Skip to main content
The 2024 Developer Survey results are live! See the results
Search type Search syntax
Tags [tag]
Exact "words here"
Author user:1234
user:me (yours)
Score score:3 (3+)
score:0 (none)
Answers answers:3 (3+)
answers:0 (none)
isaccepted:yes
hasaccepted:no
inquestion:1234
Views views:250
Code code:"if (foo != bar)"
Sections title:apples
body:"apples oranges"
URL url:"*.example.com"
Saves in:saves
Status closed:yes
duplicate:no
migrated:no
wiki:no
Types is:question
is:answer
Exclude -[tag]
-apples
For more details on advanced search visit our help page
Results tagged with
Search options not deleted user 151903

SSL (Secure Sockets Layer) and/or TLS (Transport Layer Security)

8 votes
Accepted

if SSL v3 disabled on www.google.com, why does openssl output suggest SSL v3 is being used?

These messages are coming from SSL_state_string_long, and many of them were updated in version 1.1.0 from "SSLv3 [message]" to "SSLv3/TLS [message]", so my guess would be that OpenSSL uses the same code … for SSL 3 and TLS handshakes, and you're just using a version before 1.1.0 where the messages weren't yet updated to account for that. …
AndrolGenhald's user avatar
11 votes
Accepted

Why using the premaster secret directly would be vulnerable to replay attack?

I think you misunderstand what a replay attack is. You are correct that a MitM wouldn't be able to see the premaster secret, but an attacker can still cause trouble even if they can't decrypt anything …
AndrolGenhald's user avatar
1 vote

How does DTLS replace the transport encryption of TLS?

The section you linked to says that the NULL cipher (no encryption) works the same as in TLS, and that RC4 (the only stream cipher in TLS 1.2) cannot be used for DTLS. … The next three subsections indicate that block ciphers and AEAD ciphers work exactly the same in DTLS as in TLS, and that new cipher suits must specify if they are suitable for DTLS along with what changes …
AndrolGenhald's user avatar
1 vote

How do you fix this error in IE: "The security certificate presented by this website was iss...

You're accessing https://localhost/, while the certificate was probably issued for some public domain that you own. Standards compliant web browsers will check the certificate to make sure that one of …
AndrolGenhald's user avatar
7 votes
Accepted

HSTS vs RewriteRule

No, a rewrite rule is still vulnerable to attacks like sslstrip. If you look at the documentation or try it out, you'll see that your rewrite rule is actually creating a redirect.
AndrolGenhald's user avatar
8 votes
Accepted

Why isn't HTTPS enough to defeat an evil twin attack?

In general, HTTPS should be enough as long as you don't do anything crazy like installing extra trusted root certificates, or bypassing warnings because you want to see the page. But, that assumes on …
AndrolGenhald's user avatar
2 votes

What is a "non-stitched" ciphersuite?

The very next sentence gives a short explanation: Stitched ciphersuites are optimised implementations of certain commonly used ciphersuites. Googling, the term is better explained in the paper …
AndrolGenhald's user avatar
3 votes
Accepted

Why does Authenticated Encryption not decrease confidentiality?

Instead, only the MAC will be checked, which should be considerably faster. Not so. In fact, it can be the opposite. For Encrypt then MAC, you'd have to MAC the entire ciphertext to test a MAC …
AndrolGenhald's user avatar
5 votes
Accepted

client/server trust after authenticating over HTTPS then dropping to plaintext?

It sounds like you need to do some profiling and optimizing, but I can almost guarantee that TLS isn't going to be the bottleneck. …
AndrolGenhald's user avatar
0 votes

Why are cryptographically secure random number generators required for shared keys?

Predicting future output from existing output is only one of many problems a PRNG can have. I'm not an expert in this area, but just looking at PRNG on Wikipedia, I see it links to RANDU, which, among …
AndrolGenhald's user avatar
1 vote

What does "This request does not comply with Chrome's Certificate Transparency policy." in C...

According Chrome's certificate transparency policy, all EV certs are required to be CT Qualified to be recognized as EV, and other certs may be required to be CT Qualified basically at their discretio …
AndrolGenhald's user avatar
1 vote

Why do some root and intermediate certificate authorities have "G2" or "G3" in the name?

Quoted from Tombart's answer on Crypto SE: Yes, G stands for "Generation". When CA needs to get a new chain they just increment the generation number. For example GoDaddy's signatures: …
AndrolGenhald's user avatar
3 votes
Accepted

How does selection between multiple available certificate chains work?

This question is somewhat related, and you can see from StackzOfZtuff's answer that only one chain can be sent. When connecting with openssl s_client -connect letsencrypt.org:443 it's returning the ch …
AndrolGenhald's user avatar
2 votes

Is There Any Real Benefit To Encrypting A Password Before Sending Over SSL

There would only be benefit if for some reason you can't trust that the TLS connection is secure, in which case you would be much better off fixing the TLS connection. …
AndrolGenhald's user avatar
17 votes
Accepted

Does HSTS protect against a rogue CA issuing a illegitimate valid certificate?

If an attacker has a Man in the Middle position, they may be able to tell which browser is establishing a connection early on (eg due to minor behavioral differences in the TLS stack). …
AndrolGenhald's user avatar

15 30 50 per page