Cite this RFC:TXT | XML | BibTeX
DOI: https://doi.org/10.17487/RFC5746
Discuss this RFC: Send questions or comments to the mailing listtls@ietf.org
Other actions:Submit Errata | Find IPR Disclosures from the IETF | View History of RFC 5746
Secure Socket Layer (SSL) and Transport Layer Security (TLS)renegotiation are vulnerable to an attack in which the attacker formsa TLS connection with the target server, injects content of hischoice, and then splices in a new TLS connection from a client. Theserver treats the client's initial TLS handshake as a renegotiationand thus believes that the initial data transmitted by the attacker isfrom the same entity as the subsequent client data. Thisspecification defines a TLS extension to cryptographically tierenegotiations to the TLS connections they are being performed over,thus preventing this attack. [STANDARDS-TRACK]
For the definition ofStatus,seeRFC 2026.
For the definition ofStream, seeRFC 8729.