06b - Transport Layer Security Flashcards

1
Q

What protocols Comprise TLS?

A
  • Handshake Protcol
  • Change Cipher Spec Protocol
  • Alert Protocol
  • HTTP
  • Heartbeat Protocol
  • Record Protocol
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the difference between a TLS connection and a TLS session?

A

Connection is:
A transport that provides a suitable type of service.
Typically for TLS such connections are peer-to-peer.
Every connection is associated with one session.

Session is:
An association between a client and a server.
Created by handshake protocol.
Define a set of Cryptographic security parameters which can be shared among multiple connections.
Are used to avoid the expensive negotiation of new security parameters for each connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What steps are involved in the TLS Record Protocol Transmission?

A
  • Application Data is broken up into fragments
  • Fragments are compressed
  • MAC is added to compressed fragments
  • Heterogenous fragments are then encrypted
  • TLS Record header is appended to the encrypted blocks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

For what applications is SSH useful?

A
  • Remote login and X tunnelling
  • rapidly becoming one of the most pervasive applications for encryption technology outside of embedded systems
  • can be used for network functions like file-transfer and email
  • can be used to secure pretty much any TCP connection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Based on what you have learned in this chapter, is it possible in TLS for the receiver to reorder TLS record blocks that arrive out of order?

A

SSL relies on the underlying TCP protocol which assures that bytes are not lost or modified. So, if the underlying protocol is TCP, then yes, but if the underlying transport protocol is not TCP, then it depends on how that underlying protocol supports packet ordering.
If it’s UDP, TLS has to do the reordering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What purpose does the MAC serve during the change cipher spec TLS exchange?

A

To verify that the message is coming from the right person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Summarize Web Security Threats

A

They involve threats to Integrity, Confidentiality, Denial of Service and Authentication.
Integrity –> modification of user data
Confidentiality –> sensitive data is no longer private
DOS–> users can no longer use service.
Authentication–> users can be impersonated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Summarize Web Traffic Security Approaches

A

Web Traffic is typically secured on three levels, Network, Transport and Application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Present an overview of Transport Layer Security (TLS)

A

TLS –> offers security on the transport layer. Does this by providing a suite of transport layer protocols for ensuring confidentiality and message integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Understand the differences between Secure Sockets Layer and Transport Layer Security

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Compare the Pseudorandom function used in Transport Layer Security with those discussed earlier in the book

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Present an overview of HTTPS (HTTPS over SSL)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Present and overview of Secure Shell (SSH)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In the context of SSL / TLS, what is MAC?

A

Message Authentication Code

  • A pre-shared secret defined in the Handshake Protocol.
  • is used to verify that the message is coming from the right person
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an IV?

A

Initialization Vector

  • A (pseudo)random fixed-size input used in encryption methods.
  • Purpose is to start off an encryption method (methods that implement various Cipher Modes for encrypted communications).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly