z/tpf OpenSSL Support Dan Yee IBM Software Engineer August 10, 2016

Size: px
Start display at page:

Download "z/tpf OpenSSL Support Dan Yee IBM Software Engineer August 10, 2016"

Transcription

1 z/tpf OpenSSL Support Dan Yee IBM Software Engineer August 10,

2 Disclaimer Any reference to future plans are for planning purposes only. IBM reserves the right to change those plans at its discretion. Any reliance on such a disclosure is solely at your own risk. IBM makes no commitment to provide additional information in the future. 2

3 Agenda OpenSSL Introduction OpenSSL Support on z/tpf z/tpf Shared SSL Support z/tpf CPACF and Crypto Express Support Generating public key pairs and certificates on z/tpf z/tpf SSL Demo 3

4 SSL Introduction SSL - Secure Sockets Layer Enables socket applications using TCP protocol to communicate in a secure manner over the TCP/IP network Netscape originally developed SSL protocol versions 2 and 3 in 1995 and Transport Layer Security (TLS) protocol versions TLS 1.0, 1.1, and 1.2 were developed in 1999, 2006, and OpenSSL became a popular implementation of the SSL and TLS protocols after its first release in OpenSSL was ported to TPF 4.1 in 2001, and OpenSSL 0.9.7c was included in z/tpf base in

5 OpenSSL Support on z/tpf OpenSSL 1.0.2e (APARs PJ42982 and PJ43537 on z/tpf PUT 13) supported January 2016 Dropped support of SSL versions 2 and 3 Dropped support of RC2 and RC4 encryption algorithms Supports TLS versions 1.0, 1.1, and 1.2 Supports SHA-256 hashing algorithm SSL performance enhanced (50% to 90% reduction in CPU usage) Vulnerability fixes from 2003 to 2015 improve security of z/tpf s support Fewer modifications to OpenSSL code, facilitating future OpenSSL ports Intention to port latest version of OpenSSL more often 5

6 How does z/tpf port OpenSSL? Download OpenSSL from Configure opensslconf.h with options not supported Support AES, DES, SHA1/SHA256 Error strings disabled Set compiler options in cssl.mak Add z/tpf modifications to OpenSSL Build CSSL and z/tpf SSL segments (if necessary) Load updated code to VM and native test systems Run internal SSL drivers and associated SSL middleware (HTTP server/client, MQ, FTP client) 6

7 z/tpf Shared SSL Support Unique to z/tpf Allows SSL sessions to be shared by multiple ECBs Shared SSL sessions managed by SSL daemon processes SSL daemon process contains multiple threads to process functions Increase number of SSL daemon processes and threads to improve scalability Number of processes and threads configurable 7

8 Configuring Shared SSL Modify SNAKEY macro SSLPROC parameter defines number of SSL daemon processes (0 to 16) SSLTHRD parameter defined number of thread ECBs per daemon process (0 to 32) SSL1052 parameter defined whether SSL daemon processes start in 1052 state (YES or NO) Reassemble and load CTK2 8

9 Managing SSL daemons SSL daemons started automatically If SSL1052-YES, SSL daemons started in 1052 state If SSL1052-NO, SSL daemons started in CRAS state ZSSLD STOP stops SSL daemon processes ZSSLD START starts SSL daemon processes after being stopped ZSSLD RECYCLE stops and starts SSL daemon processes ZSSLD DISPLAY displays statistical information about SSL daemon processes 9

10 ZSSLD DISPLAY example CSMP0097I CPU-B SS-BSS SSU-HPN IS-01 CSMP0099I B ZSSLD DISPLAY+ CSMP0097I CPU-B SS-BSS SSU-HPN IS-01 SSLD0007I CSSLZD - SSL STATISTICAL INFORMATION LAST MINUTE HIGH WATER MARK SESSIONS STARTED 2 5 SSL_WRITES ISSUED _ SSL_READS ISSUED MEGABYTES SENT MEGABYTES RECEIVED SSL ACTIVE MAX ACT CURRENT MAX HEAP AVAIL MAX HEAP DAEMON THREADS THREADS SESS SESS IN USE HEAP IN USE

11 Displaying/changing SSL shared support configuration ZNKEY SSLPROC Display number of SSL daemon processes Change number of SSL daemon processes (1 to 16) Takes effect on ZSSLD RECYCLE or ZSSLD STOP and ZSSLD START ZNKEY SSLTHRD Display number of thread ECBs per daemon process Change number of thread ECBs per daemon process (1 to 32) Takes effect on ZSSLD RECYCLE or ZSSLD STOP and ZSSLD START ZNKEY SSL1052 Display whether SSL daemon processes start in 1052 state Change whether SSL daemon processes start in 1052 state (YES/NO) Takes effect on ZSSLD RECYCLE or ZSSLD STOP and ZSSLD START 11

12 z/tpf unique SSL functions SSL_aor SSL_get_peer_certificate_subject_info SSL_get_peer_certificate_FQDN SSL_CTX_new_shared SSL_CTX_load_and_set_client_CA_file SSL_load_and_set_client_CA_file 12

13 z/tpf SSL_aor Function Enables caller s ECB to exit before data arrives to save on resources (similar to activate_on_receipt) Format SSL_aor(SSL *ssl, unsigned char *parm, unsigned char * pgm, unsigned int istream) When data arrives, program specified is activated. Application interface EBW004-EBW011 8 byte data passed from caller (*parm) EBW016-EBW019 socket descriptor EBW020 time-out flag EBW024-EBW031 - SSL token (SSL *ssl) Activated program issues SSL_read to read in data 13

14 INETD SSL Model Features Builds efficient SSL server for SSL shared applications Creates and manages CTX structure Sets up and completes SSL handshake Provides USSL user exit to perform initialization and cleanup tasks when server is started or stopped User tasks Provide SSL configuration file /etc/inetd/ssl/<servername.conf> Provide SSL application to read/write data, free SSL session, close SSL connection Code USSL user exit Starting/stopping INETD SSL model ZINET ADD S-S7500 PORT-7550 PGM-QSSZ MODEL-SSL STATE-CRAS ACT- AUTO PARM-S7500 ZINET START S-S7500 ZINET STOP S-S

15 INETD SSL Model Interface Application called by INETD during client connection Application interface EBW008-EBW011 - client connection socket. EBW016-EBW023 - parameter string specified with the PARM parameter of the ZINET ADD command. EBW024-EBW031 - SSL token associated with the new SSL session. 15

16 Sample SSL Server Application Program 1 (entered by INETD) setsockopt (set time-out and buffer sizes) SSL_aor exit Program 2 (activated by SSL_aor) SSL_read SSL_write SSL_aor (to program 2) exit 16

17 SAMPLE SSL CONFIGURATION FILE USESSL=YES VERSION=TLSv1_2 CIPHER=DES-CBC3-SHA,DES-CBC-SHA,AES256-SHA256 VERIFYPEER=NO CERTIFICATE=/certs/tpf7550_cert.pem CERTTYPE=PEM KEY=/tpfpubk/tpf7550.pem KEYTYPE=PEM 17

18 SSL Hardware Accelerator - CPACF Performs symmetric key encryption and calculates message digests in hardware faster than software z/tpf automatically detects and uses any available CPACF features Supports following algorithms SHA-1 for message integrity SHA-256 for message integrity DES for data encryption TDES for data encryption AES-128 for data encryption AES-256 for data encryption z/tpf invokes CPACF on I-stream cipher operation was requested. Use ZCPAC DISPLAY to obtain performance information for CPACF cipher algorithms 18

19 SSL Hardware Accelerator Crypto Express Performs Rivest-Shamir-Adelman (RSA) operations in hardware faster than software z/tpf automatically detects and uses any available Crypto Express cards z/tpf load balances RSA operations among defined Crypto Express cards z/tpf supports following Crypto Express cards: Crypto Express2 (z9) Crypto Express3 (z10) Crypto Express4S (EC12) Crypto Express5S (z13) Crypto Express card must be configured in accelerator mode. Crypto Express card is required to generate z/tpf public key pairs with ZPUBK GENERATE command Use ZCRYP DISPLAY command to obtain performance information for each Crypto Express card. 19

20 Generating public key pairs on z/tpf Public key pair and certificate required to start SSL session Enter ZPUBK GENERATE command to generate public key pair on z/tpf ZPUBK GENERATE KEYPAIR-KEYNAME1 CIPHER-RSA2048 (generate key) ZKEYS BACKUP PATH-/keys/backup.fil (back up the keystore) ZPUBK ACTIVATE KEYPAIR-KEYNAME1 (activate the key) Keypair saved in z/tpf keystore and can be reused for multiple SSL sessions Enter ZPUBK DISPLAY command to see keypairs saved in keystore 20

21 Creating self-signed certificates and certificate requests on z/tpf Use ZPUBK REQCERT command to create a create a self-signed certificate SSIGNED parameter creates self-signed certificate suitable for testing. Input key pair name, configuration file, and digest (SHA1/MD5) Output file to put certificate ZPUBK REQCERT PATH-/certs/certreq.fil KEYPAIR-KEYNAME1 CONFIG-/sslcfg/myssl.cfg DIGEST-SHA1 SSIGNED Use ZPUBK REQCERT command to create certificate request Omitting SSIGNED parameter creates a certificate request that can be sent to a certificate authority (CA) for signing ZPUBK REQCERT PATH-/certs/certreq.fil KEYPAIR-KEYNAME1 CONFIG-/sslcfg/myssl.cfg DIGEST-SHA1 21

22 References RFCs 2246 (TLS 1.0), 4346 (TLS 1.1), and 5246 (TLS 1.2) (link to z/tpf documentation in IBM Knowledge Center) z/tpf Security z/tpf C/C++ Language Support z/tpf Operations 22

Hardware Cryptography and z/tpf

Hardware Cryptography and z/tpf z/tpf V1.1 2013 TPF Users Group Hardware Cryptography and z/tpf Mark Gambino Communications Subcommittee AIM Enterprise Platform Software IBM z/transaction Processing Facility Enterprise Edition 1.1 Any

More information

Name: Mark Gambino Venue: SOA Subcommittee

Name: Mark Gambino Venue: SOA Subcommittee z/tpf V1.1-2011 Title: z/tpf HTTP Server Preview Name: Mark Gambino Venue: SOA Subcommittee AIM Enterprise Platform Software IBM z/transaction Processing Facility Enterprise Edition 1.1.0 Any reference

More information

z/tpf SSL Socket Driver User s Guide

z/tpf SSL Socket Driver User s Guide z/tpf SSL Socket Driver User s Guide Copyright IBM Corp. 2010 1. 1.0 Introduction This driver is used to test the basic and expanded functionality of the SSL code in TPF. Its function is determined by

More information

Name : Mark Gambino Venue : Communications Subcommittee

Name : Mark Gambino Venue : Communications Subcommittee z/tpf EE V1.1 z/tpfdf V1.1 TPF Toolkit for WebSphere Studio V3 TPF Operations Server V1.2 IBM Software Group TPF Users Group Spring 2006 TCP/IP Enhancements Name : Mark Gambino Venue : Communications Subcommittee

More information

z/tpf Enhanced HTTP Client and High Speed Connector Enhancements

z/tpf Enhanced HTTP Client and High Speed Connector Enhancements z/tpf Enhanced and High Speed Connector Enhancements Jamie Farmer Communications Subcommittee Disclaimer Any reference to future plans are for planning purposes only IBM reserves the right to change those

More information

Cipher Suite Configuration Mode Commands

Cipher Suite Configuration Mode Commands The Cipher Suite Configuration Mode is used to configure the building blocks for SSL cipher suites, including the encryption algorithm, hash function, and key exchange. Important The commands or keywords/variables

More information

Secure Key Management and Data Privacy on z/tpf

Secure Key Management and Data Privacy on z/tpf z/tpf EE V1.1 z/tpfdf V1.1 TPF Toolkit for WebSphere Studio V3 TPF Operations Server V1.2 IBM Software Group TPF Users Group Spring 2006 Secure Key Management and Data Privacy on z/tpf Name : Mark Gambino

More information

z/tpf Support for Java Enhancements

z/tpf Support for Java Enhancements z/tpf Support for Java Enhancements Chris Filachek z/tpf and z/tpfdf Architecture & Development What can I do with Java on z/tpf TODAY? Extend z/tpf Applications with Java z/tpf Application ECB 1 z/tpf

More information

TPF 4.1 Communications - TCP/IP Enhancements

TPF 4.1 Communications - TCP/IP Enhancements TPF Users Group Grapevine, Texas IBM Software Group TPF 4.1 Communications - TCP/IP Enhancements Jamie Farmer October 2004 AIM Core and Enterprise Solutions IBM z/transaction Processing Facility Enterprise

More information

TPF Communications - TCP/IP Enhancements

TPF Communications - TCP/IP Enhancements TPF Communications - TCP/IP Enhancements Jamie Farmer TPF TCP/IP Enhancements 7 New TCP/IP Enhancements All native stack enhancements 4 of the enhancements are TPF Users Group Requirements 3 enhancements

More information

Secure Socket Layer (SSL) for

Secure Socket Layer (SSL) for Secure Socket Layer (SSL) for Micro-Controller over Wireless LAN This document illustrates how to secure network link by using SSL. The example setups a SSL connection with Apache Web server, and transmit/receive

More information

Lisa Banks Distributed Systems Subcommittee

Lisa Banks Distributed Systems Subcommittee z/tpf V1.1 Title: Concepts of z/tpf SOAP Consumer Support Lisa Banks Distributed Systems Subcommittee AIM Enterprise Platform Software IBM z/transaction Processing Facility Enterprise Edition 1.1.0 Any

More information

z/tpfdf Encryption Communications Subcommittee! IBM z/tpf April 11, 2016! Chris Filachek z/tpf and z/tpfdf Architecture & Development!

z/tpfdf Encryption Communications Subcommittee! IBM z/tpf April 11, 2016! Chris Filachek z/tpf and z/tpfdf Architecture & Development! z/tpfdf Encryption Communications Subcommittee! Chris Filachek z/tpf and z/tpfdf Architecture & Development! IBM z/tpf April 11, 2016! Copyright IBM Corporation 2016. U.S. Government Users Restricted Rights

More information

Jim Johnston Distributed Subcommittee

Jim Johnston Distributed Subcommittee z/tpf V1.1 Apache v2.2.9 Deciding to Upgrade to Apache v2.2.9 Jim Johnston Distributed Subcommittee AIM Enterprise Platform Software IBM z/transaction Processing Facility Enterprise Edition 1.1.0 Any reference

More information

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu Security Achieved by

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet. SSL ensures the secure transmission of data between a client and a server through

More information

Transport Level Security

Transport Level Security 2 Transport Level Security : Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l12, Steve/Courses/2013/s2/css322/lectures/transport.tex,

More information

TPF Users Group Spring 2005

TPF Users Group Spring 2005 TPF Users Group Spring 2005 Update on Single Source APARs & Other Application Migration Tips Name : Sue Pavlakis Venue : Languages / Applications Subcommittee AIM Enterprise Platform Software IBM z/transaction

More information

E-commerce security: SSL/TLS, SET and others. 4.1

E-commerce security: SSL/TLS, SET and others. 4.1 E-commerce security: SSL/TLS, SET and others. 4.1 1 Electronic payment systems Purpose: facilitate the safe and secure transfer of monetary value electronically between multiple parties Participating parties:

More information

TPF Users Group Code Coverage in TPF Toolkit

TPF Users Group Code Coverage in TPF Toolkit z/tpf V1.1-2011 Code Coverage in TPF Toolkit Mohammed Ajmal Development Tools Subcommittee AIM Enterprise Platform Software IBM z/transaction Processing Facility Enterprise Edition 1.1.0 Any reference

More information

Configuring SSL Security

Configuring SSL Security CHAPTER9 This chapter describes how to configure SSL on the Cisco 4700 Series Application Control Engine (ACE) appliance. This chapter contains the following sections: Overview Configuring SSL Termination

More information

TLS/sRTP Voice Recording AddPac Technology

TLS/sRTP Voice Recording AddPac Technology Secure IP Telephony Solution (TLS/SRTP Protocol) TLS/sRTP Voice Recording AddPac Technology 2015, Sales and Marketing www.addpac.com Contents Secure IP Telephony Service Diagram Secure VoIP Protocol &

More information

CONNReadme.txt. US Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.

CONNReadme.txt. US Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. High Speed Connector Driver readme Copyright IBM Corporation 2016 US Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. NOTE: Before

More information

Configuring Secure Socket Layer HTTP

Configuring Secure Socket Layer HTTP This feature provides Secure Socket Layer (SSL) version 3.0 support for the HTTP 1.1 server and HTTP 1.1 client within Cisco IOS software. SSL provides server authentication, encryption, and message integrity

More information

Configuring Secure Socket Layer HTTP

Configuring Secure Socket Layer HTTP This feature provides Secure Socket Layer (SSL) version 3.0 support for the HTTP 1.1 server and HTTP 1.1 client within Cisco IOS software. SSL provides server authentication, encryption, and message integrity

More information

Encryption. INST 346, Section 0201 April 3, 2018

Encryption. INST 346, Section 0201 April 3, 2018 Encryption INST 346, Section 0201 April 3, 2018 Goals for Today Symmetric Key Encryption Public Key Encryption Certificate Authorities Secure Sockets Layer Simple encryption scheme substitution cipher:

More information

Implementing Secure Socket Layer

Implementing Secure Socket Layer This module describes how to implement SSL. The Secure Socket Layer (SSL) protocol and Transport Layer Security (TLS) are application-level protocols that provide for secure communication between a client

More information

Comparison of SSL/TLS libraries based on Algorithms/languages supported, Platform, Protocols and Performance. By Akshay Thorat

Comparison of SSL/TLS libraries based on Algorithms/languages supported, Platform, Protocols and Performance. By Akshay Thorat Comparison of SSL/TLS libraries based on Algorithms/languages supported, Platform, Protocols and Performance By Akshay Thorat Table of Contents TLS - Why is it needed? Introduction- SSL/TLS evolution Libraries

More information

TPF Users Group Fall 2012 Title: z/tpf OpenLDAP Update

TPF Users Group Fall 2012 Title: z/tpf OpenLDAP Update z/tpf V1.1 TPF Users Group Fall 2012 Title: z/tpf OpenLDAP Update Name: Mark Cooper Venue: Service Oriented Architecture (SOA) Subcommittee Processing Facility Enterprise Edition 1.1.0 Any reference to

More information

Displaying SSL Configuration Information and Statistics

Displaying SSL Configuration Information and Statistics CHAPTER 7 Displaying SSL Configuration Information and Statistics This chapter describes the show commands available for displaying CSS SSL configuration information and statistics and an explanation of

More information

AIM Enterprise Platform Software IBM z/transaction Processing Facility Enterprise Edition 1.1.0

AIM Enterprise Platform Software IBM z/transaction Processing Facility Enterprise Edition 1.1.0 z/tpfdf V1.1 SDO Access to z/tpfdf Databases Name: Sasha Krymer Venue: Main Tent AIM Enterprise Platform Software IBM z/transaction Processing Facility Enterprise Edition 1.1.0 Any reference to future

More information

System SSL and Crypto on z Systems. Greg Boyd

System SSL and Crypto on z Systems. Greg Boyd System SSL and Crypto on z Systems Greg Boyd gregboyd@mainframecrypto.com November 2015 Copyrights... Presentation based on material copyrighted by IBM, and developed by myself, as well as many others

More information

SSL Accelerated Service Configuration Mode Commands

SSL Accelerated Service Configuration Mode Commands SSL Accelerated Service Configuration Mode Commands SSL accelerated services lets you enable and configure SSL acceleration on your WAAS system, and define services to be accelerated on the SSL path. To

More information

TPF Users Group Spring 2007

TPF Users Group Spring 2007 z/tpf EE V1.1 z/tpfdf V1.1 TPF Toolkit for WebSphere Studio V3 TPF Operations Server V1.2 IBM Software Group TPF Users Group Spring 2007 z/tpf Recoup Enhancements Recoup Phase 1 Chain Chase Processing

More information

Sample SOAP Consumer Application on z/tpf Enterprise Edition V1.1

Sample SOAP Consumer Application on z/tpf Enterprise Edition V1.1 Downloads for TPF Family Products Sample SOAP Consumer Application on z/tpf Enterprise Edition V1.1 Copyright International Business Machines Corporation, 2009. All Rights Reserved. Note to US Government

More information

Recoup Deferred Lost z/tpf APAR PJ31559

Recoup Deferred Lost z/tpf APAR PJ31559 z/tpf EE V1.1 z/tpfdf V1.1 TPF Toolkit for WebSphere Studio V3 TPF Operations Server V1.2 IBM Software Group TPF Users Group Spring 27 Recoup Deferred Lost z/tpf APAR PJ31559 Name : Michael Shershin Venue

More information

IBM Education Assistance for z/os V2R1

IBM Education Assistance for z/os V2R1 IBM Education Assistance for z/os V2R1 Items: TLS V1.2 Suite B RFC 5280 Certificate Validation Element/Component: Cryptographic Services - System SSL Material is current as of June 2013 Agenda Trademarks

More information

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector Acronyms 3DES AES AH ANSI CBC CESG CFB CMAC CRT DoS DEA DES DoS DSA DSS ECB ECC ECDSA ESP FIPS IAB IETF IP IPsec ISO ITU ITU-T Triple DES Advanced Encryption Standard Authentication Header American National

More information

Performance implication of elliptic curve TLS

Performance implication of elliptic curve TLS MSc Systems & Network Engineering Performance implication of elliptic curve TLS Maikel de Boer - maikel.deboer@os3.nl Joris Soeurt - joris.soeurt@os3.nl April 1, 2012 Abstract During our research we tested

More information

New Data Reduction Tool

New Data Reduction Tool New Data Reduction Tool Josh Wisniewski Tools Architect! IBM z/tpf April 11, 2016! Copyright IBM Corporation 2016. U.S. Government Users Restricted Rights - Use, duplication or disclosure restricted by

More information

Let's Encrypt - Free SSL certificates for the masses. Pete Helgren Bible Study Fellowship International San Antonio, TX

Let's Encrypt - Free SSL certificates for the masses. Pete Helgren Bible Study Fellowship International San Antonio, TX Let's Encrypt - Free SSL certificates for the masses Pete Helgren Bible Study Fellowship International San Antonio, TX Agenda Overview of data security Encoding and Encryption SSL and TLS Certficate options

More information

Internet security and privacy

Internet security and privacy Internet security and privacy SSL/TLS 1 Application layer App. TCP/UDP IP L2 L1 2 Application layer App. SSL/TLS TCP/UDP IP L2 L1 3 History of SSL/TLS Originally, SSL Secure Socket Layer, was developed

More information

AIM Enterprise Platform Software IBM z/transaction Processing Facility Enterprise Edition 1.1.0

AIM Enterprise Platform Software IBM z/transaction Processing Facility Enterprise Edition 1.1.0 z/tpf EE V1.1 z/tpfdf V1.1 TPF Toolkit for WebSphere Studio V3 TPF Operations Server V1.2 IBM Software Group TPF Users Group Spring 2007 TPF Users Group Spring 2007 z/tpf Web Services Update Name: Barry

More information

Compiler Roll-out Plan and zos 1.2 Changes

Compiler Roll-out Plan and zos 1.2 Changes Compiler Roll-out Plan and zos 1.2 Changes Colette A. Manoni Compilers and System Levels A new system level does not imply a new compiler OS/390 2.10 compiler is shipped with the following systems. OS/390

More information

CSCE 715: Network Systems Security

CSCE 715: Network Systems Security CSCE 715: Network Systems Security Chin-Tser Huang huangct@cse.sc.edu University of South Carolina Web Security Web is now widely used by business, government, and individuals But Internet and Web are

More information

Anand Raghunathan

Anand Raghunathan ECE 695R: SYSTEM-ON-CHIP DESIGN Module 2: HW/SW Partitioning Lecture 2.26: Example: Hardware Architecture Anand Raghunathan raghunathan@purdue.edu ECE 695R: System-on-Chip Design, Fall 2014 Fall 2014,

More information

Cubro Network Security Series

Cubro Network Security Series Cubro Security Series PRODUCT REVIEW Security At a glance In order to meet the demands of the operators and fastdeveloping network, Cubro delivers the network secure sockets layer analysis products --

More information

Encrypted Phone Configuration File Setup

Encrypted Phone Configuration File Setup This chapter provides information about encrypted phone configuration files setup. After you configure security-related settings, the phone configuration file contains sensitive information, such as digest

More information

Name: Sasha Krymer Venue: Database Subcommittee

Name: Sasha Krymer Venue: Database Subcommittee z/tpfdf V1.1 SDO z/tpfdf Data Access Service Setup and Administration Name: Sasha Krymer Venue: Database Subcommittee AIM Enterprise Platform Software IBM z/transaction Processing Facility Enterprise Edition

More information

Configuring Secure Socket Layer HTTP

Configuring Secure Socket Layer HTTP Finding Feature Information, page 1 Information about Secure Sockets Layer (SSL) HTTP, page 1 How to Configure Secure HTTP Servers and Clients, page 4 Monitoring Secure HTTP Server and Client Status, page

More information

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.).

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.). Time: 3hrs BCA III Network security and Cryptography Examination-2016 Model Paper 2 M.M:50 The question paper contains 40 multiple choice questions with four choices and students will have to pick the

More information

Configuring SSL. SSL Overview CHAPTER

Configuring SSL. SSL Overview CHAPTER 7 CHAPTER This topic describes the steps required to configure your ACE appliance as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination. The topics included in this section are:

More information

Authenticated Encryption in TLS

Authenticated Encryption in TLS Authenticated Encryption in TLS Same modelling & verification approach concrete security: each lossy step documented by a game and a reduction (or an assumption) on paper Standardized complications - multiple

More information

Chris Filachek Database/TPFDF Subcommittee. AIM Enterprise Platform Software IBM z/transaction Processing Facility Enterprise Edition 1.1.

Chris Filachek Database/TPFDF Subcommittee. AIM Enterprise Platform Software IBM z/transaction Processing Facility Enterprise Edition 1.1. z/tpf V1.1 z/tpfdf Multiple LREC Buffers APAR PM55273 Chris Filachek Database/TPFDF Subcommittee AIM Enterprise Platform Software IBM z/transaction Processing Facility Enterprise Edition 1.1.0 Any reference

More information

CPSC 467: Cryptography and Computer Security

CPSC 467: Cryptography and Computer Security CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 24a December 2, 2013 CPSC 467, Lecture 24a 1/20 Secure Shell (SSH) Transport Layer Security (TLS) Digital Rights Management and Trusted

More information

Scan Report Executive Summary

Scan Report Executive Summary Scan Report Executive Summary Part 1. Scan Information Scan Customer Company: Date scan was completed: Vin65 ASV Company: Comodo CA Limited 11/20/2017 Scan expiration date: 02/18/2018 Part 2. Component

More information

Chapter 8 Web Security

Chapter 8 Web Security Chapter 8 Web Security Web security includes three parts: security of server, security of client, and network traffic security between a browser and a server. Security of server and security of client

More information

Lecture Nov. 21 st 2006 Dan Wendlandt ISP D ISP B ISP C ISP A. Bob. Alice. Denial-of-Service. Password Cracking. Traffic.

Lecture Nov. 21 st 2006 Dan Wendlandt ISP D ISP B ISP C ISP A. Bob. Alice. Denial-of-Service. Password Cracking. Traffic. 15-441 Lecture Nov. 21 st 2006 Dan Wendlandt Worms & Viruses Phishing End-host impersonation Denial-of-Service Route Hijacks Traffic modification Spyware Trojan Horse Password Cracking IP Spoofing DNS

More information

HTTPS--HTTP Server and Client with SSL 3.0

HTTPS--HTTP Server and Client with SSL 3.0 The feature provides Secure Socket Layer (SSL) version 3.0 support for the HTTP 1.1 server and HTTP 1.1 client within Cisco IOS software. SSL provides server authentication, encryption, and message integrity

More information

Designing Network Encryption for the Future Emily McAdams Security Engagement Manager, Security & Trust Organization BRKSEC-2015

Designing Network Encryption for the Future Emily McAdams Security Engagement Manager, Security & Trust Organization BRKSEC-2015 Designing Network Encryption for the Future Emily McAdams Security Engagement Manager, Security & Trust Organization BRKSEC-2015 What Could It Cost You? Average of $0.58 a record According to the Verizon

More information

David Wetherall, with some slides from Radia Perlman s security lectures.

David Wetherall, with some slides from Radia Perlman s security lectures. David Wetherall, with some slides from Radia Perlman s security lectures. djw@cs.washington.edu Networks are shared: Want to secure communication between legitimate participants from others with (passive

More information

TCP/IP Native Stack Roadmap for TPF 4.1

TCP/IP Native Stack Roadmap for TPF 4.1 TCP/IP Native Stack Roadmap for TPF 4.1 Mark Gambino It Came from the 80's TCP/IP has become the most prevalent networking protocol The IP and TCP architectures were developed many years ago: Request for

More information

Cryptography SSL/TLS. Network Security Workshop. 3-5 October 2017 Port Moresby, Papua New Guinea

Cryptography SSL/TLS. Network Security Workshop. 3-5 October 2017 Port Moresby, Papua New Guinea Cryptography SSL/TLS Network Security Workshop 3-5 October 2017 Port Moresby, Papua New Guinea 1 History Secure Sockets Layer was developed by Netscape in 1994 as a protocol which permitted persistent

More information

HTTPS--HTTP Server and Client with SSL 3.0

HTTPS--HTTP Server and Client with SSL 3.0 The feature provides Secure Socket Layer (SSL) version 3.0 support for the HTTP 1.1 server and HTTP 1.1 client within Cisco IOS XE software. SSL provides server authentication, encryption, and message

More information

Protocol Comparisons: OpenSSH, SSL/TLS (AT-TLS), IPSec

Protocol Comparisons: OpenSSH, SSL/TLS (AT-TLS), IPSec Protocol Comparisons: OpenSSH, SSL/TLS (AT-TLS), IPSec Author: Gwen Dente, IBM Gaithersburg, MD Acknowledgments: Alfred Christensen, IBM Erin Farr, IBM Christopher Meyer, IBM Linwood Overby, IBM Richard

More information

Configuring SSL CHAPTER

Configuring SSL CHAPTER 7 CHAPTER This chapter describes the steps required to configure your ACE appliance as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination. The topics included in this section

More information

IBM z13 Performance of Cryptographic Operations (Cryptographic Hardware: CPACF, CEX5S)

IBM z13 Performance of Cryptographic Operations (Cryptographic Hardware: CPACF, CEX5S) IBM z13 Performance of Cryptographic Operations (Cryptographic Hardware: CPACF, CEX5S) 1 Copyright IBM Corporation 1994, 2015. IBM Corporation Marketing Communications, Server Group Route 100 Somers, NY

More information

z/tpf Communications Enhancements

z/tpf Communications Enhancements TPF Users Group Fall 2007 z/tpf Communications Enhancements Name: Mark Gambino Venue: Communications Subcommittee Overview This presentation covers recent z/tpf communications enhancements All APARs listed

More information

Josh Wisniewski Development Tools Subcommittee

Josh Wisniewski Development Tools Subcommittee z/tpf V1.1 TPF Users Group - Spring 2009 TPF Debugger Update Name: Venue: Josh Wisniewski Development Tools Subcommittee AIM Enterprise Platform Software IBM z/transaction Processing Facility Enterprise

More information

TPF and TPFDF Requirements

TPF and TPFDF Requirements TPF Users Group Grapevine, Texas IBM Software Group TPF and TPFDF Requirements Sue Pavlakis and Kevin Jones AIM Core and Enterprise Solutions IBM z/transaction Processing Facility Enterprise Edition 1.1.0

More information

Control program updates and enhancements

Control program updates and enhancements Control program updates and enhancements Michael Shershin TPF Development lab z/tpf TPF Users Group, Austin, TX April 22-25, 2018 2018 IBM Corporation PJ44596 FARF6 fixed file support (PUT 14) Agenda PJ44680

More information

TPF Debugger / Toolkit update PUT 12 contributions!

TPF Debugger / Toolkit update PUT 12 contributions! TPF Debugger / Toolkit update PUT 12 contributions! Matt Gritter TPF Toolkit Technical Lead! IBM z/tpf April 12, 2016! Copyright IBM Corporation 2016. U.S. Government Users Restricted Rights - Use, duplication

More information

Information Security CS 526

Information Security CS 526 Information Security CS 526 Topic 14: Key Distribution & Agreement, Secure Communication Topic 14: Secure Communication 1 Readings for This Lecture On Wikipedia Needham-Schroeder protocol (only the symmetric

More information

Configuring SSL. SSL Overview CHAPTER

Configuring SSL. SSL Overview CHAPTER CHAPTER 8 Date: 4/23/09 This topic describes the steps required to configure your ACE (both the ACE module and the ACE appliance) as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination.

More information

Overview of SSL/TLS. Luke Anderson. 12 th May University Of Sydney.

Overview of SSL/TLS. Luke Anderson. 12 th May University Of Sydney. Overview of SSL/TLS Luke Anderson luke@lukeanderson.com.au 12 th May 2017 University Of Sydney Overview 1. Introduction 1.1 Raw HTTP 1.2 Introducing SSL/TLS 2. Certificates 3. Attacks Introduction Raw

More information

TLS 1.1 Security fixes and TLS extensions RFC4346

TLS 1.1 Security fixes and TLS extensions RFC4346 F5 Networks, Inc 2 SSL1 and SSL2 Created by Netscape and contained significant flaws SSL3 Created by Netscape to address SSL2 flaws TLS 1.0 Standardized SSL3 with almost no changes RFC2246 TLS 1.1 Security

More information

BCA III Network security and Cryptography Examination-2016 Model Paper 1

BCA III Network security and Cryptography Examination-2016 Model Paper 1 Time: 3hrs BCA III Network security and Cryptography Examination-2016 Model Paper 1 M.M:50 The question paper contains 40 multiple choice questions with four choices and student will have to pick the correct

More information

The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to

The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to 1 The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to compromises of various sorts, with a range of threats

More information

Introduction and Overview. Why CSCI 454/554?

Introduction and Overview. Why CSCI 454/554? Introduction and Overview CSCI 454/554 Why CSCI 454/554? Get Credits and Graduate Security is important More job opportunities More research funds 1 Workload Five homework assignments Two exams (open book

More information

Scan Report Executive Summary

Scan Report Executive Summary Scan Report Executive Summary Part 1. Scan Information Scan Customer Company: Date scan was completed: Vin65 ASV Company: Comodo CA Limited 08/28/2017 Scan expiration date: 11/26/2017 Part 2. Component

More information

ASA AnyConnect Double Authentication with Certificate Validation, Mapping, and Pre Fill Configuration Guide

ASA AnyConnect Double Authentication with Certificate Validation, Mapping, and Pre Fill Configuration Guide ASA AnyConnect Double Authentication with Certificate Validation, Mapping, and Pre Fill Configuration Guide Document ID: 116111 Contributed by Michal Garcarz, Cisco TAC Engineer. Jun 13, 2013 Contents

More information

TPF Users Group Spring 2006

TPF Users Group Spring 2006 z/tpf EE V1.1 z/tpfdf V1.1 TPF Toolkit for WebSphere Studio V3 TPF Operations Server V1.2 IBM Software Group TPF Users Group Spring 2006 Best Practices for Migrating Your TPF4.1 Applications C/C++ Migration

More information

1.264 Lecture 28. Cryptography: Asymmetric keys

1.264 Lecture 28. Cryptography: Asymmetric keys 1.264 Lecture 28 Cryptography: Asymmetric keys Next class: Anderson chapters 20. Exercise due before class (Reading doesn t cover same topics as lecture) 1 Asymmetric or public key encryption Receiver

More information

FIPS Security Policy UGS Teamcenter Cryptographic Module

FIPS Security Policy UGS Teamcenter Cryptographic Module FIPS 140-2 Security Policy UGS Teamcenter Cryptographic Module UGS Corp 5800 Granite Parkway, Suite 600 Plano, TX 75024 USA May 18, 2007 Version 1.3 containing OpenSSL library source code This product

More information

z/tpf File System Security Update

z/tpf File System Security Update z/tpf EE V1.1 z/tpfdf V1.1 TPF Toolkit for WebSphere Studio V3 TPF Operations Server V1.2 IBM Software Group TPF Users Group Fall 2006 z/tpf File System Security Update z/tpf PUT03 APAR PJ30915 Name :

More information

SharkFest 17 Europe. SSL/TLS Decryption. uncovering secrets. Wednesday November 8th, Peter Wu Wireshark Core Developer

SharkFest 17 Europe. SSL/TLS Decryption. uncovering secrets. Wednesday November 8th, Peter Wu Wireshark Core Developer SharkFest 17 Europe SSL/TLS Decryption uncovering secrets Wednesday November 8th, 2017 Peter Wu Wireshark Core Developer peter@lekensteyn.nl 1 About me Wireshark contributor since 2013, core developer

More information

Total No. of Questions : 09 ] [ Total No.of Pages : 02

Total No. of Questions : 09 ] [ Total No.of Pages : 02 CS / IT 321 (CR) Total No. of Questions : 09 ] [ Total No.of Pages : 02 III/IV B. TECH. DEGREE EXAMINATIONS, OCT / NOV - 2015 Second Semester COMPUTER SCIENCE & ENGINEERING NETWK SECURITY Time : Three

More information

Kernel Transport Layer Security

Kernel Transport Layer Security Kernel Transport Layer Security A TLS socket Dave Watson davejwatson@fb.com TLS implemented as a socket int tls_fd = socket(af_tls, SOCK_STREAM SOCK_DGRAM, 0); 2 Why TLS? Security for the web The S in

More information

Overview of cryptography and enhancements on z/vse 4.3

Overview of cryptography and enhancements on z/vse 4.3 Overview of cryptography and enhancements on z/vse 4.3 Joerg Schmidbauer jschmidb@de.ibm.com March, 2011 Trademarks Trademarks The following are trademarks of the International Business Machines Corporation

More information

FIPS Management. FIPS Management Overview. Configuration Changes in FIPS Mode

FIPS Management. FIPS Management Overview. Configuration Changes in FIPS Mode This chapter contains the following sections: Overview, on page 1 Configuration Changes in FIPS Mode, on page 1 Switching the Appliance to FIPS Mode, on page 2 Encrypting Sensitive Data in FIPS Mode, on

More information

Configuring Cisco Mobility Advantage

Configuring Cisco Mobility Advantage CHAPTER 46 This chapter describes how to configure the adaptive security appliance for Cisco Unified Communications Mobility Advantage Proxy features. This chapter includes the following sections: Information

More information

Integrating the Hardware Management Console s Broadband Remote Support Facility into your Enterprise

Integrating the Hardware Management Console s Broadband Remote Support Facility into your Enterprise System z Integrating the Hardware Management Console s Broadband Remote Support Facility into your Enterprise SC28-6880-00 System z Integrating the Hardware Management Console s Broadband Remote Support

More information

WAP Security. Helsinki University of Technology S Security of Communication Protocols

WAP Security. Helsinki University of Technology S Security of Communication Protocols WAP Security Helsinki University of Technology S-38.153 Security of Communication Protocols Mikko.Kerava@iki.fi 15.4.2003 Contents 1. Introduction to WAP 2. Wireless Transport Layer Security 3. Other WAP

More information

Transport Layer Security

Transport Layer Security Transport Layer Security TRANSPORT LAYER SECURITY PERFORMANCE TESTING OVERVIEW Transport Layer Security (TLS) and its predecessor Secure Sockets Layer (SSL), are the most popular cryptographic protocols

More information

SSL/TLS & 3D Secure. CS 470 Introduction to Applied Cryptography. Ali Aydın Selçuk. CS470, A.A.Selçuk SSL/TLS & 3DSec 1

SSL/TLS & 3D Secure. CS 470 Introduction to Applied Cryptography. Ali Aydın Selçuk. CS470, A.A.Selçuk SSL/TLS & 3DSec 1 SSL/TLS & 3D Secure CS 470 Introduction to Applied Cryptography Ali Aydın Selçuk CS470, A.A.Selçuk SSL/TLS & 3DSec 1 SSLv2 Brief History of SSL/TLS Released in 1995 with Netscape 1.1 Key generation algorithm

More information

Transport Layer Security

Transport Layer Security CEN585 Computer and Network Security Transport Layer Security Dr. Mostafa Dahshan Department of Computer Engineering College of Computer and Information Sciences King Saud University mdahshan@ksu.edu.sa

More information

OpenSSL is a project comprising (1) a core library and (2) a toolkit. The core library offers an API for developers of secure applications.

OpenSSL is a project comprising (1) a core library and (2) a toolkit. The core library offers an API for developers of secure applications. 1 OpenSSL is a project comprising (1) a core library and (2) a toolkit. The core library offers an API for developers of secure applications. The toolkit offers a series of command-line tools to perform

More information

The Xirrus Wi Fi Array XS4, XS8 Security Policy Document Version 1.0. Xirrus, Inc.

The Xirrus Wi Fi Array XS4, XS8 Security Policy Document Version 1.0. Xirrus, Inc. The Xirrus Wi Fi Array XS4, XS8 Security Policy Document Version 1.0 Xirrus, Inc. March 8, 2011 Copyright Xirrus, Inc. 2011. May be reproduced only in its original entirety [without revision]. Page 1 TABLE

More information

Sample WS-Security Wrapper Application on z/tpf Enterprise Edition V1.1

Sample WS-Security Wrapper Application on z/tpf Enterprise Edition V1.1 Page 1 of 10 Downloads for TPF Family Products Sample WS-Security Wrapper Application on z/tpf Enterprise Edition V1.1 Copyright International Business Machines Corporation, 2010. All Rights Reserved.

More information

Cisco VPN Internal Service Module for Cisco ISR G2

Cisco VPN Internal Service Module for Cisco ISR G2 Data Sheet Cisco VPN Internal Service Module for Cisco ISR G2 Compact Versatile High-Performance VPN Module The Cisco VPN Internal Service Module (VPN ISM) is a module for the Cisco Integrated Services

More information