skip to main
skip to sidebar
Where facts are few, experts are many.
SSL/TLS Hardening and compatibility report 2011 (updated)
Posted by Thierry Zoller
Subscribe to the
feed in case you are interested in updates
My professional and private commitments made it difficult to maintain a healthly blogging style, I am trying to get back to some blogging on a more regular basis.
no longer operate on a commercial basis
, for those that want to join the G-SEC Team and blogging platform drop me (Thierry) a mail.
I updated the "TLS/SSL hardening and compatibility Report" to 2011
TLS/SSL hardening and compatibility Report 2011
Chrome moved from SCHANNEL to NSS, this move enhances the ciphersuites available to XP systems considerably (compared to IE)
Added OPERA ciphersuites
Updated: Restructured Tables to reflect usage of NSS by Firefox and Chrome
Updated: Fixed typos
Note: I have not re-tested all browsers completely, if you find errors please let me know. The report is can be downloaded
Signed - Thierry Zoller
Post a Comment
G-SEC™ is a non-commercial and independent group of Information Security Specialists based in Luxembourg.
Follow by Email
An Overview of the BEAST - TLS, CBC, countermeasur...
SSL/TLS Hardening and compatibility report 2011 (u...
TLS / SSLv3 renegotiation vulnerability explained (Update #2)(
Subscribe to the RSS feed in case you are interested in updates This paper explains the vulnerability for a broader audience and summariz...
IIS 5 & IIS 6 & IIS7 FTP vulnerability - information and tools (updated)
Subscribe to our RSS feed for regular updates Renowed security researcher "Kingcope" published a recent zero day vulnerability (...
Solving the HACK.LU 2009 reversing challenge like it's 1998
Subscribe to the RSS feed in case you are interested in updates Here is quick overview of one possible way to solve the Hack.lu 2009 cra...
Harden SSL/TLS - Tool release
Subscribe to the RSS feed in case you are interested in updates “Harden SSL/TLS” allows hardening the SSL/TLS settings of Windows 2000...
Blogs we read
Oracle Security Blog
DOAG 2015: Best of Oracle Security 2015
6 days ago
A Different Spin on the Air War Against IS
3 weeks ago
MS Security Research & Defense
EMET: To be, or not to be, A Server-Based Protection Mechanism
5 weeks ago
The Security Development Lifecycle
What’s New with Microsoft Threat Modeling Tool 2016
1 month ago
j00ru//vx tech blog
44CON slides and details about further Windows kernel font vulnerabilities are out
2 months ago
Security Database Tools Watch
CVSS v3 and Updates
4 months ago
ADD / XOR / ROL
Why changes to Wassenaar make oppression and surveillance easier, not harder
5 months ago
Ma petite parcelle d'Internet...
Router backdoor reloaded...
2 years ago
xorl %eax, %eax
CVE-2013-3228: Linux kernel IrDA Information Leak
2 years ago
Web Development on a Chromebook (2)
3 years ago
David LeBlanc's Web Log
Compilers, Integers and Optimizations
3 years ago
Inside Laura's Lab
Filtering OUT Traffic by IP Address - Aaargh!
4 years ago
Michael Howard's Web Log
Security Sessions at TechEd in Australia and New Zealand
6 years ago
ReversingLabs | Blog
Reversing It Out
Disassembling logic at its best
Tags and Labels