Online citations, reference lists, and bibliographies.
← Back to Search

HTTP Over TLS

E. Rescorla
Published 2000 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
This memo describes how to use TLS to secure HTTP connections over the Internet. Current practice is to layer HTTP over SSL (the predecessor to TLS), distinguishing secured traffic from insecure traffic by the use of a different server port. This document documents that practice using TLS. A companion document describes a method for using HTTP/TLS over the same port as normal HTTP [RFC2817].
This paper references



This paper is referenced by
10.17487/RFC6749
The OAuth 2.0 Authorization Framework
D. Hardt (2012)
An Intrusion-Tolerant Web Server based on the DISTRACT Architecture
R. Ferraz (2004)
Application and network traffic correlation of grid applications
J. Paisley (2006)
Internet Engineering Task Force (ietf)
Sean Lawrence (2010)
10.1109/ICAwST.2019.8923148
Security and Privacy Awareness: for Software Creators and Users
Glenn Mansfield Keeni (2019)
10.1016/j.comnet.2015.06.011
A multi-resolution accountable logging and its applications
Bo Fu (2015)
10.1007/978-3-319-99136-8
Beyond Cookie Monster Amnesia: Real World Persistent Online Tracking
Nasser Mohammed Al-Fannah (2019)
Unordered Delivery in TLS-Encrypted TCP Connections
B. Ford (2011)
GNuggies: A proposal for hosting resilient stateless services using untrusted nodes
Harshit Agarwal (2018)
10.1145/3038923
Surviving the Web
S. Calzavara (2017)
10.1109/ICSE.2019.00033
The Seven Sins: Security Smells in Infrastructure as Code Scripts
A. Rahman (2019)
Unlocking the armour : enabling intrusion detection and analysis of encrypted traffic streams
B. Irwin (2005)
10.1007/978-3-642-10838-9_16
Finding Collisions for a 45-Step Simplified HAS-V
Nicky Mouha (2009)
10.32657/10356/20727
VENO2 : a generic overlay infrastructure over heterogeneous networks.
Kuan. Yu (2009)
Computer Networks '2013
Jurgen Schonwalder (2013)
10.1155/2014/762194
TALK: Topology Aware LKH Key Management
Dimitris Tsitsipis (2014)
10.1016/j.jisa.2017.11.002
Internet of Things: A survey on the security of IoT frameworks
M. Ammar (2018)
10.17487/RFC6770
Use Cases for Content Delivery Network Interconnection
G. Bertrand (2012)
10.1155/2018/4351603
Survey of Authentication and Authorization for the Internet of Things
Michal Trnka (2018)
Securing Small Business and Home Internet of Things (IoT) Devices: Mitigating Network-Based Attacks Using Manufacturer Usage Description (MUD)
Donna Dodson (2019)
10.17487/RFC5765
Security Issues and Solutions in Peer-to-Peer Systems for Realtime Communications
H. Schulzrinne (2010)
10.31274/ETD-180810-4785
Data access pattern protection in cloud storage
J. Zhang (2016)
10.17487/RFC6712
Internet X.509 Public Key Infrastructure - HTTP Transfer for the Certificate Management Protocol (CMP)
Tomi Kause (2012)
Analysis and Evaluation of Network Management Solutions : A Comparison of Network Management Solutions Suitable for Networks with 2,500+ Devices
Murat Gabdurahmanov (2016)
10.1109/ICMSS.2009.5305503
A Smart-Card Based DRM Authentication Scheme for Mobile TV System
Yi-Chun Zhang (2009)
Booters and Certificates : An Overview of TLS in the DDoS-as-a-Service Landscape
Benjamin Kuhnert (2017)
Authenticating HTTPS servers through the use of DNS in an Offline Personal Authentication Device (OffPAD)
Joakim Hovlandsvåg (2013)
Why the Equifax Breach Should Not Have Mattered
Marten Lohstroh (2018)
10.1109/ICECT.2005.99
Trustworthy e-mail using secure XML Web services
S. Taylor (2005)
10.1002/bltj.20258
Aspects of network security for VoIP solutions using IMS core network and Wi-Fi access
Ruth S. Gayde (2007)
10.1109/WCNC.2007.535
Fast Authentication Based on Heuristic Movement Prediction for Seamless Handover in Wireless Access Environment
L. Zhang (2007)
10.1016/j.comnet.2007.12.009
Dynamic CPU provisioning for self-managed secure web applications in SMP hosting platforms
J. Guitart (2008)
See more
Semantic Scholar Logo Some data provided by SemanticScholar