TLS 1.3 Handshake

  Рет қаралды 42,337

F5 DevCentral

F5 DevCentral

Күн бұрын

Пікірлер: 44
@mrRDX001
@mrRDX001 5 жыл бұрын
I have a small doubt, prior to 1.3 the client used to generate the Pre Master Key and encrypt it with servers public key, as per your demonstration Client is sending Key share before even getting the Public key, does it mean that client already gets the public key from the repository and encrypts it and send ? Thank you in advance :)
@devcentral
@devcentral 5 жыл бұрын
Hi Jubair...great question! Prior to TLS 1.3, the client and server could use the RSA algorithm to exchange keys. In RSA, the client uses the server's public key to encrypt the pre-master secret as you mentioned. However, in TLS 1.3, RSA is not allowed to be used for key exchange. In TLS 1.3, the Diffie Hellman key exchange is used to exchange keys. The Diffie Hellman key exchange requires that both the client and server generate their own random integer values and then send other calculated values to each other that are based on their own secret values. So, the "key share" referenced here is the client's calculated value that it sends to the server. It can send this without ever receiving anything from the server. Here's a video I did on the Diffie Hellman key exchange: kzbin.info/www/bejne/ppKXoKall5aLhc0 And, here's one on Perfect Forward Secrecy: kzbin.info/www/bejne/f5ywZIVjgKmoapY I hope this helps!
@mrRDX001
@mrRDX001 5 жыл бұрын
@@devcentral Wow, thank you very much for the reply, I am new to F5 and learning, let me know if there are documents I can get to be a skilled F5 admin, thanks a ton again 😊
@muhammadsiddiqui9522
@muhammadsiddiqui9522 2 жыл бұрын
But TLS 1.2 could also use ECDH for key exchange, so ?
@adarshrao1692
@adarshrao1692 5 жыл бұрын
in TLs 1.2 or previous, the encryption was Assymetric, followed by symetric. How is it happening in 1.3?
@devcentral
@devcentral 5 жыл бұрын
Great question Adarsh! As you noted, the encryption in TLS 1.2 and earlier is asymmetric (for sharing keys) followed by symmetric (for bulk encryption). In TLS 1.3 the same thing happens. The keys are shared via asymmetric encryption (in fact, it's mandatory in TLS 1.3 that the client and server use Perfect Forward Secret ciphers for key exchange) but then the bulk encryption is done using symmetric encryption. I hope this helps!
@lemandemirova697
@lemandemirova697 4 жыл бұрын
▶️
@business548
@business548 8 ай бұрын
Amazing work.
@nibmz7
@nibmz7 3 жыл бұрын
Hi. So in TLS 1.3, does it mean the server's public key no longer plays a role in the whole encryption process?
@vinaygudi2089
@vinaygudi2089 3 жыл бұрын
i think he meant public key when he said certificate from server
@devcentral
@devcentral 2 жыл бұрын
Hi Nur...great question! The server's public key (which is included in the larger certificate) is still used for authentication purposes...typically using RSA for authentication. But, TLS 1.3 uses only Perfect Forward Secret ciphers for key exchange...so the key exchange algorithms are all Diffie Hellman. Diffie Hellman doesn't use the server's public/private keys for key exchange. So, the server's keys are still used for authenticating the server to the browser (i.e. is this the correct server to be connecting), but the server's keys are not used for key exchange with TLS 1.3. I hope this helps!
@dhanushshetty7840
@dhanushshetty7840 2 жыл бұрын
@@devcentral how does this prevent man in the middle attack?
@mountainslopes
@mountainslopes 2 жыл бұрын
Excellent videos!
@devcentral
@devcentral 2 жыл бұрын
Glad you enjoyed it!
@neadlead2621
@neadlead2621 2 жыл бұрын
very clear thank you
@devcentral
@devcentral 2 жыл бұрын
Glad you liked it and thanks for the comment!
@jimmy_dee
@jimmy_dee 6 жыл бұрын
Great video. Well explained.
@devcentral
@devcentral 6 жыл бұрын
glad you enjoyed it!
@mahathidevulapalli8673
@mahathidevulapalli8673 4 жыл бұрын
Thanks for explaining it
@devcentral
@devcentral 4 жыл бұрын
glad you enjoyed it!
@abhaypratap5311
@abhaypratap5311 6 жыл бұрын
sir what about version negotiation happen between client TLS and server TLS i mean if client has new version like 1.2 and server has 1.3 or vice versa then connection established or not? please make a shot video on that.
@devcentral
@devcentral 6 жыл бұрын
ultimately, the server gets to make the final call on the cipher suite, version, etc. the server (and/or client) can be configured to use multiple versions of TLS (1.1, 1.2, 1.3). If, for example, the client is trying to talk via TLS 1.3 and the server can only talk TLS 1.2, then the client (if configured) would back down to TLS 1.2 and the connection would be established using TLS 1.2. If the client was only configured to talk TLS 1.3 and the server was only configured to talk TLS 1.2 (or vice versa), then the connection would terminate because they couldn't both find a version that they are both configured to talk with. Hope this helps!
@muratzhumagali4604
@muratzhumagali4604 4 жыл бұрын
I seen Diffie Hellman been used with RSA for assymetric part in tls 1.2. If it's not the case in 1.3, then there might be successful man in the middle attack?
@danish6192
@danish6192 4 ай бұрын
1. the tcp handshake still occurs 2. certificate verification also happens
@JasserHussain
@JasserHussain 6 жыл бұрын
What is the keyshare ypu are talking about? Please explain it in detail....
@devcentral
@devcentral 6 жыл бұрын
Hi...great question! The idea with keyshare is that the Client and Server both have to provide information to one another in order to calculate the symmetric key that will be used for bulk encryption. The TLS handshake is the process that (among other things) shares the information between Client and Server so that they can each independently calculate the symmetric key used for the bulk encryption. During this process, each of the Client and Server contributes their "share" of information needed to ultimately generate the symmetric key. As for the exact information needed from each side, it depends on the exact cipher suite choses for key exchange and bulk encryption. For example, if a Diffie-Hellman key exchange is chosen, each side will need to contribute their portion of the Diffie-Hellman calculations so that they can independently calculate the shared key for bulk encryption. They can't calculate the shared symmetric key until they have the key exchange information from the other party (Client/Server). In TLS 1.3, the handshake process speeds up significantly because the Client preemptively guesses the cipher suite that the Server will choose. The server still has the final say on which cipher suite is chosen, but many times the Client can guess the correct cipher suite before the Server confirms the chosen suite. Because of this, the Client can go ahead and send what would be the key exchange information for the chosen cipher suite when it initially sends the "Hello". Then, the Server can calculate the shared symmetric key and go ahead and start encrypting data very early in the handshake process. I hope this helps!
@TheZiZaZo
@TheZiZaZo 6 жыл бұрын
Thank you, great explanation!
@devcentral
@devcentral 6 жыл бұрын
glad you enjoyed it!
@TheZiZaZo
@TheZiZaZo 6 жыл бұрын
Would you say Diffie-Hellman is the most common key exchange algorithm used for TLS 1.3 connections?
@devcentral
@devcentral 6 жыл бұрын
yes, definitely. in fact, it's extremely common among TLS 1.2 connections as well. thanks!
@nitishemmanuel3183
@nitishemmanuel3183 5 жыл бұрын
A packet capture of the handshake showed also be shown and/or made available to be downloaded.
@alekkras3487
@alekkras3487 4 жыл бұрын
Great video, very clear! A suggestion for the future, what do you guys think about creating a nice infographic with high resolution for the future to use in explanations?
@gauravsaini5401
@gauravsaini5401 6 жыл бұрын
Well explained
@devcentral
@devcentral 6 жыл бұрын
glad you enjoyed it!
@thoughtslibrary
@thoughtslibrary 5 жыл бұрын
where person is writing ? is this on a glass? how is this annotation works can anyone explain it to me?
@adithyavaishnav4081
@adithyavaishnav4081 5 жыл бұрын
kzbin.info/www/bejne/rX_RpIhnmp2opa8
@thoughtslibrary
@thoughtslibrary 5 жыл бұрын
@@adithyavaishnav4081 thanks man
@davidadamson1588
@davidadamson1588 5 жыл бұрын
How does he write mirrored so perfect? 😳
@joechieftain
@joechieftain 5 жыл бұрын
kzbin.info/www/bejne/i2iokH9qrKiDisU
@dota2tournamentss
@dota2tournamentss Жыл бұрын
the trick is he write normally but in post production they mirror the image so from our perspective text is normal
@leogenius812
@leogenius812 4 жыл бұрын
amazing the way he writes backwards the entire video
@devcentral
@devcentral 4 жыл бұрын
you can see how we create these here! kzbin.info/www/bejne/i2iokH9qrKiDisU
@RS250Squid
@RS250Squid 3 жыл бұрын
At the start of the video: "Now I'm gonna learn more about TLS". A few seconds later "But first I'm gonna learn how he writes backwards!"
@techevangelist8373
@techevangelist8373 Жыл бұрын
90% stuff not needed/related....Cummon...Get into the details of 1.3..This I felt like scratching the surface.Remember sitting in an interview and talking like this..I dont think even F5 will hire you if you talk exactly the guy in the video explained...This is so useless stuff I felt like...
Explaining TLS 1.3
18:00
F5 DevCentral
Рет қаралды 72 М.
Perfect Forward Secrecy
13:26
F5 DevCentral
Рет қаралды 71 М.
POV: Your kids ask to play the claw machine
00:20
Hungry FAM
Рет қаралды 11 МЛН
At the end of the video, deadpool did this #harleyquinn #deadpool3 #wolverin #shorts
00:15
Anastasyia Prichinina. Actress. Cosplayer.
Рет қаралды 17 МЛН
Touching Act of Kindness Brings Hope to the Homeless #shorts
00:18
Fabiosa Best Lifehacks
Рет қаралды 18 МЛН
Пришёл к другу на ночёвку 😂
01:00
Cadrol&Fatich
Рет қаралды 3,9 МЛН
What Are AEAD Ciphers?
11:09
F5 DevCentral
Рет қаралды 23 М.
TLS 1.3 Handshake - many CHANGES from prior versions!
17:39
Practical Networking
Рет қаралды 16 М.
Troubleshoot TLS Handshake Failures using Wireshark
31:33
Plaintext Packets
Рет қаралды 30 М.
TLS Handshake Explained - Computerphile
16:59
Computerphile
Рет қаралды 557 М.
TLS Handshake - EVERYTHING that happens when you visit an HTTPS website
27:59
Practical Networking
Рет қаралды 117 М.
Breaking Down the TLS Handshake
12:29
F5 DevCentral
Рет қаралды 254 М.
What is a TLS Cipher Suite?
20:47
F5 DevCentral
Рет қаралды 115 М.
Wiresharking TLS - What happens during TLS 1.2 and TLS 1.3 Handshake
16:45
How TLS Works?
12:09
High-Performance Programming
Рет қаралды 44 М.
What is a Web Application Firewall (WAF)?
10:04
F5 DevCentral
Рет қаралды 247 М.
POV: Your kids ask to play the claw machine
00:20
Hungry FAM
Рет қаралды 11 МЛН