Chapter 18. Security: EAP, IPsec, TLS, DNSSEC, and DKIM

Introduction

Basic Principles of Information Security

Threats to Network Communication

Basic Cryptography and Security Mechanisms

Certificates, Certificate Authorities (CAs), and PKIs

TCP/IP Security Protocols and Layering

Network Access Control: 802.1X, 802.1AE, EAP, and PANA

Layer 3 IP Security (IPsec)

Transport Layer Security (TLS and DTLS)

TLS 1.2

TLS Record Protocol
TLS Handshaking Protocols

The normal TLS connection initiation exchange consists of several messages that may be pipelined. Required messages have solid arrows and are shown in boldface type. An abbreviated exchange takes place if a previously existing connection can be restarted. This avoids endpoint authentication, which can be costly for systems with limited processing capabilities.