datatracker.ietf.org
Sign in
Version 5.13.0, 2015-03-25
Report a bug

Preventing cross-protocol attacks in TLS protocol
draft-mavrogiannopoulos-tls-server-key-exchage-00

Document type: Expired Internet-Draft (individual)
Document stream: No stream defined
Last updated: 2012-11-17 (latest revision 2012-05-16)
Intended RFC status: Unknown
Other versions: (expired, archived): plain text, pdf, html

Stream State:No stream defined
Document shepherd: No shepherd assigned

IESG State: Expired
Responsible AD: (None)
Send notices to: No addresses provided

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found here:
http://www.ietf.org/archive/id/draft-mavrogiannopoulos-tls-server-key-exchage-00.txt

Abstract

This memo proposes a fix in the TLS ServerKeyExchange message signature, to prevent cross-protocol attacks.

Authors

Nikos Mavrogiannopoulos <nikos.mavrogiannopoulos@esat.kuleuven.be>

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid)