Transport Layer Security Flashcards
Where does TLS sit between?
Transport and Application Layer
How does TLS run in terms of its interaction with other layers?
It runs on top of TCP, securing HTTP traffic. A TCP connection must be established before a TLS handshake.
What is a TLS handshake?
It is the setup of cryptographic parameters between client and server
What are the steps in a TLS handshake (up to verifying server certificate)
Client Hello with cipher suites and client random.
Server Hello with decision on cipher suites and client random.
Server certificate sent to client.
Verification of server certificate.
What steps are involved in key generation/derivation?
Generate pre master secret.
With premaster secret, client random and server random generate master secret (48 bytes).
With master secret, client random and server random generate session keys.
What are three typical firewall policies?
User control, service control and direction control
How does a user control policy control the access to and from the firewall? Which users are affected by user control policies by a firewall?
User control policies control access to data based on the role of a user in the network. It apples only to users inside the firewall perimeter.
How does a service control policy control the access to and from the firewall? What parameters do firewall apply the basis of their control policy on?
Controls access by the type of service provided by host. Applied on basis of network address, protocol of connection and port numbers.
How does direction control policy control the access to and from the firewall?
Determines the direction in which requests are allowed to flow through the firewall.
Firewalls have what 3 actions to control network traffic?
Accepted, denied and rejected
What is the difference between a denied and a rejected action.
Rejected actions tell the source about the decision made by the firewall, denied packets do not.