Secure Connection


  • Protocol: SSL/TLS
  • Application: HTTPS

 

TLS


1.Client

  • Hello

2.Server

  • Hello
  • sends its certificate

3.Client

  • verifies certificate;
  • extracts server’s pub key;
  • generates a premaster secret;
  • encrypts it using server’s pub key and sends to server;

4.The server

  • sends msg-3 to hardware security module (HSM);
  • HSM decrypts premaster secret and sends it to server;

5.The server and The client

calculate a master secret using premaster secret and some other info in hello msg;

HTTPS


Hypertext Transfer Protocol Secure

Threats Solutions
Eavesdropping Encryption
Manipulation Integrity (MAC)
Impersonation Signature

 

DNS

  • 通过DNS服务器发送域名查找IP。

DNS Hijacking:发送错误的IP,导向错误的网站。

Web域名伪造:使用类似的域名。

Client Hello:

SSL Protocol version
Session ID
List of Cipher Suites
CLIENT HELLO Extensions

Server Hello:

SSL Protocol version
Session ID
Selected Cipher
Server Certificate---> public key
SERVER HELLO Extensions
Client Certificate Request (optional)

Certificate

  • Issued by a trusted third party
  • Certificate Authority (CA)
  • VeriSign, GeoTrust, Digicert, etc.

Goal:

vouch for server public key

Principle:

signed by CA’s private key

verifiable by CA’s public key

Root CA || CA Chain


trigger 触发
symatric 对称的
eavesdrop 窃听
manipulation 操作
integrity 完整性
impersonation 模仿
forge 伪造
signature 签名
integrate 整合
visible 可见的
expired 到期的
cautious 谨慎的
revocation 撤销

0 条评论

发表评论

Avatar placeholder