7.1.1 - Transport Layer Security (TLS)

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/13

flashcard set

Earn XP

Description and Tags

Flashcards about Transport Layer Security (TLS), its purpose, implementation, and versions.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

14 Terms

1
New cards

Why was Transport Layer Security (TLS) developed?

To address the lack of security mechanisms in the original TCP/IP application protocols, which made services vulnerable to spoofing, eavesdropping, and unauthorized modification.

2
New cards

Where does TLS operate in the TCP/IP stack?

Between the Application and Transport layers of the TCP/IP stack, or at the Session layer in OSI terms.

3
New cards

What is TLS normally used for?

To authenticate and encrypt TCP connections.

4
New cards

When TLS is used with the HTTP application, what is it referred to as?

HTTP Secure (HTTPS).

5
New cards

Besides HTTP, what other TCP applications can TLS be used to secure?

DNS, NTP, FTP, POP3/IMAP, SMTP, and LDAP.

6
New cards

What is TLS referred to when used with UDP, and where is it most often used?

Datagram Transport Layer Security (DTLS). It is most often used in virtual private networking (VPN) solutions.

7
New cards

To implement TLS, what is installed on the server?

A digital certificate issued by a trusted certificate authority (CA).

8
New cards

During a TLS handshake, what does the server provide to the client, and what does it contain?

The server provides its certificate to the client to prove its identity (assuming the client trusts the CA) and contains the public key part of a public/private encryption key pair.

9
New cards

If authentication is successful, how do the server and client establish a secure communication channel?

The server and client use the key pair in the digital certificate and a chosen cryptographic cipher suite within the TLS protocol to set up an encrypted tunnel.

10
New cards

How does TLS protect communications from third parties?

Even if someone knows the public key, they cannot decrypt the contents of the tunnel without obtaining the server's private key, ensuring communications cannot be read or changed by a third party.

11
New cards

What mechanism can the latest versions of TLS use to prevent decryption of captured packets, even if the server's private key is obtained?

Perfect Forward Secrecy (PFS). When configured, not even obtaining the server's private key allows decryption of captured packets.

12
New cards

What is the current version of TLS at the time of writing, and why are older versions often disabled?

TLSv1.3. Servers are often configured to use only TLSv1.3 or TLSv1.2 due to weaknesses in older versions.

13
New cards

Besides a compatible version, what else must the client and server agree on when using TLS?

The client and server must be able to agree on a mutually supported cipher suite.

14
New cards

What older protocol was TLS developed from, and what is its current status?

Secure Sockets Layer (SSL). SSL is now completely obsolete.