Practical Issues with TLS Client Certificate Authentication

Size: px
Start display at page:

Download "Practical Issues with TLS Client Certificate Authentication"

Transcription

1 Practical Issues with TLS Client Certificate Authentication Arnis Parsovs February 26, / 10

2 Motivation 2 / 10

3 Motivation Problems with password authentication: 2 / 10

4 Motivation Problems with password authentication: Weak passwords 2 / 10

5 Motivation Problems with password authentication: Weak passwords Password reuse 2 / 10

6 Motivation Problems with password authentication: Weak passwords Password reuse Insecure storage on server side 2 / 10

7 Motivation Problems with password authentication: Weak passwords Password reuse Insecure storage on server side Phishing attacks 2 / 10

8 Motivation Problems with password authentication: Weak passwords Password reuse Insecure storage on server side Phishing attacks MITM attacks 2 / 10

9 Motivation Problems with password authentication: Weak passwords Password reuse Insecure storage on server side Phishing attacks MITM attacks Solution to these problems public key authentication 2 / 10

10 Motivation Problems with password authentication: Weak passwords Password reuse Insecure storage on server side Phishing attacks MITM attacks Solution to these problems public key authentication in a form of TLS Client Certificate Authentication (CCA) 2 / 10

11 Motivation Problems with password authentication: Weak passwords Password reuse Insecure storage on server side Phishing attacks MITM attacks Solution to these problems public key authentication in a form of TLS Client Certificate Authentication (CCA) Supported by all major browsers! 2 / 10

12 TLS Client Certificate Authentication 3 / 10

13 TLS Client Certificate Authentication Client ClientHello ServerHello, Certificate, CertificateRequest, ServerHelloDone Certificate, ClientKeyExchange, CertificateVerify [ChangeCipherSpec], Finished [ChangeCipherSpec], Finished Application Data Server 4 / 10

14 TLS Client Certificate Authentication Client ClientHello ServerHello, Certificate, CertificateRequest, ServerHelloDone Certificate, ClientKeyExchange, CertificateVerify [ChangeCipherSpec], Finished [ChangeCipherSpec], Finished Application Data Server 4 / 10

15 TLS Client Certificate Authentication Client ClientHello ServerHello, Certificate, CertificateRequest, ServerHelloDone Certificate, ClientKeyExchange, CertificateVerify [ChangeCipherSpec], Finished [ChangeCipherSpec], Finished Application Data Server Private key has much better entropy than passwords 4 / 10

16 TLS Client Certificate Authentication Client ClientHello ServerHello, Certificate, CertificateRequest, ServerHelloDone Certificate, ClientKeyExchange, CertificateVerify [ChangeCipherSpec], Finished [ChangeCipherSpec], Finished Application Data Server Private key has much better entropy than passwords The same certificate can be reused for different services 4 / 10

17 TLS Client Certificate Authentication Client ClientHello ServerHello, Certificate, CertificateRequest, ServerHelloDone Certificate, ClientKeyExchange, CertificateVerify [ChangeCipherSpec], Finished [ChangeCipherSpec], Finished Application Data Server Private key has much better entropy than passwords The same certificate can be reused for different services No risk if server-side public key database leaks 4 / 10

18 TLS Client Certificate Authentication Client ClientHello ServerHello, Certificate, CertificateRequest, ServerHelloDone Certificate, ClientKeyExchange, CertificateVerify [ChangeCipherSpec], Finished [ChangeCipherSpec], Finished Application Data Server Private key has much better entropy than passwords The same certificate can be reused for different services No risk if server-side public key database leaks Private key cannot be phished by traditional phishing attacks 4 / 10

19 TLS Client Certificate Authentication Client ClientHello ServerHello, Certificate, CertificateRequest, ServerHelloDone Certificate, ClientKeyExchange, CertificateVerify [ChangeCipherSpec], Finished [ChangeCipherSpec], Finished Application Data Server Private key has much better entropy than passwords The same certificate can be reused for different services No risk if server-side public key database leaks Private key cannot be phished by traditional phishing attacks MITM attacker (e.g., rogue CA) cannot impersonate the user 4 / 10

20 TLS Client Certificate Authentication Client ClientHello ServerHello, Certificate, CertificateRequest, ServerHelloDone Certificate, ClientKeyExchange, CertificateVerify [ChangeCipherSpec], Finished [ChangeCipherSpec], Finished Application Data Server Private key has much better entropy than passwords The same certificate can be reused for different services No risk if server-side public key database leaks Private key cannot be phished by traditional phishing attacks MITM attacker (e.g., rogue CA) cannot impersonate the user No trusted third party required (!) 4 / 10

21 Estonia and TLS CCA 5 / 10

22 Estonia and TLS CCA 5 / 10

23 Estonia and TLS CCA Mandatory ID cards since / 10

24 Estonia and TLS CCA Mandatory ID cards since 2002 Two RSA key pairs: For Qualified Digital Signatures For TLS Client Certificate Authentication 5 / 10

25 Estonia and TLS CCA Mandatory ID cards since 2002 Two RSA key pairs: For Qualified Digital Signatures For TLS Client Certificate Authentication TLS CCA supported by all major e-service providers 5 / 10

26 Estonia and TLS CCA Mandatory ID cards since 2002 Two RSA key pairs: For Qualified Digital Signatures For TLS Client Certificate Authentication TLS CCA supported by all major e-service providers Authentication to e-health services only by TLS CCA 5 / 10

27 Estonia and TLS CCA Mandatory ID cards since 2002 Two RSA key pairs: For Qualified Digital Signatures For TLS Client Certificate Authentication TLS CCA supported by all major e-service providers Authentication to e-health services only by TLS CCA Required to authorize online banking transactions >200 EUR 5 / 10

28 Research Objectives 6 / 10

29 Research Objectives What are the practical issues concerning TLS CCA deployment? 6 / 10

30 Research Objectives What are the practical issues concerning TLS CCA deployment? What should be improved on client and server side? 6 / 10

31 Research Objectives What are the practical issues concerning TLS CCA deployment? What should be improved on client and server side? On server side: Apache mod ssl (branch 2.2) 6 / 10

32 Research Objectives What are the practical issues concerning TLS CCA deployment? What should be improved on client and server side? On server side: Apache mod ssl (branch 2.2) On client side: Mozilla Firefox (version 19.0) Google Chrome (version 25.0) Microsoft Internet Explorer (version 9.0) 6 / 10

33 Research Objectives What are the practical issues concerning TLS CCA deployment? What should be improved on client and server side? On server side: Apache mod ssl (branch 2.2) On client side: Mozilla Firefox (version 19.0) Google Chrome (version 25.0) Microsoft Internet Explorer (version 9.0) Perform study on Estonian TLS CCA deployments. 6 / 10

34 Measurement Study of Estonian TLS CCA Deployments 7 / 10

35 Measurement Study of Estonian TLS CCA Deployments Analyzed 87 public service providers: 7 / 10

36 Measurement Study of Estonian TLS CCA Deployments Analyzed 87 public service providers: Software Hosts Percent Apache mod ssl % MS IIS % BigIP 4 4.6% Oracle AS 3 3.4% Tomcat 1 1.1% Nginx 1 1.1% Jetty 1 1.1% unknown 2 2.3% 7 / 10

37 Measurement Study of Estonian TLS CCA Deployments Analyzed 87 public service providers: Software Hosts Percent Apache mod ssl % MS IIS % BigIP 4 4.6% Oracle AS 3 3.4% Tomcat 1 1.1% Nginx 1 1.1% Jetty 1 1.1% unknown 2 2.3% 33% request certificate unencrypted 7 / 10

38 Measurement Study of Estonian TLS CCA Deployments Analyzed 87 public service providers: Software Hosts Percent Apache mod ssl % MS IIS % BigIP 4 4.6% Oracle AS 3 3.4% Tomcat 1 1.1% Nginx 1 1.1% Jetty 1 1.1% unknown 2 2.3% 33% request certificate unencrypted 93% do not bind session to certificate 7 / 10

39 Measurement Study of Estonian TLS CCA Deployments Analyzed 87 public service providers: Software Hosts Percent Apache mod ssl % MS IIS % BigIP 4 4.6% Oracle AS 3 3.4% Tomcat 1 1.1% Nginx 1 1.1% Jetty 1 1.1% unknown 2 2.3% 33% request certificate unencrypted 93% do not bind session to certificate 47% have superfluous CAs in trust store 7 / 10

40 Measurement Study of Estonian TLS CCA Deployments Analyzed 87 public service providers: Software Hosts Percent Apache mod ssl % MS IIS % BigIP 4 4.6% Oracle AS 3 3.4% Tomcat 1 1.1% Nginx 1 1.1% Jetty 1 1.1% unknown 2 2.3% 33% request certificate unencrypted 93% do not bind session to certificate 47% have superfluous CAs in trust store 45% have larger chain verification depth than needed 7 / 10

41 Measurement Study of Estonian TLS CCA Deployments Analyzed 87 public service providers: Software Hosts Percent Apache mod ssl % MS IIS % BigIP 4 4.6% Oracle AS 3 3.4% Tomcat 1 1.1% Nginx 1 1.1% Jetty 1 1.1% unknown 2 2.3% 33% request certificate unencrypted 93% do not bind session to certificate 47% have superfluous CAs in trust store 45% have larger chain verification depth than needed 18% do not perform revocation checks 7 / 10

42 Things to Improve on Client Side (Browsers) 8 / 10

43 Things to Improve on Client Side (Browsers) Opt-in for strong locked same-origin policy 8 / 10

44 Things to Improve on Client Side (Browsers) Opt-in for strong locked same-origin policy To isolate content served by MITM and legitimate connection 8 / 10

45 Things to Improve on Client Side (Browsers) Opt-in for strong locked same-origin policy To isolate content served by MITM and legitimate connection JavaScript API in order to: 8 / 10

46 Things to Improve on Client Side (Browsers) Opt-in for strong locked same-origin policy To isolate content served by MITM and legitimate connection JavaScript API in order to: clear TLS session cache (reauthenticate) 8 / 10

47 Things to Improve on Client Side (Browsers) Opt-in for strong locked same-origin policy To isolate content served by MITM and legitimate connection JavaScript API in order to: clear TLS session cache (reauthenticate) clear client certificate selection (logout) 8 / 10

48 Things to Improve on Client Side (Browsers) Opt-in for strong locked same-origin policy To isolate content served by MITM and legitimate connection JavaScript API in order to: clear TLS session cache (reauthenticate) clear client certificate selection (logout) Prevent deadlock in case CCA fails (Firefox, IE) 8 / 10

49 Things to Improve on Client Side (Browsers) Opt-in for strong locked same-origin policy To isolate content served by MITM and legitimate connection JavaScript API in order to: clear TLS session cache (reauthenticate) clear client certificate selection (logout) Prevent deadlock in case CCA fails (Firefox, IE) Show warning if CCA requested on initial negotiation 8 / 10

50 Things to Improve on Client Side (Browsers) Opt-in for strong locked same-origin policy To isolate content served by MITM and legitimate connection JavaScript API in order to: clear TLS session cache (reauthenticate) clear client certificate selection (logout) Prevent deadlock in case CCA fails (Firefox, IE) Show warning if CCA requested on initial negotiation Client certificate selection window improvement: 8 / 10

51 Things to Improve on Client Side (Browsers) Opt-in for strong locked same-origin policy To isolate content served by MITM and legitimate connection JavaScript API in order to: clear TLS session cache (reauthenticate) clear client certificate selection (logout) Prevent deadlock in case CCA fails (Firefox, IE) Show warning if CCA requested on initial negotiation Client certificate selection window improvement: Remember last client certificate choice 8 / 10

52 Things to Improve on Server Side (Apache mod ssl) 9 / 10

53 Things to Improve on Server Side (Apache mod ssl) Provide session resumption support for CCA sessions 9 / 10

54 Things to Improve on Server Side (Apache mod ssl) Provide session resumption support for CCA sessions Important when CCA is performed by a smart card 9 / 10

55 Things to Improve on Server Side (Apache mod ssl) Provide session resumption support for CCA sessions Important when CCA is performed by a smart card Implement flexible SSLVerifyClient require any 9 / 10

56 Things to Improve on Server Side (Apache mod ssl) Provide session resumption support for CCA sessions Important when CCA is performed by a smart card Implement flexible SSLVerifyClient require any To perform certificate verification at the application level 9 / 10

57 Things to Improve on Server Side (Apache mod ssl) Provide session resumption support for CCA sessions Important when CCA is performed by a smart card Implement flexible SSLVerifyClient require any To perform certificate verification at the application level To provide personalized error messages in case of CCA failure 9 / 10

58 Things to Improve on Server Side (Apache mod ssl) Provide session resumption support for CCA sessions Important when CCA is performed by a smart card Implement flexible SSLVerifyClient require any To perform certificate verification at the application level To provide personalized error messages in case of CCA failure Provide to environment variable the timestamp of CCA 9 / 10

59 Things to Improve on Server Side (Apache mod ssl) Provide session resumption support for CCA sessions Important when CCA is performed by a smart card Implement flexible SSLVerifyClient require any To perform certificate verification at the application level To provide personalized error messages in case of CCA failure Provide to environment variable the timestamp of CCA To enforce the freshness of the proof of possession 9 / 10

60 Things to Improve on Server Side (Apache mod ssl) Provide session resumption support for CCA sessions Important when CCA is performed by a smart card Implement flexible SSLVerifyClient require any To perform certificate verification at the application level To provide personalized error messages in case of CCA failure Provide to environment variable the timestamp of CCA To enforce the freshness of the proof of possession Provide better CCA audit trail 9 / 10

61 Conclusion 10 / 10

62 Conclusion Solution for secure user identity is already here 10 / 10

63 Conclusion Solution for secure user identity is already here Estonian example shows that it works in practice 10 / 10

64 Conclusion Solution for secure user identity is already here Estonian example shows that it works in practice There are things to improve on client and server side 10 / 10

65 Conclusion Solution for secure user identity is already here Estonian example shows that it works in practice There are things to improve on client and server side Improvements do not require changes to the protocol 10 / 10

66 Conclusion Solution for secure user identity is already here Estonian example shows that it works in practice There are things to improve on client and server side Improvements do not require changes to the protocol Thank you! 10 / 10

MTAT Applied Cryptography

MTAT Applied Cryptography MTAT.07.017 Applied Cryptography Transport Layer Security (TLS) Advanced Features University of Tartu Spring 2016 1 / 16 Client Server Authenticated TLS ClientHello ServerHello, Certificate, ServerHelloDone

More information

TLS. RFC2246: The TLS Protocol. (c) A. Mariën -

TLS. RFC2246: The TLS Protocol. (c) A. Mariën - TLS RFC2246: The TLS Protocol What does it achieve? Confidentiality and integrity of the communication Server authentication Eventually: client authentication What is does not do Protect the server Protect

More information

Internet security and privacy

Internet security and privacy Internet security and privacy SSL/TLS 1 Application layer App. TCP/UDP IP L2 L1 2 Application layer App. SSL/TLS TCP/UDP IP L2 L1 3 History of SSL/TLS Originally, SSL Secure Socket Layer, was developed

More information

CSCE 715: Network Systems Security

CSCE 715: Network Systems Security CSCE 715: Network Systems Security Chin-Tser Huang huangct@cse.sc.edu University of South Carolina Web Security Web is now widely used by business, government, and individuals But Internet and Web are

More information

TLS authentication using ETSI TS and IEEE certificates

TLS authentication using ETSI TS and IEEE certificates TLS authentication using ETSI TS 103 097 and IEEE 1609.2 certificates IETF meeting 93 Prague TLS WG session Wednesday, July 22, 2015 Objective & Motivations Objective: enable C/S authentication using C-ITS*

More information

Auth. Key Exchange. Dan Boneh

Auth. Key Exchange. Dan Boneh Auth. Key Exchange Review: key exchange Alice and want to generate a secret key Saw key exchange secure against eavesdropping Alice k eavesdropper?? k This lecture: Authenticated Key Exchange (AKE) key

More information

Transport Layer Security

Transport Layer Security CEN585 Computer and Network Security Transport Layer Security Dr. Mostafa Dahshan Department of Computer Engineering College of Computer and Information Sciences King Saud University mdahshan@ksu.edu.sa

More information

Network Security: TLS/SSL. Tuomas Aura T Network security Aalto University, Nov-Dec 2014

Network Security: TLS/SSL. Tuomas Aura T Network security Aalto University, Nov-Dec 2014 Network Security: TLS/SSL Tuomas Aura T-110.5241 Network security Aalto University, Nov-Dec 2014 Outline 1. Diffie-Hellman key exchange (recall from earlier) 2. Key exchange using public-key encryption

More information

Network Security: TLS/SSL. Tuomas Aura T Network security Aalto University, Nov-Dec 2010

Network Security: TLS/SSL. Tuomas Aura T Network security Aalto University, Nov-Dec 2010 Network Security: TLS/SSL Tuomas Aura T-110.5240 Network security Aalto University, Nov-Dec 2010 Outline 1. Diffie-Hellman 2. Key exchange using public-key encryption 3. Goals of authenticated key exchange

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet. SSL ensures the secure transmission of data between a client and a server through

More information

One Year of SSL Internet Measurement ACSAC 2012

One Year of SSL Internet Measurement ACSAC 2012 One Year of SSL Internet Measurement ACSAC 2012 Olivier Levillain, Arnaud Ébalard, Benjamin Morin and Hervé Debar ANSSI / Télécom SudParis December 5th 2012 Outline 1 SSL/TLS: a brief tour 2 Methodology

More information

CS 161 Computer Security

CS 161 Computer Security Raluca Ada Popa Spring 2018 CS 161 Computer Security Discussion 6 Week of February 26, 2018 Question 1 TLS threats (10 min) An attacker is trying to attack the company Boogle and its users. Assume that

More information

Securely Deploying TLS 1.3. September 2017

Securely Deploying TLS 1.3. September 2017 Securely Deploying TLS 1.3 September 2017 Agenda Why TLS 1.3? Zero Round Trip Time (0-RTT) requests Forward secrecy Resumption key management Why TLS 1.3? Speed TLS impacts latency, not thoroughput Protocol

More information

SSL/TLS FOR MORTALS.

SSL/TLS FOR MORTALS. SSL/TLS FOR MORTALS maartenm@infosupport.com @mthmulders Exception in thread "main" javax.net.ssl.sslhandshakeexception: sun.security.validator.validatorexception: PKIX path building failed: sun at sun.security.ssl.alerts.getsslexception(alerts.java:192)

More information

Crypto meets Web Security: Certificates and SSL/TLS

Crypto meets Web Security: Certificates and SSL/TLS CSE 484 / CSE M 584: Computer Security and Privacy Crypto meets Web Security: Certificates and SSL/TLS Spring 2016 Franziska (Franzi) Roesner franzi@cs.washington.edu Thanks to Dan Boneh, Dieter Gollmann,

More information

Security Engineering. Lecture 16 Network Security Fabio Massacci (with the courtesy of W. Stallings)

Security Engineering. Lecture 16 Network Security Fabio Massacci (with the courtesy of W. Stallings) Security Lecture 16 Network Security Fabio Massacci (with the courtesy of W. Stallings) Lecture Outline Network Attacks Attive Attacks Passive Attacks TCP Attacks Contermeasures IPSec SSL/TLS Firewalls

More information

Chapter 4: Securing TCP connections

Chapter 4: Securing TCP connections Managing and Securing Computer Networks Guy Leduc Chapter 5: Securing TCP connections Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley, March 2012. (section

More information

Universität Hamburg. SSL & Company. Fachbereich Informatik SVS Sicherheit in Verteilten Systemen. Security in TCP/IP. UH, FB Inf, SVS, 18-Okt-04 2

Universität Hamburg. SSL & Company. Fachbereich Informatik SVS Sicherheit in Verteilten Systemen. Security in TCP/IP. UH, FB Inf, SVS, 18-Okt-04 2 Universität Hamburg SSL & Company Fachbereich Informatik SVS Sicherheit in Verteilten Systemen Security in TCP/IP UH, FB Inf, SVS, 18-Okt-04 2 SSL/TLS Overview SSL/TLS provides security at TCP layer. Uses

More information

Transport Layer Security

Transport Layer Security Cryptography and Security in Communication Networks Transport Layer Security ETTI - Master - Advanced Wireless Telecommunications Secure channels Secure data delivery on insecure networks Create a secure

More information

Legacy of Heartbleed: MITM and Revoked Certificates. Alexey Busygin NeoBIT

Legacy of Heartbleed: MITM and Revoked Certificates. Alexey Busygin NeoBIT Legacy of Heartbleed: MITM and Revoked Certificates Alexey Busygin busygin@neobit.ru NeoBIT Notable Private Key Leaks 2010 DigiCert Sdn Bhd. issued certificates with 512-bit keys 2012 Trustwave issued

More information

Datasäkerhetsmetoder föreläsning 7

Datasäkerhetsmetoder föreläsning 7 Datasäkerhetsmetoder föreläsning 7 Nyckelhantering Jan-Åke Larsson Cryptography A security tool, not a general solution Cryptography usually converts a communication security problem into a key management

More information

Trusted Identities. Foundational to Cloud Services LILA KEE CHIEF PRODUCT OFFICER GLOBALSIGN

Trusted Identities. Foundational to Cloud Services LILA KEE CHIEF PRODUCT OFFICER GLOBALSIGN Trusted Identities Foundational to Cloud Services LILA KEE CHIEF PRODUCT OFFICER GLOBALSIGN WHAT YOU WILL LEARN TODAY Strong identity verification as a security measure and business enabler Authentication

More information

Computer Security Course. Public Key Crypto. Slides credit: Dan Boneh

Computer Security Course. Public Key Crypto. Slides credit: Dan Boneh Computer Security Course. Dawn Song Public Key Crypto Slides credit: Dan Boneh Administra>ve Issues Security is a fast- changing field We cover a broad spectrum of areas in computer security Hence, there

More information

Coming of Age: A Longitudinal Study of TLS Deployment

Coming of Age: A Longitudinal Study of TLS Deployment Coming of Age: A Longitudinal Study of TLS Deployment Accepted at ACM Internet Measurement Conference (IMC) 2018, Boston, MA, USA Platon Kotzias, Abbas Razaghpanah, Johanna Amann, Kenneth G. Paterson,

More information

Securing IoT applications with Mbed TLS Hannes Tschofenig

Securing IoT applications with Mbed TLS Hannes Tschofenig Securing IoT applications with Mbed TLS Hannes Tschofenig Part#2: Public Key-based authentication March 2018 Munich Agenda For Part #2 of the webinar we are moving from Pre-Shared Secrets (PSKs) to certificated-based

More information

Security Protocols and Infrastructures

Security Protocols and Infrastructures Security Protocols and Infrastructures Dr. Michael Schneider michael.schneider@h-da.de Chapter 8: The Transport Layer Security Protocol (TLS) December 4, 2017 h_da WS2017/18 Dr. Michael Schneider 1 1 Overview

More information

DTLS over SNMP. Wes Hardaker. 14 November Wes Hardaker () DTLS over SNMP 14 November / 15

DTLS over SNMP. Wes Hardaker. 14 November Wes Hardaker () DTLS over SNMP 14 November / 15 DTLS over SNMP Wes Hardaker 14 November 2008 Wes Hardaker () DTLS over SNMP 14 November 2008 1 / 15 Outline 1 Background 2 SNMP over DTLS: Details 3 Issues Wes Hardaker () DTLS over SNMP 14 November 2008

More information

MTAT Applied Cryptography

MTAT Applied Cryptography MTAT.07.017 Applied Cryptography Transport Layer Security (TLS) University of Tartu Spring 2017 1 / 22 Transport Layer Security TLS is cryptographic protocol that provides communication security over the

More information

Security Protocols and Infrastructures. Winter Term 2015/2016

Security Protocols and Infrastructures. Winter Term 2015/2016 Winter Term 2015/2016 Nicolas Buchmann (Harald Baier) Chapter 8: Transport Layer Security Protocol Key Questions Application context of TLS? Which security goals shall be achieved? Approaches? 2 Contents

More information

TLS 1.3 Extension for Certificate-based Authentication with an External Pre-Shared Key

TLS 1.3 Extension for Certificate-based Authentication with an External Pre-Shared Key TLS 1.3 Extension for Certificate-based Authentication with an External Pre-Shared Key draft-housley-tls-tls13-cert-with-extern-psk Russ Housley TLS WG at IETF 102 July 2018 TLS 1.3 Authentication and

More information

Lehrstuhl für Netzarchitekturen und Netzdienste Fakultät für Informatik Technische Universität München. ilab. Lab 8 SSL/TLS and IPSec

Lehrstuhl für Netzarchitekturen und Netzdienste Fakultät für Informatik Technische Universität München. ilab. Lab 8 SSL/TLS and IPSec Lehrstuhl für Netzarchitekturen und Netzdienste Fakultät für Informatik Technische Universität München ilab Lab 8 SSL/TLS and IPSec Outlook: On Layer 4: Goal: Provide security for one specific port SSL

More information

File submissions to VINN and KRITA

File submissions to VINN and KRITA Date Page 2017-10-25 1 (10) Recipient: Respondents to VINN and KRITA File submissions to VINN and KRITA Summary This document briefly describes the VINN/KRITA solution for file submissions in the form

More information

Security Protocols and Infrastructures. Winter Term 2010/2011

Security Protocols and Infrastructures. Winter Term 2010/2011 Winter Term 2010/2011 Chapter 4: Transport Layer Security Protocol Contents Overview Record Protocol Cipher Suites in TLS 1.2 Handshaking Protocols Final Discussion 2 Contents Overview Record Protocol

More information

Stop sweating the password and learn to love public key cryptography. Chris Streeks Solutions Engineer, Yubico

Stop sweating the password and learn to love public key cryptography. Chris Streeks Solutions Engineer, Yubico 1 Stop sweating the password and learn to love public key cryptography Chris Streeks Solutions Engineer, Yubico Stop Sweating the Password! 2 Agenda Introduction The modern state of Phishing How to become

More information

Authentication Technology for a Smart eid Infrastructure.

Authentication Technology for a Smart eid Infrastructure. Authentication Technology for a Smart eid Infrastructure. www.aducid.com One app to access all public and private sector online services. One registration allows users to access all their online accounts

More information

TLS 1.3. Eric Rescorla Mozilla IETF 92 TLS 1

TLS 1.3. Eric Rescorla Mozilla IETF 92 TLS 1 TLS 1.3 Eric Rescorla Mozilla ekr@rtfm.com IETF 92 TLS 1 Changes since -03 draft-05 Prohibit SSL negotiation for backwards compatibility. Fix which MS is used for exporters. draft-04 Modify key computations

More information

Cryptographic Execution Time for WTLS Handshakes on Palm OS Devices. Abstract

Cryptographic Execution Time for WTLS Handshakes on Palm OS Devices. Abstract Cryptographic Execution Time for WTLS Handshakes on Palm OS Devices Neil Daswani Stanford University daswani@cs.stanford.edu Abstract This paper analyzes the cryptographic operation time that is required

More information

CS 356 Internet Security Protocols. Fall 2013

CS 356 Internet Security Protocols. Fall 2013 CS 356 Internet Security Protocols Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5

More information

SECURITY STORY WE NEVER SEE, TOUCH NOR HOLD YOUR DATA

SECURITY STORY WE NEVER SEE, TOUCH NOR HOLD YOUR DATA SECURITY STORY WE NEVER SEE, TOUCH NOR HOLD YOUR DATA CTO Office www.digi.me another Engineering Briefing digi.me keeping your data secure at all times ALL YOUR DATA IN ONE PLACE TO SHARE WITH PEOPLE WHO

More information

Client Certificates Are Going Away

Client Certificates Are Going Away Client Certificates Are Going Away What now? Garrett Wollman, TIG May 2, 2016 1 Overview of this talk 1. Review of the current situation and how we got here 2. Our response to the deprecation of client

More information

SSL Report: bourdiol.xyz ( )

SSL Report: bourdiol.xyz ( ) Home Projects Qualys.com Contact You are here: Home > Projects > SSL Server Test > bourdiol.xyz > 217.70.180.152 SSL Report: bourdiol.xyz (217.70.180.152) Assessed on: Sun Apr 19 12:22:55 PDT 2015 HIDDEN

More information

Security analysis of OpenID, followed by a reference implementation of an npabased OpenID provider

Security analysis of OpenID, followed by a reference implementation of an npabased OpenID provider Security analysis of OpenID, followed by a reference implementation of an npabased OpenID provider Sebastian Feld, Norbert Pohlmann Institute for Internet-Security, if(is) Gelsenkirchen University of Applied

More information

Delivering Microservices Securely and at Scale with NGINX in Red Hat OpenShift. November, 2017

Delivering Microservices Securely and at Scale with NGINX in Red Hat OpenShift. November, 2017 Delivering Microservices Securely and at Scale with NGINX in Red Hat OpenShift November, 2017 Klaus Oxdal Channel Director klaus@nginx.com The Big Shift Architectural Changes: Monolith import myapp.driver

More information

SYSTEM REQUIREMENTS M.APP ENTERPRISE

SYSTEM REQUIREMENTS M.APP ENTERPRISE SYSTEM REQUIREMENTS M.APP ENTERPRISE Description or Document Category October 06, 2016 Contents M.App Enterprise Server... 3 Hardware requirements... 3 Disk space requirements... 3 Production environment

More information

Transport Layer Security

Transport Layer Security Transport Layer Security TRANSPORT LAYER SECURITY PERFORMANCE TESTING OVERVIEW Transport Layer Security (TLS) and its predecessor Secure Sockets Layer (SSL), are the most popular cryptographic protocols

More information

Understanding Traffic Decryption

Understanding Traffic Decryption The following topics provide an overview of SSL inspection, describe the prerequisites for SSL inspection configuration, and detail deployment scenarios. Traffic Decryption Overview, page 1 SSL Handshake

More information

Certificate reputation. Dorottya Papp

Certificate reputation. Dorottya Papp Certificate reputation Dorottya Papp Motivation Verification on a digital certificate does not reveal important factors Is it a fake certificate? (Hash collision) Was it mistakenly issued? (Comodo scandal)

More information

SSL Report: sharplesgroup.com ( )

SSL Report: sharplesgroup.com ( ) 1 of 5 26/06/2015 14:28 Home Projects Qualys.com Contact You are here: Home > Projects > SSL Server Test > sharplesgroup.com SSL Report: sharplesgroup.com (176.58.116.26) Assessed on: Fri, 26 Jun 2015

More information

User-Defined Key Pair Protocol

User-Defined Key Pair Protocol Rochester Institute of Technology RIT Scholar Works Theses Thesis/Dissertation Collections 5-13-2013 User-Defined Key Pair Protocol Omar Hassan Follow this and additional works at: http://scholarworks.rit.edu/theses

More information

SSL Report: ( )

SSL Report:   ( ) Home Projects Qualys.com Contact You are here: Home > Projects > SSL Server Test > www.workbench.nationaldataservice.org SSL Report: www.workbench.nationaldataservice.org (141.142.210.100) Assessed on:

More information

Breaking FIDO Yubico. Are Exploits in There?

Breaking FIDO Yubico. Are Exploits in There? Breaking FIDO Are Exploits in There? FIDO U2F (Universal 2nd Factor) Analyzing FIDO U2F Attack and Countermeasures Implementation Considerations Resources 2 User Experience 1. Enter username/pwd 2. Insert

More information

Internet Engineering Task Force. Intended status: Standards Track. December 26, 2018

Internet Engineering Task Force. Intended status: Standards Track. December 26, 2018 Internet Engineering Task Force Internet-Draft Intended status: Standards Track Expires: June 29, 2019 H. Wang, Ed. Y. Yang X. Kang Huawei International Pte. Ltd. December 26, 2018 Using Identity as Raw

More information

Wireless LAN Security. Gabriel Clothier

Wireless LAN Security. Gabriel Clothier Wireless LAN Security Gabriel Clothier Timeline 1997: 802.11 standard released 1999: 802.11b released, WEP proposed [1] 2003: WiFi alliance certifies for WPA 2004: 802.11i released 2005: 802.11w task group

More information

SSL Visibility and Troubleshooting

SSL Visibility and Troubleshooting Page 1 of 6 view online Avi Vantage provides a number of features to help understand the utilization of SSL traffic and troubleshoot SSL-related issues. Visibility Every virtual service provides a number

More information

Cryptography (Overview)

Cryptography (Overview) Cryptography (Overview) Some history Caesar cipher, rot13 substitution ciphers, etc. Enigma (Turing) Modern secret key cryptography DES, AES Public key cryptography RSA, digital signatures Cryptography

More information

Managing Certificates

Managing Certificates CHAPTER 12 The Cisco Identity Services Engine (Cisco ISE) relies on public key infrastructure (PKI) to provide secure communication for the following: Client and server authentication for Transport Layer

More information

Request for Comments: 2712 Category: Standards Track CyberSafe Corporation October 1999

Request for Comments: 2712 Category: Standards Track CyberSafe Corporation October 1999 Network Working Group Request for Comments: 2712 Category: Standards Track A. Medvinsky Excite M. Hur CyberSafe Corporation October 1999 Addition of Kerberos Cipher Suites to Transport Layer Security (TLS)

More information

Securing Internet Communication: TLS

Securing Internet Communication: TLS Securing Internet Communication: TLS CS 161: Computer Security Prof. David Wagner March 11, 2016 Today s Lecture Applying crypto technology in practice Two simple abstractions cover 80% of the use cases

More information

IEEE C802.16e-03/71r2. IEEE Broadband Wireless Access Working Group <

IEEE C802.16e-03/71r2. IEEE Broadband Wireless Access Working Group < Project IEEE 802.16 Broadband Wireless Access Working Group Title Enhancement of 802.16e to Support -based Authentication / Key Distribution Rev. 2 Date Submitted Source(s) 2003-12-29

More information

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until

More information

SSL Report: printware.co.uk ( )

SSL Report: printware.co.uk ( ) 1 of 5 26/06/2015 14:27 Home Projects Qualys.com Contact You are here: Home > Projects > SSL Server Test > printware.co.uk SSL Report: printware.co.uk (194.143.166.5) Assessed on: Fri, 26 Jun 2015 12:53:08

More information

From wired internet to ubiquitous wireless internet

From wired internet to ubiquitous wireless internet WlanSmartcard.org Technical Committee Wireless LAN A primer guide. Paris, February 5 th Pascal.Urien@enst.fr From wired internet to ubiquitous wireless internet 1 Classical intranet. Network access is

More information

(Continue) Cryptography + (Back to) Software Security

(Continue) Cryptography + (Back to) Software Security CSE 484 / CSE M 584 (Winter 2013) (Continue) Cryptography + (Back to) Software Security Tadayoshi Kohno Thanks to Vitaly Shmatikov, Dan Boneh, Dieter Gollmann, Dan Halperin, John Manferdelli, John Mitchell,

More information

concerto: A Methodology Towards Reproducible Analyses of TLS Datasets

concerto: A Methodology Towards Reproducible Analyses of TLS Datasets concerto: A Methodology Towards Reproducible Analyses of TLS Datasets Olivier Levillain, Maxence Tury and Nicolas Vivet ANSSI Real World Crypto January 6th 2017 Levillain, Tury, Vivet (ANSSI) concerto

More information

Cryptographic Protocols 1

Cryptographic Protocols 1 Cryptographic Protocols 1 Luke Anderson luke@lukeanderson.com.au 5 th May 2017 University Of Sydney Overview 1. Crypto-Bulletin 2. Problem with Diffie-Hellman 2.1 Session Hijacking 2.2 Encrypted Key Exchange

More information

Let's Encrypt - Free SSL certificates for the masses. Pete Helgren Bible Study Fellowship International San Antonio, TX

Let's Encrypt - Free SSL certificates for the masses. Pete Helgren Bible Study Fellowship International San Antonio, TX Let's Encrypt - Free SSL certificates for the masses Pete Helgren Bible Study Fellowship International San Antonio, TX Agenda Overview of data security Encoding and Encryption SSL and TLS Certficate options

More information

Cryptography Lecture 9 Key distribution and trust, Elliptic curve cryptography

Cryptography Lecture 9 Key distribution and trust, Elliptic curve cryptography Cryptography Lecture 9 Key distribution and trust, Elliptic curve cryptography Key Management The first key in a new connection or association is always delivered via a courier Once you have a key, you

More information

ON THE SECURITY OF TLS RENEGOTIATION

ON THE SECURITY OF TLS RENEGOTIATION ON THE SECURITY OF TLS RENEGOTIATION 2012/11/02 QUT Douglas Stebila European Network of Excellence in Cryptology II (ECRYPT II) Australian Technology Network German Academic Exchange Service (ATN-DAAD)

More information

POA Bridge. Security Assessment. Cris Neckar SECUREWARE.IO

POA Bridge. Security Assessment. Cris Neckar SECUREWARE.IO POA Bridge Security Assessment Cris Neckar SECUREWARE.IO Executive Summary The engagement team performed a limited scope, source code assessment of POA Network s POA Bridge. The purpose of this assessment

More information

HTTP Mutual authentication protocol proposal. Yutaka OIWA RCIS, AIST

HTTP Mutual authentication protocol proposal. Yutaka OIWA RCIS, AIST HTTP Mutual authentication protocol proposal Yutaka OIWA RCIS, AIST Problem Current HTTP auth is weak In security: Basic: plain-text authentication Digest: off-line attack, not well implemented TLS Client

More information

On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications

On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications Πανεπιστήμιο Κύπρου Τμήμα Πληροφορικής [ΕΠΛ682 Advanced Security Topics] On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications Όνομα: Φιλίππου Χρίστα Καθηγητής : Δρ. Ηλίας Αθανασόπουλος

More information

Information Security. message M. fingerprint f = H(M) one-way hash. 4/19/2006 Information Security 1

Information Security. message M. fingerprint f = H(M) one-way hash. 4/19/2006 Information Security 1 Information Security message M one-way hash fingerprint f = H(M) 4/19/2006 Information Security 1 Outline and Reading Digital signatures Definition RSA signature and verification One-way hash functions

More information

Session objectives. Identification and Authentication. A familiar scenario. Identification and Authentication

Session objectives. Identification and Authentication. A familiar scenario. Identification and Authentication Session objectives Background Identification and Authentication CSM27 Computer Security Dr Hans Georg Schaathun University of Surrey Autumn 2008 Week 3 Recognise the purposes of (password) identification.

More information

WHITE PAPER. Authentication and Encryption Design

WHITE PAPER. Authentication and Encryption Design WHITE PAPER Authentication and Encryption Design Table of Contents Introduction Applications and Services Account Creation Two-step Verification Authentication Passphrase Management Email Message Encryption

More information

Introduction to SSL. Copyright 2005 by Sericon Technology Inc.

Introduction to SSL. Copyright 2005 by Sericon Technology Inc. Introduction to SSL The cornerstone of e-commerce is a Web site s ability to prevent eavesdropping on data transmitted to and from its site. Without this, consumers would justifiably be afraid to enter

More information

Request for Comments: 4680 Updates: 4346 September 2006 Category: Standards Track

Request for Comments: 4680 Updates: 4346 September 2006 Category: Standards Track Network Working Group S. Santesson Request for Comments: 4680 Microsoft Updates: 4346 September 2006 Category: Standards Track Status of This Memo TLS Handshake Message for Supplemental Data This document

More information

Internet Engineering Task Force (IETF) July Transport Layer Security (TLS) Cached Information Extension

Internet Engineering Task Force (IETF) July Transport Layer Security (TLS) Cached Information Extension Internet Engineering Task Force (IETF) Request for Comments: 7924 Category: Standards Track ISSN: 2070-1721 S. Santesson 3xA Security AB H. Tschofenig ARM Ltd. July 2016 Abstract Transport Layer Security

More information

TLS1.2 IS DEAD BE READY FOR TLS1.3

TLS1.2 IS DEAD BE READY FOR TLS1.3 TLS1.2 IS DEAD BE READY FOR TLS1.3 28 March 2017 Enterprise Architecture Technology & Operations Presenter Photo Motaz Alturayef Jubial Cyber Security Conference 70% Privacy and security concerns are

More information

Protocols, Technologies and Standards Secure network protocols for the OSI stack P2.1 WLAN Security WPA, WPA2, IEEE i, IEEE 802.1X P2.

Protocols, Technologies and Standards Secure network protocols for the OSI stack P2.1 WLAN Security WPA, WPA2, IEEE i, IEEE 802.1X P2. P2 Protocols, Technologies and Standards Secure network protocols for the OSI stack P2.1 WLAN Security WPA, WPA2, IEEE 802.11i, IEEE 802.1X P2.2 IP Security IPsec transport mode (host-to-host), ESP and

More information

Certificate Properties File Realm

Certificate Properties File Realm Certificate Properties File Realm {scrollbar} This realm type allows you to configure Web applications to authenticate users against it. To get to that point, you will need to first configure Geronimo

More information

Network Working Group Requests for Commments: 2716 Category: Experimental October 1999

Network Working Group Requests for Commments: 2716 Category: Experimental October 1999 Network Working Group Requests for Commments: 2716 Category: Experimental B. Aboba D. Simon Microsoft October 1999 Status of this Memo PPP EAP TLS Authentication Protocol This memo defines an Experimental

More information

Deprecating the Password: A Progress Report. Dr. Michael B. Jones Identity Standards Architect, Microsoft May 17, 2018

Deprecating the Password: A Progress Report. Dr. Michael B. Jones Identity Standards Architect, Microsoft May 17, 2018 Deprecating the Password: A Progress Report Dr. Michael B. Jones Identity Standards Architect, Microsoft May 17, 2018 The password problem Alpha-numeric passwords are hard for humans to remember and easy

More information

SSL/TLS & 3D Secure. CS 470 Introduction to Applied Cryptography. Ali Aydın Selçuk. CS470, A.A.Selçuk SSL/TLS & 3DSec 1

SSL/TLS & 3D Secure. CS 470 Introduction to Applied Cryptography. Ali Aydın Selçuk. CS470, A.A.Selçuk SSL/TLS & 3DSec 1 SSL/TLS & 3D Secure CS 470 Introduction to Applied Cryptography Ali Aydın Selçuk CS470, A.A.Selçuk SSL/TLS & 3DSec 1 SSLv2 Brief History of SSL/TLS Released in 1995 with Netscape 1.1 Key generation algorithm

More information

TLS 1.3. Eric Rescorla Mozilla draft-ietf-tls-tls13-21 IETF 100 TLS 1

TLS 1.3. Eric Rescorla Mozilla draft-ietf-tls-tls13-21 IETF 100 TLS 1 TLS 1.3 draft-ietf-tls-tls13-21 Eric Rescorla Mozilla ekr@rtfm.com IETF 100 TLS 1 Agenda Middlebox issues (PR#1091) close_notify and half-close (PR#1092) SNI and resumption(pr#1080) IETF 100 TLS 2 Middlebox

More information

Authentication and Secure Communication. Jeff Chase Duke University

Authentication and Secure Communication. Jeff Chase Duke University Authentication and Secure Communication Jeff Chase Duke University technology people Where are the boundaries of the system that you would like to secure? Where is the weakest link? What happens when the

More information

The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to

The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to 1 The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to compromises of various sorts, with a range of threats

More information

Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks

Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks Juraj Somorovsky Ruhr University Bochum 3curity GmbH juraj.somorovsky@3curity.de About me Security Researcher at: Chair

More information

Securing IoT applications with Mbed TLS Hannes Tschofenig Arm Limited

Securing IoT applications with Mbed TLS Hannes Tschofenig Arm Limited Securing IoT applications with Mbed TLS Hannes Tschofenig Agenda Theory Threats Security services Hands-on with Arm Keil MDK Pre-shared secret-based authentication (covered in webinar #1) TLS Protocol

More information

BROWSER-BASED SUPPORT CONSOLE USER S GUIDE. 31 January 2017

BROWSER-BASED SUPPORT CONSOLE USER S GUIDE. 31 January 2017 BROWSER-BASED SUPPORT CONSOLE USER S GUIDE 31 January 2017 Contents 1 Introduction... 2 2 Netop Host Configuration... 2 2.1 Connecting through HTTPS using Certificates... 3 2.1.1 Self-signed certificate...

More information

Instructions For Configuring Your Browser Settings and Online Banking FAQ's

Instructions For Configuring Your Browser Settings and Online Banking FAQ's Instructions For Configuring Your Browser Settings and Online Banking FAQ's Instructions By Browser Type Google Chrome Firefox Internet Explorer 8 Internet Explorer 9 Safari Online Banking FAQ's Google

More information

Internet Engineering Task Force (IETF) Category: Standards Track. A. Langley Google Inc. E. Stephan Orange July 2014

Internet Engineering Task Force (IETF) Category: Standards Track. A. Langley Google Inc. E. Stephan Orange July 2014 Internet Engineering Task Force (IETF) Request for Comments: 7301 Category: Standards Track ISSN: 2070-1721 S. Friedl Cisco Systems, Inc. A. Popov Microsoft Corp. A. Langley Google Inc. E. Stephan Orange

More information

Nolij Transfer 6 Migration Planning & Preparation. Danielle Whitney Services Product Manager

Nolij Transfer 6 Migration Planning & Preparation. Danielle Whitney Services Product Manager Nolij Transfer 6 Migration Planning & Preparation Danielle Whitney Services Product Manager Introduction Preparation and Planning is key to every successful Nolij Transfer project. In this session we will

More information

Securing Connections for IBM Traveler Apps. Bill Wimer STSM for IBM Collaboration Solutions December 13, 2016

Securing Connections for IBM Traveler Apps. Bill Wimer STSM for IBM Collaboration Solutions December 13, 2016 Securing Connections for IBM Traveler Apps Bill Wimer (bwimer@us.ibm.com), STSM for IBM Collaboration Solutions December 13, 2016 IBM Technote Article #21989980 Securing Connections for IBM Traveler mobile

More information

SharkFest 17 Europe. SSL/TLS Decryption. uncovering secrets. Wednesday November 8th, Peter Wu Wireshark Core Developer

SharkFest 17 Europe. SSL/TLS Decryption. uncovering secrets. Wednesday November 8th, Peter Wu Wireshark Core Developer SharkFest 17 Europe SSL/TLS Decryption uncovering secrets Wednesday November 8th, 2017 Peter Wu Wireshark Core Developer peter@lekensteyn.nl 1 About me Wireshark contributor since 2013, core developer

More information

Internet Security. - IPSec, SSL/TLS, SRTP - 29th. Oct Lee, Choongho

Internet Security. - IPSec, SSL/TLS, SRTP - 29th. Oct Lee, Choongho Internet Security - IPSec, SSL/TLS, SRTP - 29th. Oct. 2007 Lee, Choongho chlee@mmlab.snu.ac.kr Contents Introduction IPSec SSL / TLS SRTP Conclusion 2/27 Introduction (1/2) Security Goals Confidentiality

More information

But where'd that extra "s" come from, and what does it mean?

But where'd that extra s come from, and what does it mean? SSL/TLS While browsing Internet, some URLs start with "http://" while others start with "https://"? Perhaps the extra "s" when browsing websites that require giving over sensitive information, like paying

More information

Cryptography and secure channel. May 17, Networks and Security. Thibault Debatty. Outline. Cryptography. Public-key encryption

Cryptography and secure channel. May 17, Networks and Security. Thibault Debatty. Outline. Cryptography. Public-key encryption and secure channel May 17, 2018 1 / 45 1 2 3 4 5 2 / 45 Introduction Simplified model for and decryption key decryption key plain text X KE algorithm KD Y = E(KE, X ) decryption ciphertext algorithm X

More information

SHA-1 to SHA-2. Migration Guide

SHA-1 to SHA-2. Migration Guide SHA-1 to SHA-2 Migration Guide Web-application attacks represented 40 percent of breaches in 2015. Cryptographic and server-side vulnerabilities provide opportunities for cyber criminals to carry out ransomware

More information

SSL/TLS. Pehr Söderman Natsak08/DD2495

SSL/TLS. Pehr Söderman Natsak08/DD2495 SSL/TLS Pehr Söderman Pehrs@kth.se Natsak08/DD2495 1 Historical problems No general purpose security wrapper Kerberos doesn't cut it! Each protocol has it's own security layer SNMP, Ktelnet Or none at

More information

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman Public Key Infrastructure PKI National Digital Certification Center Information Technology Authority Sultanate of Oman Agenda Objectives PKI Features etrust Components Government eservices Oman National

More information