Communication security over the Internet
The big picture Me Internet Resource Internet Server Client Attack vectors
MAN DNS LAN Client Internet Back Bone Router Networking WWW overview
MITM (Man In The Middle) 3 2 4 5 LAN 2 3 Router Internet 1 1 AV: Spoofing
Use WPA! Sniffer Don't use WEP! Router W-LAN Internet AV: Sniffing
HTTP network capture
Encryption Enc ncryp ypt Decrypt
Encrypted channel ???!!! %#$ %#$ %#$ Internet c c a a b b b b a a c c
HTTPS Capture
HTTPS (TLS/SSL) 4. da data 3. keys 2. certificate 1. requ quest Client Server
AV: Phishing my-bank.com % % # # %#$ $ $ my-bamk.com
Resolver Root NS NS where? 1. where is “m-b” where? my-bank.com there! where? NS there! Other NS there! % % # # $ $ AV: DNS my-bank.com
CA SSL / Certificates delegate CA 3. verify s s i i g g n n 5. da data 4. keys 2. certificate 1. requ quest Client Server
SSL in action (1)
SSL in action (2)
SSL in action (3)
SSL in action (4)
SSL missing in action ???!!!
??? Huh ???
Check “SHA1 Fingerprint”!!! Don't rely on “MD5 Fingerprint”!!!
The explanation!
Email security Browser Outlook IMAPS Use GnuPG! HTTPS My-Mail Extra-Mail ??? ;)
Keep focus!
Recommend
More recommend