Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

Deprecating Secure Sockets Layer Version 3.0 (RFC7568)

IP.com Disclosure Number: IPCOM000242215D
Original Publication Date: 2015-Jun-01
Included in the Prior Art Database: 2015-Jun-26
Document File: 14 page(s) / 14K

Publishing Venue

Internet Society Requests For Comment (RFCs)

Related People

R. Barnes: AUTHOR [+4]

Abstract

Since it was released in 1996, the SSLv3 protocol [RFC6101] has been subject to a long series of attacks, both on its key exchange mechanism and on the encryption schemes it supports. Despite being replaced by TLS 1.0 [RFC2246] in 1999, and subsequently TLS 1.1 in 2002 [RFC4346] and 1.2 in 2006 [RFC5246], availability of these replacement versions has not been universal. As a result, many implementations of TLS have permitted the negotiation of SSLv3.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 20% of the total text.

Internet Engineering Task Force (IETF)                         R. Barnes Request for Comments: 7568                                    M. Thomson Updates: 5246                                                    Mozilla Category: Standards Track                                     A. Pironti ISSN: 2070-1721                                                    INRIA                                                               A. Langley                                                                   Google                                                                June 2015

               Deprecating Secure Sockets Layer Version 3.0

Abstract

   The Secure Sockets Layer version 3.0 (SSLv3), as specified in RFC    6101, is not sufficiently secure.  This document requires that SSLv3    not be used.  The replacement versions, in particular, Transport    Layer Security (TLS) 1.2 (RFC 5246), are considerably more secure and    capable protocols.

   This document updates the backward compatibility section of RFC 5246    and its predecessors to prohibit fallback to SSLv3.

Status of This Memo

   This is an Internet Standards Track document.

   This document is a product of the Internet Engineering Task Force    (IETF).  It represents the consensus of the IETF community.  It has    received public review and has been approved for publication by the    Internet Engineering Steering Group (IESG).  Further information on    Internet Standards is available in Section 2 of RFC 5741.

   Information about the current status of this document, any errata,    and how to provide feedback on it may be obtained at    http://www.rfc-editor.org/info/rfc7568.

Barnes, et al.               Standards Track                    [Page 1]
 RFC 7568                   SSLv3 Is Not Secure                 June 2015

 Copyright Notice

   Copyright (c) 2015 IETF Trust and the persons identified as the    document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal    Provisions Relating to IETF Documents    (http://trustee.ietf.org/license-info) in effect on the date of    publication of this document.  Please review these documents    carefully, as they describe your rights and restrictions with respect    to this document.  Code Components extracted from this document must    include Simplified BSD License text as described in Section 4.e of    the Trust Legal Provisions and are provided without...