Transport Level Security Presentation
Transport Level Security Presentation
TRANSPORT-LEVEL SECURITY.
GROUP 4:
NO: NAMES:
1 TUMUHIMBISE ALLAN
1 2
3
Web Security considerations
2
Secure socket layer and transport layer security
Transport layer security
HTTPs
Secure Shell (SSH)
These slides are based on Willian Stallings’s book “Network Security Essentials: Applications and Standards
(Fourth edition)”
3 Web Security Considerations:
Web security is fundamentally a client/server application running over the internet and TCP/IP
intranets.
‘’Web security ,also known as Cyber Security ‘’ Involves protecting that information by
preventing, detecting and responding to attacks.
The WEB is a highly visible utlet for corporate and product information and as the platform for
business transactions.
Complex software hide many security flaws.
Web servers are easy to configure and manage.
Users are not aware of the risks
4 Web security Threats:
Security threats faced in using the web
1. One way –Active attacks and Passive attacks
Passive attacks include eavesdropping on network traffic between browser and server and
gaining access to information on a web site that is supposed to be restricted.
Active attacks include impersonating another user, altering messages in transit between
client and server, and altering information on a Web site.
2. Another way :classify location of the threat e.g. web server, web browser, and network traffic
between browser and server. Issues of server and browser security fall into the category of
computer system security
5 Web Traffic Security Approaches:
Web security provide to use IP security (IP Sec) .
The advantage of using IPSec is that it is transparent to end users and applications and provides a general
purpose solution.
Ipsec includes a filtering capability so that only selected traffic need incur the overhead of Ipsec processing.
Another relatively general-purpose solution is to implement security just above TCP .The foremost example
of this approach is Secure Sockets Layer(SSL) and Transport Layer Security(TLS).
SSL or TLS could be provided protocol suite
SSL can be embedded in specific packages
Comparison of threats on the Web:
6
Relative location of Security facilities in the
7
TCP/IP STACK:
connection closure
o have “Connection: close” in HTTP record
o TLS level exchange close_notify alerts
o can then close TCP connection
o must handle TCP close before alert exchange sent or completed
22
Secure Shell (SSH):
Protocol for secure network communications
designed for simplicity, easy to implement.
SSH1 provided secure remote logon facility
replace TELNET & other insecure schemes
SSH2 fixes a number of security flaws
Documented in RFCs 4250 through 4254
SSH provides general client/server capability: can
TCP
be used for network functions, e.g., file transfer, e-
mail IP
SSH client and server applications widely available
for most OSs SSH Protocol Stack
Has become method of choice for remote login, X
tunneling
Pervasive application for encryption technology
outside of embedded systems
SSH Transport Layer Protocol: Server
23
Authentication:
Server authentication occurs at the transport layer, based on server’s public/private key pair
A server may have multiple host keys using multiple different asymmetric encryption
algorithms
Multiple hosts may share the same host key
Server host key is used during key exchange to authenticate the identity of the host
SSH Transport Layer: Protocol Packet
24
Exchange, Formation:
payload
COMPRESS
ENCRYPT MAC
ciphertext
SSH Packet
Password
• The client sends a message containing a plaintext password, which is protected by encryption by the
Transport Layer Protocol
Hostbased
• Authentication is performed on the client’s host rather than the client itself
• This method works by having the client send a signature created with the private key of the client
host
• Rather than directly verifying the user’s identity, the SSH server verifies the identity of the client
host
27 SSH Connection Protocol:
runs on SSH Transport Layer Protocol
assumes secure authentication connection
which is called tunnel
used for multiple logical channels
SSH communications use separate channels
either side can open with unique id number
flow controlled via sliding window mechanism
have three stages:
opening a channel, data transfer, closing a channel