File: README.https

package info (click to toggle)
wwwoffle 2.9f-2.2
  • links: PTS
  • area: main
  • in suites: squeeze
  • size: 7,716 kB
  • ctags: 2,077
  • sloc: ansic: 23,951; sh: 6,815; lex: 4,201; perl: 917; makefile: 623; ruby: 181; lisp: 14
file content (185 lines) | stat: -rw-r--r-- 8,862 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
            WWWOFFLE - World Wide Web Offline Explorer - Version 2.9
            ========================================================


This README describes how HTTPS connections work, the relationship of HTTPS to
SSL/TLS and how certificates work.  More detail can be found in lots of places
on the internet.

The HTTPS protocol is a secure version of the HTTP protocol that is used for
transmitting web pages from the server to the browser.  To allow the server to
distinguish between them a different port number is used.  By default HTTP will
use port 80 and HTTPS will use port 443.  WWWOFFLE will use port 8080 by default
for HTTP connections and when compiled with the GNUTLS library it will use port
8443 by default for HTTPS connections.

An HTTPS connection is just an HTTP connection but using SSL (Secure Socket
Layer) or TLS (Transport Layer Security) to encrypt and authenticate the data
between the server and the client.  To be able to make a secure connection
there are various things that must be performed and options that can be used on
top of this for extra security.


Essential Security
------------------

The essential feature of a secure connection is that the server and client can
exchange data without anybody else being able to find out what the data is.
This means that even though the data that it transmitted goes through an
insecure network it has been encrypted so that nobody else can decode it.  The
link must also be protected against an attacker being able to modify the data,
either be replacing the real data, adding more data or deleting data.

To establish a secure link the steps that are taken by the server and the client
are the following:

    Agree on an encryption algorithm that both understand.
    Exchange a secret key to use with the encryption.

The exchange of the encryption key must be performed so that anybody that has
visibility of the data being transmitted cannot determine the key.  There are
several methods for doing this, Diffie-Hellman key exchange is one, RSA
public/private key encryption is another.

After these steps the data on the link can be encrypted with the chosen
algorithm and the chosen secret key.


Server Authentication
---------------------

An optional feature that is generally used for HTTPS is to have the server
authenticate itself to the client so that the client can be sure that the server
is the one it claims to be.  This uses certificates and public/private key
cryptography to allow certificates to be signed by trusted certificate
authorities.  If the browser trusts the certificate authority then it can also
trust any certificate that has been signed by that certificate authority.


Optional Client Authentication
------------------------------

As a further check on the link the server can require that the client
authenticates itself.  This is supported in most browsers although it is rarely
used.  Generally only bank or government HTTPS servers require this type of
authentication.  A certificate must be loaded into the browser to identify the
user when connected to the server.  The authentication is performed in the same
way that the server authenticates itself as described above.



Certificates
------------

With SSL and TLS the certificates that are used are defined as X509 objects.
This X509 object contains information about who the certificate represents (the
name, and location of the entity), the validity of the certificate (start date
and end date), a version number and serial number and what the certificate is
for.

For each certificate there is also a public and private key that is created at
the same time.  The public key is included in the certificate and the
certificate contains information that can only be created by somebody with
knowledge of the private key.  Using the public key it is possible to verify
that the certificate really does belong to the person that knows the private
key.

The certificate will also be signed by a certificate authority to make it
useful.  When a certificate has been signed by a certificate authority the
contents cannot be changed.  If the certificate was changed then this would
invalidate the certificate authority's signature.  The certificate authority's
signature can be checked by using the certificate authority's public key.  All
that an unsigned certificate proves is that the person that created it knows the
private key.  It does not prove that the person that created it is who they say
they are.


Creating Certificates
---------------------

A certificate authority will create a master certificate whose usage is
certificate signing and will then sign that certificate themselves.  This self
signed certificate is important since it is the root of the chain of trust that
ends in the browser.  The certificate authority must make sure that this
certificate is made publicly available, and in particular that it is included
with all browsers.

The operator of a server who wants to be trusted by its users will create their
own certificate with the information about themselves and set the usage of the
certificate to be encryption.  This certificate will be submitted to a
certificate authority who will sign it with their private key that belongs to
the master certificate.  This signed certificate is then returned to the server
operator for use.


Trust
-----

The server can use this signed certificate during HTTPS connections.  The browser
will be able to use the certificate authority's public key contained in the
certificate authority's certificate to verify the identity of the server.  This
process relies on the browser trusting the certificate authority and the
certificate authority trusting the server operator.

To see the list of certificate authorities that are included in Firefox (version
1.0x was current at the time of writing this) select from the menu Edit ->
Preferences (or Tools -> Options on MS Windows).  In the dialog box select the
"Advanced" tab and go down to "Certificates" and select "Manage Certificates".
In the certificate manager dialog box select "Authorities".  There will be a
long list of certificates, many of these are certificate authorities for signing
other server certificates.

When you make a connection to a server that has a certificate signed by any of
these certificate authorities then your browser will not give you a warning.  If
the server that you visit has a certificate that is signed by a different
certificate authority then the browser will warn you.  This warning only means
that you cannot be sure who is operating the server that you have connected to.
The data that is transmitted between you and the server will be encrypted even
if the certificate is not trusted.

If there are any certificate authorities that are listed in your browser that
you do not trust then there is the risk of sending data to the wrong server.
When a server sends you a certificate during an HTTPS connection it will be
accepted by the browser if it validates with any of the loaded certificate
authorities.  If you do not trust this certificate authority then the server may
not be who it says it is.

If any website ever asks you to load in a trusted certificate then be very
careful that it is not a certificate authority certificate.  (You can identify a
certificate authority certificate because it will have a usage for certificate
signing.)  If it is then you must trust the person giving it to you because this
certificate could be used to sign any other certificate and circumvent the normal
trust mechanism.


WWWOFFLE
--------

If you have enabled GNUTLS in WWWOFFLE then you have enabled some HTTPS
capability.

The WWWOFFLE server will create its own certificate authority certificate and a
certificate for each server name that the server can be accessed by.  These can
be identified by the name information in the certificate that will contain the
word "WWWOFFLE" very clearly.

You can either load the certificate authority certificate from WWWOFFLE into
your browser (see the warning above about loading in new certificate authority
certificates) or you can accept the server certificate when your browser warns
you about it.

It is possible to use URLs like https://localhost:8443/ instead of
http://localhost:8080/ for access to the WWWOFFLE internal pages.

If you decide to allow it then you can cache HTTPS connections by abusing the
trust relationship between the browser and the certificate authority.  When
accessing HTTPS servers through WWWOFFLE and caching the results WWWOFFLE will
re-encrypt the data from the server and send it to the browser using a fake
certificate.  If you configure your browser to trust WWWOFFLE as a certificate
authority then the fake certificate from WWWOFFLE will be trusted just like it
was the real one from the original server.



Andrew M. Bishop
7th Jan 2006