection against cipher block channing (CBC) attacks.
• The implicit initialization vector (IV) was replaced with an explicit IV.
Division of Computer Engineering,SOEPage 7
Transport layer security
• Change in handling of padding errors.
• Support for IANA registration of parameters.
2.5 TLS version 1.2
TLS 1.2 was defined in RFC 5246 in August 2008. It is based on the earlier TLS 1.1
specification. Major differences include:
• The MD5-SHA-1 combination in the Pseudorandom function( RF) was replaced with SHA-
256, with an option to use cipher-suite specified PRFs.
• The MD5-SHA-1 combination in the Finished message hash was replaced with SHA-256,
with an option to use cipher-suite specific hash algorithms.
• The MD5-SHA-1 combination in the digitally-signed element was replaced with a
single HASH negotiated during handshake, defaults to SHA-1.
• Enhancement in the client's and server's ability to specify which hash and signature
algorithms they will accept.
• Expansion of support for authenticated encryption ciphers, used mainly for galois (GCM)
and CCM of advance encryption standarts encryption.
• TLS Extensions definition and Advanced Encryption Standard ciphersuites were added.
Division of Computer Engineering,SOEPage 8
Transport layer security
2.6 Cipher block channing (CBC)CBC mode of operation was invented by IBM in 1976. In the cipher-block chaining (CBC) mode, each block of plaintext is XORed with the previous ciphertext block before being encrypted. This way, each ciphertext block is dependent on all plaintext blocks processed up to that point. Also, to make each message unique, an initialization vector must be used in the first block
Fig (CBC ENCRYPTION)
Division of Computer Engineering,SOEPage 9
Transport layer security
2.7 Cipher block chaining mode decryption
Fig( CBC decryption)
Division of Computer Engineering,SOEPage 10
Transport layer security
CHAPTER 3
APPLICATION
In applications design, TLS is usually implemented on top of any of the Layer protocols,
encapsulating the application-specific protocols such as HTTP,FTP, SMTP, NNTP,
and XMPP. Historically it has been used primarily with reliable transport protocols such as
the Transmission Control Protocol (TCP). However, it has also been implemented with
datagram-oriented transport protocols, such as the User Datagram Protocol (UDP) and
the Datagram Congestion Control Protocol (DCCP), usage which has been standardized
independently using the term Datagram Transport Layer Security (DTLS).
A prominent use of TLS is for securing World Wide Web traffic carried by HTTP to
form HTTPS. Notable applications are electronic commerce and asset management.
Increasingly, the Simple Mail Transfer Protocol (SMTP) is also protected by TLS (RFC
3207). These applications use public key certificates to verify the identity of endpoints.
TLS can also be used to tunnel an entire network stack to create a VPN, as is the case
with OpenVPN. Many vendors now marry TLS's encryption and authentication capabilities
with authorization,]There has also been substantial development since the late 1990s in
creating client technology outside of the browser to enable support for client/server
applications. When compared against traditional IPsec VPN technologies, TLS has some
inherent advantages in firewall and NAT traversal that make it easier to administer for large
remote-access populations.
TLS is also a standard method to protect Session Initiation Protocol(SIP) application
signaling. TLS can be used to provide authentication and encryption of the SIP signaling
associated with VoIPand other SIP-based applications.
Division of Computer Engineering,SOEPage 11
Transport layer security
CHAPTER 4
SECURITY
TLS/SSL have a variety of security measures:
• Protection against a downgrade of the protocol to a previous (less secure) version or a weaker
cipher suite.
• Numbering subsequent Application records with a sequence number, and using this sequence
number in the message authentication codes (MACs).
• Using a message digest enhanced with a key (so only a key-holder can check the MAC).
The HMAC construction used by most TLS ciphersuites is specified in RFC 2104 (SSLv3
used a different hash-based MAC).
• The message that ends the handshake ("Finished") sends a hash of all the exchanged
handshake messages seen by both parties.
• The pseudorandom function splits the input data in half and processes each one with a
different hashing algorithm (MD5 and SHA-1)P, then XORs them together to create the
MAC. This provides protection even if one of these algorithms is found to be vulnerable. TLS
only.
• SSL v3 improved upon SSL v2 by adding SHA-1 based ciphers, and support for certificate
authentication.
A vulnerability of the renegotiation procedure was discovered in August 2009 that can lead to
plaintext injection attacks against SSLv3 and all current versions of TLS. For example, it
allows an attacker who can hijack an https connection to splice their own requests into the
beginning of the conversation the client has with the web server. The attacker can't actually
decrypt the client-server communication, so it is different from a typical man-in-the-middle
attack. A short-term fix is for web servers to stop allowing renegotiation, which typically will
not require other changes unless client certificate authentication is used. To fix the
vulnerability, a renegotiation indication extension was proposed for TLS. It will require the
client and server to include and verify information about previous handshakes in any
renegotiation handshakes.When a user doesn't pay attention to their browser's indication that
Division of Computer Engineering,SOEPage 12
Transport layer security
the session is secure (typically a padlock icon), the vulnerability can be turned into a true
man-in-the-middle attack This extension has become a proposed standard and has been
assigned the number RFC 5746. The RFC has been implemented in recent OpenSSl and other
libraries.
There are some attacks against the implementation rather than the protocol itself.
• Most CAs don't explicitly set basic Constraints CA=FALSE for leaf nodes, and a lot of
browsers and other SSL implementations (including IE6) don't check the field. This can be
exploited for man-in-the-middle attack on all potential SSL connections.
• Some implementations (including older versions of Microsoft Cryptographic API, Network
Security Services, and Gnu TLS) stop reading any characters that follow the null character in
the name field of the certificate, which can be exploited to fool the client into reading the
certificate as if it were one that came from the authentic site, e.g. paypal.com\0.badguy.com
would be mistaken as the site of paypal.com rather than badguy.com.
SSL v2 is flawed in a variety of ways:
• Identical cryptographic keys are used for message authentication and encryption.
• SSL v2 has a weak MAC construction that uses the MD5 hash function with a secret prefix,
making it vulnerable to length extension attacks.
• SSL v2 does not have any protection for the handshake, meaning a man-in-the-
middle downgrade attack can go undetected.
• SSL v2 uses the TCP connection close to indicate the end of data. This means that truncation
attacks are possible: the attacker simply forges a TCP FIN, leaving the recipient unaware of
an illegitimate end of data message (SSL v3 fixes this problem by having an explicit closure
alert).
• SSL v2 assumes a single service, and a fixed domain certificate, which clashes with the
standard feature of virtual hosting in web servers. This means that most websites are
practically impaired from using SSL. TLS/SNI fixes this but is not deployed in web servers
as yet.
Division of Computer Engineering,SOEPage 13
Transport layer security
SSL v2 is disabled by default in Internet Explorer 7, Mozilla Firefox 2 and Mozilla Firefox
3, and Safari. After it sends a TLS Client Hello, if Mozilla Firefox finds that the server is
unable to complete the handshake, it will attempt to fall back to using SSL 3.0 with an SSL
3.0 Client Hello in SSL v2 format to maximize the likelihood of successfully handshaking
with older servers. Support for SSL v2 (and weak40-bit and 56-bit ciphers) has been removed
completely from Opera as of version 9.5.
4.1.1 TLS handshake in detail
The TLS protocol exchanges records, which encapsulate the data to be exchanged. Each
record can be compressed, padded, appended with a message authentication code (MAC), or
encrypted, all depending on the state of the connection. Each record has a content type field
that specifies the record, a length field, and a TLS version field.
When the connection starts, the record encapsulates another protocol — the handshake
messaging protocol — which has content type 22.
4.1.2 Simple TLS handshake
A simple connection example follows, illustrating a handshake where the server (but not the
client) is authenticated by its certificate:
• Negotiation phase:
• A client sends a ClientHello message specifying the highest TLS protocol version it
supports, a random number, a list of suggested CipherSuites, and suggested compression
methods. If the client is attempting to perform a resumed handshake, it may send a session
ID.
• The server responds with a ServerHello message, containing the chosen protocol version, a
random number, CipherSuite, and compression method from the choices offered by the
client. To confirm or allow resumed handshakes the server may send a session ID. The
chosen protocol version should be the highest that both the client and server support. For
example, if the client supports TLS1.1 and the server supports TLS1.2, TLS1.1 should be
selected; SSLv3 should not be selected.
Division of Computer Engineering,SOEPage 14
Transport layer security
• The server sends its Certificate message (depending on the selected cipher suite, this may be
omitted by the server).
• The server sends a ServerHelloDone message, indicating it is done with handshake
negotiation.
• The client responds with a ClientKeyExchange message, which may contain
a PreMasterSecret, public key, or nothing. (Again, this depends on the selected cipher.)
• The client and server then use the random numbers and PreMasterSecret to compute a
common secret, called the "master secret". All other key data for this connection is derived
from this master secret (and the client- and server-generated random values), which is passed
through a carefully designed "pseudorandom function".
•
• The client now sends a ChangeCipherSpec record, essentially telling the server, "Everything
I tell you from now on will be authenticated (and encrypted if encryption parameters were
present in the server certificate)." The ChangeCipherSpec is itself a record-level protocol
with content type of 20.
• Finally, the client sends an authenticated and encrypted Finished message, containing a hash
and MAC over the previous handshake messages.
• The server will attempt to decrypt the client's Finished message, and verify the hash and
MAC. If the decryption or verification fails, the handshake is considered to have failed and
the connection should be torn down.
• Finally, the server sends a ChangeCipherSpec, telling the client, "Everything I tell you from
now on will be authenticated (and encrypted, if encryption was negotiated)."
• The server sends its authenticated and encrypted Finished message.
• The client performs the same decryption and verification.
• Application phase: at this point, the "handshake" is complete and the application protocol is
enabled, with content type of 23. Application messages exchanged between client and server
will also be authenticated and optionally encrypted exactly like in their Finished message.
Otherwise, the content type will return 25 and the client will not authenticate.