19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

S 5.66 Use of SSL<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: Administrators, users<br />

<strong>The</strong> most commonly used security protocol in relation to use of the WWW is<br />

SSL (Secure Socket Layer). SSL was developed by Netscape, and is supported<br />

by all relatively up-to-date browsers. Connections can be secured with SSL in<br />

various ways:<br />

- By encryption of the connection content<br />

- By checking the completeness and correctness of the transferred data<br />

- By checking the identity of the servers<br />

- Optionally by checking the identity of the client end<br />

With SSL, a connection is set up between a user's browser and a provider's<br />

server, via which first of all the certificates with the public keys are<br />

exchanged. Next a symmetric key is exchanged by secure means, protected by<br />

the asymmetric encryption procedure RSA. A symmetric procedure is then<br />

used for the encryption of the actual data transmission, because these can<br />

encrypt large quantities of data faster. A different symmetric key is negotiated<br />

as the session key for each transaction; this is used to encrypt the connection.<br />

A hash procedure can also be used during data transmission for the purpose of<br />

data compression.<br />

<strong>The</strong> ways that a user can recognise Web pages which allow SSL-secured data<br />

transmission include for example the fact that an "s" is added to the address<br />

(https://www...), that the key at the lower edge of the screen in Netscape<br />

Navigator, usually shown broken, is now joined together, or that in Internet<br />

Explorer the padlock is shown closed instead of open.<br />

<strong>The</strong> use of SSL is not restricted to HTTP clients and servers. Applications<br />

such as Telnet or FTP can also use SSL for secure communications. This does<br />

require, however, that the clients and servers concerned have each been<br />

adapted to do this.<br />

SSL consists of two layers. <strong>The</strong> SSL handshake protocol operates on the upper<br />

layer. This is used by the client and the server to identify and authenticate<br />

themselves to each other, and to negotiate a key and an encryption algorithm<br />

to be used for the subsequent data communication traffic. <strong>The</strong> lower layer, the<br />

SSL record protocol, which forms the interface to the TCP layer, encrypts and<br />

decrypts the actual data traffic. Because SSL sits on the socket interface for<br />

access to TCP and replaces this interface with an enhanced-security version, it<br />

can also be used for other services. As a result, SSL also runs transparently in<br />

the background of any Internet service. Users only need to have active<br />

involvement when selecting a certificate. In contrast with S-HTTP, therefore,<br />

they do not have the opportunity to configure the security functions and adapt<br />

them to their specific security requirements. On the other hand, SSL may<br />

appear to be more convenient to users who do not want to be held up by the<br />

configuration of security functions every time there is a Web query.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!