Unit-IV TLS
Unit-IV TLS
Could be provided as
part of the underlying
protocol suite and
Defined in RFC 5246 therefore be
transparent to
applications
Is an Internet standard
Is a general purpose
that evolved from a
service implemented as
commercial protocol
a set of protocols that
known as Secure
rely on TCP
Sockets Layer (SSL)
TLS Architecture
• Two important TLS concepts are:
connection
• An association between a client and a server
• Created by the Handshake Protocol
Specifies the
bulk data
An arbitrary encryption
byte algorithm and A flag
An X509.v3
sequence The algorithm a hash 48-byte indicating
certificate of
chosen by the used to algorithm secret shared whether the
the peer; this
server to element of compress used for MAC between the session can
identify an the state may data prior to calculation; client and the be used to
active or be null encryption also defines server initiate new
resumable cryptographic connections
session state attributes
such as the
hash_size
A connection state is defined by the following parameters:
SSH
Transport
Layer
Cryptographic
Algorithms
* = Required
** = Recommended
Authentication Methods
• Publickey
• The client sends a message to the server that contains the client’s public
key, with the message signed by the client’s private key
• When the server receives this message, it checks whether the supplied
key is acceptable for authentication and, if so, it checks whether the
signature is correct
• Password
• The client sends a message containing a plaintext password, which is
protected by encryption by the Transport Layer Protocol
• Hostbased
• Authentication is performed on the client’s host rather than the client
itself
• This method works by having the client send a signature created with the
private key of the client host
• Rather than directly verifying the user’s identity, the SSH server verifies
the identity of the client host
Connection Protocol
• The SSH Connection Protocol runs on top of the SSH Transport
Layer Protocol and assumes that a secure authentication
connection is in use
• The secure authentication connection, referred to as a tunnel, is used
by the Connection Protocol to multiplex a number of logical channels
• Channel mechanism
• All types of communication using SSH are supported using separate
channels
• Either side may open a channel
• For each channel, each side associates a unique channel number
• Channels are flow controlled using a window mechanism
• No data may be sent to a channel until a message is received to
indicate that window space is available
• The life of a channel progresses through three stages: opening a
channel, data transfer, and closing a channel
Channel Types
Four channel types are recognized in the SSH Connection Protocol specification
Session
•The remote execution of a program
•The program may be a shell, an application such as file transfer or e-mail, a system command, or
some built-in subsystem
•Once a session channel is opened, subsequent requests are used to start the remote program
X11
•Refers to the X Window System, a computer software system and network protocol that provides
a graphical user interface (GUI) for networked computers
•X allows applications to run on a network server but to be displayed on a desktop
machine
Forwarded-tcpip
•Remote port forwarding
Direct-tcpip
•Local port forwarding
Port Forwarding
• One of the most useful features of SSH