RFC Number (or Subseries Number):
Title/Keyword:    
Show AbstractShow Keywords






Any
Standards Track :: 
Best Current Practice
Informational
Experimental
Historic
Unknown
WG Acronym:
Author (surname):
Abstract contains:

7 results

NumberFilesTitleAuthorsDateMore InfoStatus
RFC 5746ASCII, PDF, HTMLTransport Layer Security (TLS) Renegotiation Indication ExtensionE. Rescorla, M. Ray, S. Dispensa, N. OskovFebruary 2010Updates RFC 5246, RFC 4366, RFC 4347, RFC 4346, RFC 2246Proposed Standard
ABSTRACTSecure Socket Layer (SSL) and Transport Layer Security (TLS) renegotiation are vulnerable to an attack in which the attacker forms a TLS connection with the target server, injects content of his choice, and then splices in a new TLS connection from a client. The server treats the client's initial TLS handshake as a renegotiation and thus believes that the initial data transmitted by the attacker is from the same entity as the subsequent client data. This specification defines a TLS extension to cryptographically tie renegotiations to the TLS connections they are being performed over, thus preventing this attack. [STANDARDS-TRACK]
KEYWORDS[--------], ssl, secure socket layer
RFC 6101ASCII, PDF, HTMLThe Secure Sockets Layer (SSL) Protocol Version 3.0A. Freier, P. Karlton, P. KocherAugust 2011    Historic
ABSTRACTThis document is published as a historical record of the SSL 3.0 protocol. The original Abstract follows. This document specifies version 3.0 of the Secure Sockets Layer (SSL 3.0) protocol, a security protocol that provides communications privacy over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. This document defines a Historic Document for the Internet community.
KEYWORDSTransport layer security
RFC 6176ASCII, PDF, HTML, HTML with inline errataProhibiting Secure Sockets Layer (SSL) Version 2.0S. Turner, T. PolkMarch 2011Errata, Updates RFC 2246, RFC 4346, RFC 5246, Updated by RFC 8996Proposed Standard
ABSTRACTThis document requires that when Transport Layer Security (TLS) clients and servers establish connections, they never negotiate the use of Secure Sockets Layer (SSL) version 2.0. This document updates the backward compatibility sections found in the Transport Layer Security (TLS). [STANDARDS-TRACK]
KEYWORDS[--------]
RFC 7457ASCII, PDF, HTML, HTML with inline errataSummarizing Known Attacks on Transport Layer Security (TLS) and Datagram TLS (DTLS)Y. Sheffer, R. Holz, P. Saint-AndreFebruary 2015ErrataInformational
ABSTRACTOver the last few years, there have been several serious attacks on Transport Layer Security (TLS), including attacks on its most commonly used ciphers and modes of operation. This document summarizes these attacks, with the goal of motivating generic and protocol-specific recommendations on the usage of TLS and Datagram TLS (DTLS).
KEYWORDSTransport Layer Security, TLS, Datagram TLS, DTLS, Secure Sockets Layer, SSL, security attacks
RFC 7525ASCII, PDF, HTML, HTML with inline errataRecommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)Y. Sheffer, R. Holz, P. Saint-AndreMay 2015Errata, Obsoleted by RFC 9325, Updated by RFC 8996Best Current Practice
ABSTRACTTransport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are widely used to protect data exchanged over application protocols such as HTTP, SMTP, IMAP, POP, SIP, and XMPP. Over the last few years, several serious attacks on TLS have emerged, including attacks on its most commonly used cipher suites and their modes of operation. This document provides recommendations for improving the security of deployed services that use TLS and DTLS. The recommendations are applicable to the majority of use cases.
KEYWORDSTransport Layer Security, TLS, DTLS, Secure Sockets Layer, SSL
RFC 7568ASCII, PDF, HTMLDeprecating Secure Sockets Layer Version 3.0R. Barnes, M. Thomson, A. Pironti, A. LangleyJune 2015Errata, Updates RFC 5246, Updated by RFC 8996Proposed Standard
ABSTRACTThe Secure Sockets Layer version 3.0 (SSLv3), as specified in RFC 6101, is not sufficiently secure. This document requires that SSLv3 not be used. The replacement versions, in particular, Transport Layer Security (TLS) 1.2 (RFC 5246), are considerably more secure and capable protocols. This document updates the backward compatibility section of RFC 5246 and its predecessors to prohibit fallback to SSLv3.
KEYWORDSSSL, TLS, insecure, diediedie
RFC 7590ASCII, PDF, HTMLUse of Transport Layer Security (TLS) in the Extensible Messaging and Presence Protocol (XMPP)P. Saint-Andre, T. AlkemadeJune 2015Updates RFC 6120Proposed Standard
ABSTRACTThis document provides recommendations for the use of Transport Layer Security (TLS) in the Extensible Messaging and Presence Protocol (XMPP). This document updates RFC 6120.
KEYWORDSExtensible Messaging and Presence Protocol, XMPP, Jabber, Secure Sockets Layer, SSL, Transport Layer Security, TLS, instant messaging, presence, encryption, authentication