2011
DOI: 10.17487/rfc6176
|View full text |Cite
|
Sign up to set email alerts
|

Prohibiting Secure Sockets Layer (SSL) Version 2.0

Abstract: This document requires that when Transport Layer Security (TLS) clients and servers establish connections, they never negotiate the use of Secure Sockets Layer (SSL) version 2.0. This document updates the backward compatibility sections found in the Transport Layer Security (TLS). Status of This Memo This is an Internet Standards Track document. This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 42 publications
(21 citation statements)
references
References 0 publications
0
21
0
Order By: Relevance
“…All TLS versions since SSL3 protect the integrity of the full handshake and SSL2 has been deprecated [61]. miTLS does not support SSL2, and our Theorem 4 guarantees agreement over all handshake parameters, including the version and ciphersuite, on safe epochs, that is, when both peers are honest and negotiate strong handshake algorithms.…”
Section: Attacks Involving Multiple Algorithms and Handshakesmentioning
confidence: 99%
“…All TLS versions since SSL3 protect the integrity of the full handshake and SSL2 has been deprecated [61]. miTLS does not support SSL2, and our Theorem 4 guarantees agreement over all handshake parameters, including the version and ciphersuite, on safe epochs, that is, when both peers are honest and negotiate strong handshake algorithms.…”
Section: Attacks Involving Multiple Algorithms and Handshakesmentioning
confidence: 99%
“…Rationale: Today, SSLv2 is considered insecure [RFC6176]. Rationale: TLS compression has been subject to security attacks, such as the CRIME attack.…”
Section: Ssl/tls Protocol Versionsmentioning
confidence: 99%
“…See current publications by the IETF TLS working group, including RFC 6176 [RFC6176], for guidance on the ciphersuites currently considered to be appropriate for use. Also, see "Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)" [RFC7525] for recommendations on improving the security of software and services using TLS.…”
Section: Tls Requirementsmentioning
confidence: 99%