Unit 3
Unit 3
Transport-Level Security
We cannot enter into alliance with
neighboring princes until we are acquainted
with their designs.
Server and • Byte sequences that are chosen • When a block cipher in CBC
client by the server and client for mode is used, an initialization
random each connection vector (IV) is maintained for
each key
Initialization • This field is first initialized by
Server • The secret key used in MAC vectors the SSL Handshake Protocol
• The final ciphertext block from
write MAC operations on data sent by the
each record is preserved for use
secret server as the IV with the following
record
For HTTPS, the agent acting as the There are three levels of awareness
HTTP client also acts as the TLS client of a connection in HTTPS:
• The client initiates a connection to the server on • At the HTTP level, an HTTP client requests a
the appropriate port and then sends the TLS connection to an HTTP server by sending a
ClientHello to begin the TLS handshake connection request to the next lowest layer
• When the TLS handshake has finished, the client • Typically the next lowest layer is TCP, but it may
may then initiate the first HTTP request also be TLS/SSL
• All HTTP data is to be sent as TLS application data • At the level of TLS, a session is established
between a TLS client and a TLS server
• This session can support one or more
connections at any time
• A TLS request to establish a connection begins
with the establishment of a TCP connection
between the TCP entity on the client side and the
TCP entity on the server side
Connection Closure
SSH
Transport
Layer
Cryptographic
Algorithms
* = Required
** = Recommended
Authentication Methods
Publickey
• The client sends a message to the server that contains the client’s public
key, with the message signed by the client’s private key
• When the server receives this message, it checks whether the supplied key
is acceptable for authentication and, if so, it checks whether the signature
is correct
Password
Hostbased
• Authentication is performed on the client’s host rather than the client itself
• This method works by having the client send a signature created with the
private key of the client host
• Rather than directly verifying the user’s identity, the SSH server verifies the
identity of the client host
Connection Protocol
Session
• The remote execution of a program
• The program may be a shell, an application such as file transfer or e-mail, a system command,
or some built-in subsystem
• Once a session channel is opened, subsequent requests are used to start the remote program
X11
• Refers to the X Window System, a computer software system and network protocol that
provides a graphical user interface (GUI) for networked computers
• X allows applications to run on a network server but to be displayed on a desktop machine
Forwarded-tcpip
• Remote port forwarding
Direct-tcpip
• Local port forwarding
Port Forwarding