beautypg.com

Secure socket layer (ssl), Introduction, Ssl overview – Brocade Virtual ADX Security Guide (Supporting ADX v03.1.00) User Manual

Page 109: Public key infrastructure, Chapter 6

background image

Brocade Virtual ADX Security Guide

97

53-1003250-01

Chapter

6

Secure Socket Layer (SSL)

Introduction

Brocade Virtual ADX supports integrated software-based SSL. This chapter describes how to
configure a Brocade Virtual ADX for SSL in SSL Termination mode.

SSL support on the Brocade Virtual ADX includes support for SSLv2, SSLv3, and TLS1.0.

SSL overview

The Secure Sockets Layer (SSL) protocol was developed by Netscape to provide security and
privacy between client and server over the Internet. SSL supports server and client certificate
verification, allowing protocols such as HTTP, FTP, and Telnet to be run on top of the verification
process. SSL negotiates encryption keys and authenticates the server before data is exchanged by
higher-level applications.

The SSL "handshake" is a key concept in this protocol. The handshake consists of two phases:
server authentication, and an optional client certificate verification. In server authentication, the
server sends its certificate and cipher preferences to a client that has made a request. The client
then generates a master key, encrypts it with the public key of the server, and returns the
encrypted master key to the server.

The server recovers the master key and authenticates itself to the client by returning a message
encrypted with the master key. Subsequent data is encrypted and authenticated with keys derived
from this master key. In the client certificate verification phase (which is optional), the server sends
a challenge to the client, who authenticates itself to the server by returning a digital signature with
its public-key certificate.

A variety of cryptographic algorithms are supported by SSL. During the "handshaking" process, the
DSA public-key cryptosystem is used. After the exchange of keys, a number of ciphers are used that
include RC4 and triple-DES for data encryption, and the SHA-1 and MD5 digest algorithm for
message authentication.

Public key infrastructure

In cryptography, a public key infrastructure (PKI) is an arrangement that provides for trusted third
party vetting of, and vouching for, user identities. It also allows binding of public keys to users. This
is usually carried out by software at a central location, together with other coordinated software at
distributed locations. The public keys are typically in certificates.

The term PKI may mean both the certificate authority and related arrangements as well as, more
broadly (which can sometimes be confusing), the use of public key algorithms in electronic
communications. The latter meaning is erroneous since PKI methods are not required to use public
key algorithms.