DNS and HTTPs ACN Presentation. Domain Names We refer to computers on the Internet (Internet hosts), by names like: sharda.ac.in These are called domain.

Slides:



Advertisements
Similar presentations
The Internet.
Advertisements

Enabling Secure Internet Access with ISA Server
Chapter 10 Fine-tuning, Completing, and Publishing Your Project.
CP3397 ECommerce.
Cryptography and Network Security
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
SSL & SharePoint IT:Network:Applications. Agenda Secure Socket Layer Encryption 101 SharePoint Customization SharePoint Integration.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
The Internet Useful Definitions and Concepts About the Internet.
Internet…issues Managing the Internet
SSL By: Anthony Harris & Adam Shkoler. What is SSL? SSL stands for Secure Sockets Layer SSL is a cryptographic protocol which provides secure communications.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
Application Layer. Domain Name System Domain Name System (DNS) Problem – Want to go to but don’t know the IP addresswww.google.com Solution.
Internet Basics.
SSL (Secure Socket Layer) and Secure Web Pages Rob Sodders, University of Florida CIS4930 “Advanced Web Design” Spring 2004
The Internet & The World Wide Web Notes
CSCI 6962: Server-side Design and Programming
IT:Network:Applications.  Single Key (Symmetric) encryption ◦ One “key” or passphrase used to encrypt and decrypt ◦ FAST – good for large amounts of.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
 Internet vs WWW  Pages vs Sites  How the Internet Works  Getting a Web Presence.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Lesson 2 — The Internet and the World Wide Web
Digital Certificates Made Easy Sam Lutgring Director of Informational Technology Services Calhoun Intermediate School District.
Chapter 6 The World Wide Web. Web Pages Each page is an interactive multimedia publication It can include: text, graphics, music and videos Pages are.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Chapter 1: Introduction to Web Applications. This chapter gives an overview of the Internet, and where the World Wide Web fits in. It then outlines the.
HOW WEB SERVER WORKS? By- PUSHPENDU MONDAL RAJAT CHAUHAN RAHUL YADAV RANJIT MEENA RAHUL TYAGI.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Types of Electronic Infection
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
The Inter-network is a big network of networks.. The five-layer networking model for the internet.
1 DCS 835 – Computer Networking and the Internet Digital Certificate and SSL (rev ) Team 1 Rasal Mowla (project leader) Alvaro Restrepo, Carlos.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
CS 7: Introduction to Computer Programming Java and the Internet Sections ,2.1.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Living Online Lesson 3 Using the Internet IC3 Basics Internet and Computing Core Certification Ambrose, Bergerud, Buscge, Morrison, Wells-Pusins.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Pertemuan #10 Secure HTTP (HTTPS) Kuliah Pengaman Jaringan.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Organisations and Data Management 1 Data Collection: Why organisations & individuals acquire data & supply data via websites 2Techniques used by organisations.
CSCI-235 Micro-Computers in Science The Internet and World Wide Web.
1. Internet hosts:  IP address (32 bit) - used for addressing datagrams  “name”, e.g., ww.yahoo.com - used by humans DNS: provides translation between.
The Internet. Important Terms Network Network Internet Internet WWW (World Wide Web) WWW (World Wide Web) Web page Web page Web site Web site Browser.
The Internet, Fourth Edition-- Illustrated 1 The Internet – Illustrated Introductory, Fourth Edition Unit B Understanding Browser Basics.
1 UNIT 13 The World Wide Web. Introduction 2 Agenda The World Wide Web Search Engines Video Streaming 3.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Internet Protocol Version4 (IPv4)
(class #2) CLICK TO CONTINUE done by T Batchelor.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
Communication protocols 2. HTTP Hypertext Transfer Protocol, is the protocol of World Wide Web (www) Client web browser Web server Request files Respond.
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
TOPIC: HTTPS (Security protocol)
Setting and Upload Products
SSL Certificates for Secure Websites
CISC103 Web Development Basics: Web site:
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
E-commerce | WWW World Wide Web - Concepts
E-commerce | WWW World Wide Web - Concepts
BY GAWARE S.R. DEPT.OF COMP.SCI
CISC103 Web Development Basics: Web site:
Web Privacy Chapter 6 – pp 125 – /12/9 Y K Choi.
Unit 8 Network Security.
Electronic Payment Security Technologies
The Internet and Electronic mail
Q/ Compare between HTTP & HTTPS? HTTP HTTPS
Presentation transcript:

DNS and HTTPs ACN Presentation

Domain Names We refer to computers on the Internet (Internet hosts), by names like: sharda.ac.in These are called domain names or, if you want to be really geeky, “fully qualified domain names.” The key point is that the name identifies a particular computer – no two hosts have the same domain name.

The parts of a domain name sharda.ac.in A domain is a group of related hosts. The particular host is called sharda..ac → Academic Institute followed by a top level domain name..in → This is country (India) code top level domain.

A unique host Sharda.ac.in This is the domain name of a unique host. It is a member of the ac.in domain, but it is the only one with the name sharda. It is like a family – all the brothers and sisters have the same last name, but it would be confusing if two of them also had the same first name.

There are a limited top-level domains.edu, educational.com, commercial.gov, government.org, non profit.net, networking organizations These are called “generic” TLDs.

country code top-level domain names for every nation.in,India.us, United States.mx, Mexico.uk, United Kingdom These are called “country code” top-level domains (ccTLDs). The organization or host do not necessarily have to be in the country to register the name.

DNS search If your DNS knows the IP address it returns it. Otherwise it will contact another DNS to get the result. Etc. until it is found or determined that it does not exist, in which case an error message is returned.

How DNS Works Simplified If you want to… Call someone, you need to ask for their phone number You can’t just dial “M Y - F R I E N D” Mail someone, you need to get their address first What about the Internet? If you need to reach Google, you need their IP Does anyone know Google’s IP? Problem: People can’t remember IP addresses Need human readable names that map to IPs

Internet Names and Addresses Addresses, e.g Computer usable labels for machines Conform to structure of the network Names, e.g. Human usable labels for machines Conform to organizational structure How do you map from one to the other? Domain Name System (DNS)

BASIC DOMAIN NAME RESOLUTION 10 EVERY HOST KNOWS A LOCAL DNS SERVER SENDS ALL QUERIES TO THE LOCAL DNS SERVER IF THE LOCAL DNS CAN ANSWER THE QUERY, THEN YOU’RE DONE 1.LOCAL SERVER IS ALSO THE AUTHORITATIVE SERVER FOR THAT NAME 2.LOCAL SERVER HAS CACHED THE RECORD FOR THAT NAME OTHERWISE, GO DOWN THE HIERARCHY AND SEARCH FOR THE AUTHORITATIVE NAME SERVER EVERY LOCAL DNS SERVER KNOWS THE ROOT SERVERS USE CACHE TO SKIP STEPS IF POSSIBLE E.G. SKIP THE ROOT AND GO DIRECTLY TO.EDU IF THE ROOT FILE IS CACHED

RECURSIVE DNS QUERY PUTS THE BURDEN OF RESOLUTION ON THE CONTACTED NAME SERVER HOW DOES GOOGLE KNOW WHO TO FORWARD RESPONSES TOO? RANDOM IDS EMBEDDED IN DNS QUERIES WHAT HAVE WE SAID ABOUT KEEPING STATE IN THE NETWORK? 11 Root com ns1.google.com Google.com Where is

ITERATED DNS QUERY CONTACT SERVER REPLIES WITH THE NAME OF THE NEXT AUTHORITY IN THE HIERARCHY “I DON’T KNOW THIS NAME, BUT THIS OTHER SERVER MIGHT” THIS IS HOW DNS WORKS TODAY 12 Root com ns1.google.com Google.com Where is

DNS PROPAGATION HOW MANY OF YOU HAVE PURCHASED A DOMAIN NAME? DID YOU NOTICE THAT IT TOOK ~72 HOURS FOR YOUR NAME TO BECOME ACCESSIBLE? THIS DELAY IS CALLED DNS PROPAGATION 13 Root com ns.godaddy.com Sharda.ac.in  Why would this process fail for a new DNS name?

CACHING VS. FRESHNESS DNS PROPAGATION DELAY IS CAUSED BY CACHING 14 Sharda.ac.in Cached Root Zone File Cached.com Zone File Cached.net Zone File Etc. Root com ns.godaddy.com Where is That name does not exist.  Zone files may be cached for 1-72 hours

THE IMPORTANCE OF DNS 15 WITHOUT DNS… HOW COULD YOU GET TO ANY WEBSITES? YOU ARE YOUR MAILSERVER WHEN YOU SIGN UP FOR WEBSITES, YOU USE YOUR ADDRESS WHAT IF SOMEONE HIJACKS THE DNS FOR YOUR MAIL SERVER? DNS IS THE ROOT OF TRUST FOR THE WEB WHEN A USER TYPES THEY EXPECT TO BE TAKEN TO THEIR BANK’S WEBSITEWWW.ICICIBANK.COM WHAT IF THE DNS RECORD IS COMPROMISED?

HTTPs

 HTTP (Hypertext Transfer Protocol) is the set of rules for transferring files (text, graphic images, sound, video, and other multimedia files) on the world wide web.  HTTP uses default port 80.  The client submits an HTTP request message to the server. The server, which provides resources such as HTML files and other content, or performs other functions on behalf of the client, returns a response message to the client. HTTP

Fig:Working of HTTP

 Unsecured  Does not use certificates  Privacy  Integrity  Authentication HTTP Limitations Security Concerns

 HTTPS = HTTP + SSL  HTTPS stands for Hypertext Transfer Protocol over Secure Socket Layer, or HTTP over SSL.  HTTPS by default uses port 443.  URL's beginning with HTTPS indicate that the connection is encrypted using SSL. HTTPS

Fig:working of HTTPS

 HTTPS is implemented using Secure Sockets Layer (SSL).  HTTPS by purchasing an SSL Certificate. HTTPS implementation

 SSL certificates becomes the "passport" or the digital document that verify that the security and authenticity of the interaction.  The SSL certificate is installed on a web server to identify the business using it to encrypt sensitive data such as credit card information.  SSL Certificates give a website the ability to communicate securely with its web customers. What is an SSL Certificate?

 An SSL Certificate enables encryption of sensitive information during online transactions.  Each SSL Certificate contains unique, authenticated information about the certificate owner.  A Certificate Authority verifies the identity of the certificate owner when it is issued. Cont't

SSL Certificate interaction with the Browser and the Server

 Each SSL Certificate consists of a Public key and a Private key.  So during a secure communication, the browser encrypts the message using the public key and sends it to the server. The message is decrypted on the server side using the Private key. How Encryption Works ?

 In Internet Explorer, you will see a lock icon in the Security Status bar. The Security Status bar is located on the right side of the Address bar. You can click the lock to view the identity of the website.  If the information does not match or the certificate has expired, the browser displays an error message or warning and the status bar may turn RED. How to identify a Secure Connection ?

SSL Diagram When any modern browser is installed, it is sent with several CA issuer certificates. These issuer certificates contain a public key for the issuer, among other information. When a web designer decides to use SSL he needs to purchase a certificate that is signed using the CA's private key. The web browser starts a connection to an HTTPS site. Along with this request the client sends all supported encryption schemes. As a response to the browser's connection request, the Server sends a copy of the certificate from step 2. Along with this transmission is the server's answer to the encryption negotiation. Once a certificate is downloaded, the signature of the certificate (that was signed using the CA's private key) is checked using the CA's public key (installed in the browser in step 1. The connection succeeds, the client can now download and upload to the web site with the security of encryption.

 HTTPS is slightly slower than HTTP  HTTPS adds computational overhead as well as network overhead. An HTTPS server can only provide one "virtual host" behind a single socket, as opposed to multiple ones behind an http socket. This is because all security negotiation takes place before the HTTP protocol starts & hence before the server knows which URL the client is asking for. HTTPS cannot prevent stealing confidential information from the pages cached on the browser. Since in SSL data is encrypted only during transmission on the network, it is in clear text in the browser memory Disadvantages of HTTPS

 URL begins with “ in case of HTTP while the URL begins with “ in case of HTTPS.  HTTP is unsecured while HTTPS is secured.  HTTP uses port 80 for communication while HTTPS uses port 443 for communication.  HTTP operates at Application Layer while HTTPS operates at Transport Layer.  No encryption is there in HTTP while HTTPS uses encryption.  No certificates required in HTTP while certificates required in HTTPS. HTTP vs HTTPS:

How SSL Overcomes HTTP Security Concerns Secure Sockets Layer technology protects your Web site and makes it easy for your Web site visitors to trust you in three essential ways: Privacy An SSL Certificate enables encryption of sensitive information during online transactions. Integrity. A Certificate Authority verifies the identity of the certificate owner when it is issued. Authentication. Each SSL Certificate contains unique, authenticated information about the certificate owner.

Limitations of HTTPS An HTTPS server can only provide one "virtual host" behind a single socket, as opposed to multiple ones behind an http socket. This is because all security negotiation takes place before the HTTP protocol starts & hence before the server knows which URL the client is asking for. HTTPS cannot prevent stealing confidential information from the pages cached on the browser. Since in SSL data is encrypted only during transmission on the network, it is in clear text in the browser memory HTTPS is slightly slower than HTTP. HTTPS adds computational overhead as well as network overhead.

Thank You