Time
10 hours 28 minutes
Difficulty
Advanced
CEU/CPE
15

Video Description

This lesson focuses on Secure Socket Layers (SSL). Clients can encrypt a public key with a session key so secure key distribution occurs. This is asymmetric key exchange, secure data exchange which creates a secure channel. It is important to remember that most people are very desensitized to error messages and just click on cancel, but these messages can actually help to discover what issues are within a system.

Video Transcription

00:04
So here's how this is working. Like I said, I think really the best way to see this street used something like SSL.
00:11
Okay, so in, of course S S L T l s really is what we're primarily using but the same ideas. Stuart's the same one. All right, So let's say that we have a server, maybe a Web server for Bank Bank of America.
00:27
And I have a client who's trying to make a secure connection
00:31
so that client's gonna initiate a secure connection. Using a CPS is it's protocol hypertext transfer protocol secure. And when that secure says is that tells faith America, we want to set up a secure connection so brave American needs to send the client the public eats.
00:49
So I'll call this guy the client.
00:52
We'll be talking about BankAmerica's the server. So basically, this s says, Hey, server, shouldn't your public eat?
01:00
Now? Remember, there is nothing secret about a public key.
01:04
Bank of America will happily send them their own public e.
01:10
So by America comes that with thanks America's public key.
01:14
Now,
01:15
technically,
01:17
we could go with this public key Now, when the client wants to sense something secret Bank of America. It could use Bank America's public. He do so and that's true.
01:26
But then what? One Bank of America used to send information to the client?
01:32
Well, the client doesn't have a public key. There's nobody that's given the flying public. He it may or may not have one.
01:38
And even if that were the case, each individual message would be encrypted. Something different, very cumbersome in a lot of overhead.
01:47
So this is the first step.
01:49
This is the second step.
01:51
But here's where things get interesting. That's a cell
01:55
with the third sick. The client will generate
02:00
a symmetric
02:01
sessions.
02:04
Okay, so this client specifically finds Web browser generates its heat.
02:09
We'll say that he is 8439 now, obviously being much longer key. But just for brevity, say we're saying that's the symmetric key to client Generate?
02:20
Well, it cost the client generated it.
02:23
The client knows key. It's the one that came up,
02:27
but with symmetrical Thomas. See, the trouble is how I get this key
02:31
to the Bank of America Server.
02:35
Bank of America server. That's the problem with symmetric rooftop.
02:38
So what about
02:42
is the client
02:44
in crypts session
02:46
with servers.
02:49
How lucky
02:50
were encrypting a key with the Maquis?
02:53
So I've asked making America for the public e They give it to me
02:57
and I take the America's public key,
03:00
and I use that to grip the session key that I've just generated.
03:04
Now that session keys encrypted with Bacon, America's public.
03:07
What's the only thing that can decrypt
03:10
Bank of America's problems?
03:13
So what I've done is after a security key castration
03:17
by using asymmetric cryptography.
03:22
Why, so that I could get a symmetric he distributed between two parties. And once I have that submission that symmetric he distributed. Now I have symmetric battle takes shape
03:37
that's desirable with the symmetric. Cryptography is fast, and we don't know how much data there is to be shaped.
03:45
This is a very, very common idea.
03:49
Asymmetric.
03:51
He should
03:53
cement tree damage
03:54
cement, keep Shane.
03:57
That's right. A pleasure keeps change, symmetric that exchange, and we sometimes refer that is, having a secure channel set up
04:04
because it's ultimately everything
04:08
that is transmitted that it's encrypted with session key. So it's like we're both connected on the same channel, and only these two parties know what channel the tune into
04:17
that's what's called Secure Channel. But the idea is, I've used asymmetric cryptography to exchange keys specifically to exchange the session key. Now I could do some metric that exchange very, very common Nike with different geography. Let's use a cement itself the problems that we had.
04:38
But ultimately what we really want to do is symmetric
04:41
***,
04:42
and you see this best in an SSL.
04:45
Now
04:46
we have one more consideration to make with this, but I really want to make sure that this makes sense because against such a foundational principle,
04:57
so asymmetric key exchange cement your dad extra.
05:00
But here's the problem with this.
05:02
When the client says, Hey, Bank of America, I want a secure connection.
05:09
What's to keep somebody from intercepting that very stepping in and saying,
05:14
I'm back America and here's my peak.
05:17
The answer is right now. No, there's nothing that prevents that because, as you may have noticed, we don't have any built in authenticity to this. I ask Bank of America for a public E. Somebody comes back and says, We have public eat.
05:32
It could be an impersonator for all I know, and then everything I'm sending to that impersonators encrypted with their public Keep.
05:40
So what? I mean, is it this step? I need some assurance. I need some authenticity.
05:47
Okay.
05:48
And here shall that authenticity comes
05:51
prior to Bank of America ever being Webster,
05:56
a Bank of America is deciding. Hey, we wanna have a Web presence 30 years ago or however long good
06:03
what Bank of America did
06:05
and really specifically somebody representing the Bank of Miracle Web server
06:12
Weird
06:14
to a company like beer sign.
06:15
Their sign is a c A.
06:18
And see a stands for certificate authority.
06:23
Just get it working.
06:25
And I choose bear sign because they're very well respected in the industry. Most folks have heard of Verizon. If you haven't, you may have heard of thought Or Baltimore,
06:34
uh, trust they're just a bunch of them. But this being certificate authority that most people respect, all right. A representative from BankAmerica showed up at the beer sign office in person,
06:48
provided that with the driver's license, credit card information, financial information on the bed, credit records, all of that stuff.
06:58
And they have proved that they are a legitimate organization. Thanks, America,
07:03
In exchange for that, what Bank of America did I'm sorry. What Verizon did
07:11
is they gave BankAmerica.
07:14
Now what's on that certificate?
07:15
Well, first of all, the name Bank of America. And if you've ever connected to a server with a secure connection and you've been here a message saying something like the name on the certificate does not match the name you entered,
07:30
so there's going wrong with that piece of it.
07:31
Now what else is on there?
07:34
Well, an expiration date.
07:36
Class numbers, because the class and certificate will indicate Hey, this is authorized to be banking.
07:43
Where's another tough certificate? May not have that high degree of authorization, a serial number
07:48
and the public key.
07:50
So it's the certificate authority that binds a publican private key pair
07:57
to the identity of surfing. Vera Sign says Bank of America is public. He 8767530 no,
08:07
whatever that might be.
08:09
But how I know it really comes from theirs and how I know that it comes from their son that hasn't been modified in trades. We already know the answer to that.
08:16
How do we know this certificate hasn't been modified with a spear sign? Do before it gives it to Bank of America.
08:24
It hash is here and to the entire
08:26
well, have a line. Looking from Verizon.
08:30
What is fair signing? Crypto hash? Shouldn't crypto hash
08:35
with the certificate authority
08:37
certificate. Authorities
08:39
private.
08:41
If I've been decrypt that hash with Verizon's public key,
08:46
I know it came from Paris on
08:48
hash. This certificate of my cash matches the hash on there. I know it hasn't been months, so this just continues to build on the principles we talked about.
08:58
Okay, so this happened years ago.
09:01
Baby America has a certificate. So when I say hey, server Cindy, your call a key Bank of America doesn't just send a string of characters back over the line. Anybody could do that
09:13
instead,
09:16
what Bank America does sends me their certificate in. That certificate, of course, contains their public key. But because it's essentially signed by trusted authority like Verizon, I have that gear and tea. And let me just say there are no guarantees in this world of death and taxes. So
09:35
when I say 30 I mean we get a good, solid, reasonable assurance
09:39
that that really is Bank of America because they're able to give me a certificate signed by someone I trust that says this is America and here's their public e.
09:50
So this is really just building on the ideas that we talked about.
09:56
What makes all this necessary or what makes all this possible
10:01
is a P k I
10:03
public
10:05
key infrastructure
10:07
and that public key infrastructure says we must have a certificate of authority and it's not cheap or easy to set up a series of certificate authorities.
10:16
There's not just a single, very signed certificate authority, right
10:20
tons of your signed certificate, authorities,
10:24
the process of being America having, um, age to query
10:28
this certificate authority their side and say, Hey, I need a certificate.
10:31
Me is applying. Having software to understand certificates means applying it, being able to check and see if Bass America's certificate has been revoked.
10:41
And one of the ways that used to be handled
10:43
is by me contacting the issue of authority and say, Hey, can you send me your certificate revocation list? So when you talk about bringing public and private keys in here,
10:56
uh, in asymmetric cryptography, there's a lot that has to happen. This isn't cheap or easy.
11:03
You need your ticket authorities, you need certificates. You need a way to buying those two users. Ivy's You need to have fusion applications and protocols that understand certificates
11:13
in Petain. Public Key is
11:20
so It's not easy to make this work,
11:22
not to mention the fact that we've got to find some way to make sure the client has fierce on
11:30
and all those other certificate authorities.
11:33
So we've got quite a bit that's going on here that's necessary in order to make this work.
11:39
Now, we'll refer to their son as a trusted authority.
11:43
And yet here signs will know they've been in the business for a long time. People knew steps that go through in order to verify, think America's identity, for they never give a certificate. But when we talk about trust, it's actually much more than this.
12:00
We talked about trusting their sign with that really means trust
12:07
really means I have the certificate authorities
12:11
public. So when I say I trust their son, that means I have very signs couple keep
12:18
and how I got there signs public key,
12:22
uh, was that within my browser,
12:26
it's automatically been living for
12:28
essentially, I'm trust fear sign
12:31
because Microsoft says thou shalt trust fear, sign and As a matter of fact, if we do
12:37
open up our browser, okay. So as I mentioned just a minute it when we say that we trust a certificate authority,
12:45
what that really means is that in our Web browser, we've essentially been told to trust and the way I'll just open up the next floor that's very commonly used.
12:58
So again, essentially trust because Mike yourself says to trust
13:03
so loaded into our Web browser, we have trusted certification authorities
13:07
and you can see many of theirs. Did you, sir, go, Daddy? Of all things
13:15
I thought so on but their spirits on. And if I open up that certificate that's automatically populated in my browser, by the way we see how the hash on rhythm is shot one. Just like we expect.
13:28
R. S A is an asymmetric algorithm that creates the signature for us.
13:33
But as I scroll down to see a zay scroll down,
13:41
there's the public key of their side
13:45
so that public key is in my Web browser, and it's this public key
13:50
is able to decrypt the hash on the certificate. Then I know that certificate was issued by their song.
13:56
If the hash that I produced matches the hash of the certificate. I know it hasn't been modified,
14:03
so the real meaning of the certificate is that it's signed by trusting authority.
14:07
It was signed by somebody else that may be a rogue CIA, or it may not be your alive.
14:13
So essentially what happens is Microsoft says these were distributed authorities we deem to be relied. Well, that's fine. But in a more secure environment, what we would likely do is remove every one of these and on Lee, populate them with ones that we feel are trustworthy.
14:33
This may be shocking, but we may not always
14:37
trust Microsoft's judgment for security purposes. Who went the reality that sink in with shock and all settle just for a few minutes.
14:46
But the bottom line is, any time you allow things to happen automatically, you know you give up some control for ease of use updates so very important to keep your system up today.
14:58
But calls sometimes thes updates, push out fraudulent certificate. Authorities were certificate authorities that have been compromised. Did you know Tara had a compromise last year? They were out of his is a very, very short period of time. So basically, this is a weight pushing out and say, Wait, the trustees
15:16
and you'll also see ones that look legitimate, like, uh,
15:20
Microsoft, Google or whatever. But ultimately, their fraudulent certificates now also mentioned that within my environment, let's say that Eyes Instructor wanted to set up a Web server. And I want all my students to be able to connect in,
15:39
download this room the whole work securely.
15:43
Well, I can certainly do that. But the problem with that is, if you're gonna be able to connect to be securely using SS allergy, unless I need a certificate
15:54
well, very side in a certificate you're saying with The problem with that is I'm too cheap to go to their side and get a certificate because the certificate from fair Sign could cost hundreds or even thousands of dollars not gonna happen.
16:08
So what? I could do this. I could set up my own certificate of authority,
16:11
and I could issue certificates. Kelly's Webster. Now, that's kind of an environment where
16:17
I vouch for myself, if you know what I mean. This is Kelly's Web server because Kelly says it's Kelly's Webster.
16:23
You would never want to do something like that for with the strings actions. But for an internal office environment, why not set your own P K I?
16:33
Well, there's over head with it,
16:37
but it may save your money overboard. Move here, sign it may give you greater
16:42
greater control, greater security. So if I do have a certificate authority,
16:47
and I want you to trust that, see, A every Web browser has the option where you could enforce certificates into the Web browser or even better, after we push that out with policy and group policy will talk about some this week because it's just a quick, easy way to push out software to push out certificates or configuration seven.
17:07
So I've been set up in internal chaos.
17:10
Well, when somebody tries to connect to that Web server, they're gonna get the certificate message
17:15
a word of caution. We are so desensitized to error messages and morning messages.
17:22
Often when someone gets a security warning saying you know the certificate authority that is signed, the certificate untrusting
17:30
or the name on this certificate does not match to the and you typed in
17:34
most people stop process goes like this.
17:38
What is the first Latin. I can click on to make this pesky air message go away.
17:44
So I think hurry upsetting my credit card to some unknown stranger on the Internet.
17:48
And that's really what's happening with people go off cancelled.
17:52
I started this business 20 years ago working help. This
17:56
used to drive me crazy. You'd show up but somebody's desk and they'd say, or they call you. I'm getting this weird air A message. What was it? What did it say? I get my pencil ready to write it down alive, although I should cancel.
18:11
You know, we're so desensitized to these fear messages every now and then that you're a message might actually figure help you figure out what's going on.
18:21
But the bottom line is, we're allowing their users become so desensitized. I can't tell you how many times I've seen the network admin say, Just play. Cancel that air message. Don't worry about it.
18:33
Well, that's okay. Except now the user in their mind they security messages or be cancelled out.
18:41
What they are enforcing training their employees to do is disregard security messages. That's dangerous. That's a problem. That is a flaw in the things that we do.
18:55
I said My piece. That's just my little soapbox. I'd like to get on because so many times his network at
19:03
for the sake of expediency were miss training or or trading
19:11
are. So That's the essential nature of certificates. When a server gives you their public key, you need to know that that servers public, he really is legitimate.
19:22
Who did it come from? Who says that's bank miracles public? Why do I trust that?
19:26
Well, we have trusted certificate authorities than trust of the certificate is only as good as the trust of the authorities
19:34
and the trust of the public keeping is only as good as the trust.
19:38
So all this stuff that we build on with Krypton you just builds and builds and builds, and it's what comes together to make a couple.
19:48
That was years,
19:51
and I would certainly expect civil certificate questions on me, Sam, because it is very about
19:56
section
19:59
one of the saying, I inventions that. So I go to Bank America's A client, and I say, Give me your niche.
20:06
Bank America comes back and tells me they're searching. Send me back
20:11
what as a client I should do is say, Hang on, Bank America, Let me go check and make sure the certificate has not been revoked.
20:22
Now, I mentioned you guys earlier A list called krill, The C r l.
20:27
And that stood for certificate
20:30
revocation. I also So I want you to know that after him I also want you to know the acronym O. C s
20:40
online certificate status.
20:44
And that's the protocol that streamlines the ability
20:49
to verify if
20:52
a certificate has been.
20:56
And I know I'm right at the bottom with war may not be ableto read my handwriting, so O. C s online certificate status
21:07
online should get says for the whole purpose of this is to make it easier for clients to check whether an honest little bit has been with and that's a configuration setting in your Web browser. And for a long time, it was a very cumbersome process. So clients never even checked to see if the certificate has been revoked.
21:26
It's like if you were gonna speaking,
21:29
the police officer pulls you over and looks at your driver's license. Just because you have a driver's license doesn't mean it's a valid.
21:36
That officer should always go back to the car called it in the driver's license. Make sure it hasn't been suspended. Vote, say my field certificates. So online certificate satisfy protocol makes it easier for clients to check and see if the certificate has been with
21:52
now. That's quite a bit of information with a public key public infrastructure certificate. Authorities have some of that work. This is something that is testable. Certainly, obviously this expensive. I'm on it. You really want with you this material and make sure that you're solid.
22:11
There's so many things that we'll just talk about matter exactly
22:14
moving for her bro's. Or later we will talk that DNA said. Or a little further in SSL. Whatever. So many things that we do are gonna just require that you haven't understand symmetric versus a SIM entry
22:30
certificates, public key infrastructure. So I would encourage you before you move for really to review that section is very important

Up Next

CompTIA CASP

In our online CompTIA CASP training, you will learn how to integrate advanced authentication, how to manage risk in the enterprise, how to conduct vulnerability assessments and how to analyze network security concepts and components.

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor