This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery. This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.| IETF Datatracker
Firefox DoH DNS rebinding protection bypass using IPv4-mapped addresses| www.gabriel.urdhr.fr
Introduction to UPnP| www.gabriel.urdhr.fr
DNS rebinding and CSRF vulnerabilites on Samsung TV DIAL implementation| www.gabriel.urdhr.fr
DNS rebinding vulnerabilities in Freebox| www.gabriel.urdhr.fr
1. Introduction| wicg.github.io
By selecting these links, you will be leaving NIST webspace.| nvd.nist.gov
By selecting these links, you will be leaving NIST webspace.| nvd.nist.gov
By selecting these links, you will be leaving NIST webspace.| nvd.nist.gov
This document describes HTCPCP, a protocol for controlling, monitoring, and diagnosing coffee pots. This memo provides information for the Internet community. It does not specify an Internet standard of any kind.| IETF Datatracker
This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]| IETF Datatracker
JSON-RPC 2.0 Specification| www.jsonrpc.org