Section 27 - Security Protocols Flashcards
What does S/MIME stand for?
Secure/Multipurpose Internet Mail Extensions
What is S/MIME?
This is a standard that provides cryptographic security for electronic messaging, things like email.
*** This is built into most email clients that you use
S/MIME uses ___ session keys for each email message that’s being sent or received.
separate
We can use digital IDs within Outlook or digital signatures within many different programs to give our emails authentication, integrity, and non-repudiation through ___.
S/MIME
S/MIME is a way that we can encrypt our emails and their content. The problem with that is…?
It also encrypts all of their contents, including malware.
What is “SSL”?
Secure Socket Layer
This was a way to start securing the web as we wanted to start doing ecommerce.
*** This is a cryptographic protocol that provided secure internet communications for web browsing, IM, email, VoIP, etc. It was last updated in 1996 at version three so you shouldn’t use it. It was replaced with TLS.
What is “TLS”?
Transport Layer Security
*** This is the newer cryptographic protocol that provided secure internet communications. The current version in use is 1.3.
Often times when it comes to SSL and TLS, you’ll find that people will…?
Call it SSL even if it’s TLS that you’re using
How does TLS and SSL work?
The web browser goes out and gets the server’s public key. It, then, takes that and encrypts a random string of numbers, sends that over to the web server. Once the server gets it, they decrypt it using their private key. They will then create a symmetric tunnel between the two. That tunnel, is SSL or TLS.
How does TLS work in conjunction with HTTPS?
If you want to run a secure website, you would tunnel the normal HTTP protocol through a TLS tunnel. Normally you would use HTTP over port 80 but when you tunnel it through SSL or TLS, you’re going to end up putting it on port 443, which is secure HTTP or HTTPS.
For an email, you’d use SMTP and send it over port 25. But if you want to do it securely, you establish a TLS tunnel first. That would establish a TLS tunnel over port 465 instead and your SMTP traffic would go through that tunnel.
You apply this process to IM, file transfer and other stuff.
What is a way that people can attack TLS?
Downgrade attack
What is a “downgrade attack”?
When a protocol is tricked into using a lower quality version instead of using the higher quality version that it was supposed to.
*** Using a weaker (lower quality) protocol makes it easier to be exploited.
What does it mean to do a “break and inspect”?
As a defender of a network, it can be challenging when people use TLS connections because you can’t see what’s going on inside that tunnel. So, with break and inspect, you act as a man-in-the-middle by putting a proxy there. This requires the TLS tunnel to connect to the proxy to be inspected prior to getting to its destination.
What is SSH?
Secure Shell
This is a protocol used to tunnel other protocols through.
This creates a secure channel between two computers or network devices and allows one device to control another device.
This was designed to replace Telnet.
*** For example, if you wanted to use your laptop to connect to a server to do remote execution of commands as a system admin, you would use SSH to do that.
Why was SSH designed to replace Telnet?
Telnet sends everything in the clear and unencrypted
SSH, on the other hand, allows us to have an encrypted tunnel that protects our data.
SSH is most commonly used as…?
A text-based remote control method for anything that you need to be able to get into and do remote control of, things like routers and switches.
SSH operates over what port?
22
What other protocols operate over port 22 aside from SSH?
Secure Copy
Secure FTP
*** This is because these both operate in an SSH tunnel. Yes, just like TLS you can create a tunnel for security.
What are the three big versions of SSH?
Version 1
Version 1.5
Version 2
What is a “VPN”?
Virtual Private Network
This is a secure connection between two or more computers or devices that aren’t on the same private network, creating a virtual private network.
There’s three big VPN’s out there. What are they?
PPTP
L2TP
IPSec
What is PPTP?
Point-to-Point Tunneling Protocol
This is a protocol that encapsulates PPP packets and ultimately sends data out as encrypted traffic
*** PPP is the Point-to-Point Protocol and it was originally used for dial-up connections but it’s used in combination with PPTP over port 1723 to allow servers and devices to connect to a WAN.
How is PPTP vulnerable?
It uses CHAP based authentication making it vulnerable to attack
What is “L2TP”?
Layer 2 Tunneling Protocol
This is going to give you a connection between two or more computers or devices that aren’t on the same private network