HTTPS权威指南:在服务器和Web应用上部署SSLTLS和PKI (英文版)
BulletproofSsLandtls
byIvanRistic
Copyright@2014FeistyDuckLimited.Allrightsreserved
Publishedinaugust2014
ISBN:978-1-907117-04-6
FeistyDuckLimited
www.feistyduck.com
contact@feistyduck.com
addresss
6Acanthacourt
Montpelierroad
Londonw52QP
UnitedKingdom
Productioneditor:JelenaGiric-Ristic
Copyeditor:Melindarankin
Allrightsreserved.Nopartofthispublicationmaybereproduced,storedinaretrievalsystem,ortransmitted,inanyformor
byanymeans,withoutthepriorpermissioninwritingofthepublisher
Theauthorandpublisherhavetakencareinpreparationofthisbook,butmakenoexpressedorimpliedwarrantyofanykind
andassumenoresponsibilityforerrorsoromissions.Noliabilityisassumedforincidentalorconsequentialdamagesincon
nectionwithorarisingoutoftheuseoftheinformationorprogramscontainedherein
FeistyduckDigital
Bookdistribution
vw.feistyduck.com
Licensedfortheexclusiveuseof
RichardFussenegger
Tableofcontents
Preface
Scopeandaudience
Contents
XV
SSLversustls
Onlineresources
Feedback
Abouttheauth
Acknowledgments
1.SSL,TLS,andCryptography
TransportLayerSecurity
Networkinglayers
Protocolhistor
Cryptography
Buildingblocks
Protocols
AttackingCryptography
16
Measuringstrength
Man-in-the-Middleattack
18
2.Protocol
23
Recordproto
24
Handshakeprotocol
25
Fullhandshake
26
Clientauthentication
Sessionresumption
34
KeyExchange
RSAKeyexchange
38
Diffie-HellmanKeyexch
EllipticCurveDiffie-HellmanKeyExchange
40
Authentication
41
Encryption
42
StreamEncryption
Blockencryptio
AuthenticatedEncryption
44
Renegotiate
ApplicationDataprotocol
47
Alertprotocol
Connectionclosure
47
CryptographicOperations
48
Pseudorandomfunction
Mastersecret
CipherSuite
49
Extensions
ApplicationlayerprotocolNegotiation
CertificateTransparency
EllipticCurvecapabilities
Heartbeat
NextprotocolNegotiation
56
SecureRenegotiation
57
Servernameindication
57
Tickets
Signaturealgorithms
OCSPStapling
Protocollimitations
Differencesbetweenprotocolversions
TLS1.0
TLS1.1
TLS1.2
3.Public-KeyInfrastructure
63
InternetpKi
Standards
Certificate
66
Certificatefields
67
Certificateextensions
68
Certificatechains
71
Relyingpa
72
Certificationauthorities
Certificatelifecycle
Revocation
Weaknesses
RootKeycompromise
46690
EcosystemMeasurements
Improvements
4.AttacksagainstPKI
87
VerisignmicrosoftCode-SigningCertificate
Thawteloginlive.com
StartComBreach(2008
CertStar(Comodo)Mozillacertificate
RapidsslrogueCAcertificate
88892
Chosen-Prefixcollisionattack
ConstructionofCollidingCertificates
Predictingtheprefiⅸx
WhathappenedNext
Comodoresellersbreaches
StartComBreach(2011)
Diginota
PublicDiscovery
Fallofacertificationauthority
Man-in-the-Middleattacks
Comodohackerclaimsresponsibili
DigiCertsdn.bhd
Flame
FlameagainstWindowsUpdate
FlameagainstWindowsTerminalServices
FlameagainstMD5
TURKTRUST
109
5.Httpandbrowserissues
13
Sidejacking
113
Cookiestealing
CookieManipulation
UnderstandinghttPCookies
Cookiemanipulationattacks
118
npa
Mitigation
122
eSLStripping
123
MITMCertificates
125
CertificateWarnings
126
WhySoManyInvalidCertificates?
EffectivenessofCertificateWarnings
Click-ThroughWarningsversusExceptions
Mitigation
SecurityIndicators
131
MixedContent
Rootcauses
134
Impact
Browsertreatment
Prevalenceofmixedcontent
668
Mitigation
Extendedvalidationcertificates
140
Certificaterevocation
141
Inadequateclient-Sidesupport
141
KeyIssueswithRevocation-CheckingStandards
142
Certificaterevocationlists
Onlinecertificatestatusprotocol
146
6.ImplementationIssues..........................
..151
Certificatevalidationflaws
152
Libraryandplatformvalidationfailures
152
Applicationvalidationfailures
HostnamevalidationIssues
156
Randomnumbergeneration
158
netscapeNavigator(1994)
158
Debian(2006
InsufficientEntropyonEmbeddedDevices
Heartbleed
Impact
Mitigation
ProtocolDowngradeattacks
165
Rollbackprotectioninssl3
Interoperabilityproblems
67
VoluntaryProtocolDowngrade
Rollbackprotectionintls1.0andbetter
171
AttackingVoluntaryProtocolDowngrade
172
Modernrollbackdefenses
172
TruncationAttacks
173
TruncationAttackHistory
175
CookieCutting
175
DeploymentWeaknesses
177
Virtua|Hostconfusⅰon
TLSSessionCacheSharing
178
7.Protocolattacks
181
InsecureRenegotiation
181
WhyWasrenegotiationInsecure
182
TriggeringtheWeakness
AttacksagainstHttp
AttacksagainstotherProtocols
87
nsecureRenegotiationIssuesIntroducedbyarchitecture
Impact
Mitigation
Discoveryandremediationtimeline
BEAST
191
Howtheattackworks
Client-Sidemitigation
195
Server-SideMitigation
History
198
Impact
CompressionSidechannelattacks
HowtheCompressionOracleWorks
201
HistoryofAttacks
203
CRIME
MitigationofAttacksagainstTLSandSPDy
212
MitigationofAttacksagainsthttPCompression
213
PaddingOracleattacks
214
WhatIsapaddingoracle?
AttacksagainstTLS
215
Impact
216
Mitigation
RC4Weaknesses
218
KeyschedulingWeaknesses
218
EarlySingle-ByteBiases
219
Biasesacrossthefirst256Bytes
Double-ByteBiases
Mitigation:RC4versusBEASTandLucky13
222
TriplehandshakeAttack
Theattack
224
Impact
Prerequisites
232
DualEllipticCurveDeterministicRandombitGenerator
232
8.Deployment
235
Ke
35
Keyalgorithm
Keysize
KeyManagement
237
Certificate
CertificateType
238
Certificatehostnames
239
CertificateSharing
Signaturealgorithm
240
Certificatechain
240
Revocat
Choosingtherightcertificateauthority
241
ProtocolConfiguration
243
CipherSuiteConfiguration
244
Serverciphersuitepreference
244
CipherStrength
244
Forwardsecrecy
244
Performance
245
Interoperability
246
ServerConfigurationandarchitecture
246
Sharedenvironments
VirtualSecureHosting
247
Sessioncaching
247
Complexarchitectures
248
IssueMitigation
249
Renegotiation
249
BeasT(Http)
249
CrimE(htTP)
250
Lucky13
250
RC4
250
TiMeandbreach(Http)
251
Triplehandshakeattack
252
Heartbleed
252
Pinning
253
Http
MakingFullUseofEncryl
Cookiesecurity
254
Backendcertificateandhostnamevalidation
254
HttpStrictTransportSecurity
254
ContentSecurityPolicy
255
ProtocolDowngradeprotection
255
9.PerformanceOptimization............
257
LatencyandConnectionmanagement
258
TCPOptimization
259
Connectionpersisten
260
Spdy,Http2.0,andbeyond
262
ContentDeliveryNetworks
TLSProtocolOptimization
265
KeyExchange
265
Certificates
RevocationChecking
271
SessionResumption
272
TransportOverhead
273
SymmetricEncryption
275
TLSRecordBufferingLatency
277
Interoperability
279
Hardwareacceleration
279
Denialofserviceattacks
KeyExchangeandencryptioncPucosts
281
Client-InitiatedRenegotiation
OptimizedtLsDenialofServiceAttacks
10.HSTS,CSP,andpinning
日日日
HttpStrictTransportSecurity
ConfiguringHSTS
286
Ensuringhostnamecoverage
Cookiesecurity
Attackvectors
RobustdeploymentChecklist
BrowserSupport
291
PrivacyImplications
293
X
用户评论