skip to main
skip to sidebar
Where facts are few, experts are many.
SSL/TLS Hardening and compatibility report 2011 (updated)
Posted by Thierry Zoller
Subscribe to the
feed in case you are interested in updates
My professional and private commitments made it difficult to maintain a healthly blogging style, I am trying to get back to some blogging on a more regular basis.
no longer operate on a commercial basis
, for those that want to join the G-SEC Team and blogging platform drop me (Thierry) a mail.
I updated the "TLS/SSL hardening and compatibility Report" to 2011
TLS/SSL hardening and compatibility Report 2011
Chrome moved from SCHANNEL to NSS, this move enhances the ciphersuites available to XP systems considerably (compared to IE)
Added OPERA ciphersuites
Updated: Restructured Tables to reflect usage of NSS by Firefox and Chrome
Updated: Fixed typos
Note: I have not re-tested all browsers completely, if you find errors please let me know. The report is can be downloaded
Signed - Thierry Zoller
Post a Comment
G-SEC™ is a non-commercial and independent group of Information Security Specialists based in Luxembourg.
Follow by Email
An Overview of the BEAST - TLS, CBC, countermeasur...
SSL/TLS Hardening and compatibility report 2011 (u...
TLS / SSLv3 renegotiation vulnerability explained (Update #2)(
Subscribe to the RSS feed in case you are interested in updates This paper explains the vulnerability for a broader audience and summariz...
IIS 5 & IIS 6 & IIS7 FTP vulnerability - information and tools (updated)
Subscribe to our RSS feed for regular updates Renowed security researcher "Kingcope" published a recent zero day vulnerability (...
Solving the HACK.LU 2009 reversing challenge like it's 1998
Subscribe to the RSS feed in case you are interested in updates Here is quick overview of one possible way to solve the Hack.lu 2009 cra...
Harden SSL/TLS - Tool release
Subscribe to the RSS feed in case you are interested in updates “Harden SSL/TLS” allows hardening the SSL/TLS settings of Windows 2000...
Blogs we read
My Security Strategy: The "Third Way"
5 days ago
j00ru//vx tech blog
Results of my recent PostScript Charstring security research unveiled
1 week ago
MS Security Research & Defense
Advances in Scripting Security and Protection in Windows 10 and PowerShell V5
3 weeks ago
ADD / XOR / ROL
Why changes to Wassenaar make oppression and surveillance easier, not harder
5 weeks ago
The Security Development Lifecycle
New Version of BinScope Binary Analyzer
7 months ago
Security Database Tools Watch
Code improvement and security, from good to great!
11 months ago
Oracle Security Blog
Oracle CPU July 2014 + Oracle Exploit CVE-2013-3751
11 months ago
Ma petite parcelle d'Internet...
Router backdoor reloaded...
1 year ago
xorl %eax, %eax
CVE-2013-3228: Linux kernel IrDA Information Leak
2 years ago
Web Development on a Chromebook (2)
3 years ago
David LeBlanc's Web Log
Compilers, Integers and Optimizations
3 years ago
Inside Laura's Lab
Filtering OUT Traffic by IP Address - Aaargh!
4 years ago
Michael Howard's Web Log
Security Sessions at TechEd in Australia and New Zealand
5 years ago
ReversingLabs | Blog
Disassembling logic at its best
Reversing It Out
Tags and Labels