cmsc 426 final lecture 7

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/21

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

22 Terms

1
New cards

What does HTTP stand for and what is its purpose?

Hypertext Transfer Protocol

It is an application-layer protocol used for transmitting HTML documents and other web resources.

2
New cards

How does HTTP follow the client-server model?

The client (usually a browser) always initiates the connection to request data from the server.

3
New cards

What are the main steps in an HTTP connection?

  1. Establish TCP connection

  2. Client sends HTTP request

  3. Server sends HTTP response

  4. TCP connection is closed or reused.

4
New cards

What is a user-agent in HTTP?

Any tool that sends HTTP requests on behalf of the client, e.g., browsers, web crawlers, debug tools.

5
New cards

What are the responsibilities of a browser as a user-agent?

  • Send HTTP requests

  • Parse HTML

  • Display CSS, images, and videos

  • Run scripts and dynamic content.

6
New cards

What is an HTTP server?

server that serves HTML documents or resources requested by a client. Servers are stateless and don’t retain info between requests.

7
New cards

Name common HTTP headers and their purpose.

  • Host: Domain name of the server

  • User-Agent: Browser and OS version

  • Accept-Language: Client language preference

  • Content-Type: MIME type of the document

  • Content-Length: Size of data

  • Set-Cookie: Sends cookies to browser.

8
New cards

What are the main HTTP methods and their uses?

  • GET: Retrieve data from server (parameters in URL)

  • POST: Send data to server (e.g., form submissions).

9
New cards

What is a cookie in HTTP?

Small data pieces stored by browsers to maintain stateful information such as login status or shopping cart contents.

10
New cards

What does SSL/TLS provide?

Secure communications over a network (used in HTTPS, email, VoIP).

11
New cards

What is the difference between SSL and TLS?

  • SSL 2.0 (1995) deprecated in 2011

  • SSL 3.0 (1996) deprecated in 2015

  • TLS is the successor; current version is TLS 1.3 (2018, RFC 8446).

12
New cards

What happens in the Client Hello step of TLS 1.3?

  • Client proposes connection

  • Sends supported cipher suites

  • Includes 32-byte Client Random value

  • Sends key share info for key exchange.

13
New cards

What is a cipher suite in TLS?

A set of cryptographic algorithms including key exchange, encryption, digital signatures, and hashing.

14
New cards

What is the purpose of the Client Key Share?

It allows the server to immediately proceed with key generation, saving a round-trip communication.

15
New cards

Describe the Server Hello step of TLS 1.3.

  • Server selects cipher suite

  • Generates Server Random value

  • Generates symmetric Master Secret

  • Sends digital certificate (X.509) and signed handshake info

  • All encrypted with symmetric key.

16
New cards

What does the client do after receiving Server Hello?

  • Generates same symmetric Master Secret

  • Decrypts Server Hello contents

  • Verifies server’s digital signature

  • Sends a “Finished” message.

17
New cards

What is OpenSSL?

Most common implementation of SSL/TLS; also includes other cryptographic tools. Used to generate X.509 certificates.

18
New cards

Which OpenSSL versions were affected by Heartbleed?

Versions 1.0.1 – 1.0.1f.

19
New cards

When was Heartbleed added and disclosed?

Added in 2012, disclosed in 2014 (CVE-2014-0160).

20
New cards

What was the vulnerability in Heartbleed?

OpenSSL failed to verify if the payload size matched the actual data size, allowing attackers to read up to 64 KB of random memory (potentially sensitive data).

21
New cards

What is the purpose of the Heartbeat extension?

Keeps TLS sessions alive without data transfer; checks if the server is online.

22
New cards

Why was Heartbleed so dangerous?

  • Easy to exploit

  • Leaves no logs/evidence

  • Could leak SSL private keys, credentials, and session cookies

  • Allowed repeated exploitation.