Literatur
Bodo Möller, Thai Duong, Krzysztof Kotowicz; This POODLE Bites: Exploting the SSL 3.0 Fallback; https://www.openssl.org/~bodo/ssl-poodle.pdf
Mozilla; Attacks on SSL and TLS, https://wiki.mozilla.org/Security/Server_Side_TLS#Attacks_on_SSL_and_TLS
Ivan Ristić; Bulletproof SSL and TLS
Ivan Ristić; OpenSSL Cookbook
Ivan Ristić; SSL/TLS Deployment Best Practices, https://www.ssllabs.com/downloads/SSL_TLS_Deployment_Best_Practices.pdf
Diverse Autoren; Applied Crypto Hardening, https://bettercrypto.org/static/applied-crypto-hardening.pdf
Chris Palmer; Gradually sunsetting SHA-1, http://googleonlinesecurity.blogspot.de/2014/09/gradually-sunsetting-sha-1.html
IANA TLS Cipher Suite Registry, http://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#tls-parameters-4
BSI; Technische Richtlinie TR-02102-2, Kryptographische Verfahren: Empfehlungen und Schlüssellängen, Teil 2 — Verwendung von Transport Layer Security (TLS). https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Publikationen/TechnischeRichtlinien/TR02102/BSITR-02102-2_pdf.pdf?__blob=publicationFile
OWASP; Transport Layer Protection Cheat Sheet, https://www.owasp.org/index.php/Transport_Layer_Protection_Cheat_Sheet
OWASP; HTTP Strict Transport Security https://www.owasp.org/index.php/HTTP_Strict_Transport_Security
OWASP; Certificate and Public Key Pinning, https://www.owasp.org/index.php/Certificate_and_Public_Key_Pinning
Mozilla Wiki — Security TLS, https://wiki.mozilla.org/Security/Server_Side_TLS
Certificate Transperency, http://www.certificate-transparency.org/
Let’s encrypt; https://letsencrypt.org/
Apache mod_ssl Dokumentation; http://httpd.apache.org/docs/2.4/mod/mod_ssl.html
ENISA; Algorithms, key size and parameters report 2014, http://www.enisa.europa.eu/activities/identity-and-trust/library/deliverables/algorithms-key-size-and-parameters-report-2014
Fox, Dirk: Perfect Forward Secrecy (PFS). DuD 11/2013, S. 729
Achim Hoffmann, Torsten Gigler; O-Saft — Richtig verschlüsseln mit SSL/TLS; OWASP Day Germany 2014, https://www.owasp.org/images/1/19/Richtig_verschluesseln_mit_SSL%2BTLS_-_Achim_Hoffmann%2BTorsten_Gigler.pdf
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Jendrian, K. TLS — Dos and Don’ts. Datenschutz Datensich 39, 114–116 (2015). https://doi.org/10.1007/s11623-015-0376-x
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11623-015-0376-x