Catalog / Cybersecurity Protocols Cheatsheet
Cybersecurity Protocols Cheatsheet
A quick reference guide to essential cybersecurity protocols, their functions, and configurations, designed to help security professionals and developers implement robust security measures.
Encryption Protocols
SSL/TLS
Purpose: |
Secures communication over networks; encrypts data between client and server. |
Function: |
Uses certificates to authenticate the server; negotiates encryption algorithms and keys. |
Configuration: |
Configured on web servers; requires a valid SSL/TLS certificate obtained from a Certificate Authority (CA). |
Cipher Suites: |
Negotiate encryption algorithm. Examples: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_AES_256_GCM_SHA384. |
Common Issues: |
Certificate expiration, weak cipher suites, protocol downgrade attacks (e.g., POODLE, BEAST). |
Best Practices: |
Regularly update certificates, use strong cipher suites, disable SSLv3/TLS 1.0, enforce HTTPS with HSTS. |
IPsec
Purpose: |
Secures IP communications by authenticating and encrypting each IP packet. |
Function: |
Operates at the network layer; provides security for VPNs and other network connections. |
Configuration: |
Configured on routers, firewalls, and servers; involves setting up Security Associations (SAs) using IKE. |
Protocols: |
Authentication Header (AH), Encapsulating Security Payload (ESP), Internet Key Exchange (IKE). |
Common Issues: |
NAT traversal issues, incorrect SA configuration, key management complexities. |
Best Practices: |
Use strong encryption algorithms (e.g., AES), implement perfect forward secrecy (PFS), regularly update keys. |
SSH
Purpose: |
Provides secure remote access to systems; encrypts communication channels. |
Function: |
Uses public-key cryptography to authenticate clients and encrypt data; replaces insecure protocols like Telnet and FTP. |
Configuration: |
Configured on servers; involves setting up SSH keys and configuring SSH daemon (sshd). |
Authentication Methods: |
Password authentication, public-key authentication, Kerberos, GSSAPI. |
Common Issues: |
Weak password policies, insecure SSH configurations, brute-force attacks. |
Best Practices: |
Disable password authentication, use public-key authentication, regularly update SSH server, use fail2ban to block brute-force attacks. |
Authentication Protocols
Kerberos
Purpose: |
Provides strong authentication for client/server applications using secret-key cryptography. |
Function: |
Relies on a trusted third party (Key Distribution Center - KDC) to authenticate users and issue tickets. |
Configuration: |
Configured on domain controllers; involves setting up realms and registering services. |
Components: |
Authentication Server (AS), Ticket Granting Server (TGS), Kerberos clients. |
Common Issues: |
Clock synchronization issues, KDC compromise, replay attacks. |
Best Practices: |
Maintain clock synchronization, secure KDC, regularly update Kerberos software, monitor for suspicious activity. |
RADIUS
Purpose: |
Provides centralized authentication, authorization, and accounting (AAA) for network access. |
Function: |
Authenticates users connecting to network devices (e.g., routers, switches, wireless access points). |
Configuration: |
Configured on RADIUS servers; involves setting up clients (network devices) and user accounts. |
Attributes: |
Username, password, service type, Framed-IP-Address, NAS-IP-Address. |
Common Issues: |
Shared secret compromise, dictionary attacks, denial-of-service attacks. |
Best Practices: |
Use strong shared secrets, implement rate limiting, monitor for suspicious activity, use RADIUS over IPsec. |
LDAP
Purpose: |
Provides directory services for managing user accounts, resources, and policies. |
Function: |
Allows applications to authenticate users and retrieve information from a directory. |
Configuration: |
Configured on LDAP servers; involves setting up directory structure and user accounts. |
Operations: |
Bind, search, add, modify, delete. |
Common Issues: |
LDAP injection, anonymous binds, weak access controls. |
Best Practices: |
Disable anonymous binds, enforce strong access controls, sanitize user inputs, use LDAP over TLS (LDAPS). |
Network Security Protocols
DNSSEC
Purpose: |
Secures the Domain Name System (DNS) by adding cryptographic signatures to DNS records. |
Function: |
Prevents DNS spoofing and cache poisoning attacks by verifying the authenticity of DNS data. |
Configuration: |
Configured on DNS servers; involves generating and managing cryptographic keys and signing DNS zones. |
Record Types: |
RRSIG, DNSKEY, DS, NSEC. |
Common Issues: |
Key management complexities, zone signing errors, algorithm vulnerabilities. |
Best Practices: |
Regularly rotate keys, use strong cryptographic algorithms, monitor for DNSSEC validation failures, implement NSEC3 for zone enumeration protection. |
HTTPS
Purpose: |
Secure version of HTTP which enables encrypted communication with Transport Layer Security (TLS) or Secure Sockets Layer (SSL) |
Function: |
Protects the integrity and confidentiality of data transmitted between web browsers and web servers |
Configuration: |
Requires an SSL/TLS certificate to be installed on the web server. The server is configured to listen for incoming connections on port 443 |
Protocols: |
TLS (Transport Layer Security) and SSL (Secure Sockets Layer) |
Common Issues: |
Weak cipher suites, mixed content warnings, and vulnerabilities related to SSL/TLS protocols (e.g., Heartbleed, POODLE). |
Best Practices: |
Always use HTTPS, enforce HTTP Strict Transport Security (HSTS) to prevent protocol downgrade attacks, regularly update SSL/TLS certificates. |
SFTP
Purpose: |
Secure File Transfer Protocol. Provides secure file transfer over a reliable data stream. Uses SSH to establish secure connections |
Function: |
Performs all operations over an encrypted SSH transport. |
Configuration: |
SFTP server is part of SSH server package. |
Common Issues: |
Man-in-the-middle attacks, brute force attacks. |
Best Practices: |
Enforce strong password policies, monitor SFTP activity, use key-based authentication, disable password-based authentication. |
Wireless Security Protocols
WPA3
Purpose: |
Latest wireless security protocol to replace WPA2. |
Function: |
Offers improved encryption and authentication compared to WPA2. |
Configuration: |
Configure on wireless routers and devices. Requires compatible hardware. |
Key Features: |
Simultaneous Authentication of Equals (SAE) - protects against dictionary attacks, enhanced encryption. |
Common Issues: |
Compatibility issues with older devices, configuration errors. |
Best Practices: |
Use WPA3 where possible, update firmware regularly, use strong passwords. |
WPA2
Purpose: |
Wireless security protocol to secure Wi-Fi networks. |
Function: |
Uses Advanced Encryption Standard (AES) with Counter Mode Cipher Block Chaining Message Authentication Code Protocol (CCMP). |
Configuration: |
Configured on wireless routers and devices. Choose WPA2-Personal (PSK) or WPA2-Enterprise (802.1X). |
Key Features: |
CCMP encryption, stronger than WEP and WPA. |
Common Issues: |
PSK cracking, vulnerabilities like KRACK attack. |
Best Practices: |
Use strong passwords, update firmware regularly, consider WPA3 if available. |
WEP
Purpose: |
Legacy wireless security protocol. Obsolete and insecure. |
Function: |
Uses RC4 encryption with a 40-bit or 104-bit key. |
Configuration: |
Avoid using WEP. If unavoidable, change the WEP key frequently. |
Key Features: |
Simple to configure, but easily cracked. |
Common Issues: |
Easily cracked using readily available tools. |
Best Practices: |
Do not use WEP. Upgrade to WPA2 or WPA3 immediately. |