HTTPS at Windows Server 2008 ~ Riguest

Thursday, February 12, 2015

HTTPS at Windows Server 2008

Basic Concept

Hypertext Transfer Protocol Secure (HTTPS) is a communications proto-col for secure communication over a computer network, with especially wide deployment on the Internet. Technically, it is not a protocol in and of itself; rather, it is the result of simply layering the Hypertext Transfer Protocol (HTTP) on top of the SSL/TLS protocol, thus adding the security capabilities of SSL/TLS to standard HTTP communications. The main motivation for HTTPS is to prevent wiretapping and man-in-the-middle attacks.
The security of HTTPS is therefore that of the underlying SSL/TLS, which uses long-term public and secret keys to exchange a short term session key to encrypt the data flow between client and server. perfect forward secrecy (PFS) can prevent the short-term session key to be derived from the long-term asymmetric secret key; however, with multitudes of co-existing standards of differing quality there is no guarantee for the average end-user that any kind of high quality security features or ciphers are used. Indeed PFS is not widely adopted.
X.509 certificates are used to guarantee one is talking to the partner with whom one wants to talk. As a consequence,certificate authorities and a public key infrastructure are necessary to verify the relation between the owner of a certificate and the certificate, as well as to generate, sign, and administer the validity of certificates. While this can be more beneficial than verifying the identities via a web of trust, the 2013 mass surveillance disclosures made it more widely known that certificate authorities are a weak point from a security standpoint, allowing man-in-the-middle attacks.
In its popular deployment on the internet, HTTPS provides authentication of the website and associated web server that one is communicating with, which protects against man-in-the-middle attacks. Additionally, it provides bidirectional encryption of communications between a client and server, which protects against eavesdropping and tampering with and/or forging the contents of the communication. In practice, this provides a reasonable guarantee that one is communicating with precisely the website that one intended to communicate with (as opposed to an imposter), as well as ensuring that the contents of communications between the user and site cannot be read or forged by any third party.
Historically, HTTPS connections were primarily used for payment transactions on the World Wide Web, e-mail and for sensitive transactions in corporate information systems. In the late 2000s and early 2010s, HTTPS began to see widespread use for protecting page authenticity on all types of websites, securing accounts and keeping user communications, identity and web browsing private.
A site must be completely hosted over HTTPS, without having some of its contents loaded over HTTP, or the user will be vulnerable to some attacks and surveillance. For example, having scripts etc. loaded insecurely on an HTTPS page makes the user vulnerable to attacks. Also having only a certain page that contains sensitive information (such as a log-in page) of a website loaded over HTTPS, while having the rest of the website loaded over plain HTTP, will expose the user to attacks. On a site that has sensitive information somewhere on it, every time that site is accessed with HTTP instead of HTTPS, the user and the session will get exposed. Similarly, cookies on a site served through HTTPS have to have the secure attributeenabled.

Purpose


1. To know "How to configure HTTP Secure in Windows Server 2008"
2. To learn "How to add some features in Windows Server 2008"
3. To configure HTTPS

Step


1. Open server manager and click roles and add Roles 


 2. Select Web Server, and than Add Required Features



 3. Select WEB Server (IIS), then click next


4. It's an Introduction of WEB Server, Click Next after read it 


5. Select IIS 6 Management Compability, and then click next


6. After the you select IIS 6 Management, and then click Install 


 7. Wait just a few moment


8. The Installation has finished, click close 


 9. Open IIS Manager in Start menu


10. Select your server, and select Server Certificate, then create certificate 



11. Give name and click ok, and then wait a few moment 



 12. Open your DNS in start menu


13. Make a new host, with following the picture below





14. add a WEB site 


15. Give a site name, Binding and Certificate. Don't forget to search wwwroot 


 Browse For Folder


 16. Ping the Server


17. Open your Mozilla Browser and browse your HTTPS. Select "I Understand the Risks". and then Add Exception.. 



18. Confirm Security Exception the HTTPS 


19. Rebrowse The HTTPS and The Appear will be looked 


 20. Open Computer in Start menu


 21. Open the notepad and Edit the HTML to change the appear of the WEB


22. Edit the HTML 
a. Default HTML

b. Edited HTML

23. The Configuration has finished

source : http://en.wikipedia.org/wiki/HTTP_Secure

0 comments:

Post a Comment