Network - TLS


TLS is a cryptographic protocol and the successor to SSL, and is described in the RFC 2246 standard.

The protocol name was changed from SSL to TLS when it became a standard.

TLS is a protocol that helps provide privacy between communicating applications. When a server and client communicate, TLS ensures that no third party can overhear or tamper with any messages.

TLS is

It secures the traffic from the beginning of the connection. If you want to secure the traffic in the middle of a plain text connection, you should use StartTLS


Externally Internally
SSL 2.0 SSL 2.0
SSL 3.0 SSL 3.0
TLS 1.0 SSL 3.1
TLS 1.1 SSL 3.2
TLS 1.2 SSL 3.3


Handshake / Procedure

See SSL - Handshake


For SSL/TLS negotiation (handshake) to take place, the system administrator must prepare the minimum of 2 files:



Tls Version Firefox

Chrome dev tool:

Chrome Dev Tool Security

Check / Validate

Documentation / Reference

Discover More
Authentication - HTTP Digest Access Authentication

Digest access authentication is an http authentication method based on authorization entry. It is intended (as a security trade-off) to replace unencrypted HTTP basic access authentication. It is not,...
Cryptography - Key

A key is a parameter used in a cipher algorithm that determines: the encryption operation (forward) and the decryption operation (backward). It's the only secret parameter that protect the anonymity...
Email - Encryption

in Email Message can be encrypted using: (in transit and storage) (in transit and storage) (in transit) S/MIME is a long-standing protocol which allows encrypted and signed messages to...
Smtp Telnet Result
Email - How to verify your SMTP connection and parameters (TSL/SSL) with TELNET ?

An article showing how you can verify the smtp parameters with telnet. You must be in the possession of your smtp parameters. The best way is to use the smtp of your ISP because you will then have access...
Public Key Crypto Pair Key Creation
Enveloped Public Key Encryption (EPKE)

is a encryption method of the public key schema. EPKE is the method used when securing communication on an open networked environment such by making use of the Transport Layer Security (TLS) (ie SSL)...
Git - Credential

Git makes use of a credential helper (an external utility) to be able to retrieve the credentials) The id of a credential (user, ww) is a URL (Credential context) It will lookup a credential with the...
Valid Https
HTTP - HTTPS scheme (HTTP-over-TLS)

The https scheme represents HTTP-over-TLS HTTP is a application protocol (OSI level 7) that is build on TCP as transport layer (OSI level 3) HTTPS is essentially HTTP after the connection has been secured...
How to send an email at the command line with SMTP? Email transaction explained

This page is a how-to that describes how you can transport an email to a SMTP server at the command line using the SMTP protocol for further delivery It will show you the inner mechanisms of SMTP. Below...
Map Of Internet 1973
Network - Latency Calculation (Transfer time)

Rule of thumb to calculate a transfer time of a 20 Gigabyte file over an IP connection with bandwidth that is less than Gigabit. Number of raw data in bits: GBtraffic “”“” When the raw...
Network Cryptographic (SSL/TLS)

Cryptographic in Network (SSL/TLS) in Cryptography. The cryptographic protocols are used to encrypt the data stream between a server (for instance a web server) and a client (for instance, a browser). There...

Share this page:
Follow us:
Task Runner