14. SSL and HTTPS

preview_player
Показать описание
MIT 6.858 Computer Systems Security, Fall 2014
Instructor: Nickolai Zeldovich

In this lecture, Professor Zeldovich discusses how to cryptographically protect network communications, as well as how to integrate cryptographic protection of network traffic into the web security model.

License: Creative Commons BY-NC-SA
Рекомендации по теме
Комментарии
Автор

This has been very helpful refreshing myself on some things. I would love to comment that the instructor, who presumably has taught this many times and can even be a stale subject (legacy protocols etc), looks so damn genuinely excited. You can see his passion for networking and that giddy little smile as he's watching a student connect the dots, much like the smile I assume we all get the first time you correctly configure a lab after hours of trial and error.

So thank you Nickolai for sharing your passion, it's greatly appreciated and you are very proficient in all aspects of your role. Cheers

august
Автор

I'm so appreciative that is this available to everyone. This is great.

melissabellemills
Автор

Excellent lecture! Everything explained nicely. You can clearly tell he is very knowledgeable about the topic.

DannyDChung
Автор

I have never seen crypto, ssl, tls etc...explained better than in this lesson. This lecturer is really great.

lubosculak
Автор

This guy is a fantastic lecturer and amazing!!!

kiddyjeldsalacot
Автор

This lecture is just awesome. I can see why MIT is the best.

osraneslipy
Автор

This lecture is more like a general discussion on SSL, Certificates. It assumes that you will learn about certificates on your own. (set the right expectations)

sriharshacv
Автор

This guy teaches well and he is very easy to understand.

edwardwong
Автор

What a passionate teacher, I learned what is passion from him

ReadingKing
Автор

Is it normal to have Session ID in the First Client Hello, and then have the Web Server pick that up and use it in further TLS traffic ? Why is this behavior were the Client Hello decides the Session ID; and does this have any security risks for a public facing webserver?

shanjose
Автор

you are such a good teacher <3 <3

btcblade
Автор

12:51 It's Diffie-Hellman (misheard in subs).

marekgibas
Автор

13:24 Can someone explain why the nonce generated by B helps to fix the replay problem? Thanks.

hj-core
Автор

Can you please help us understanding where exactly chain certificate is involved in SSL handshake. I have concerns... what chain certificate does at server side. I understand what is chain certificate but my question is where you are making use of chain certificate in SSL handshake?


Why we copy that on server when it not require in Ssl handshake. is there any specific use case of chain certificate

I heard that Browsers have major root CAs and intermediate CAs public keys. Please correct if I am wrong, Whatever I see in the browser, those are not the root certificate and chain/intermediate certificate but they are only public keys of root and chain certs. Next, During the SSL handshake in step two when server responds to the client with his Server hello message.... After that does server send only server certificate or it sends both to the client (server certificate and chain certificate)? Please answer

kavitaray
Автор

He is a excellent tutor.i like his way of teaching.

masumehto
Автор

what is an attacker change jquery and create new hash?

moums
Автор

Just funny complete course link in the description is HTTP. Anyway good lecture.

balazsszekely
Автор

Can we see public key on certificate? Anyone can explain for me, please I'm still vague.

mattjohn
Автор

why do professors still use notes? do t hey not have the material memorized?

Jeff-zcrr
Автор

I would say the title shall be keberos protocol

ttttyyyy