Cite this RFC:TXT | XML | BibTeX
DOI: https://doi.org/10.17487/RFC7366
Discuss this RFC: Send questions or comments to the mailing listtls@ietf.org
Other actions:View Errata | Submit Errata | Find IPR Disclosures from the IETF | View History of RFC 7366
This document describes a means of negotiating the use of theencrypt-then-MAC security mechanism in place of the existing MAC-then-encryptmechanism in Transport Layer Security (TLS) and Datagram Transport LayerSecurity (DTLS). The MAC-then-encrypt mechanism has been the subject of anumber of security vulnerabilities over a period of many years.
For the definition ofStatus,seeRFC 2026.
For the definition ofStream, seeRFC 8729.