Understanding Public Key Infrastructure and TLS Components

In order to configure secure communication between the ArcSight products, infrastructure products, and any administrative tools, you must have a good understanding of the components that enable the secure communication to occur. ArcSight uses the industry standards of X.509 certificates, public key infrastructure (PKI), and transport layer security (TLS). This section provides a basic introductions to these components. For more detailed information, see (links open an external site):

You must secure the communication channels between servers and clients to protect your data and stop security breaches from happening in your environment. The following graphic depicts the different components required for secure communication using certificates, PKI, TLS, and tools to manage the keys.

The secure communication occurs between a server and a client. An example server is a web server and a client could be a browser. The following items are the terms that you need to understand to create a secure connection between a server and a client.

Example: Establishing Secure Communication for a Web Server

When you install a web server, communication is not secure by default. If the communication is secure, it is usually using a self-signed certificate. The following example shows how the web server obtains a server certificate signed by a well-known certificate authority (CA) to use in establishing secure communications with any client. In the example, Adam the administrator requests a signed server certificate from the well-known CA and uses the certificate to establish secure communications with a client that is a web application.

  1. Adam generates a key pair on the web server using keytool. Adam uses the key pair to create a certificate signing request (CSR) using keytool. The CSR contains the fully qualified DNS name of the server, the key pair, and other such information to help identity the web server.

  2. Adam sends the CSR that contains the web server’s information to a well-known CA such as DigCert.

  3. The CA uses the CSR to generate a server certificate for the web server. The CA uses its private key to sign the certificate. The server certificate contains the key pair and the web server’s information included in the CSR. The CA signs the certificate with its private key.

  4. The CA sends the signed web server certificate back to Adam.

  5. Adam imports the signed web server certificate into the web server and the web server’s certificate and private key are stored in the KeyStore on the web server.

  6. When a browser accesses the web server, the web server sends a certificate signed by the private key of the CA to the browser. The browser has a copy of the CA’s public key in its TrustStore and uses the public key to decrypt the signature of the CA. Now, the browser will trust any communication coming from this web server.

Example: Secure Handshake for the Client

This example show how the secure handshake occurs between a client and a server so that they can create their own secure communication channel that no other entities can use or access. In this example, Adam the administrator logs into the administration console that is a web application. Every action (except for Adam entering the URL in the web browser) happens automatically between the browser and the web server. No user interaction is required.

  1. Adam adds a the URL into the browser. The browser sends a request to connect to the fully qualified DNS names of the web server.

  2. The web server sends a copy of its server certificate that has been signed by the private key of a well-known CA.

  3. The browser accesses the public key of the well-known CA that is stored in the browser’s TrustStore. The browser uses the public key of the well-known CA to decrypt the signature on the web server’s certificate to verify that the certificate is valid.

  4. The browser generates a session key using the public key in the web server’s certificate.

  5. The browser sends the newly generated session key back to the web server.

  6. The web server uses its private key stored in the KeyStore to decrypt the session key.

  7. The web server verifies that the session key is not on the certificate revocation list (CLR). At this point the secure handshake between the browser and web server is established.

  8. The web server encrypts the data using the session key and sends the data back in ciphertext to the browser. The browser uses the session key to decrypt the data and then uses the session key to encrypt data and then it sends the data back in ciphertext. This secure communication continues until the session ends.

 

 

.