SSL/TLS Handshake between Server and Client
In today's communication over the internet mostly servers and client communication are using secure communication and that's HTTPs not HTTP. To make this communication secure we use a protocol that is part of session layer (TCP OSI layer) TLS (Transport layer security) before a TCP session is initiated for data flow between a client and server TLS/SSL handshake is a must for HTTPs enabled servers. We will just discuss the type of SSL handshake without going into the details of its process. In SSL handshake process server and client can share their respective certificates (chain of certificates) signed by CA authorities or it can be signed locally (that communication will be only between trusted sources not for everyone over the internet. After receiving the certificate at client and server end respective nodes will verify the certificates either via root CA or via locally CA store certificates (if communication is only in between trusted parties). For a server to serve public users, it's a must that its chain certificates are signed by public trusted intermediates CA like DigiCert so certificate can be validated by client and communication can be enabled as client is now sure that's server is the right one.
Hope so till now you will be able to get understanding of TLS/SSL importance in HTTPs communication. We have two type of SSL/TLS handshake.
1)One way SSL handshake
2)Two-way SSL handshake
One way SSL handshake
Mostly over the public internet to access a website/Application using a browser/SDK one way SSL handshake is used in that case only server present it certificate to the client and then client validated. Server present 3 certificates Root certificate, Intermediates certificate and server/leaf certificate it's a chain of certificates which is signed by using private key of root CA. When a client receives the certificate, it sees that trusted root certificate (private key) is used to sign the server certificate (chain of certificate/Intermediate and server/leaf), so it trusts the certificate and it get verified then client and server communication is enabled for the respective flow, in case provided chain of certificate is not validated clients drop the connection to the server.
Chain of Certificates
2)Two-way SSL handshake
Enterprise DC Engineer
Happy Learning
The limit is the sky.
Comments