Lantronix EDS8PR EDS - User Guide - Page 103

SSL Settings, SSL Cipher Suites

Page 103 highlights

12: Security Settings SSL Settings Secure Sockets Layer (SSL) is a protocol for managing the security of data transmission over the Internet. It provides encryption, authentication, and message integrity services. SSL is widely used for secure communication to a web server. Certificate/Private key combinations can be obtained from an external Certificate Authority (CA) and downloaded into the unit. Self-signed certificates with associated private key can be generated by the device server itself. For more information regarding Certificates and how to obtain them, see SSL Certificates and Private Keys (on page 104). SSL uses digital certificates for authentication and cryptography against eavesdropping and tampering. Sometimes only the server is authenticated, sometimes both server and client. The EDS can be server and/or client, depending on the application. Public key encryption systems exchange information and keys and set up the encrypted tunnel. Efficient symmetric encryption methods encrypt the data going through the tunnel after it is established. Hashing provides tamper detection. Applications that can make use of SSL are Tunneling, Secure Web Server, and WLAN interface. The EDS supports SSlv3 and its successors, TLS1.0 and TLS1.1. Note: An incoming SSlv2 connection attempt is answered with an SSlv3 response. If the initiator also supports SSLv3, SSLv3 handles the rest of the connection. SSL Cipher Suites The SSL standard defines only certain combinations of certificate type, key exchange method, symmetric encryption, and hash method. Such a combination is called a cipher suite. Supported cipher suites include the following: Table 12-13 Supported Cipher Suites Certificate Key Exchange Encryption Hash DSA RSA RSA RSA RSA RSA RSA RSA DHE RSA RSA RSA RSA 1024 bits RSA 1024 bits RSA 1024 bits RSA 3DES 128 bits AES Triple DES 128 bits RC4 128 bits RC4 56 bits RC4 56 bits RC4 40 bits RC4 SHA1 SHA1 SHA1 MD5 SHA1 MD5 SHA1 MD5 Whichever side is acting as server decides which cipher suite to use for a connection. It is usually the strongest common denominator of the cipher suite lists supported by both sides. EDS User Guide 103

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163

12: Security Settings
EDS User Guide
103
SSL Settings
Secure Sockets Layer (SSL) is a protocol for managing the security of data transmission over the
Internet. It provides encryption, authentication, and message integrity services. SSL is widely used
for secure communication to a web server.
Certificate/Private key combinations can be obtained from an external Certificate Authority (CA)
and downloaded into the unit.
Self-signed certificates with associated private key can be
generated by the device server itself.
For more information regarding Certificates and how to obtain them, see
SSL Certificates and
Private Keys (on page 104)
.
SSL uses digital certificates for authentication and cryptography against eavesdropping and
tampering. Sometimes only the server is authenticated, sometimes both server and client. The
EDS can be server and/or client, depending on the application. Public key encryption systems
exchange information and keys and set up the encrypted tunnel.
Efficient symmetric encryption methods encrypt the data going through the tunnel after it is
established. Hashing provides tamper detection.
Applications that can make use of SSL are Tunneling, Secure Web Server, and WLAN interface.
The EDS supports SSlv3 and its successors, TLS1.0 and TLS1.1.
Note:
An incoming SSlv2 connection attempt is answered with an SSlv3 response. If the
initiator also supports SSLv3, SSLv3 handles the rest of the connection.
SSL Cipher Suites
The SSL standard defines only certain combinations of certificate type, key exchange method,
symmetric encryption, and hash method. Such a combination is called a cipher suite. Supported
cipher suites include the following:
Whichever side is acting as server decides which cipher suite to use for a connection. It is usually
the strongest common denominator of the cipher suite lists supported by both sides.
Table 12-13
Supported Cipher Suites
Certificate
Key Exchange
Encryption
Hash
DSA
DHE
3DES
SHA1
RSA
RSA
128 bits AES
SHA1
RSA
RSA
Triple DES
SHA1
RSA
RSA
128 bits RC4
MD5
RSA
RSA
128 bits RC4
SHA1
RSA
1024 bits RSA
56 bits RC4
MD5
RSA
1024 bits RSA
56 bits RC4
SHA1
RSA
1024 bits RSA
40 bits RC4
MD5