First, SSL1. About SSLThe SSL protocol is located between the TCP/IP protocol and various application layer protocols, providing security support for data communication. The SSL protocol can be divided into two tiers:SSL recording Protocol (SSL
SSL: (SecureSocketLayer, Secure Socket Layer) is a protocol layer between reliable connection-oriented network layer protocol and application layer protocol. SSL authenticates each other, uses digital signatures to ensure integrity, and uses
Status of this MemorandumThis document defines Internet standard protocols for the Internet community and solicit suggestions for improvement. About thisFor the Protocol Status and standardization status, see Internet official protocol standard (Std
ObjectiveDue to the transmission of data in TCP, UDP, etc., it is possible for the packet to be intercepted by others and to parse out the information, which poses a great challenge to information security. The initial SSL protocol was proposed by
Took some time to study the next ktls, which stems from a problem with colleagues, that is, the HTTPS server today and the SCP command to transfer local files, can not use the Sendfile system call!This topic reminds me of a lot of old colleagues, in
In the past, the author has analyzed many methods which can reduce the delay of HTTPS transmission, such as the reuse of distributed Session;With HSTS enabled, the client opens HTTPS jump by default, adopts HTTP/2 transport protocol, and uses chacha2
The "Transport Layer Security Protocol" evolved from SSL can use encryption technology to protect the privacy of TCP communication (information leakage) and integrity (whether data is tampered with during transmission ). RFC 3207 specifies an
This is a creation in
Article, where the information may have evolved or changed.
The Transport Layer Security Protocol (TRANSPORT layer safety, abbreviation: TLS), and its predecessor, Secure Sockets Layer (secure Sockets layer, abbreviation: SSL)
Original: https://www.ssllabs.com/downloads/SSL_TLS_Deployment_Best_Practices_1.3.pdf Translator: Shawn the R0ck, (after correcting themselves plus to the back) SSL /TLS Deployment Best Practices Ivan Risti?version 1.3 (September) Copyright? 2012-201
HTTPS protocols: TLS, SSL, SNI, ALPN, PNP, snialpn
HTTPS is now widely used. It brings security while introducing more complicated concepts to the Web. This includes a series of network protocols that have never been seen before. Now, based on the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.