09.12.2012 Views

Download PDF - IBM Redbooks

Download PDF - IBM Redbooks

Download PDF - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The steps in bold in Figure 5-6 on page 95 are additional steps specific to client<br />

certificate authentication:<br />

1. The client sends a client hello command to the server, which includes:<br />

– Client version - highest SSL and TLS version supported by the client<br />

– Random structure generated by the client for use in the key generation<br />

process<br />

– A session ID that the client wishes to use for the connection<br />

– Ciphers supported by the client with client's first preference first<br />

– Data compression methods supported by client sorted by client preference<br />

2. The server sends a server hello command to the client, which includes:<br />

– Highest client SSL or TLS version that server supports<br />

– Random structure generated by the server for use in the key generation<br />

process<br />

– A session ID for the SSL session<br />

– A cipher selected by the server from the list of client-supported ciphers<br />

– Data compression method selected by the server from the list of<br />

client-supported compression methods<br />

3. The server sends the server certificate (that is, the X.509 certificate).<br />

4. The server sends a certificate request to authenticate the client. This step<br />

occurs with client certificate authentication only.<br />

5. The server sends the server hello done, indicating that the server is done<br />

sending messages to support the key exchange. The client should verify that<br />

the server provided a valid certificate upon receiving the server hello done.<br />

6. The client sends a client certificate only if the server requested a certificate.<br />

This step occurs with client certificate authentication only.<br />

7. The client key exchange occurs using a premaster secret that was created by<br />

the client and was then encrypted using the server’s public key.<br />

Both the client and the server generate the symmetric encryption keys on<br />

there own using the premaster secret and the random data that is generated<br />

from the server hello and client hello commands.<br />

8. The certificate verify message is sent to provide explicit verification of a client<br />

certificate. This step occurs with client certificate authentication only.<br />

9. The change cipher spec message is sent by the client to notify the server that<br />

subsequent records will be protected under the newly negotiated CipherSpec<br />

and keys.<br />

96 Security in WebSphere Application Server Version 6.1 and J2EE 1.4 on z/OS

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!