1. Handshake and key negotiation processClient Authentication server based on RSA handshake and key exchange for an example TLS/SSL handshake processLook at a hand-drawn timing diagram. (1). Client_hello Client initiates a request to transmit the request information in clear text, including the version information
I. The handshake process of SSL/TLS
In the SSL/TLS handshake process, the client and the server need to exchange parameters, the specific process is as follows: The client provides the various cipher suites that it supports (including cryptographic algorithms and hash functions) from which the server chooses itself and
The SSL/TLS handshake process can be divided into two types:
1) SSL/TLS two-way authentication, that is, both sides will be mutual authentication, that is, the exchange of certificates between the two.2) SSL/TLS one-way authentication, the client authenticates the server side, and the server does not authenticate the c
Reprinted from http://blog.csdn.net/taiyangdao/article/details/54707184I. Handshake process of SSL/TLSDuring the handshake process of SSL/TLS, parameters need to be exchanged between the client and the server, as follows:
The client provides various cipher suites that it supports (including cryptographic algorithms and hash functions)
The server choo
OpenVPN Optimization-Establishment of TLS handshake Control CHannel
An optimization of the OpenVPN data tunnel is in progress. After referring to the concept and idea of the "giant frame", I carefully considered the design and implementation of the TCP/IP protocol stack, so I come up with a possible error, but at least it is very practical in my scenario: although the upper-layer protocol sends data, it doe
The best way to learn the TLS protocol is to look at the RfC, but if there is no basic understanding of the secure transport protocol, it is difficult to read the details and design principles of the RFC, so here in order to be able to further understand the TLS protocol, put some basic knowledge here, is a sweep blind.1. The difference between TLS and SSL: SSL i
OpenVPN Optimization-Establishment of TLS handshake Control CHannelAn optimization of the OpenVPN data tunnel is in progress. After referring to the concept and idea of the "giant frame", I carefully considered the design and implementation of the TCP/IP protocol stack, so I come up with a possible error, but at least it is very practical in my scenario: although the upper-layer protocol sends data, it does
authentication code (MAC) to ensure data integrity and prevent message tampering
Replay protection-Protection against replay attacks by Using implicit serial numbers
To achieve these security goals, the SSL/TLS protocol is designed as a two-phase protocol, divided into the handshake phase and application phase:
The handshake stage is also called the negotiation
, so that the IP address space will not be exhausted immediately.Like earlier versions of HTTP, TLS (and SSL) is subject to initialization handshake without specifying the desired host.Only depends on the IP address. Use Plaintext HTTP/1.1 upgrade: As the prelude to TLS handshake-basedInitial HOST: select a certificate
When using Bosh to create Director on Linux, the error is as follows:
Bosh create-env bosh-deployment/bosh.yml \
--state state.json \
--vars-store./creds.yml \
o BOSH-DEPLOYMENT/VIRTUALBOX/CPI.YML \
o
Me: hi,tls! This is your special session! Tls:ok, then I'll start! First of all, my name is called Transport Layer Security Protocol (Transport Layer Secure Protocol), which is an upgraded version of SSL. In fact, my left and right hand are able to use the left hand is called record layer (record), the right hand is called handshake layer (handshake layer) ...Me:
and DSS) to verify the identity of the peer entity.L reliable when connected. Message transfer uses a key for the MAC, including message integrity checks. A secure hash function (such as SHA and MD5) is used for Mac computing.The degree of acceptance of SSL is limited to HTTP only. It has been shown to be available in other protocols, but it has not been widely used.Second, TLS1. About TLSTLS: Secure Transport Layer Protocol(tls:transport Layer Security Protocol)Secure Transport Layer Protocol
abolished, and the key exchange mechanism based on public key can now provide forward secrecy;
All handshake messages after Serverhello take the cryptographic action;
The TLS 1.2 version of the renegotiation handshake mechanism has been deprecated and the renegotiation in TLS 1.3 becomes non-negotiable;
Co
SSL: (SecureSocketLayer, Secure Socket Layer) is a protocol layer between reliable connection-oriented network layer protocol and application layer protocol. SSL authenticates each other, uses digital signatures to ensure integrity, and uses encryption to ensure privacy, so as to achieve secure communication between the client and the server. The protocol consists of two layers: SSL record protocol and SSL Handshake Protocol.
Analysis of TCP three-way handshake and four-way handshake, analysis of tcp three-way handshake
Reprinted from http://www.jellythink.com/archives/705What is TCP?
I am not going to elaborate on what TCP is. When you see this article, I think you also know the concept of TCP and want to have a better understanding of TCP work, let's continue. It is just a super-tro
integrity. These three services are not required and can be selected according to the specific application scenario.Encryption: A mechanism for confusing data.Authentication: A mechanism for verifying the validity of an identity.Integrity: A mechanism for detecting whether a message has been tampered with or forged.2.TLS handshakeThe client and server must negotiate the establishment of an encrypted channel before exchanging data over
HTTP three-way handshake to establish a connection and four-way handshake to disconnect, handshake to disconnect
Three-way handshake to establish A connection the first handshake: host A sends A packet with syn = 1 and generates A data packet with seq number = 1234567 to t
sockets are directly encrypted in the kernel state and do the TLS encapsulation, as shown in the framework:As described by the author, the TLS handshake logic is still done in the user state, and this handshake protocol is actually a matter of control plane. In the AF_KTLS socket, in addition to completing the encrypt
Local thread storage TLS
The local variables defined in the stack are safe for multithreading because different threads have their own stacks. Generally, the defined global variables can be read and written by all threads, so that they are not thread-safe. to ensure security, it is necessary to lock mutex access. What is Thread Local Storage (TLS), simply put, is a variable (usually a pointer pointing to a
Purpose
Familiar with OpenSSL generate key and certificate pair, familiar with CRYPTO/TLS usage in Go
noun explanation
Pem-privacy Enhanced Mail, open the Look text format, start with "-–begin ...", End with "-–end ..." and the content is BASE64 encoded.
Apache and *nix servers tend to use this encoding format.
View information for PEM format certificates: OpenSSL x509-in certificate.pem-text-noout
der-distinguished Encoding Rules, open look i
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.