datatracker.ietf.org
Sign in
Version 5.3.0, 2014-04-12
Report a bug

Preventing cross-protocol attacks in TLS protocol
draft-mavrogiannopoulos-tls-server-key-exchage-00

Document type: Expired Internet-Draft (individual)
Document stream: No stream defined
Last updated: 2012-11-17 (latest revision 2012-05-16)
Intended RFC status: Unknown
Other versions: (expired, archived): plain text, pdf, html

Stream State:No stream defined
Document shepherd: No shepherd assigned

IESG State: Expired
Responsible AD: (None)
Send notices to: No addresses provided

This Internet-Draft is no longer active. Unofficial copies of old Internet-Drafts can be found here:
http://tools.ietf.org/id/draft-mavrogiannopoulos-tls-server-key-exchage

Abstract

This memo proposes a fix in the TLS ServerKeyExchange message signature, to prevent cross-protocol attacks.

Authors

Nikos Mavrogiannopoulos <nikos.mavrogiannopoulos@esat.kuleuven.be>

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid)