Web Security Considerations

The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets.

Web Traffic Security Approaches

A number of approaches to providing Web security are possible.

Figure 5.1 Relative location of security facilities in the TCP/IP protocol stack.

Figure 5.1 Relative location of security facilities in the TCP/IP protocol stack.

A general-purpose solution is to implement security just above TCP.

Transport Layer Security

Secure Socket Layer (or SSL) probably most widely used Web security mechanism, and it is implemented at the Transport layer.

SSL Architecture

SSL is not a single protocol but rather two layers of protocols.

Figure 5.2 SSL protocol stack.

Figure 5.2 SSL protocol stack.

The SSL Record protocol defines two services for SSL connections:

  1. Confidentiality: The Handshake Protocol defines a shared secret key that is used for conventional encryption of SSL payloads. The message is compressed before being concatenated with the MAC and encrypted, with a range of ciphers being supported.
  2. Message Integrity: The Handshake Protocol also defines a shared secret key that is used to form a message authentication code (MAC).