30 August 2018
Bulletproof TLS Newsletter is a free periodic newsletter bringing you commentary and news surrounding SSL/TLS and Internet PKI, designed to keep you informed about the latest developments in this space. Received monthly by more than 50,000 subscribers. Written by Hanno Böck.
It’s taken much longer than anticipated, but the IETF finally published new version 1.3 of the TLS protocol as RFC 8446.
We have covered the development of TLS 1.3 many times in previous newsletters. The new protocol version deprecates a lot of problematic and insecure practices, including static RSA ciphers without forward secrecy, CBC modes with MAC-then-Encrypt, insecure hashes, and many other old algorithms. New features include, among others, a reworked handshake that removes one round trip, an optional—and controversial—zero round trip mode, encrypted certificates, a safer nonce construction for AEAD modes, and RSA-PSS signatures.
The development of TLS 1.3 took longer than anticipated because many deployed devices didn’t implement the TLS handshake correctly or broke in other ways when they saw an as-yet-unknown TLS version.
Deployment of TLS 1.3 had already started before it was finalized; various browsers and servers supported draft versions. It’s expected that they’ll all soon move to the final version.
The IETF posted a blog entry introducing the new TLS version, and a very detailed description was written by Cloudflare’s Nick Sullivan.
This subscription is just for the newsletter; we won't send you anything else.
Designed by Ivan Ristić, the author of SSL Labs, Bulletproof TLS and PKI, and Hardenize, our course covers everything you need to know to deploy secure servers and encrypted web applications.
Remote and trainer-led, with small classes and a choice of timezones.
Join over 2,000 students who have benefited from more than a decade of deep TLS and PKI expertise.