notes:tls
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| notes:tls [2023/12/04 21:11] – david | notes:tls [2024/04/09 21:33] (current) – david | ||
|---|---|---|---|
| Line 5: | Line 5: | ||
| [[https:// | [[https:// | ||
| + | === Certificate order === | ||
| + | leaf certificate followed by intermediaries and root, see " | ||
| + | [[https:// | ||
| + | [[https:// | ||
| - | [[https:// | ||
| - | Choosing an Elliptic Curve in 2022 | + | |
| - | https://soatok.blog/2022/ | + | [[https://www.rfc-editor.org/rfc/rfc5280| RFC 5280 ]] Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile |
| use the Mozilla SSL Config generator to generate strong SSL configuration | use the Mozilla SSL Config generator to generate strong SSL configuration | ||
| https:// | https:// | ||
| + | ===ECC=== | ||
| + | * Use NIST SuiteB P-256 or P-384 curves | ||
| + | * Choosing an Elliptic Curve in 2022 | ||
| + | |||
| + | https:// | ||
| + | |||
| + | https:// | ||
| + | |||
| + | Guidelines for the Selection, | ||
| + | |||
| + | https:// | ||
| + | |||
| + | |||
| + | If the server is configured with an ECDSA signature certificate, | ||
| + | |||
| + | |||
| + | ECDSA key lengths page 6 https:// | ||
| + | |||
| + | |||
| + | |||
| + | ==== Certificate management ==== | ||
| https:// | https:// | ||
| NIST SP 800-131A Rev. 2 | NIST SP 800-131A Rev. 2 | ||
| + | |||
| Transitioning the Use of Cryptographic Algorithms and Key Lengths | Transitioning the Use of Cryptographic Algorithms and Key Lengths | ||
| + | |||
| https:// | https:// | ||
| - | Recommendation for | + | Recommendation for Key Management: |
| - | Key Management: | + | Part 2 - Best Practices for Key Management Organizations |
| - | Part 2 - Best Practices for | + | |
| - | Key Management Organizations | + | |
| https:// | https:// | ||
| Line 33: | Line 57: | ||
| https:// | https:// | ||
| - | RFC 9325 | + | RFC 9325\\ |
| - | Recommendations for Secure Use of Transport Layer | + | Recommendations for Secure Use of Transport Layer\\ |
| - | Security (TLS) and Datagram Transport | + | Security (TLS) and Datagram Transport |
| - | Security | + | |
| RFC-8446 - The Transport Layer Security (TLS) Protocol Version 1.3 | RFC-8446 - The Transport Layer Security (TLS) Protocol Version 1.3 | ||
| Line 42: | Line 65: | ||
| - | Guidelines for the Selection, | ||
| - | Configuration, | ||
| - | Layer Security (TLS) Implementations | ||
| - | https:// | ||
| - | |||
| - | |||
| - | If the server is configured with an ECDSA signature certificate, | ||
| - | |||
| - | |||
| - | |||
| - | ECDSA key lengths page 6 | ||
| - | https:// | ||
| Line 64: | Line 75: | ||
| - | NIST Special Publication 800-56A | + | NIST Special Publication 800-56A\\ |
| - | Revision 3 | + | Revision 3\\ |
| - | Recommendation for Pair-Wise Key- | + | Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete |
| - | Establishment Schemes Using Discrete | + | Logarithm Cryptography\\ |
| - | Logarithm Cryptography | + | |
| https:// | https:// | ||
| + | |||
| + | ===== Cipher Suites ==== | ||
| + | https:// | ||
notes/tls.1701742315.txt.gz · Last modified: by david
