| < draft-ietf-tls-sslv3-diediedie-01.txt | draft-ietf-tls-sslv3-diediedie-02.txt > | |||
|---|---|---|---|---|
| skipping to change at page 1, line 13 ¶ | skipping to change at page 1, line 13 ¶ | |||
| Network Working Group R. Barnes | Network Working Group R. Barnes | |||
| Internet-Draft M. Thomson | Internet-Draft M. Thomson | |||
| Updates: 5246 (if approved) Mozilla | Updates: 5246 (if approved) Mozilla | |||
| Intended status: Standards Track A. Pironti | Intended status: Standards Track A. Pironti | |||
| Expires: September 2, 2015 INRIA | Expires: September 2, 2015 INRIA | |||
| A. Langley | A. Langley | |||
| March 1, 2015 | March 1, 2015 | |||
| Deprecating Secure Sockets Layer Version 3.0 | Deprecating Secure Sockets Layer Version 3.0 | |||
| draft-ietf-tls-sslv3-diediedie-01 | draft-ietf-tls-sslv3-diediedie-02 | |||
| Abstract | Abstract | |||
| Secure Sockets Layer version 3.0 (SSLv3) [RFC6101] is no longer | Secure Sockets Layer version 3.0 (SSLv3) is no longer secure. This | |||
| secure. This document requires that SSLv3 not be used. The | document requires that SSLv3 not be used. The replacement versions, | |||
| replacement versions, in particular Transport Layer Security (TLS) | in particular Transport Layer Security (TLS) 1.2, are considerably | |||
| 1.2 [RFC5246], are considerably more secure and capable protocols. | more secure and capable protocols. | |||
| This document updates the backward compatibility sections of the TLS | This document updates the backward compatibility sections of the TLS | |||
| RFCs to prohibit fallback to SSLv3. | RFCs to prohibit fallback to SSLv3. | |||
| Status of This Memo | Status of This Memo | |||
| This Internet-Draft is submitted in full conformance with the | This Internet-Draft is submitted in full conformance with the | |||
| provisions of BCP 78 and BCP 79. | provisions of BCP 78 and BCP 79. | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| skipping to change at page 2, line 37 ¶ | skipping to change at page 2, line 37 ¶ | |||
| 1. Introduction | 1. Introduction | |||
| The SSLv3 protocol has been subject to a long series of attacks, both | The SSLv3 protocol has been subject to a long series of attacks, both | |||
| on its key exchange mechanism and on the encryption schemes it | on its key exchange mechanism and on the encryption schemes it | |||
| supports since it was released in 1996. Despite being replaced by | supports since it was released in 1996. Despite being replaced by | |||
| TLS 1.0 [RFC2246] in 1999, and subsequently TLS 1.1 in 2002 [RFC4346] | TLS 1.0 [RFC2246] in 1999, and subsequently TLS 1.1 in 2002 [RFC4346] | |||
| and 1.2 in 2006 [RFC5246], availability of these replacement versions | and 1.2 in 2006 [RFC5246], availability of these replacement versions | |||
| has not been universal. As a result, many implementations of TLS | has not been universal. As a result, many implementations of TLS | |||
| have permitted the negotiation of SSLv3. | have permitted the negotiation of SSLv3. | |||
| The predecessor of SSLv3, SSL version 2, is no longer considered | The predecessor of SSLv3, SSL version 2 [RFC6101], is no longer | |||
| secure [RFC6176]. SSLv3 now follows. | considered secure [RFC6176]. SSLv3 now follows. | |||
| 2. Do Not Use SSL Version 3.0 | 2. Do Not Use SSL Version 3.0 | |||
| SSLv3 MUST NOT be used [RFC2119]. Negotiation of SSLv3 from any | SSLv3 MUST NOT be used [RFC2119]. Negotiation of SSLv3 from any | |||
| version of TLS MUST NOT be permitted. | version of TLS MUST NOT be permitted. | |||
| Any version of TLS is more secure than SSLv3, though the highest | Any version of TLS is more secure than SSLv3, though the highest | |||
| version available is preferable. | version available is preferable. | |||
| Pragmatically, clients MUST NOT send a ClientHello with | Pragmatically, clients MUST NOT send a ClientHello with | |||
| End of changes. 3 change blocks. | ||||
| 7 lines changed or deleted | 7 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||