25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

architecture still allows proxies to exist between client <strong>and</strong> servers. In such a<br />

scenario, the process of setting up end-to-end TLS capabilities becomes more<br />

complicated. The OMA WAP-219-TLS-20010411-a specification addresses this<br />

by defining the process of creating a TLS tunnel across a proxy.<br />

In such a scenario, the proxy server acts only as a transport layer data relay,<br />

performing no processing on messages passed between the server <strong>and</strong> client,<br />

nor passing the message up to higher layers in the architecture. This is illustrated<br />

in Figure 18-22.<br />

WAP client WAP server<br />

Upper<br />

Layers<br />

TLS<br />

Transport<br />

<strong>and</strong> <strong>IP</strong><br />

Layers<br />

Wireless<br />

Transport<br />

<strong>and</strong> <strong>IP</strong><br />

Layers<br />

Figure 18-22 An example of TLS tunnelling<br />

18.10.2 Wireless Identity Module (WIM)<br />

WAP proxy<br />

Transport<br />

<strong>and</strong> <strong>IP</strong><br />

Layers<br />

Wireless Wireless<br />

Upper<br />

Layers<br />

TLS<br />

Transport<br />

<strong>and</strong> <strong>IP</strong><br />

Layers<br />

Wireless<br />

In implementing WTLS, it is important to have a tamper-proof device that stores<br />

secret information (such as keys <strong>and</strong> certificates) <strong>and</strong> can also perform other<br />

security functions (such as cryptology). Such a device increases the difficulty<br />

faced by a malicious user attempting to gain access to such information. In order<br />

to achieve this functionality, WAP2 architecture defines the Wireless Identity<br />

Module (WIM). This typically exists as a smart card within the mobile device.<br />

Defined originally by the OMA WAP-260-WIM-20010712-a specification, the<br />

Chapter 18. Wireless Application Protocol 701

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!