Sfoglia il codice sorgente

A little bit of ssl protocols decription.

Playing with tikz to graw the hirarchich pki trust model, still needs a little
bit of refinement.
Michele Orrù 11 anni fa
parent
commit
8e40bcb4f7
3 ha cambiato i file con 67 aggiunte e 12 eliminazioni
  1. 3 0
      book/question_authority.tex
  2. 63 11
      book/ssl_prequisites.tex
  3. 1 1
      book/wiener.tex

+ 3 - 0
book/question_authority.tex

@@ -23,6 +23,9 @@
 \usepackage{minted}
 \usepackage{makeidx,shortvrb,latexsym}
 \usepackage{supertabular}
+\usepackage{tikz}
+
+\usetikzlibrary{arrows}
 
 %% setting epigraphs
 \renewcommand{\epigraphsize}{\small}

+ 63 - 11
book/ssl_prequisites.tex

@@ -6,22 +6,74 @@ providing \strong{integrity} and \strong{confidentiality} of the message, \stron
 optionally the client.
 %% fuck osi layers: there is no code explicitly structuring the internet in 7
 %% layers.
-The most allocate TLS in the 6 or 7th OSI Layer, ``Application'', and is nowdays widely adopted
-all over the world, being the de-facto standard for end-to-end  encryption.
+It is nowadays widely adopted all over the world, being the de-facto standard for
+end-to-end  encryption.
 
-\paragraph{Certifications Authority} are at the root of the security of the
-protocol. See section ~\ref{sec:ssl:x509}
+\paragraph{Certification Authorities} are authorities to whom it is granted the
+power to \emph{authenticate} the peer. Pragmatically, they are public keys
+pre-installed on your computer that decide who and who not to trust employing
+of a digital signature. A more detailed analysis of the inside of a certificate
+will be given in section ~\ref{sec:ssl:x509}.
+In order to overcome the proliferation of keys to disribute, and satisfy the
+use-case of a mindless user willing to accomplish a secure transaction on the
+internet, the concept of a hierarchical model issuing digital certificates
+proliferated with the following trust model:
+\\
+\\
+%% E` BELLISSIMO QUESTO COSO
+\begin{center}
+  \begin{tikzpicture}[
+    scale=.8,
+    ->,>=stealth',
+    ,level/.style={sibling distance = 10cm/#1,
+      level distance = 2.5cm}]
+    \node  {Root CA}
+    child{ node {\small{Intermediate CA}}
+      child{ node  {Issuer CA}
+        child{ node {} edge from parent node[above left]
+          {\tiny{loltrust}}}
+        child{ node {}}
+      }
+      child{ node  {CA}
+        child{ node  {Sub-CA}}
+        child{ node  {}}
+      }
+    }
+    child{ node {\small{Intermediate CA}}
+      child{ node  {CA}
+        child{ node  {hacked computer}}
+        child{ node  {CA}}
+      }
+      child{ node {GVMT CA}
+        child{ node  {}}
+        child{ node  {}}
+      }
+    }
+    ;
+  \end{tikzpicture}
+\end{center}
 
-\paragraph{The protocol} is actually composed of many sub-protocols:
 
+\paragraph{The protocol} is actually a collection of many sub-protocols:
 \begin{itemize}
-\item handshake protocol
-\item record protocol
-\item alert protocol
-\item changespec protocol ?
+  \setlength{\itemsep}{1pt}
+  \setlength{\parskip}{0pt}
+  \setlength{\parsep}{0pt}
+\item \strong{\emph{handshake}} protocol, a messaging protocol that allows to
+  \emph{authenticate} the peers, and eventually restore a past encrypted
+  session.
+\item \strong{\emph{record}} protocol, permitting the encapsulation of higher level protocols,
+  like HTTP and even the next two sub-protocols. It is the fulcrum for all data
+  transfer.
+\item \strong{alert} protocol, which steps-in at any time from handshake to closure of the
+  session in order to signal a fatal error. The connection will be closed
+  immediately after sending an alert record.
+\item \strong{changespec} protocol, to negotiate with and notify  the receiver that
+  subsequent records will be protected under the just negotiated keys and
+  \texttt{Cipher Spec}.
 \end{itemize}
 We will proceed by describing in deep only the first two of these, due to their
-relevant role inside the conection and furthermore, because they are the only
+relevant role inside the connection and furthermore, because they are the only
 two we actually made use of during our investigations.
 
 
@@ -30,7 +82,7 @@ Different options:
 \begin{itemize}
 \item no session
 \item session
-\item client authenticaton
+\item client authentication
 \end{itemize}
 
 

+ 1 - 1
book/wiener.tex

@@ -53,7 +53,7 @@ By definition, each new approximation is recursively defined as:
   \end{cases}
 \end{align}
 
-After a small digression into the properties of continuef fractions, Wiener, in
+After a small digression into the properties of continued fractions, Wiener, in
 ~\cite{wiener}, shows that, if a continued fraction $f'$ is an underestimate of
 another one $f$:
 \begin{align}