~~NOTOC~~ ====== 10. TLS/mTLS Kommunikation ====== **Szenarien:** 4 \\ **FFI-Funktionen:** ~30 \\ **Status:** ⏳ Geplant Diese Kategorie umfasst alle Szenarien zur Post-Quantum-sicheren TLS-Kommunikation. Server-Setup, Client-Konfiguration und mTLS-Deployment. ---- ===== Szenarien ===== ^ ID ^ Szenario ^ Beschreibung ^ Komplexität ^ Status ^ | [[.:server_setup|10.1]] | TLS-Server einrichten | Server mit PQ-Zertifikat | ⭐⭐⭐ | ⏳ | | [[.:client_config|10.2]] | TLS-Client konfigurieren | Client für PQ-TLS | ⭐⭐⭐ | ⏳ | | [[.:mtls_deployment|10.3]] | mTLS Deployment | Beidseitige Authentifizierung | ⭐⭐⭐⭐ | ⏳ | | [[.:hybrid_tls|10.4]] | Hybrid-TLS | ECDHE + ML-KEM Key Exchange | ⭐⭐⭐⭐ | ⏳ | ---- ===== TLS 1.3 mit PQ Key Exchange ===== sequenceDiagram participant C as Client participant S as Server Note over C,S: TLS 1.3 Handshake mit Hybrid Key Exchange C->>S: ClientHello (x25519_mlkem768) Note right of C: ECDH + ML-KEM Key Shares S->>C: ServerHello (x25519_mlkem768) S->>C: EncryptedExtensions S->>C: Certificate (ML-DSA-65) S->>C: CertificateVerify S->>C: Finished Note over C: Zertifikat validieren Note over C: Hybrid Key berechnen C->>S: Finished Note over C,S: 🔐 Verschlüsselte Kommunikation ---- ===== Cipher Suites ===== ^ Cipher Suite ^ Key Exchange ^ Authentication ^ Encryption ^ | TLS_AES_256_GCM_SHA384 | x25519_mlkem768 | ML-DSA-65 | AES-256-GCM | | TLS_CHACHA20_POLY1305_SHA256 | x25519_mlkem768 | ML-DSA-65 | ChaCha20-Poly1305 | | TLS_AES_256_GCM_SHA384 | x25519 (Hybrid fallback) | ECDSA P-384 | AES-256-GCM | ---- ===== Server-Konfiguration ===== ^ Server ^ Konfiguration ^ PQ-Support ^ | **Nginx** | ssl_certificate + ssl_protocols | Via OpenSSL 3.6 | | **Apache** | SSLCertificateFile + SSLProtocol | Via OpenSSL 3.6 | | **Kestrel (.NET)** | HttpsConnectionAdapterOptions | Native | | **HAProxy** | bind ... ssl crt | Via OpenSSL 3.6 | ---- ===== Branchenspezifische Anforderungen ===== ^ Branche ^ TLS-Anforderung ^ Besonderheiten ^ | **Energie/SCADA** | TLS 1.2+ | IEC 62351, Offline-Fallback | | **Healthcare** | TLS 1.3 | gematik TI-Konnektor | | **Automotive** | TLS 1.3 | V2X, kurze Handshakes | | **Industrie 4.0** | TLS 1.3 + mTLS | OPC UA Security | ---- ===== Code-Schnellstart ===== ==== Kestrel Server (ASP.NET Core) ==== // Program.cs var builder = WebApplication.CreateBuilder(args); builder.WebHost.ConfigureKestrel(options => { options.ListenAnyIP(443, listenOptions => { listenOptions.UseHttps(httpsOptions => { // PQ-Zertifikat laden var cert = ctx.LoadCertificate("server.crt.pem"); var key = ctx.LoadPrivateKey("server.key.pem", password); httpsOptions.ServerCertificate = ctx.CreateX509Certificate2(cert, key); // TLS 1.3 erzwingen httpsOptions.SslProtocols = SslProtocols.Tls13; // Client-Zertifikat für mTLS httpsOptions.ClientCertificateMode = ClientCertificateMode.RequireCertificate; httpsOptions.ClientCertificateValidation = (cert, chain, errors) => { return ctx.ValidateCertificate(cert, trustStore).IsValid; }; }); }); }); ==== HttpClient mit PQ-TLS ==== // HttpClient für PQ-TLS konfigurieren var handler = new SocketsHttpHandler { SslOptions = new SslClientAuthenticationOptions { EnabledSslProtocols = SslProtocols.Tls13, RemoteCertificateValidationCallback = (sender, cert, chain, errors) => { // PQ-Zertifikatsvalidierung return ctx.ValidateCertificate(cert, trustStore).IsValid; } } }; var httpClient = new HttpClient(handler); var response = await httpClient.GetAsync("https://pq-server.example.com/api/data"); ---- ===== OpenSSL 3.6 Konfiguration ===== # /etc/ssl/openssl.cnf [openssl_init] providers = provider_sect [provider_sect] default = default_sect oqsprovider = oqsprovider_sect [default_sect] activate = 1 [oqsprovider_sect] activate = 1 module = /usr/lib/ossl-modules/oqsprovider.so ---- ===== Verwandte Kategorien ===== ^ Kategorie ^ Beziehung ^ | [[.:zertifikate:start|3. Zertifikate ausstellen]] | Server-Zertifikate | | [[.:authentifizierung:start|9. Authentifizierung]] | mTLS Client-Auth | | [[.:verschluesselung:start|7. Verschlüsselung]] | Key Exchange | ---- << [[de:int:pqcrypt:szenarien:authentifizierung:start|← 9. Authentifizierung]] | [[de:int:pqcrypt:szenarien:start|↑ Szenarien]] | [[.:schluessel:start|11. Schlüsselmanagement →]] >> ---- //Wolfgang van der Stille @ EMSR DATA d.o.o. - Post-Quantum Cryptography Professional// {{tag>kategorie tls mtls https openssl}}