VOYAGER: Yet Another Secure Web Browser to Demonstrate Secure Socket Layer Working and Implementatio...
Download
1 / 20

By : Shrinivas G. Deshpande Advisor: Dr. Chung E. Wang Second Reader: Prof. Richard Smith - PowerPoint PPT Presentation


  • 139 Views
  • Uploaded on

VOYAGER: Yet Another Secure Web Browser to Demonstrate Secure Socket Layer Working and Implementation . By : Shrinivas G. Deshpande Advisor: Dr. Chung E. Wang Second Reader: Prof. Richard Smith. Scope of the Project. Study of Secure Socket Layer(SSL) Protocol SSL Handshake Protocol

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'By : Shrinivas G. Deshpande Advisor: Dr. Chung E. Wang Second Reader: Prof. Richard Smith' - gustav


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
By shrinivas g deshpande advisor dr chung e wang second reader prof richard smith

VOYAGER: Yet Another Secure Web Browser to Demonstrate Secure Socket Layer Working and Implementation

By: Shrinivas G. Deshpande

Advisor: Dr. Chung E. Wang

Second Reader: Prof. Richard Smith


Scope of the project
Scope of the Project Secure Socket Layer Working and Implementation

  • Study of Secure Socket Layer(SSL) Protocol

    • SSL Handshake Protocol

    • SSL Record Protocol

  • Demonstrate how SSL can be used to make clients secure against a secure server

  • Keys and Digital Certificates

  • Role of Gateways in SSL communication

Voyager: Yet Another Secure Web Browser


Requirement specification
Requirement Specification Secure Socket Layer Working and Implementation

  • Introduction to SSL

    • What is SSL and how SSL works

    • Client and Server Authentication

    • SSL Handshake Protocol

    • SSL Record Protocol

  • Difference between http and https

    • Demonstrated by developing a Browser that understands http and https.

  • Certificates and Digital Signatures

  • Role of Gateways in SSL communication

Voyager: Yet Another Secure Web Browser


1 difference between http and https

http Secure Socket Layer Working and Implementation

Stateless protocol

Non secure connection

Non Secure Sockets

https

Session based protocol

Secure connection

Secure Sockets

1. Difference between http and https

Voyager: Yet Another Secure Web Browser


2 introduction to ssl
2. Secure Socket Layer Working and Implementation Introduction to SSL

  • SSL- Developed by Netscape Communication

  • SSL – accepted universally on the World Wide Web for AUTHENTICATED and ENCRYPTED communication between clients and servers

  • IETF standard called Transport Layer Security is based on SSL

  • SSL protocol runs above TCP/IP and below higher level protocols such as HTTP

  • Uses TCP/IP to authenticate itself to an SSL enabled client

Voyager: Yet Another Secure Web Browser


What does ssl actually do
What does SSL actually do? Secure Socket Layer Working and Implementation

  • Fragments messages to be transmitted into manageable blocks

  • Compresses the data

  • Encrypts and transmits the data

  • Received data is decrypted

  • Verified, decompressed

  • Reassembled and transmitted to higher layers

Voyager: Yet Another Secure Web Browser


Ssl in tcp ip protocol stack
SSL in TCP/IP Protocol Stack Secure Socket Layer Working and Implementation

Voyager: Yet Another Secure Web Browser


Ssl record layer
SSL Record Layer Secure Socket Layer Working and Implementation

  • Receives uninterrupted data from upper layers

  • Fragmentation / Reassemble data

  • Compresses/Decompress data

  • Encrypt/Decrypt and verification of data

Voyager: Yet Another Secure Web Browser


Ssl handshake protocol
SSL Handshake Protocol Secure Socket Layer Working and Implementation

  • Maintains information about the current state and next state called the pending state

  • Once the handshake is complete, the two parties have shared secrets used to encrypt records and compute keyed messages authentication codes on their contents.

  • Maintains the handshake state information of the client and server and ensures that the protocol state machines of client and server work consistently

Voyager: Yet Another Secure Web Browser


Ssl record protocol
SSL Record Protocol Secure Socket Layer Working and Implementation

  • Receives uninterrupted data from upper layers

  • Fragmentation / Reassemble data

  • Compresses/Decompress data

  • Encrypt/Decrypt and verification of data

Voyager: Yet Another Secure Web Browser


Design secure library class diagram
Design:Secure Library Class Diagram Secure Socket Layer Working and Implementation

Voyager: Yet Another Secure Web Browser


Http connection sequence diagram
http connection sequence diagram Secure Socket Layer Working and Implementation

Voyager: Yet Another Secure Web Browser


Https connection sequence diagram
https connection sequence diagram Secure Socket Layer Working and Implementation

Voyager: Yet Another Secure Web Browser


How why gateways use ssl
How/Why Gateways use SSL Secure Socket Layer Working and Implementation

  • SSL designed to provide security between client and server and avoid man-in-the-middle attack

  • SSL considers a proxy server as a middleman

  • Gateways act as clients and authenticate servers. Client authentication is not possible.

  • Gateway/proxy can internally authenticate client within the firewall

  • Packet Filtering by allowing specific ports for specific traffic. 443 in case of SSL

  • SSL can works with gateways that support SOCKS. SOCKS is a networking proxy protocol that enables hosts on one side of a SOCKS server to gain full access to hosts on the other side of the SOCKS server without requiring direct IP-reach ability. SOCKS is often used as a network firewall, redirecting connection requests from hosts on opposite sides of a SOCKS server. The SOCKS server authenticates and authorizes requests, establishes a proxy connection, and relays data between hosts.

Voyager: Yet Another Secure Web Browser


Gateways and ssl
Gateways and SSL Secure Socket Layer Working and Implementation

  • Proxy Server should support SOCKS to support SSL

  • With SOCKS, DNS is the responsibility of the client

  • SSL tunneling, DNS is the responsibility of the proxy

  • Proxy Server can spoof mock on behalf of internal client. Makes connection faster

Voyager: Yet Another Secure Web Browser


Implementation details
Implementation Details Secure Socket Layer Working and Implementation

  • Client/Server setup for development

    • Voyager Front-end: Developed Using Java Swing. JRE:1.3.1_02

    • Secure Library: Developed using Java and JSSE.

    • Testing: Running Apache Tomcat as a Secure Web Server on Local System on port #: 8443

  • JSSE is Java implementation of SSL developed by SUN

  • Key/certificate generation

    • Key/certificate generation using Keytool

    • RSA algorithm used for key generation

    • X.509v3 certificates generated

    • Import/Export certificate to make certificate available for authentication

Voyager: Yet Another Secure Web Browser


Voyager snapshots
Voyager Snapshots Secure Socket Layer Working and Implementation

Voyager: Yet Another Secure Web Browser


Securely accessing tomcat apache default page though voyager
Securely Accessing Tomcat Apache Default page though Voyager Secure Socket Layer Working and Implementation

Voyager: Yet Another Secure Web Browser


Accessing golden 1 web site through voyager
Accessing Golden-1 web site through Voyager Secure Socket Layer Working and Implementation

Voyager: Yet Another Secure Web Browser


Conclusion
Conclusion Secure Socket Layer Working and Implementation

  • Opportunity to learn about network security

  • How SSL works/implemented

  • Setting up client servers for secure communications

  • Thanks to Dr. Wang and Prof. Dick Smith

Voyager: Yet Another Secure Web Browser