Explaining TLS 1.3

preview_player
Показать описание
The newest version of the TLS protocol was recently approved by the IETF -- version 1.3. There are several key changes in this protocol such as a requirement to use Perfect Forward Ciphers, and the introduction of a Zero Round Trip Time handshake for session resumption. In this video, John outlines many of the important features of this new protocol.

Рекомендации по теме
Комментарии
Автор

I just think it's awesome that you guy got a polo with the logo backwards. Good work!

BruceRicard
Автор

Your mirrored hand writing is around 1000x nicer than my regular left to right :)

TheBundyworld
Автор

This is amazing! Good you covered both benefits and drawbacks so that those who implement have a very good picture of roadblocks as well.

rdshenai
Автор

Are you writing backwards? Sorry for the off topic but it is blowing my mind.

xHuge
Автор

John you are the best man keep on ROCKING!!!

netsnower
Автор

Hello, do you think Websockets are susceptible to 0rtt replay attacks? I mean if tou can trigger a sensitive operation via a websocket message.

ZelenoJabko
Автор

Thank you, content and presentation is excellent.

I do not understand reply attack - even though the intruder gets access to an existing session, he does not have secret key, symmetric key to encrypt and decrypt information. Can you please help me understand? Thank you.

lokeshbangalore
Автор

When using tlsv1.3 or an older version that is configured to exclusively use PFS ciphers; is there a need to import the private key file that gets generated when we create the CSR? It seems that PFS ciphers generate their own private key, therefore importing a private key is not necessary. Is this assumption correct?

danpacheco
Автор

Every session of yours is indespensable!!!

himanshusharma
Автор

Thanks John, as always a very nice video !!

TheMikael
Автор

I feel like the title is misleading. This is rather explaining why you should use TLS 1.3, a high level overview of what it adds on top of TLS 1.2, but not really explaining TLS 1.3.

alin-valentinradulescu
Автор

can anyone share me a link for what was the SSL certificate and what is TSL certificate how to work on both

vishnudixit
Автор

Since when does Matthew McConaughey give lightboard sessions on YouTube

patcoder
Автор

You were wrong with explaining PFS, you never share your private key it simply a method to assure you that even if the server you are talking with was compromise i.e. an attacker somehow get hold of his private key he than this attacker still need to decrypt each session you do with that server separately as the session key will change (new random roll) for each session. so it is going to be a bit harder.

neilreonen
Автор

It’s hard for our little mobile phones to do these complicated computational stuff

My iPhone: Laughs in A13 bionic which could very well compete with Intel’s core i5

realtopg
Автор

Technology explained as if nutritional guide

Mike-ciio
Автор

LOL ok "server, you're responsible for making sure no replay attacks can occur. please configure properly..."

JasonSmith-fuoi