Appendix B. The SSL/TLS Protocol

This appendix describes the SSL Version 3.0 protocol introduced in Chapter 5. It gives a general overview of the protocol that’s appropriate for a semi-technical audience.

The Internet Engineering Task Force (IETF) Transport Layer Security (TLS) working group was established in 1996 to create an open stream encryption standard. The group began working with SSL Version 3.0 and, in 1999, published RFC 2246. “TLS Protocol Version 1.0” RFC 2712 adds Kerberos authentication to TLS. RFC 2817 and 2818 apply to TLS using HTTP/1.1.

TLS is a general-purpose protocol for encrypting web, email, and other stream-oriented information sent over the Internet. But while TLS may eventually supersede SSL, it could be years before this happens. Even once TLS becomes widely used, people may still call it SSL by sheer force of habit.

The charter for the TLS working group can be found at http://www.ietf.org/html.charters/tls-charter.html.

History

The SSL protocol was designed by Netscape Communications for use with Netscape Navigator. Version 1.0 of the protocol was used inside Netscape. Version 2.0 of the protocol shipped with Netscape Navigator Versions 1 and 2. After SSL 2.0 was published, Microsoft created a similar secure link protocol called PCT (described briefly in Chapter 5) that it claimed overcame some of SSL 2.0’s shortcomings. However, PCT generally annoyed the rest of the industry, which claimed that Microsoft wasn’t interested in working with standards bodies and was more interested in doing things its own way. The advances of PCT were incorporated into SSL 3.0, which was used as the basis for the TLS protocol developed by the IETF.

The TLS protocol is arranged in two layers:

  • The TLS Record Protocol, which is responsible for transmitting blocks of information called records between the two computers.

  • The TLS Handshake protocol, which manages key exchange, alerts, and cipher changes.

These two layers are built on top of a third layer, which is not strictly part of SSL:

  • The data transport layer (usually TCP/IP)

These layers are illustrated in Figure B-1.

SSL layers

Figure B-1. SSL layers

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.135.221.0