25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

► SEC-Exchange: Performs public key authentication or key exchange with a<br />

client. Additional information about public keys is in OMA specifications<br />

WAP-217-WPKI-20010424-a, WAP-217_103-WPKI-20011102-a, <strong>and</strong><br />

WAP-217_105-WPKI-20020816-a.<br />

► SEC-Commit: Initiated when the h<strong>and</strong>shake is completed <strong>and</strong> either peer<br />

requests to switch to the agreed connection state.<br />

► SEC-Terminate: Terminates the connection.<br />

► SEC-Exception: Informs the other partner about warning level alerts.<br />

► SEC-Create-Request: The server requests the client to initiate a new<br />

h<strong>and</strong>shake.<br />

Protocol overview<br />

As shown in Figure 18-21 on page 697, WTLS consists of four protocol<br />

components:<br />

► The record protocol<br />

► The h<strong>and</strong>shake protocol<br />

► The alert protocol<br />

► The change CipherSpec protocol<br />

Record protocol<br />

The record protocol is the interface to the upper layer (transaction or session<br />

layer) <strong>and</strong> to the lower layer (transport layer). It receives messages from the<br />

upper layer to be transmitted, optionally compresses the data, applies a<br />

message authentication code (MAC), encrypts the message, <strong>and</strong> then transmits<br />

the message. Conversely, received data is decrypted, verified, decompressed,<br />

<strong>and</strong> delivered to a higher layer of the client. The remaining four protocols<br />

cooperate very closely with the record protocol in achieving these steps.<br />

H<strong>and</strong>shake protocol<br />

This protocol consists of three subprotocols that allow peers to agree on security<br />

parameters for the record layer. The h<strong>and</strong>shake protocol is responsible for the<br />

negotiation process between the client <strong>and</strong> server <strong>and</strong> is employed when<br />

initiating WTLS. These parameters are negotiated during the h<strong>and</strong>shake:<br />

Session identifier Identifies an active <strong>and</strong> resumeable secure<br />

session.<br />

Protocol version WTLS protocol version number.<br />

Peer certificate Certificate of the peer.<br />

Compression method The algorithm used to compress data prior to<br />

encryption.<br />

Chapter 18. Wireless Application Protocol 699

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!