Pertemuan #10 Secure HTTP (HTTPS) Kuliah Pengaman Jaringan.

Slides:



Advertisements
Similar presentations
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Advertisements

Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Cryptography and Network Security
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
Chapter 7 Web Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
CSE 461 Section. “Transport Layer Security” protocol Standard protocol for encrypting Internet traffic Previously known as SSL (Secure Sockets Layer),
By: Hassan Waqar.  A PROTOCOL for securely transmitting data via the internet.  NETWORK LAYER application.  Developed by NETSCAPE.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
SSL & SharePoint IT:Network:Applications. Agenda Secure Socket Layer Encryption 101 SharePoint Customization SharePoint Integration.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Web Security CS-431. HTTP Authentication Protect web content from those who don’t have a “need to know” Require users to authenticate using a userid/password.
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Chapter 31 Security Protocols in the Internet.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
Part 5:Security Network Security (Access Control, Encryption, Firewalls)
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
INF 123 SW ARCH, DIST SYS & INTEROP LECTURE 17 Prof. Crista Lopes.
SSL By: Anthony Harris & Adam Shkoler. What is SSL? SSL stands for Secure Sockets Layer SSL is a cryptographic protocol which provides secure communications.
Chapter 8 Web Security.
DIGITAL CERTIFICATE & SSL PRESENTED BY, SWAPNA ERABATHINI.
CSCI 6962: Server-side Design and Programming
How HTTPS Works J. David Giese. Hyper Text Transfer Protocol BrowserHTTP Server GET / HTTP/1.1 HOST: edge-effect.github.io HEADERS BODY HTTP/ OK.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
SSL and https for Secure Web Communication CSCI 5857: Encoding and Encryption.
Secure Socket Layer (SSL)
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Introduction to Secure Sockets Layer (SSL) Protocol Based on:
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Encryption and Security Dylan Anderson Michael Huffman Julie Rothacher Dylan Anderson Michael Huffman Julie Rothacher.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Web Security : Secure Socket Layer Secure Electronic Transaction.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
Tunneling and Securing TCP Services Nathan Green.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
SSL(Secure Socket Layer) Guided By:- Presented By:- Richard Sinn Jimmy Mehta
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
Jump to first page Internet Security in Perspective Yong Cao December 2000.
 authenticated transmission  secure tunnel over insecure public channel  host to host transmission is typical  service independent WHAT IS NEEDED?
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
Secure Socket Layer SSL and TLS. SSL Protocol Peer negotiation for algorithm support Public key encryptionPublic key encryption -based key exchange and.
X509 Web Authentication From the perspective of security or An Introduction to Certificates.
Securing Access to Data Using IPsec Josh Jones Cosc352.
Lecture 6 (Chapter 16,17,18) Network and Internet Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007.
Henric Johnson1 Chapter 7 WEB Security Henric Johnson Blekinge Institute of Technology, Sweden
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
PRESENTATION ON SECURE SOCKET LAYER (SSL) BY: ARZOO THAKUR M.E. C.S.E (REGULAR) BATCH
TOPIC: HTTPS (Security protocol)
Setting and Upload Products
Virtual Private Network (VPN)
Secure Sockets Layer (SSL)
How to Check if a site's connection is secure ?
Using SSL – Secure Socket Layer
Unit 8 Network Security.
Electronic Payment Security Technologies
Presentation transcript:

Pertemuan #10 Secure HTTP (HTTPS) Kuliah Pengaman Jaringan

The Plain Text HTTP Consider the following HTTP request passed in clear text: POST /search HTTP/1.1 Host: User-Agent: Mozilla/5.0 Galeon/1.2.5 (X11; Linux i686; U;) Gecko/ Connection: keep-alive Content-Type: application/x-www-form-urlencoded Content-Length: 71 credit_card_num= &exp_date= & name=Chris%20Shiflett

Security For HTTP We need a technology for HTTP that provides:  Server authentication Clients know they’re talking to the real server  Client authentication Servers know they’re talking to the real client  Integrity Servers & clients are safe from their data being altered  Encryption Clients & servers talk privately without fear of eavesdropping  Efficiency An algorithm fast enough for inexpensive clients and servers to use

Security For HTTP  Ubiquity Protocols are supported by virtually all clients and servers  Administrative scalability Instant secure communication for anyone, anywhere  Adaptibility Supports the best known security methods of the day

HTTPS Overview Stands for HTTP Secure HTTP sent over secure transport layer (Secure Socket Layer) The most popular secure form of HTTP Pioneered by Netscape Corp. In 1994, Netscape released the spec of Secure Socket Layer By 1995, version 3.0 of SSL was released Supported by all major browsers & servers Dramatically changed the way people used the web The URL will start with instead of Some browser also display iconic security cues

HTTPS Overview

Secure Socket Layer (SSL) provides:  Data Integrity Can help ensure that HTTP data can’t be changed while in transit  Data Confidentiality Provides strong cryptographic techniques used to encrypt HTTP messages  Identification Can offer reasonable assurance as to the identity of a Web Server Can also be used to validate the identity of a client, but this is less common

HTTPS Overview Compared with HTTP in TCP/IP Protocol Stack Server Port: 80 Server Port: 443

HTTP & HTTPS Transactions Initiate connection

HTTP & HTTPS Transactions Exchange data

HTTP & HTTPS Transactions Terminate connection

SSL Security Parameters Handshake

HTTPS Server Certificate

Site Certificate Validation SSL doesn’t require you to examine the web server But modern browser do some simple sanity checks on certificates, the steps are:  Date check Check start/end date, ensure cert is still valid  Signer trust check Cert is signed by well-known trusted Cerfiticate Authority  Signature check Check cert integrity by applying the signing CA’s public key to the signature and comparing it to the checksum  Site identity check Domain name in cert matches with the server they’re talking to

Certificate Authorities CA is used to assure that a particular public key belongs to a particular person (or domain name, for example: its-sby.edu) CA is a trusted 3 rd party that assures the identity of a public key’s owner with a digital certificate Digital cert is a document declaring a particular pub-key is owned by a particular web site CA’s role is very similar to a notary whose responsibility is to ensure the correct identity of people signing a legal document

Tunnelling Secure Traffic Through Proxies Corporate firewall proxy

Tunnelling Secure Traffic Through Proxies Proxy can’t read the encrypted HTTP header, so it won’t know where to forward the request A few modifications are needed to tell the proxy where to connect One popular technique is the HTTPS SSL tunnelling protocol

SSL Tunnelling To allow SSL traffic to flow through proxy firewalls, a tunnelling feature was added to HTTP Encrypted data is placed inside HTTP messages and sent through normal HTTP channels

SSL Tunnelling Tunnels let non-HTTP traffic flow through HTTP connections

SSL Tunnelling Direct SSL connection vs. tunnelled SSL connection