diff --git a/_posts/2015-01-01-Ireland-Log.html b/_posts/2015-01-01-Ireland-Log.html old mode 100755 new mode 100644 diff --git a/_drafts/TLS_Writeup2.html b/_posts/2015-11-10-TLS-Part-2.html similarity index 51% rename from _drafts/TLS_Writeup2.html rename to _posts/2015-11-10-TLS-Part-2.html index 8629a9b..0e81c50 100644 --- a/_drafts/TLS_Writeup2.html +++ b/_posts/2015-11-10-TLS-Part-2.html @@ -15,16 +15,62 @@ examination of certificates, cipher suites, and public-key authentication.

-

Certificates

-

A certificate is a vessel for a server to provide authentication - information.

+

Certificates

+

A certificate is a vessel for a domain to provide authentication + information. More specifically, and perhaps most importantly, a certificate + is the package which transfers a key. TLS relies entirely upon Public-Key + Authentication to setup a secure connection. The challenge with Public-Key + Authentication is often sharing keys in a verifiable and secure manner. + This is to say that, despite public keys being public, you still need to + verify the owner of the key. This is where certificates, and Certificate + Authorities come in. Each certificate is tailored to a specific domain. It + includes not only the public key for a user to connect to the server with, + but also meta-data about the certificate: a UUID, and information about the + Certificate Authority; a signature authorizing the certificate, as well as + the encryption used for the signature; a thumbprint of the key, and details + of the algorithm used to hash the key; and a purpose for the certificate. + Certificates may contain additional details, but the aforementioned list is + required.

-

Cipher Suites

-

A cipher is the algorithm used to encrypt the information - to be transmitted.

+

A Certificate Authority (CA) is a trusted third-party repository of + signed keys. The purpose of a CA is very specific: verification. A CA will + generate and issue a key-pair to a domain. The domain can then share the + public key using a certificate. How specifically a CA verifies the domains + and keys is out of scope of this discussion, but Wikipedia provides many + details on the techniques used.

+ +

Cipher Suites

+

A cipher is the algorithm used to encrypt information. Ciphers are + incredibly complex mathematical formulae, and are well beyond my + understanding. However, it is important to note that the strength of a key + is only as strong as the cipher suite used to generate it. Likewise, the + strength of a certificate is only as strong as the cipher used to sign + it. Keep this in mind when you generate and work with keys.

Public-Key Authentication

-

Big topic, very important!

+

The most important part of TLS is public-key authentication. I would + argue that public-key authentication is one of the most important facets of + the technical world. Because of this, I want to recap in more general terms + how public-key authentication works:

+ +
    +
  1. Two parties want to establish a secure connection.
  2. +
  3. Each party generates two keys: one to share publicly, one to keep + secret.
  4. +
  5. Each party then shares their public keys.
  6. +
+ +

Now, whenever one of the two parties wants to securely communicate with + the other, they "sign" (encrypt) the communication with their private key. + The second party can then use the public key of the first party to verify + the identify of the sender, and decrypt the message. + +

Conclusion

+

Security is a very deep and involved topic, but one I feel every + Sys-Admin should know a bit about. While these posts are only meant to serve + as a high-level overview of TLS, there are many more-detailed sources + available. I would suggest a visit to your local Wikipedia as a good first + step. Thanks for reading.

Sources

    @@ -49,7 +95,7 @@