syselement's Blog
🏠 Home BlogXGitHub📚 Buy Me a Book📧 Contact
  • 🏠Home
  • 🔳Operating Systems
    • 🐧Linux
      • 📃Everything Linux
      • Linux Distros
        • Kali Linux - VM
        • ParrotOS - VM
        • Rocky Linux
        • Ubuntu Desktop - VM
        • Ubuntu Server - VM
      • Linux Tools
        • BookStack
        • Nessus Essentials
        • SysReptor
        • Terminator
        • UniFi
        • Zsh & Oh-My-Zsh
    • 🪟Windows
      • 📃Everything Windows
      • Windows Tools
        • Hashcat
        • Vagrant
      • Windows Virtual Machines
        • Windows 11 - VM
        • Windows Server 2025 - VM
  • 📝Courses Notes
    • eLearnSecurity / INE
      • eJPT - PTSv2
      • eMAPT
      • ICCA
    • Practical Networking
      • Practical TLS
        • TLS/SSL Overview
        • Cryptography
        • x509 Certificates and Keys
        • Security through Certificates
        • Cipher Suites
        • TLS/SSL Handshake
        • TLS Defenses
        • TLS Attacks & Vulnerabilities
        • What's new in TLS 1.3?
        • TLS 1.3 Under the Hood
        • TLS 1.3 Extensions
        • 🌐Practical TLS References
    • TCM Security
      • Linux101
      • MAPT
      • PEH
  • 🖥️Cyber Everything
    • 📌Generic Resources
      • Cryptography
      • CVSS 3.1
      • Cyber Threat Intelligence (CTI)
    • 📱Mobile
      • Apps Lab
        • Android Rooting Guide
        • iOS Jailbreak Guide
        • Intercepting Android App Traffic
      • OWASP MAS
        • MASTG Techniques
        • MASTG Tests
        • MASTG Theory
        • MASVS Notes
      • Tools
        • MobSF
    • 🧬Network
      • Commands
        • Linux Privesc Commands
        • Networking Commands
    • 🌐Web
      • API
        • API Sec Fundamentals
        • API Penetration Testing
      • PortSwigger Academy
        • Server-Side Topics
        • Client-Side Topics
        • Advanced topics
        • 🔬Vulnerability Labs
    • ✍️Writeups & Walkthroughs
      • 🌩️TryHackMe
        • 📖Learn
          • Cyber Threat Intelligence
          • Intro to Defensive Security
          • Juice Shop
          • Upload Vulnerabilities
        • 🎯Practice
          • Easy
            • Blaster
            • Blue
            • Bolt
            • Chill Hack
            • Ice
            • Ignite
            • Retro
            • Startup
          • Medium
            • Blog
      • 📦HackTheBox
      • 🚩Capture The Flag
  • ♾️DevOps Everything
    • 🔗DevOps Resources
      • Introduction to DevOps
      • Ansible
      • Docker
      • Git
      • Kubernetes
      • Terraform
      • Vim
  • 🔬Home Lab
    • 🖥️Hypervisors
      • Hyper-V
        • Windows WSL
      • Proxmox
        • Proxmox VE
        • Proxmox Upgrade 7 to 8
      • VMware
        • VMware Workstation Pro
    • 🔴Offensive Labs
      • Hashcat Password Cracking
      • Metasploitable3
    • 🔵Defensive Labs
      • Detection Lab
    • ⚪Misc Labs
      • Bitwarden On-Premise
      • OpenWrt & WiFi Exploitation
      • Passbolt CE - Ubuntu Server
Powered by GitBook
On this page
  • Introduction
  • TLS/SSL Versions

Was this helpful?

Edit on GitHub
  1. Courses Notes
  2. Practical Networking
  3. Practical TLS

TLS/SSL Overview

PreviousPractical TLSNextCryptography

Last updated 1 year ago

Was this helpful?

Introduction

(Secure Sockets Layer) and (Transport Layer Security) are both protocols used to secure internet communication. SSL was the original, but it has largely been replaced by TLS due to security improvements.

By creating a secure, protected "tunnel" across the Internet, they encrypt data to keep it private and secure while it's being transmitted between a client (like a web browser) and a server (like a website). TLS is the newer (SSL renamed by IETF), more secure version that's widely used today. The 2 terms are often used interchangeably.

  • HTTPS - HTTP secured by an SSL/TLS

  • SSL VPN for private corporate network

  • SSL VPN via public VPN provider

The purpose of SSL/TLS is to protect the data that can be captured.

  • Confidentiality - data accessible only by client and server - Encryption

  • Integrity - data is not modified between client and server - Hashing

  • Authentication - client/server are who they say they are - PKI

The data put on the wire is still passing through someone else's network.

  • Anti-Replay - prevents attackers from reusing intercepted data to gain unauthorized access. It provides sequence numbers built in to integrity and authentication mechanism.

  • Non-Repudiation - ensures parties can't deny their involvement in a transaction or communication.

The key players of the SSL/TLS ecosystem are:

  • Client - entity initiating the TLS handshake, e.g. web browser, apps, IoT, etc

    • optionally authenticated at the SSL layer (rarely provides a certificate)

  • Server - entity receiving the TLS handshake, e.g. web server, etc

    • always authenticated (the user has to know what server he is talking to)

  • Certificate Authority (CA) - governing entity that issues digital certificates to servers

    • trusted by client and server

    • provides Trust Anchor - if the client trusts the CA, it can trust what the CA trusts

    • : , , , , , , ...

TLS/SSL Versions

Security must be balanced with Accessibility, based on the usage case.

SSL v3.0 (declared insecure as of Oct 2014 due to POODLE attack), as a complete redesign of SSL v2.0 is the foundation of the following TLS versions (TLS 1.0, 1.1, 1.2).

TLS v1.0

  • almost identical to SSL v3.0

  • Vulnerability: BEAST attack on CBC ciphers

  • protocol deprecated on March 2021

TLS v1.1

  • deprecated EXPORT grade ciphers

  • protection against CBC attacks

  • protocol deprecated on March 2021

  • improved security of key generation

  • support for AEAD ciphers (Authentication Encryption with Associated Data)

  • secure, recommended

  • major changes from prior TLS/SSL versions, favors security and simplicity

  • shorted handshake

  • forward secrecy required

  • 0-RTT resumption

  • AEAD ciphers required


Protocol ownership transferred to

📝
SSL
TLS
CAs organizations
Let's Encrypt
IdenTrust
GlobalSign
Sectigo
DigiCert
GoDaddy
SSL Guide – The Complete Guide to SSL/TLS Certificates
Qualys SSL Labs - SSL Pulse
TLS vs SSL: What's the Difference? Which One Should You Use? - Kinsta.com
I.E.T.F.
TLS v1.2
TLS v1.3
SSL/TLS Versions - aboutssl.org
Qualys SSL Labs - SSL Pulse
TLS 1.3 Usage - Kinsta.com
TLS 1.2 usage - Kinsta.com