25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

18.6.7 Security<br />

In a trusted environment, several questions can arise, for example:<br />

► How can the push initiator be authenticated?<br />

► What role does PPG play in a security <strong>and</strong> trusted model?<br />

► What are the access control policies for a push initiator <strong>and</strong> pushed content?<br />

► How can a client authenticate something if it has no certificates?<br />

Authenticating a push initiator<br />

Some of the following solutions can be used to implement a security environment<br />

between a push initiator <strong>and</strong> the PPG:<br />

► Use of session level certificates (TSL <strong>and</strong> SSL)<br />

If the push content traverses the Internet between the push initiator <strong>and</strong> PPG,<br />

TSL or SSL can be used.<br />

► Use of object-level certificates<br />

Certificates can be used to sign <strong>and</strong> encrypt the pushed content on an<br />

end-to-end basis. This strengthens the level of confidence in the content<br />

authenticity at the client’s end.<br />

► HTTP authentication<br />

The basic authentication through user ID <strong>and</strong> password is available. In<br />

addition, HTTP authentication, for example, based on digests, can be<br />

implemented.<br />

► Combination of technologies<br />

Another approach is combining technologies by using a TLS/SSL session<br />

with a PPG, while HTTP authentication can be used to authenticate the push<br />

initiator. Signed <strong>and</strong> encrypted content can then be sent over this<br />

authenticated session.<br />

Client authentication<br />

If a client <strong>and</strong> a PPG are able to create a trusted environment, the PPG can<br />

authenticate a push initiator on behalf of that client, that is, trust can be transitive.<br />

A trust situation can be established between client <strong>and</strong> PPG by maintaining a list<br />

of trusted PPGs in a client system. Push initiators own a certificate or public key<br />

for end-to-end authentication of the origin server.<br />

Chapter 18. Wireless Application Protocol 669

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!