Breaking Down the TLS Handshake

Breaking Down the TLS Handshake

F5 DevCentral

7 лет назад

253,447 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

Manny Lenis
Manny Lenis - 29.03.2023 23:26

Great Video. One question, how often does that process kick off?

Ответить
Olliver Aira
Olliver Aira - 17.01.2023 19:45

What I dont understand is how this makes the data secure by any means, cant a cleverly designed software follow all this communication and end up with the same symmetric key at the end (assuming the attacker is able to sniff every single package sent back & forth)?

Ответить
Zak B.
Zak B. - 27.11.2022 08:41

Perfect explanation. I thought every time we encrypt with server certificate public key the whole time but it's not.

Ответить
Muzaffer Aydin
Muzaffer Aydin - 06.11.2022 06:34

Where is the CA (Certificate Authority)?

Ответить
Srimal Nishantha
Srimal Nishantha - 02.11.2022 14:51

Well explained. thanks a lot 👍

Ответить
Rockatansky1974
Rockatansky1974 - 28.10.2022 15:06

Epic Video!

Ответить
Latha Manickavasagam
Latha Manickavasagam - 17.10.2022 01:21

each client generates a unique symmetric key, how does the server stores all these symmetric keys ? if million unique users hit a website does that mean that the server stores million symmetric keys?

Ответить
Julian Toon
Julian Toon - 29.09.2022 05:32

another good explanation need to watch a few times

Ответить
Adam Hdia
Adam Hdia - 07.09.2022 10:21

Thank youuu

Ответить
Claude Djale
Claude Djale - 05.09.2022 03:13

Wow, it is amazing to know what happens behind the scenes. I would like to meet the people who create/invent these things.

Ответить
Puwanat Sretavevuth
Puwanat Sretavevuth - 14.08.2022 20:57

amazing and easy to understand

Ответить
Paritosh D
Paritosh D - 28.06.2022 17:54

Does it protect TCP header and payload both? Or just the payload?

Ответить
Luke Caruana
Luke Caruana - 08.06.2022 06:38

super fkng awesome explaination

Ответить
ayan Saha
ayan Saha - 13.05.2022 12:02

Nice explanation! Thank you.

Ответить
Ole Kristian Rannekleiv
Ole Kristian Rannekleiv - 04.05.2022 06:54

Very well explained, thank you.

Ответить
Morteza
Morteza - 02.05.2022 11:44

Best explain I'd ever seen.

Ответить
buffaloofm
buffaloofm - 13.04.2022 16:43

nice 🔥🔥

Ответить
Emmanuel Solano
Emmanuel Solano - 06.04.2022 06:07

Very well explained, pretty useful.

Ответить
skitz241
skitz241 - 03.04.2022 12:42

amazing vid thanks so much

Ответить
Jaid Ahmed
Jaid Ahmed - 02.04.2022 16:23

Hi all
Is anyone can help me here if i disable TLS 1.0 and enable TLS 1.1 and 1.2 then my crystal reports is not working

Ответить
Sagar Vyas
Sagar Vyas - 23.03.2022 16:51

Its really amazing explanation on TLS handshake Thank you ... Just for my curiosity which application you used to record video with screen whiteboard option.

Ответить
Zen 101
Zen 101 - 18.03.2022 03:11

That was entertaining to watch :)
Thanks.

Ответить
NeuroBoost - science and technology
NeuroBoost - science and technology - 18.12.2021 22:53

I don't understand when Difie Hellaman is used here. And why is it actually needed? Why a signed certificate with public key is not enough?

Ответить
satksd
satksd - 23.11.2021 22:19

Thanks and that was great video. Have one question in the actual data transfer , the data is encrypted with symmetric encryption and the symmetric key is encrypted with asymmetric encryption for each session?

Ответить
Madizm1264
Madizm1264 - 21.11.2021 14:28

Wow this is great. It takes months to truly get your head around this but vids like this make it so easy to refresh my memory

Ответить
Zohdiak
Zohdiak - 19.11.2021 16:02

Thank you for explaining things perfectly!

Ответить
Gursimran Tiwana
Gursimran Tiwana - 12.11.2021 05:57

what technology is he using to present? Is this a camera trick or a special screen?

Ответить
Mike Mancini
Mike Mancini - 11.11.2021 16:17

What's the point of encrypting the pre-master-secret using the servers public key? Wouldn't the man in the middle know the public key of the server, so the man in the middle could decrypt the pre-master-secret.

Ответить
Anton Fernando
Anton Fernando - 08.11.2021 18:01

cool presentation. Questions: is the pre-master key actually exchanged, if so, what if man in the middle learned it, can it be used to create the eventual asymmetric key? Meaning during the TLS handshake is there vulnerability? 2nd question, is the final symmetric key ever exchanged? thanks.

Ответить
Amit Bisht
Amit Bisht - 07.11.2021 08:33

I got everything but I have a single doubt. Pre master secret is derived from public key. And then it is encrypted and shared with the server. And then server has the same pre master key. And now both client and server makes a symmetric key. How? What kinds of algo do they use? And how do they ensure that they make the same symmetric key?

Ответить
Vijay Shinde
Vijay Shinde - 02.11.2021 17:17

Wow ...

Ответить
Pankaj Chaturvedi
Pankaj Chaturvedi - 31.10.2021 10:26

The most thorough explanation of TLS Handshake. Thank you!

Ответить
SULEKHA
SULEKHA - 21.09.2021 15:53

im a little confused... wouldn't it suffice if only one side generated a symmetric key? why is it necessary that even though it's the same symmetric key in a way another one would be generated by the web server?

Ответить
Christopher Holland
Christopher Holland - 03.09.2021 19:12

Does symmetric key encryption used on top of the asymmetrical encryption, or do both nodes switch over to symmetric encryption? If so, why not asymmetrical to host and symmetric back to client?

Ответить
omkar sawant
omkar sawant - 29.08.2021 22:27

Very Informative, thanks

Ответить
Tejas Pancholi
Tejas Pancholi - 24.08.2021 18:47

Great explanation. Breaking something down that takes microseconds to complete into a 12min video.

Ответить
Zes
Zes - 22.07.2021 21:18

no such thing as hellox or handshakex etc about it, ts just machinex, no nerx, cepitxuxyuax, any say any nmw

Ответить
Joshua Euceda
Joshua Euceda - 22.07.2021 03:04

The waterfall analogy was outstanding, provided an excellent framework for further study.

Ответить
blockk2a
blockk2a - 04.07.2021 18:32

As far as i know there's nonce in the handshake process. I know it's used to prevent some replay attack but I wonder if nonce is used to create pre master secret.
Or Is pms only genereated from server's public key?

Ответить
Rajiv Kumar
Rajiv Kumar - 21.06.2021 21:40

If anyone needs more deeper information then can check

ECC-based SSL handshake (ECDH- ECDSA key exchange).   | Download Scientific Diagram (researchgate.net)

Ответить
TK
TK - 12.06.2021 11:37

Superb!

Ответить
Joallyson Castro
Joallyson Castro - 28.05.2021 01:50

Amazing!

Ответить
Ramkumar k
Ramkumar k - 17.04.2021 19:30

after went through so many other videos. Finally got clear picture only from your explanation. Very good explanation, thanks !

Ответить
GAURAV CHIMANJI
GAURAV CHIMANJI - 12.03.2021 17:23

Great Video..!! One quick question.. How does the client verify that the (certificate and the public key) is coming from Big-IP not from an anonymous attacker?

Ответить
Ben B
Ben B - 10.03.2021 09:04

Man this is TECH NF

Ответить
Error Boom
Error Boom - 27.02.2021 11:06

But what is the pre master secret? ;/

Ответить
sailendra pavan
sailendra pavan - 23.02.2021 10:28

Excellent explanation. Thank you.

Ответить
Rainfallen
Rainfallen - 14.02.2021 21:16

Is this tls v1.3?

Ответить
Rainfallen
Rainfallen - 05.02.2021 08:52

Very good explanation!

Ответить
Ankur Rajput
Ankur Rajput - 29.01.2021 21:59

Awesome explanation.
But I didn't get the difference between Pre-master secret and symmetric key. As per my understanding they are different names to the same key. Could someone please correct me?

Ответить