Dancing protocols, POODLEs and other tales from TLS

Hanno's Blog

Tuesday, November 4. 2014

Dancing protocols, POODLEs and other tales from TLS


Trackbacks

What the GHOST tells us about free software vulnerability management
On Tuesday details about the security vulnerability GHOST in Glibc were published by the company Qualys. When severe security vulnerabilities hit the news I always like to take this as a chance to learn what can be improved and how to avoid similar incide
Weblog: Hanno's blog
Tracked: Jan 30, 00:52

Comments
Display comments as (Linear | Threaded)

Great article as always, the most complete summary I have seen so far!

You might want to fix a small typo:
> and it's only legit use case – unauthenticated file download
It's "its". ;-)
#1 Ben on 2014-11-04 08:13 (Reply)
Thanks for the article, too.

Another type: they're "forged", not "forget signatures". (Third paragraph on BERserk.)
#2 Peter on 2014-11-04 16:52 (Reply)
Most of the crypto stuff was over my head, so I will stick to typo-hunting:

s/what bytes us/what bites us/

:)
#3 douglas on 2014-11-05 10:42 (Reply)

Add Comment

E-Mail addresses will not be displayed and will only be used for E-Mail notifications.

To prevent automated Bots from commentspamming, please enter the string you see in the image below in the appropriate input box. Your comment will only be submitted if the strings match. Please ensure that your browser supports and accepts cookies, or your comment cannot be verified correctly.
CAPTCHA

 
 

About

This blog is written by Hanno Böck. Unless noted otherwise, its content is licensed as CC0.

You can find my web page with links to my work as a journalist here.

I am also publishing a newsletter about climate change and decarbonization technologies.

The blog uses the free software Serendipity and is hosted at schokokeks.org.

Hanno on Mastodon | Contact / Imprint | Privacy / Datenschutz