MongooseIM 6.4 brings unified connections, TLS 1.3, FAST auth, and faster startup for a simpler, more secure messaging server.| Erlang Solutions
In the curl project we have a long tradition of supporting a range of different third party libraries that provide similar functionality. The person who builds curl needs to decide which of the backends they want to use out of the provided alternatives. For example when selecting which TLS library to use. This is a … Continue reading Dropping some TLS laggards →| daniel.haxx.se
This is the first part of a series of blog posts about techniques to bypass web filters, looking at increasingly advanced techniques with each part.| blog.compass-security.com
SMTP MTA Strict Transport Security (MTA-STS) is a mechanism enabling mail service providers (SPs) to declare their ability to receive Transport Layer Security (TLS) secure SMTP connections and to specify whether sending SMTP servers should refuse to deliver to MX hosts that do not offer TLS with a trusted server certificate.| IETF Datatracker
年底抽空开发自己的图床服务PICR.zz.ac。图床部署在一台甲骨文 永久免费 ARM 机器上。机器在美西,从国内访问不太稳定。无论是延迟还是丢包率都不太 好看。这种网络环境正是 QUIC + HTTP/3 协议的用武之地。而且我测试发现,在高峰期 UDP 通信反而比 TCP 通信要更稳定。而实践发现 HTTP/3 协议的加载速度确实优于 HTTP/1.1 和 HTTP/2,所以我就给服务器的 Nginx 开启了 HTTP/3 支持。本...| taoshu.in
TLS 1.2 is a widely used security protocol offering encryption and authentication, while TLS 1.3 improves security, speed, and simplicity by removing outdated features.| Encryption Consulting
By Marc Ilunga Key derivation is essential in many cryptographic applications, including key exchange, key management, secure communications, and building robust cryptographic primitives. But it’s …| Trail of Bits Blog
Module ngx_http_ssl_module| nginx.org
Interface that represents an HTTP request.| Cloudflare Docs
This report performs the first public analysis of MMTLS, the main network protocol used by WeChat, an app with over one billion users. The report finds that MMTLS is a modified version of TLS, however some of the modifications have introduced cryptographic weaknesses.| The Citizen Lab
This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery. This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.| IETF Datatracker
Impact of the different Wifi security modes| www.gabriel.urdhr.fr
Introduction to TLS v1.3| www.gabriel.urdhr.fr
Introduction to TLS v1.2| www.gabriel.urdhr.fr
Introduction to the Diffie-Hellman key exchange| www.gabriel.urdhr.fr
DNS rebinding explained| www.gabriel.urdhr.fr
Intro to TLS Certificates| carrickbartle.com
Using alternative browser engines in the European Union| developer.apple.com
Public Key Infrastructure using X.509 (PKIX) certificates are used for a number of purposes, the most significant of which is the authentication of domain names. Thus, certification authorities (CAs) in the Web PKI are trusted to verify that an applicant for a certificate legitimately represents the domain name(s) in the certificate. As of this writing, this verification is done through a collection of ad hoc mechanisms. This document describes a protocol that a CA and an applicant can use to...| IETF Datatracker
This document introduces the concepts that you need to understand how to| Google Cloud
You really shouldn't have to trust the network you're on, but you kind of do| educatedguesswork.org