Securing .NET Web Services with SSL: How to Protect “Data in Transit” between Client and Remote Server
By Slava Gomzin
()
About this ebook
Booklet for developers and security professionals on how to implement SSL in order to protect data transmission between .NET client and server. The guide contains examples of the client application code and certificate validations in C#.
Topics include: what is SSL certificate and how to use it to secure .NET Web Services, how to create server and client test certificates, implementing SSL in server and client applications, extra validations of server certificate on client side, and more (Article: ~3,300 words).
Table of Contents includes:
Introduction
Vulnerabilities Due To Insecure Communication
Difference between SSL and TLS
Securing Data Transmission with SSL
Different Levels of Security Provided by SSL
SSL Implementation Modes
Server Certificate Only
Server and Client Certificates
SSL Certificates
Certificate Issuing Methods
Self-Signed Certificate
Certificate Issued Using Self-Signed Root Certificate
Certificate Issued through Local Certificate Authority
Certificate Issued through Public Certificate Authority
Test Certificates
Server Test Certificates
Creating Test Certificate Authority
Creating Server Test Certificate for Specific Server Host Name
Creating Server Test Certificate for localhost
Creating Standalone Self-Signed Test Server Certificate (without CA Root)
Obtaining Test Server Certificate from Public Certificate Authority
Going to Production
Client Test Certificate
Creating Client Test Certificate using Root CA Certificate
Implementing SSL on Server
Web Server Configuration
Server Application Configuration
Server Application Code Changes
Implementing SSL on Client
Client Application Configuration
Client Application Code Changes
Additional Server Certificate Validations Performed by Client
Testing
Conclusion
Resources
About the Author
Slava Gomzin, CISSP, PCI ISA, PCIP, ECSP, Security+ has more than 15 years of professional experience in software development and security including
12 years in application development for retail industry and electronic payments,
10 years in .NET and SQL Server development,
6 years in application security and PCI compliance.
Slava Gomzin is Security Architect at Retalix USA. He lives in Dallas, Texas.
Slava Gomzin
Slava Gomzin is an information security enthusiast and full-stack technologist. He is the author of multiple publications on information security and technology including books "Hacking Point of Sale" (Wiley, 2014) and the just-published "Bitcoin for Nonmathematicians" (Universal Publishers, 2016). Slava is VP of Information Security and Technology at Pieces Technologies, an innovative start-up that deploys cutting edge technology to improve clinical and community health outcomes. Before Pieces Tech, he was Director of Information Security at Parkland Center for Clinical Innovation (PCCI), a noted scientific research and development nonprofit corporation. Prior to joining PCCI, Slava was a Security and Payments Technologist at Hewlett-Packard, where he helped create products that are integrated into modern payment processing ecosystems using the latest security technologies. Before HP, he worked in various information security and software development positions at Retalix, a Division of NCR Retail. Slava currently holds CISSP and other security certifications. He blogs about information security and technology at www.gomzin.com.
Read more from Slava Gomzin
Hiding Web Traffic with SSH: How to Protect Your Internet Privacy against Corporate Firewall or Insecure Wireless Rating: 0 out of 5 stars0 ratingsSecuring Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build Rating: 0 out of 5 stars0 ratingsProtecting Confidential Information: How to Securely Store Sensitive Data Rating: 0 out of 5 stars0 ratingsSecuring Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools Rating: 0 out of 5 stars0 ratings
Related to Securing .NET Web Services with SSL
Related ebooks
Building Telephony Systems with OpenSER Rating: 0 out of 5 stars0 ratingsCertified Information Systems Auditor Exam Prep And Dumps Exam Review Guide for ISACA CISA Exam PART 3 Rating: 0 out of 5 stars0 ratingsMac OS X Lion Server For Dummies Rating: 3 out of 5 stars3/5CCNA Security Study Guide: Exam 210-260 Rating: 0 out of 5 stars0 ratingsREMOTE ACCESS VPN- SSL VPN: A deep dive into SSL VPN from basic Rating: 5 out of 5 stars5/5Advanced Cybersecurity Strategies: Navigating Threats and Safeguarding Data Rating: 0 out of 5 stars0 ratingsMicrosoft Windows Security Essentials Rating: 5 out of 5 stars5/5“Careers in Information Technology: Cloud Security Specialist”: GoodMan, #1 Rating: 0 out of 5 stars0 ratingsCommunication and Network Security: CISSP, #4 Rating: 0 out of 5 stars0 ratingsMastering Puppet Rating: 0 out of 5 stars0 ratingsRHCSA Red Hat Certified System Administrator Linux Certification Study Guide to Pass Exam Rating: 0 out of 5 stars0 ratingsThreat modelling Second Edition Rating: 1 out of 5 stars1/5PHP Mastery: Crafting Dynamic Web Solutions Rating: 0 out of 5 stars0 ratingsHIPAA Compliance Officer - The Comprehensive Guide Rating: 0 out of 5 stars0 ratingsSetup of a Graphical User Interface Desktop for Linux Virtual Machine on Cloud Platforms Rating: 0 out of 5 stars0 ratingsNine Steps to Success: An ISO27001:2013 Implementation Overview Rating: 1 out of 5 stars1/5MCSA Windows Server 2012 Complete Study Guide: Exams 70-410, 70-411, 70-412, and 70-417 Rating: 0 out of 5 stars0 ratings"Careers in Information Technology: Cybersecurity Analyst": GoodMan, #1 Rating: 0 out of 5 stars0 ratings26 Ways to Save on Your Utility Bills!: 26 Ways, #1 Rating: 0 out of 5 stars0 ratingsSecuring the CI/CD Pipeline: Best Practices for DevSecOps Rating: 0 out of 5 stars0 ratingsCloud: Get All The Support And Guidance You Need To Be A Success At Using The CLOUD Rating: 0 out of 5 stars0 ratings"Careers in Information Technology: Network Engineer": GoodMan, #1 Rating: 0 out of 5 stars0 ratingsUbuntu 18.04 Essentials: Learn to Install, Administer and Use Ubuntu 18.04 Systems Rating: 0 out of 5 stars0 ratingsGoogle Cloud Run for DevOps: Automating Deployments and Scaling Rating: 0 out of 5 stars0 ratingsCCSP Certified Cloud Security Professional A Step by Step Study Guide to Ace the Exam Rating: 0 out of 5 stars0 ratingsNagios Core Administration Cookbook Rating: 5 out of 5 stars5/5
Security For You
Cybersecurity For Dummies Rating: 5 out of 5 stars5/5CISM Certified Information Security Manager Study Guide Rating: 4 out of 5 stars4/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5IAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsHow to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5CompTIA Security+ Study Guide with over 500 Practice Test Questions: Exam SY0-701 Rating: 5 out of 5 stars5/5How to Hack Like a GOD: Master the secrets of hacking through real-life hacking scenarios Rating: 4 out of 5 stars4/5How to Hack Like a Pornstar Rating: 4 out of 5 stars4/5IAPP CIPM Certified Information Privacy Manager Study Guide Rating: 0 out of 5 stars0 ratings(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide Rating: 3 out of 5 stars3/5The Darknet Superpack Rating: 0 out of 5 stars0 ratingsMake Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5CompTia Security 701: Fundamentals of Security Rating: 0 out of 5 stars0 ratingsSocial Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Codes and Ciphers Rating: 5 out of 5 stars5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Hacking For Dummies Rating: 4 out of 5 stars4/5Amazon Web Services (AWS) Interview Questions and Answers Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Cybersecurity All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsDestination CISSP Rating: 5 out of 5 stars5/5How Not To Use Your Smartphone Rating: 5 out of 5 stars5/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5CompTIA CySA+ Study Guide: Exam CS0-003 Rating: 2 out of 5 stars2/5
Reviews for Securing .NET Web Services with SSL
0 ratings0 reviews
Book preview
Securing .NET Web Services with SSL - Slava Gomzin
Securing .NET Web Services with SSL
How to Protect Data in Transit
between Client and Remote Server
Application Security Series
Slava Gomzin
Cover Photo and Design: Alisa Levy
Smashwords Edition
Copyright © 2012 Slava Gomzin
Table of Contents
Introduction
Vulnerabilities Due To Insecure Communication
Difference between SSL and TLS
Securing Data Transmission with SSL
Different Levels of Security Provided by SSL
SSL Implementation Modes
Server Certificate Only
Server and Client Certificates
SSL Certificates
Certificate Issuing Methods
Self-Signed Certificate
Certificate Issued Using Self-Signed Root Certificate
Certificate Issued through Local Certificate Authority
Certificate Issued through Public Certificate Authority
Test Certificates
Server Test Certificates
Creating Test Certificate Authority
Creating Server Test Certificate for Specific Server Host Name
Creating Server Test Certificate for localhost
Creating Standalone Self-Signed Test Server Certificate (without CA Root)
Obtaining Test Server Certificate from Public Certificate Authority
Going to Production
Client Test Certificate
Creating Client Test Certificate using Root CA Certificate
Implementing SSL on Server
Web Server Configuration
Server Application Configuration
Server Application Code Changes
Implementing SSL on Client
Client Application Configuration
Client Application Code