Download presentation
Presentation is loading. Please wait.
Published byEric Willis Modified over 9 years ago
1
Pertemuan #10 Secure HTTP (HTTPS) Kuliah Pengaman Jaringan
2
The Plain Text HTTP Consider the following HTTP request passed in clear text: POST /search HTTP/1.1 Host: 127.0.0.1 User-Agent: Mozilla/5.0 Galeon/1.2.5 (X11; Linux i686; U;) Gecko/20020606 Connection: keep-alive Content-Type: application/x-www-form-urlencoded Content-Length: 71 credit_card_num=1234567890123456&exp_date=2006-05& name=Chris%20Shiflett
3
Security For HTTP We need a technology for HTTP that provides: Server authentication Clients know they’re talking to the real server Client authentication Servers know they’re talking to the real client Integrity Servers & clients are safe from their data being altered Encryption Clients & servers talk privately without fear of eavesdropping Efficiency An algorithm fast enough for inexpensive clients and servers to use
4
Security For HTTP Ubiquity Protocols are supported by virtually all clients and servers Administrative scalability Instant secure communication for anyone, anywhere Adaptibility Supports the best known security methods of the day
5
HTTPS Overview Stands for HTTP Secure HTTP sent over secure transport layer (Secure Socket Layer) The most popular secure form of HTTP Pioneered by Netscape Corp. In 1994, Netscape released the spec of Secure Socket Layer By 1995, version 3.0 of SSL was released Supported by all major browsers & servers Dramatically changed the way people used the web The URL will start with https:// instead of http://https://http:// Some browser also display iconic security cues
6
HTTPS Overview
7
Secure Socket Layer (SSL) provides: Data Integrity Can help ensure that HTTP data can’t be changed while in transit Data Confidentiality Provides strong cryptographic techniques used to encrypt HTTP messages Identification Can offer reasonable assurance as to the identity of a Web Server Can also be used to validate the identity of a client, but this is less common
8
HTTPS Overview Compared with HTTP in TCP/IP Protocol Stack Server Port: 80 Server Port: 443
9
HTTP & HTTPS Transactions Initiate connection
10
HTTP & HTTPS Transactions Exchange data
11
HTTP & HTTPS Transactions Terminate connection
12
SSL Security Parameters Handshake
13
HTTPS Server Certificate
14
Site Certificate Validation SSL doesn’t require you to examine the web server But modern browser do some simple sanity checks on certificates, the steps are: Date check Check start/end date, ensure cert is still valid Signer trust check Cert is signed by well-known trusted Cerfiticate Authority Signature check Check cert integrity by applying the signing CA’s public key to the signature and comparing it to the checksum Site identity check Domain name in cert matches with the server they’re talking to
15
Certificate Authorities CA is used to assure that a particular public key belongs to a particular person (or domain name, for example: its-sby.edu) CA is a trusted 3 rd party that assures the identity of a public key’s owner with a digital certificate Digital cert is a document declaring a particular pub-key is owned by a particular web site CA’s role is very similar to a notary whose responsibility is to ensure the correct identity of people signing a legal document
16
Tunnelling Secure Traffic Through Proxies Corporate firewall proxy
17
Tunnelling Secure Traffic Through Proxies Proxy can’t read the encrypted HTTP header, so it won’t know where to forward the request A few modifications are needed to tell the proxy where to connect One popular technique is the HTTPS SSL tunnelling protocol
18
SSL Tunnelling To allow SSL traffic to flow through proxy firewalls, a tunnelling feature was added to HTTP Encrypted data is placed inside HTTP messages and sent through normal HTTP channels
19
SSL Tunnelling Tunnels let non-HTTP traffic flow through HTTP connections
20
SSL Tunnelling Direct SSL connection vs. tunnelled SSL connection
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.