Real-world Protocols




CS166

Chris Pollett

Nov 19, 2012

Outline

Secure Socket Layer -- What is the socket layer?

Socket Layer in Protocol Stack

What is SSL?

Simple SSL-like Protocol

An SSL-like  Protocol

Simplified SSL Protocol

Simplified SSL  Protocol

SSL Keys

SSL Authentication

SSL MiM Attack?

SSL with a Man-in-the-Middle

SSL Sessions vs Connections

SSL Connection

SSL Connection Protocol

SSL vs IPSec

SSL vs IPSec

Quiz

Which of the following is true?

  1. We gave a protocol for perfect forward security that did not involve forgetting anything.
  2. If timestamps are used rather than nonces, replay attacks might become possible where they weren't before.
  3. We gave a potentially successful man-in-the-middle attack for SSH.

IPSec and SSL

IPSec and SSL in Network stack

IPSec and Complexity

IKE and ESP/AH

IKE

IKE Phase 1 Versions

IKE Phase 1 - Specific Version Cases

IKE Phase 1 -- Session Key

IKE Phase 1: Digital Signature (Main Mode)

IKE Phase 1 Digital Signature Protocol

IKE Phase 1: Public Key Signature (Aggressive Mode)

IKE Phase 1 Aggresive Signature Protocol

Main vs Aggressive Modes

IKE Phase 1: Symmetric Key (Main Mode)

IKE Phase 1 Symmetric Protocol

Problems with Symmetric Key (Main Mode)