Title: Jennifer. Brad's public. key. Angelina. Man in the middl
1Chriss Top Ten Security Tips
2Me
- Securing large enterprise applications
- Developer
- ISO 27001 Lead Auditor
310.What is an X509 certificate?
410.What is an X509 certificate?
Message
Jhbsx8
Encrypt
Decrypt
Message
510.What is an X509 certificate?
Public
Message
Jhbsx8
Encrypt
Private
Decrypt
Message
610.What is an X509 certificate?
Public
Message
Jhbsx8
Encrypt
Private
Decrypt
Usually includes encryption of symmetric key!
Message
710.What is an X509 certificate?
810.What is an X509 certificate?
Private key
Certificate store
910.What is an X509 certificate?
Private key is the essential component!
Private key
Certificate store
1010.What is an X509 certificate?
- Local machine
- Certificates used by system
- Demo uses Network Service
- Current user
- Logged on user
- Permissions have to be granted for other users to
access private keys
119.What is a PKI?
129.What is a PKI?
Jennifer
Brad
139.What is a PKI?
Jennifer
Brad
Brads public key
149.What is a PKI?
Jennifer
Brad
Encrypts message
Kvhdxa 6e6t4g
Brads public key
159.What is a PKI?
Jennifer
Brad
Kvhdxa 6e6t4g
Message sent
Brads public key
169.What is a PKI?
Jennifer
Brad
Decrypts
Brads public key
Message Stuff
Brads private key
179.What is a PKI?
Jennifer
Brad
Angelina
Man in the middle attack
189.What is a PKI?
Jennifer
Brad
Brads public key
Angelina
Man in the middle attack
199.What is a PKI?
Jennifer
Brad
Angelinas public key
Angelina
Brads public key
Man in the middle attack
209.What is a PKI?
Jennifer
Brad
Encrypts message
Gvvwh 336fwd
Angelinas public key
Angelina
Brads public key
Man in the middle attack
219.What is a PKI?
Jennifer
Brad
Sends message
Gvvwh 336fwd
Angelinas public key
Angelina
Brads public key
Man in the middle attack
229.What is a PKI?
Jennifer
Brad
Message stuff
Angelinas public key
Angelinas private key
Decrypts message
Angelina
Brads public key
Man in the middle attack
239.What is a PKI?
Jennifer
Brad
Message New
Angelinas public key
Changes message
Angelina
Brads public key
Man in the middle attack
249.What is a PKI?
Jennifer
Brad
Hjbsxa687 svscv
Angelinas public key
Encrypts Using Brads public key
Angelina
Brads public key
Man in the middle attack
259.What is a PKI?
Jennifer
Brad
Hjbsxa687 svscv
Angelinas public key
Sends message
Angelina
Brads public key
Man in the middle attack
269.What is a PKI?
Brad decrypts Using his Private key
Jennifer
Brad
Message New
Angelinas public key
Angelina
Brads public key
Man in the middle attack
279.What is a PKI?
CA
Jennifer
Brad
Brads public key
289.What is a PKI?
CA
Digitally signs
Jennifer
Brad
Brads public key
299.What is a PKI?
CA
Trust
Trust
Digitally signs
Jennifer
Brad
CA cert Placed in cert store
CA cert Placed in cert store
Brads public key
309.What is a PKI?
CA
Jennifer
Brad
Brads public key
319.What is a PKI?
CA
Jennifer
Brad
Checks Signature On cert Against CA
cert Public key
Brads public key
Definitely Brad!
328. Best way to implement cryptography
- Dont write your own algorithm
- Use policy where possible
- WS-Security
- Use configuration where possible
- IIS and SSL
- Use simple APIs that perform crypto in one step
- CAPICOM
- Enterprise libraries
337.How do we store secrets?
- Encryption!
- But
- How do we store the encryption key?
347.How do we store secrets?
356. whats the one hop problem?
- I can authenticate to the web server
- I cant authenticate to the database on another
server
366. whats the one hop problem?
Web server
SQL
376. whats the one hop problem?
Username Password
Web server
SQL
386. whats the one hop problem?
Username Password
Web server
NTLM auth
SQL
396. whats the one hop problem?
Digest AD cert mapping
Web server
SQL
406. whats the one hop problem?
Digest AD cert mapping
Web server
Null session
SQL
416. whats the one hop problem?
Digest AD cert mapping
Web server
Null session
SQL
426. whats the one hop problem? Solution!
- Protocol transition
- Kerberos
- Protocol transition
436. whats the one hop problem? Solution!
Web server
Any IIS authentication Method Basic Certs Digest
SQL
446. whats the one hop problem? Solution!
Kerberos auth
Web server
Any IIS authentication Method Basic Certs Digest
SQL
456. whats the one hop problem? Solution!
- Patterns and Practices Web Service Security
Scenarios, Patterns and Implementation Guidance
for Web Services Enhancements (WSE) 3.0 - From MSDN
465.ACL, DACL and SACL wossat?
474.Validation, validation, validation
484.Validation, validation, validation
- White list validation
- Check for what you will allow
- Regex
- Many functions available on net
- Replace bad input
- Escape characters
- HTMLEncode output
- Not a cure, but a patch
- Negotiate acceptable input with business when
gathering requirements
493.Warning, Will Robinson!
502.Using SQL
51Run down
- 10. what is an X509 cert?
- 9.What is a PKI?
- 8.Best way to implement cryptography
- 7.How do we store secrets?
- 6.Whats the one hop problem?
- 5.ACL, DACL and SACL
- 4.Validation, validation, validation
- 3.Warning, Will Robinson!
- 2.Using SQL
521.Dont develop as admin!