Welcome to HBH! If you had an account on hellboundhacker.org you will need to reset your password using the Lost Password system before you will be able to login.

Web Server Encryption


Scar0ptics's Avatar
Member
0 0

How many bits is the private key on this site? I know the majority of commercial sites use 2048-bit keys to encrypt internet traffic using symmetric encryption, but I was thinking about going higher than that. I know I will have more overhead, although when you consider the amount of internet traffic that the server will be processing I do not think it will matter much.

How much does it cost to get a certificate verified? I think if all users know the fingerprint of the legit self-signed certificate, then it is more secure that getting a cert that's verified from a known vendor. Also, the asymmetric encryption is only as secure as your server is too.


gobzi's Avatar
Member
10 0

Scar0ptics wrote: Also, the symmetric encryption is only as secure as your server is too.

If you check their cert there is a 4096 public RSA key, meaning that they're using asymmetric encryption. :|


Scar0ptics's Avatar
Member
0 0

I always get the two terminologies mixed up, but that's what I meant. thumbs up

Ok, I found what I was looking for and I was thinking about using the same key size for my server as well.

Symmetric Encryption Symmetric encryption is the oldest and best-known technique. A secret key, which can be a number, a word, or just a string of random letters, is applied to the text of a message to change the content in a particular way. This might be as simple as shifting each letter by a number of places in the alphabet. As long as both sender and recipient know the secret key, they can encrypt and decrypt all messages that use this key. Asymmetric Encryption The problem with secret keys is exchanging them over the Internet or a large network while preventing them from falling into the wrong hands. Anyone who knows the secret key can decrypt the message. One answer is asymmetric encryption, in which there are two related keys–a key pair. A public key is made freely available to anyone who might want to send you a message. A second, private key is kept secret, so that only you know it.

Any message (text, binary files, or documents) that are encrypted by using the public key can only be decrypted by applying the same algorithm, but by using the matching private key. Any message that is encrypted by using the private key can only be decrypted by using the matching public key.

This means that you do not have to worry about passing public keys over the Internet (the keys are supposed to be public). A problem with asymmetric encryption, however, is that it is slower than symmetric encryption. It requires far more processing power to both encrypt and decrypt the content of the message. About Digital Certificates To use asymmetric encryption, there must be a way for people to discover other public keys. The typical technique is to use digital certificates (also known simply as certificates). A certificate is a package of information that identifies a user or a server, and contains information such as the organization name, the organization that issued the certificate, the user's e-mail address and country, and the user's public key.

When a server and client require a secure encrypted communication, they send a query over the network to the other party, which sends back a copy of the certificate. The other party's public key can be extracted from the certificate. A certificate can also be used to uniquely identify the holder.


gobzi's Avatar
Member
10 0

I don't think that you can even use different size keys since the public key t is derived from the private key.

https://en.wikipedia.org/wiki/Key_size

Personally I believe 4096 is too much.

Also remember that you need to consider many things:

-Certificates -Protocol Support (SSL 2 or 3? :o ) -Key Exchange -Cipher Strength

You should check:

https://www.owasp.org/index.php/Testing_for_Weak_SSL/TLS_Ciphers,_Insufficient_Transport_Layer_Protection_(OTG-CRYPST-001)

and

https://www.ssllabs.com/ssltest/


Scar0ptics's Avatar
Member
0 0

I will look into it some more, but I think I have a real nice set up right now. I'll give the option for people to surf the site via http or https when they get to the site. The cert is self-signed and I am using a 4096-bit key.

check it out:

http://i.imgur.com/ypOQ7Ej.png


gobzi's Avatar
Member
10 0

Scar0ptics wrote:

check it out:

http://i.imgur.com/ypOQ7Ej.png

The cypher looks fine to me.

HTTPS should be forced. It's 2016, compute power should not be used as an excuse :P


Scar0ptics's Avatar
Member
0 0

I planned on doing that before releasing it into the wild lol

I would like to give the users an option, but I know that isn't the securest thing to do. :)


Scar0ptics's Avatar
Member
0 0

I got an "A" on SSL labs and the site hosted on my local server is more secure than a banking site. I had to play around with the SSL configurations before getting the A. Yeah, that wouldn't be a bad challenge either lol.

Hellboundhackers has an A- and I have an A :P

Here is my site: https://securitybox.ddns.net