Transport Layer Security: Description
Transport Layer Security: Description
Transport Layer Security: Description
Description
The TLS protocol allows client/server applications to communicate across a network in a way designed to prevent
eavesdropping and tampering. TLS provides endpoint authentication and communications confidentiality over the
Internet using cryptography. TLS provides RSA security with 1024 and 2048 bit strengths.
In typical end-user/browser usage, TLS authentication is unilateral: only the server is authenticated (the client
knows the server's identity), but not vice versa (the client remains unauthenticated or anonymous).
TLS also supports the more secure bilateral connection mode (typically used in enterprise applications), in which
both ends of the "conversation" can be assured with whom they are communicating (provided they diligently
scrutinize the identity information in the other party's certificate). This is known as mutual authentication, or 2SSL.
Mutual authentication requires that the TLS client-side also hold a certificate (which is not usually the case in the
end-user/browser scenario). Unless, that is, TLS-PSK, the Secure Remote Password (SRP) protocol, or some other
protocol is used that can provide strong mutual authentication in the absence of certificates.
Typically, the key information and certificates necessary for TLS are handled in the form of X.509 certificates,
which define required fields and data formats.
SSL operates in modular fashion. It is extensible by design, with support for forward and backward compatibility
and negotiation between peers.
Cipher suite
When a TLS or SSL connection is established, the client and server negotiate a CipherSuite, exchanging
CipherSuite codes in the client hello and server hello messages, which specifies a combination of cryptographic
algorithms to be used for the connection and establishes technical politeness between client and server, a necessary
component of all interactive server deployments.
The key exchange and authentication algorithms are typically public key algorithms, or as in TLS-PSK preshared
keys could be used. The message authentication codes are made up from cryptographic hash functions using the
HMAC construction for TLS, and a non-standard pseudorandom function for SSL.
Transport Layer Security 2
Standards
The current approved version of TLS is version 1.2, which is specified in:
• RFC 5246: “The Transport Layer Security (TLS) Protocol Version 1.2”.
The current standard obsoletes these former versions:
• RFC 2246: “The TLS Protocol Version 1.0”.
• RFC 4346: “The Transport Layer Security (TLS) Protocol Version 1.1”.
Other RFCs subsequently extended TLS, including:
• RFC 2595: “Using TLS with IMAP, POP3 and ACAP”. Specifies an extension to the IMAP, POP3 and ACAP
services that allow the server and client to use transport-layer security to provide private, authenticated
communication over the Internet.
• RFC 2712: “Addition of Kerberos Cipher Suites to Transport Layer Security (TLS)”. The 40-bit ciphersuites
defined in this memo appear only for the purpose of documenting the fact that those ciphersuite codes have
already been assigned.
• RFC 2817: “Upgrading to TLS Within HTTP/1.1”, explains how to use the Upgrade mechanism in HTTP/1.1 to
initiate Transport Layer Security (TLS) over an existing TCP connection. This allows unsecured and secured
HTTP traffic to share the same well known port (in this case, http: at 80 rather than https: at 443).
• RFC 2818: “HTTP Over TLS”, distinguishes secured traffic from insecure traffic by the use of a different 'server
port'.
• RFC 3207: “SMTP Service Extension for Secure SMTP over Transport Layer Security”. Specifies an extension to
the SMTP service that allows an SMTP server and client to use transport-layer security to provide private,
authenticated communication over the Internet.
• RFC 3268: “AES Ciphersuites for TLS”. Adds Advanced Encryption Standard (AES) ciphersuites to the
previously existing symmetric ciphers.
• RFC 3546: “Transport Layer Security (TLS) Extensions”, adds a mechanism for negotiating protocol extensions
during session initialisation and defines some extensions. Made obsolete by RFC 4366.
• RFC 3749: “Transport Layer Security Protocol Compression Methods”, specifies the framework for compression
methods and the DEFLATE compression method.
• RFC 3943: “Transport Layer Security (TLS) Protocol Compression Using Lempel-Ziv-Stac (LZS)”.
• RFC 4132: “Addition of Camellia Cipher Suites to Transport Layer Security (TLS)”.
• RFC 4162: “Addition of SEED Cipher Suites to Transport Layer Security (TLS)”.
• RFC 4217: “Securing FTP with TLS”.
• RFC 4279: “Pre-Shared Key Ciphersuites for Transport Layer Security (TLS)”, adds three sets of new ciphersuites
for the TLS protocol to support authentication based on pre-shared keys.
• RFC 4347: “Datagram Transport Layer Security” specifies a TLS variant that works over datagram protocols
(such as UDP).
• RFC 4366: “Transport Layer Security (TLS) Extensions” describes both a set of specific extensions, and a generic
extension mechanism.
• RFC 4492: “Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS)”.
• RFC 4507: “Transport Layer Security (TLS) Session Resumption without Server-Side State”.
• RFC 4680: “TLS Handshake Message for Supplemental Data”.
• RFC 4681: “TLS User Mapping Extension”.
• RFC 4785: “Pre-Shared Key (PSK) Ciphersuites with NULL Encryption for Transport Layer Security (TLS)”.
• RFC 5054: “Using the Secure Remote Password (SRP) Protocol for TLS Authentication”.
• RFC 5746: “Transport Layer Security (TLS) Renegotiation Indication Extension”.
Transport Layer Security 4
Applications
In applications design, TLS is usually implemented on top of any of the Transport Layer protocols, encapsulating the
application-specific protocols such as HTTP, FTP, SMTP, NNTP, and XMPP. Historically it has been used primarily
with reliable transport protocols such as the Transmission Control Protocol (TCP). However, it has also been
implemented with datagram-oriented transport protocols, such as the User Datagram Protocol (UDP) and the
Datagram Congestion Control Protocol (DCCP), usage which has been standardized independently using the term
Datagram Transport Layer Security (DTLS).
A prominent use of TLS is for securing World Wide Web traffic carried by HTTP to form HTTPS. Notable
applications are electronic commerce and asset management. Increasingly, the Simple Mail Transfer Protocol
(SMTP) is also protected by TLS (RFC 3207). These applications use public key certificates to verify the identity of
endpoints.
An increasing number of client and server products support TLS natively, but many still lack support. As an
alternative, users may wish to use standalone TLS products like Stunnel. Wrappers such as Stunnel rely on being
able to obtain a TLS connection immediately, by simply connecting to a separate port reserved for the purpose. For
example, by default the TCP port for HTTPS is 443, to distinguish it from HTTP on port 80.
TLS can also be used to tunnel an entire network stack to create a VPN, as is the case with OpenVPN. Many vendors
now marry TLS's encryption and authentication capabilities with authorization. There has also been substantial
development since the late 1990s in creating client technology outside of the browser to enable support for
client/server applications. When compared against traditional IPsec VPN technologies, TLS has some inherent
advantages in firewall and NAT traversal that make it easier to administer for large remote-access populations.
TLS is also a standard method to protect Session Initiation Protocol (SIP) application signaling. TLS can be used to
provide authentication and encryption of the SIP signaling associated with VoIP and other SIP-based applications.
Security
TLS/SSL have a variety of security measures:
• The client may use the certificate authority's (CA's) public key to validate the CA's digital signature of the server
certificate. If the digital signature can be verified, the client accepts the server certificate as a valid certificate
issued by a trusted CA.
• The client verifies that the issuing CA is on its list of trusted CAs.
• The client checks the server's certificate validity period. The authentication process stops if the current date and
time fall outside of the validity period.
• Protection against a downgrade of the protocol to a previous (less secure) version or a weaker cipher suite.
• Numbering all the Application records with a sequence number, and using this sequence number in the message
authentication codes (MACs).
• Using a message digest enhanced with a key (so only a key-holder can check the MAC). The HMAC construction
used by most TLS ciphersuites is specified in RFC 2104 (SSLv3 used a different hash-based MAC).
• The message that ends the handshake ("Finished") sends a hash of all the exchanged handshake messages seen by
both parties.
• The pseudorandom function splits the input data in half and processes each one with a different hashing algorithm
(MD5 and SHA-1), then XORs them together to create the MAC. This provides protection even if one of these
algorithms is found to be vulnerable. TLS only.
• SSL v3 improved upon SSL v2 by adding SHA-1 based ciphers, and support for certificate authentication.
Additional improvements in SSL v3 include better handshake protocol flow and increased resistance to
man-in-the-middle attacks.
Transport Layer Security 5
A vulnerability of the renegotiation procedure was discovered in August 2009 that can lead to plaintext injection
attacks against SSLv3 and all current versions of TLS. For example, it allows an attacker who can hijack an https
connection to splice their own requests into the beginning of the conversation the client has with the web server. The
attacker can't actually decrypt the client-server communication, so it is different from a typical man-in-the-middle
attack. A short-term fix is for web servers to stop allowing renegotiation, which typically will not require other
changes unless client certificate authentication is used. To fix the vulnerability, a renegotiation indication extension
was proposed for TLS. It will require the client and server to include and verify information about previous
handshakes in any renegotiation handshakes.[6] When a user doesn't pay attention to their browser's indication that
the session is secure (typically a padlock icon), the vulnerability can be turned into a true man-in-the-middle attack[7]
This extension has become a proposed standard and has been assigned the number RFC 5746.
There are some attacks against the implementation rather than the protocol itself:
• Most CAs don't explicitly set basicConstraints CA=FALSE for leaf nodes, and a lot of browsers and other SSL
implementations (including IE, Konqueror, OpenSSL, etc.) don't check the field. This can be exploited for
man-in-the-middle attack on all potential SSL connections.
• Some implementations (including older versions of Microsoft Cryptographic API, Network Security Services, and
GnuTLS) stop reading any characters that follow the null character in the name field of the certificate, which can
be exploited to fool the client into reading the certificate as if it were one that came from the authentic site, e.g.
paypal.com\0.badguy.com would be mistaken as the site of paypal.com rather than badguy.com.
SSL v2 is flawed in a variety [8] of ways:
• Identical cryptographic keys are used for message authentication and encryption.
• MACs are unnecessarily weakened in the "export mode" required by U.S. export restrictions (symmetric key
length was limited to 40 bits in Netscape and Internet Explorer).
• SSL v2 has a weak MAC construction and relies solely on the MD5 hash function.
• SSL v2 does not have any protection for the handshake, meaning a man-in-the-middle downgrade attack can go
undetected.
• SSL v2 uses the TCP connection close to indicate the end of data. This means that truncation attacks are possible:
the attacker simply forges a TCP FIN, leaving the recipient unaware of an illegitimate end of data message (SSL
v3 fixes this problem by having an explicit closure alert).
• SSL v2 assumes a single service, and a fixed domain certificate, which clashes with the standard feature of virtual
hosting in webservers. This means that most websites are practically impaired from using SSL. TLS/SNI fixes
this but is not deployed in webservers as yet.
SSL v2 is disabled by default in Internet Explorer 7,[9] Mozilla Firefox 2 and Mozilla Firefox 3,[10] and Safari. After
it sends a TLS ClientHello, if Mozilla Firefox finds that the server is unable to complete the handshake, it will
attempt to fall back to using SSL 3.0 with an SSL 3.0 ClientHello in SSL v2 format to maximize the likelihood of
successfully handshaking with older servers.[11] Support for SSL v2 (and weak 40-bit and 56-bit ciphers) has been
removed completely from Opera as of version 9.5.[12]
Transport Layer Security 6
How it works
[13]
A TLS client and server negotiate a stateful connection by using a handshaking procedure. During this
handshake, the client and server agree on various parameters used to establish the connection's security.
• The handshake begins when a client connects to a TLS-enabled server requesting a secure connection, and
presents a list of supported CipherSuites (ciphers and hash functions).
• From this list, the server picks the strongest cipher and hash function that it also supports and notifies the client of
the decision.
• The server sends back its identification in the form of a digital certificate. The certificate usually contains the
server name, the trusted certificate authority (CA), and the server's public encryption key.
• The client may contact the server that issued the certificate (the trusted CA as above) and confirm that the
certificate is valid before proceeding.
• In order to generate the session keys used for the secure connection, the client encrypts a random number (RN)
with the server's public key (PbK), and sends the result to the server. Only the server should be able to decrypt it
(with its private key (PvK)): this is the one fact that makes the keys hidden from third parties, since only the
server and the client have access to this data. The client knows PbK and RN, and the server knows PvK and (after
decryption of the client's message) RN. A third party is only able to know RN if PvK has been compromised.
• From the random number, both parties generate key material for encryption and decryption.
This concludes the handshake and begins the secured connection, which is encrypted and decrypted with the key
material until the connection closes.
If any one of the above steps fails, the TLS handshake fails, and the connection is not created.
• The client and server then use the random numbers and PreMasterSecret to compute a common secret, called
the "master secret". All other key data for this connection is derived from this master secret (and the client- and
server-generated random values), which is passed through a carefully designed "pseudorandom function".
2. The client now sends a ChangeCipherSpec record, essentially telling the server, "Everything I tell you from now
on will be authenticated (and encrypted if encryption parameters were present in the server certificate)." The
ChangeCipherSpec is itself a record-level protocol with content type of 20.
• Finally, the client sends an authenticated and encrypted Finished message, containing a hash and MAC over
the previous handshake messages.
• The server will attempt to decrypt the client's Finished message, and verify the hash and MAC. If the
decryption or verification fails, the handshake is considered to have failed and the connection should be torn
down.
3. Finally, the server sends a ChangeCipherSpec, telling the client, "Everything I tell you from now on will be
authenticated (and encrypted with the server private key associated with the public key in the server certificate, if
encryption was negotiated)."
• The server sends its authenticated and encrypted Finished message.
• The client performs the same decryption and verification.
4. Application phase: at this point, the "handshake" is complete and the application protocol is enabled, with content
type of 23. Application messages exchanged between client and server will also be authenticated and optionally
encrypted exactly like in their Finished message. Otherwise, the content type will return 25 and the client will not
authenticate.
2. The client now sends a ChangeCipherSpec record, essentially telling the server, "Everything I tell you from now
on will be authenticated (and encrypted if encryption was negotiated)." The ChangeCipherSpec is itself a
record-level protocol, and has type 20, and not 22.
• Finally, the client sends an encrypted Finished message, containing a hash and MAC over the previous
handshake messages.
• The server will attempt to decrypt the client's Finished message, and verify the hash and MAC. If the
decryption or verification fails, the handshake is considered to have failed and the connection should be torn
down.
3. Finally, the server sends a ChangeCipherSpec, telling the client, "Everything I tell you from now on will be
authenticated (and encrypted if encryption was negotiated)."
• The server sends its own encrypted Finished message.
• The client performs the same decryption and verification.
4. Application phase: at this point, the "handshake" is complete and the application protocol is enabled, with content
type of 23. Application messages exchanged between client and server will also be encrypted exactly like in their
Finished message. The application will never again return TLS encryption information without a type 32 apology.
Content type
This field identifies the Record Layer Protocol Type contained in this Record.
Content types
Hex Dec Type
0x14 20 ChangeCipherSpec
0x15 21 Alert
0x16 22 Handshake
0x17 23 Application
Version
This field identifies the major and minor version of TLS for the contained message. For a ClientHello
message, this need not be the highest version supported by the client.
Transport Layer Security 10
Versions
Major Version Minor Version Version Type
3 0 SSLv3
3 1 TLS 1.0
3 2 TLS 1.1
3 3 TLS 1.2
Length
The length of Protocol message(s), not to exceed 214 bytes (16 KiB).
Protocol message(s)
One or more messages identified by the Protocol field. Note that this field may be encrypted depending on the
state of the connection.
MAC and Padding
A message authentication code computed over the Protocol message, with additional key material included.
Note that this field may be encrypted, or not included entirely, depending on the state of the connection.
No MAC or Padding can be present at end of TLS records before all cipher algorithms and parameters have
been negotiated and handshaked, and then confirmed by sending a CipherStateChange record (see below) for
signaling that these parameters will take effect in all further records sent by the same peer.
Handshake protocol
Most messages exchanged during the setup of the TLS session are based on this record, unless an error or warning
occurs and needs to be signaled by an Alert protocol record (see below), or the encryption mode of the session is
modified by another record (see ChangeCipherSpec protocol below).
Byte 22
0
Message type
This field identifies the Handshake message type.
Transport Layer Security 11
Message Types
Code Description
0 HelloRequest
1 ClientHello
2 ServerHello
11 Certificate
12 ServerKeyExchange
13 CertificateRequest
14 ServerHelloDone
15 CertificateVerify
16 ClientKeyExchange
20 Finished
Alert protocol
This record should normally not be sent during normal handshaking or application exchanges. However, this
message can be sent at any time during the handshake and up to the closure of the session. If this is used to signal a
fatal error, the session will be closed immediately after sending this record, so this record is used to give a reason for
this closure. If the alert level is flagged as a warning, the remote can decide to close the session if it decides that the
session is not reliable enough for its needs (before doing so, the remote may also send its own signal).
Byte 21
0
Level
This field identifies the level of alert. If the level is fatal, the sender should close the session immediately.
Otherwise, the recipient may decide to terminate the session itself, by sending its own fatal alert and closing
the session itself immediately after sending it. The use of Alert records is optional, however if it is missing
before the session closure, the session may be resumed automatically (with its handshakes).
Normal closure of a session after termination of the transported application should preferably be alerted with
at least the Close notify Alert type (with a simple warning level) to prevent such automatic resume of a new
session. Signaling explicitly the normal closure of a secure session before effectively closing its transport layer
Transport Layer Security 12
is useful to prevent or detect attacks (like attempts to truncate the securely transported data, if it intrinsically
does not have a predetermined length or duration that the recipient of the secured data may expect).
Description
This field identifies which type of alert is being sent.
20 Bad record MAC fatal Possibly a bad SSL implementation, or payload has been tampered with. E.g., FTP
firewall rule on FTPS server.
43 Unsupported certificate warning/fatal E.g. certificate has only Server authentication usage enabled, and is presented as a client
certificate
ChangeCipherSpec protocol
Byte 20
0
Application protocol
Byte 23
0
Length
Length of Application data (excluding the protocol header, and the MAC and padding trailers)
MAC
20 bytes for the SHA-1-based HMAC, 16 bytes for the MD5-based HMAC.
Padding
Variable length ; last byte contains the padding length.
certificates. Different rules are applied depending on the application protocol or software used.[17]
• Add every virtual host name in the subjectAltName extension. The major problem being that you need to reissue
a certificate whenever you declare a new virtual server.
In order to provide the server name, RFC 4366 Transport Layer Security (TLS) Extensions allow clients to include a
Server Name Indication extension (SNI) in the extended ClientHello message. This extension hints the server
immediately which name the client wishes to connect to, so the server can select the appropriate certificate to send to
the client.
Implementations
SSL and TLS have been widely implemented in several open source software projects. Programmers may use the
OpenSSL, NSS, or GnuTLS libraries for SSL/TLS functionality. Microsoft Windows includes an implementation of
SSL and TLS as part of its Secure Channel package. Delphi programmers may use a library called Indy.
Browser implementations
All the most recent web browsers support TLS:
• Apple's Safari supports TLS, but doesn't say which version.[18]
• Mozilla Firefox, versions 2 and above, support TLS 1.0.[19] As of April 2010, Firefox does not support TLS 1.1 or
1.2.[20]
• Internet Explorer 8 in Windows 7 and Windows Server 2008 R2 supports TLS 1.2.[21]
• As of Presto 2.2, featured in Opera 10, Opera supports TLS 1.2.[22]
See also
• Certificate authority
• Datagram Transport Layer Security
• Extended Validation Certificate
• Multiplexed Transport Layer Security
• Obfuscated TCP
• Public key certificate
• SEED
• Server gated cryptography
• SSL acceleration
• Virtual private network
• X.509
• tcpcrypt
Transport Layer Security 15
Software
• OpenSSL: a free implementation (BSD license with some extensions)
• GnuTLS: a free implementation (LGPL licensed)
• JSSE: a Java implementation included in the Java Runtime Environment
• Network Security Services (NSS): FIPS 140 validated open source library
• PolarSSL: A tiny TLS implementation for embedded devices
• CyaSSL: Embedded SSL/TLS Library with a strong focus on speed and size.
Further reading
• Wagner, David; Schneier, Bruce (November 1996). "Analysis of the SSL 3.0 Protocol" (http://www.schneier.
com/paper-ssl.pdf). The Second USENIX Workshop on Electronic Commerce Proceedings (http://www.
schneier.com/paper-ssl.pdf). USENIX Press.
• Eric Rescorla (2001). SSL and TLS: Designing and Building Secure Systems. United States: Addison-Wesley Pub
Co. ISBN 0-201-61598-3.
• Stephen A. Thomas (2000). SSL and TLS essentials securing the Web. New York: Wiley. ISBN 0-471-38354-6.
• Bard, Gregory (2006). "A Challenging But Feasible Blockwise-Adaptive Chosen-Plaintext Attack On Ssl" (http:/
/citeseer.ist.psu.edu/bard04vulnerability.html). International Association for Cryptologic Research (136).
Retrieved 2007-04-20.
• Canvel, Brice. "Password Interception in a SSL/TLS Channel" (http://lasecwww.epfl.ch/memo/memo_ssl.
shtml). Retrieved 2007-04-20.
• IETF Multiple Authors. "RFC of change for TLS Renegotiation" (http://tools.ietf.org/html/rfc5746). Retrieved
2009-12-11.
External links
• SSL 2 specification (http://www.mozilla.org/projects/security/pki/nss/ssl/draft02.html) (published 1994)
• SSL 3.0 specification (http://www.freesoft.org/CIE/Topics/ssl-draft/3-SPEC.HTM) (published 1996)
• Netscape's final SSL 3.0 draft (1996) (http://www.mozilla.org/projects/security/pki/nss/ssl/draft302.txt)
• The IETF (Internet Engineering Task Force) TLS Workgroup (http://www.ietf.org/html.charters/tls-charter.
html)
• SSL tutorial (http://www2.rad.com/networks/2001/ssl/index.htm)
• OpenSSL thread safe connections tutorial with example source code (http://ardoino.com/
40-openssl-thread-safe-secure-connections/)
• ECMAScript Secure Transform (Web 2 Secure Transform Method) (http://www.semnanweb.com/
ecmast-ecmascript-secure-transform/)
• OWASP: Transport Layer Protection Cheat Sheet (http://www.owasp.org/index.
php?title=Transport_Layer_Protection_Cheat_Sheet)
• A talk on SSL/TLS that tries to explain things in terms that people might understand. (http://computing.ece.vt.
edu/~jkh/Understanding_SSL_TLS.pdf)
• Simple overview of TLS/SSL, how they work, and their benefits (http://luxsci.com/blog/
how-does-secure-socket-layer-ssl-or-tls-work.html)
• SSL versus TLS – What's the difference? (http://luxsci.com/blog/ssl-versus-tls-whats-the-difference.html)
• SSL: Foundation for Web Security (http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_1-1/
ssl.html)
This article was originally based on material from the Free On-line Dictionary of Computing, which is licensed
under the GFDL.
Article Sources and Contributors 17
License
Creative Commons Attribution-Share Alike 3.0 Unported
http:/ / creativecommons. org/ licenses/ by-sa/ 3. 0/