15 Matching Annotations
- Mar 2022
- Feb 2022
-
www.slideshare.net www.slideshare.net
-
www.youtube.com www.youtube.com
-
-
datatracker.ietf.org datatracker.ietf.org
Tags
Annotators
URL
-
- Oct 2018
-
medium.facilelogin.com medium.facilelogin.com
-
www.sjoerdlangkemper.nl www.sjoerdlangkemper.nl
-
Token binding makes session hijacking harder by creating an identifier that is based on a private key. The client generates a public/private key pair for every site that it wants to use token binding on. When it connects to the server it signs something and sends this signature along with the public key to the server. The server verifies the signature against the public key. This way, the server knows that this client is in possession of the private key. After this verification step, the public key is passed to the application. This public key uniquely identifies the client, just as a session cookie would. However, it is no longer possible to simply steal the identifier and impersonate someone. The private key is kept secret and the identifier is checked against it. Without access to the private key it is not possible to reproduce a valid identifier. Even if an attacker intercepts the signature, he can’t use this in another connection. The signature is over the public key and the keying material of the current TLS connection. When a new TLS connection is created, a new signature is needed. This means that if the attacker intercepts the signature, he can’t reuse it in a new connection to the server.
-
-
medium.com medium.com
-
github.com github.com
-
This NGINX module provides mechanism to cryptographically bind HTTP cookies to client's HTTPS channel using Token Binding, as defined by following IETF drafts:
-
-
tools.ietf.org tools.ietf.org
Tags
Annotators
URL
-
-
tools.ietf.org tools.ietf.org
-
This document specifies version 1.0 of the Token Binding protocol. The Token Binding protocol allows client/server applications to create long-lived, uniquely identifiable TLS bindings spanning multiple TLS sessions and connections. Applications are then enabled to cryptographically bind security tokens to the TLS layer, preventing token export and replay attacks. To protect privacy, the Token Binding identifiers are only conveyed over TLS and can be reset by the user at any time.
Tags
Annotators
URL
-
-
self-issued.info self-issued.info
Tags
Annotators
URL
-