Search Results
Search type | Search syntax |
---|---|
Tags | [tag] |
Exact | "words here" |
Author |
user:1234 user:me (yours) |
Score |
score:3 (3+) score:0 (none) |
Answers |
answers:3 (3+) answers:0 (none) isaccepted:yes hasaccepted:no inquestion:1234 |
Views | views:250 |
Code | code:"if (foo != bar)" |
Sections |
title:apples body:"apples oranges" |
URL | url:"*.example.com" |
Saves | in:saves |
Status |
closed:yes duplicate:no migrated:no wiki:no |
Types |
is:question is:answer |
Exclude |
-[tag] -apples |
For more details on advanced search visit our help page |
SSL (Secure Sockets Layer) and/or TLS (Transport Layer Security)
8
votes
Accepted
if SSL v3 disabled on www.google.com, why does openssl output suggest SSL v3 is being used?
These messages are coming from SSL_state_string_long, and many of them were updated in version 1.1.0 from "SSLv3 [message]" to "SSLv3/TLS [message]", so my guess would be that OpenSSL uses the same code … for SSL 3 and TLS handshakes, and you're just using a version before 1.1.0 where the messages weren't yet updated to account for that. …
11
votes
Accepted
Why using the premaster secret directly would be vulnerable to replay attack?
I think you misunderstand what a replay attack is. You are correct that a MitM wouldn't be able to see the premaster secret, but an attacker can still cause trouble even if they can't decrypt anything …
1
vote
How does DTLS replace the transport encryption of TLS?
The section you linked to says that the NULL cipher (no encryption) works the same as in TLS, and that RC4 (the only stream cipher in TLS 1.2) cannot be used for DTLS. … The next three subsections indicate that block ciphers and AEAD ciphers work exactly the same in DTLS as in TLS, and that new cipher suits must specify if they are suitable for DTLS along with what changes …
1
vote
How do you fix this error in IE: "The security certificate presented by this website was iss...
You're accessing https://localhost/, while the certificate was probably issued for some public domain that you own. Standards compliant web browsers will check the certificate to make sure that one of …
7
votes
Accepted
HSTS vs RewriteRule
No, a rewrite rule is still vulnerable to attacks like sslstrip.
If you look at the documentation or try it out, you'll see that your rewrite rule is actually creating a redirect.
8
votes
Accepted
Why isn't HTTPS enough to defeat an evil twin attack?
In general, HTTPS should be enough as long as you don't do anything crazy like installing extra trusted root certificates, or bypassing warnings because you want to see the page.
But, that assumes on …
2
votes
What is a "non-stitched" ciphersuite?
The very next sentence gives a short explanation:
Stitched ciphersuites are optimised implementations of certain commonly used
ciphersuites.
Googling, the term is better explained in the paper …
3
votes
Accepted
Why does Authenticated Encryption not decrease confidentiality?
Instead, only the MAC will be checked, which should be considerably faster.
Not so. In fact, it can be the opposite.
For Encrypt then MAC, you'd have to MAC the entire ciphertext to test a MAC …
5
votes
Accepted
client/server trust after authenticating over HTTPS then dropping to plaintext?
It sounds like you need to do some profiling and optimizing, but I can almost guarantee that TLS isn't going to be the bottleneck. …
0
votes
Why are cryptographically secure random number generators required for shared keys?
Predicting future output from existing output is only one of many problems a PRNG can have. I'm not an expert in this area, but just looking at PRNG on Wikipedia, I see it links to RANDU, which, among …
1
vote
What does "This request does not comply with Chrome's Certificate Transparency policy." in C...
According Chrome's certificate transparency policy, all EV certs are required to be CT Qualified to be recognized as EV, and other certs may be required to be CT Qualified basically at their discretio …
1
vote
Why do some root and intermediate certificate authorities have "G2" or "G3" in the name?
Quoted from Tombart's answer on Crypto SE:
Yes, G stands for "Generation". When CA needs to get a new chain they
just increment the generation number.
For example GoDaddy's signatures:
…
3
votes
Accepted
How does selection between multiple available certificate chains work?
This question is somewhat related, and you can see from StackzOfZtuff's answer that only one chain can be sent. When connecting with openssl s_client -connect letsencrypt.org:443 it's returning the ch …
2
votes
Is There Any Real Benefit To Encrypting A Password Before Sending Over SSL
There would only be benefit if for some reason you can't trust that the TLS connection is secure, in which case you would be much better off fixing the TLS connection. …
17
votes
Accepted
Does HSTS protect against a rogue CA issuing a illegitimate valid certificate?
If an attacker has a Man in the Middle position, they may be able to tell which browser is establishing a connection early on (eg due to minor behavioral differences in the TLS stack). …