2015-03-27, rev -00: This document describes a collection of mechanisms that allow HTTP servers to cryptographically bind authentication tokens (such as cookies and OAuth tokens) to a TLS [RFC5246] connection.
"Token Binding over HTTP" - Andrey Popov, Magnus Nystrom, Dirk Balfanz, Adam Langley
↧
↧
"The Token Binding Protocol Version 1.0" - Andrey Popov, Magnus Nystrom, Dirk Balfanz, Adam Langley
2015-05-29, rev -01: This document specifies Version 1.0 of the Token Binding protocol. The Token Binding protocol allows client/server applications to create long-lived, uniquely identifiable TLS [RFC5246] bindings spanning multiple TLS sessions and connections. Applications are then enabled to cryptographically bind security tokens to the TLS layer, preventing token export and replay attacks. To protect privacy, the TLS Token Binding identifiers are only transmitted encrypted and can be reset by the user at any time.
↧
"Token Binding over HTTP" - Andrey Popov, Magnus Nystrom, Dirk Balfanz, Adam Langley
2015-06-30, rev -01: This document describes a collection of mechanisms that allow HTTP servers to cryptographically bind authentication tokens (such as cookies and OAuth tokens) to a TLS [RFC5246] connection.
↧
"Transport Layer Security (TLS) Extension for Token Binding Protocol Negotiation" - Andrey Popov, Magnus Nystrom, Dirk Balfanz, Adam Langley
2015-09-11, rev -00: This document specifies a Transport Layer Security (TLS) [RFC5246] extension for the negotiation of Token Binding protocol [I-D.ietf-tokbind-protocol] version and key parameters.
↧
"The Token Binding Protocol Version 1.0" - Andrey Popov, Magnus Nystrom, Dirk Balfanz, Adam Langley
2015-09-14, rev -02: This document specifies Version 1.0 of the Token Binding protocol. The Token Binding protocol allows client/server applications to create long-lived, uniquely identifiable TLS [RFC5246] bindings spanning multiple TLS sessions and connections. Applications are then enabled to cryptographically bind security tokens to the TLS layer, preventing token export and replay attacks. To protect privacy, the TLS Token Binding identifiers are only transmitted encrypted and can be reset by the user at any time.
↧
↧
"Transport Layer Security (TLS) Extension for Token Binding Protocol Negotiation" - Andrey Popov, Magnus Nystrom, Dirk Balfanz, Adam Langley
2015-10-06, rev -01: This document specifies a Transport Layer Security (TLS) [RFC5246] extension for the negotiation of Token Binding protocol [I-D.ietf-tokbind-protocol] version and key parameters.
↧
"The Token Binding Protocol Version 1.0" - Andrey Popov, Magnus Nystrom, Dirk Balfanz, Adam Langley
2015-10-06, rev -03: This document specifies Version 1.0 of the Token Binding protocol. The Token Binding protocol allows client/server applications to create long-lived, uniquely identifiable TLS [RFC5246] bindings spanning multiple TLS sessions and connections. Applications are then enabled to cryptographically bind security tokens to the TLS layer, preventing token export and replay attacks. To protect privacy, the TLS Token Binding identifiers are only transmitted encrypted and can be reset by the user at any time.
↧
"Token Binding over HTTP" - Andrey Popov, Magnus Nystrom, Dirk Balfanz, Adam Langley
2015-10-15, rev -02: This document describes a collection of mechanisms that allow HTTP servers to cryptographically bind authentication tokens (such as cookies and OAuth tokens) to a TLS [RFC5246] connection.
↧
"Transport Layer Security (TLS) Extension for Token Binding Protocol Negotiation" - Andrey Popov, Magnus Nystrom, Dirk Balfanz, Adam Langley
2016-01-08, rev -02: This document specifies a Transport Layer Security (TLS) [RFC5246] extension for the negotiation of Token Binding protocol [I-D.ietf-tokbind-protocol] version and key parameters.
↧
↧
"The Token Binding Protocol Version 1.0" - Andrey Popov, Magnus Nystrom, Dirk Balfanz, Adam Langley
2016-01-08, rev -04: This document specifies Version 1.0 of the Token Binding protocol. The Token Binding protocol allows client/server applications to create long-lived, uniquely identifiable TLS [RFC5246] bindings spanning multiple TLS sessions and connections. Applications are then enabled to cryptographically bind security tokens to the TLS layer, preventing token export and replay attacks. To protect privacy, the TLS Token Binding identifiers are only transmitted encrypted and can be reset by the user at any time.
↧
"Token Binding over HTTP" - Andrey Popov, Magnus Nystrom, Dirk Balfanz, Adam Langley, Jeff Hodges
2016-03-21, rev -03: This document describes a collection of mechanisms that allow HTTP servers to cryptographically bind authentication tokens (such as cookies and OAuth tokens) to a TLS [RFC5246] connection.
↧
"The Token Binding Protocol Version 1.0" - Andrey Popov, Magnus Nystrom, Dirk Balfanz, Adam Langley, Jeff Hodges
2016-04-04, rev -05: This document specifies Version 1.0 of the Token Binding protocol. The Token Binding protocol allows client/server applications to create long-lived, uniquely identifiable TLS [RFC5246] bindings spanning multiple TLS sessions and connections. Applications are then enabled to cryptographically bind security tokens to the TLS layer, preventing token export and replay attacks. To protect privacy, the TLS Token Binding identifiers are only transmitted encrypted and can be reset by the user at any time.
↧
"The Token Binding Protocol Version 1.0" - Andrey Popov, Magnus Nystrom, Dirk Balfanz, Adam Langley, Jeff Hodges
2016-05-20, rev -06: This document specifies Version 1.0 of the Token Binding protocol. The Token Binding protocol allows client/server applications to create long-lived, uniquely identifiable TLS [RFC5246] bindings spanning multiple TLS sessions and connections. Applications are then enabled to cryptographically bind security tokens to the TLS layer, preventing token export and replay attacks. To protect privacy, the TLS Token Binding identifiers are only transmitted encrypted and can be reset by the user at any time.
↧
↧
"Transport Layer Security (TLS) Extension for Token Binding Protocol Negotiation" - Andrey Popov, Magnus Nystrom, Dirk Balfanz, Adam Langley
2016-07-07, rev -03: This document specifies a Transport Layer Security (TLS) [RFC5246] extension for the negotiation of Token Binding protocol [I-D.ietf-tokbind-protocol] version and key parameters.
↧
"Token Binding over HTTP" - Andrey Popov, Magnus Nystrom, Dirk Balfanz, Adam Langley, Jeff Hodges
2016-07-07, rev -05: This document describes a collection of mechanisms that allow HTTP servers to cryptographically bind authentication tokens (such as cookies and OAuth tokens) to TLS [RFC5246] connections.
↧
"The Token Binding Protocol Version 1.0" - Andrey Popov, Magnus Nystrom, Dirk Balfanz, Adam Langley, Jeff Hodges
2016-07-08, rev -08: This document specifies Version 1.0 of the Token Binding protocol. The Token Binding protocol allows client/server applications to create long-lived, uniquely identifiable TLS [RFC5246] bindings spanning multiple TLS sessions and connections. Applications are then enabled to cryptographically bind security tokens to the TLS layer, preventing token export and replay attacks. To protect privacy, the Token Binding identifiers are only transmitted encrypted and can be reset by the user at any time.
↧
"Token Binding over HTTP" - Andrey Popov, Magnus Nystrom, Dirk Balfanz, Adam Langley, Jeff Hodges
2016-08-26, rev -06: This document describes a collection of mechanisms that allow HTTP servers to cryptographically bind authentication tokens (such as cookies and OAuth tokens) to TLS [RFC5246] connections.
↧
↧
"Transport Layer Security (TLS) Extension for Token Binding Protocol Negotiation" - Andrey Popov, Magnus Nystrom, Dirk Balfanz, Adam Langley
2016-09-02, rev -05: This document specifies a Transport Layer Security (TLS) [RFC5246] extension for the negotiation of Token Binding protocol [I-D.ietf-tokbind-protocol] version and key parameters.
↧
"The Token Binding Protocol Version 1.0" - Andrey Popov, Magnus Nystrom, Dirk Balfanz, Adam Langley, Jeff Hodges
2016-09-02, rev -10: This document specifies Version 1.0 of the Token Binding protocol. The Token Binding protocol allows client/server applications to create long-lived, uniquely identifiable TLS [RFC5246] bindings spanning multiple TLS sessions and connections. Applications are then enabled to cryptographically bind security tokens to the TLS layer, preventing token export and replay attacks. To protect privacy, the Token Binding identifiers are only transmitted encrypted and can be reset by the user at any time.
↧
"Token Binding for 0-RTT TLS 1.3 Connections" - Nick Harper
2016-11-16, rev -00: This document describes how Token Binding can be used in the 0-RTT data of a TLS 1.3 connection. This involves updating how Token Binding negotiation works and adding a mechanism for indicating whether a server prevents replay. A TokenBindingMessage sent in 0-RTT data has different security properties than one sent after the TLS handshake has finished, which this document also describes.
↧
More Pages to Explore .....