• ekr____ 15 hours ago

    The situation is additionally confused by the fact that the version numbers do not give a good clue to how different the protocols were. Specifically:

    SSLv2 was the first widely deployed version of SSL, but as this post indicates, had a number of issues.

    SSLv3 is a more or less completely new protocol

    TLS 1.0 is much like SSLv3 but with some small revisions made during the IETF standardization process.

    TLS 1.1 is a really minor revision to TLS 1.0 to address some issues with the way block ciphers were used.

    TLS 1.2 is a moderately sized revision to TLS 1.1 to adjust to advances in cryptography, specifically adding support for newer hashes in response to weaknesses in MD5 and SHA-1 and adding support for AEAD cipher suites such as AES-GCM.

    TLS 1.3 is mostly a new protocol though it reuses some pieces of TLS 1.2 and before.

    Each of these protocols has been designed so that you could automatically negotiate versions, thus allowing for clients and servers to independently upgrade without loss of connectivity.

    • nextgens 8 hours ago

      TLS1.0 introduced modularity via the concept of "extensions". It's everything but a minor evolution of the protocol.

      One of the many things it brought is session tickets, enabling server-side session resumption without requiring servers to keep synced-up state. Another is Server Name Indication, enabling servers to use more than one certificate.

    • cortesoft 13 hours ago

      > Each of these protocols has been designed so that you could automatically negotiate versions, thus allowing for clients and servers to independently upgrade without loss of connectivity.

      And ensuring decades of various downgrade attacks

      • mcpherrinm 13 hours ago

        The downgrade attacks on TLS are only really present in the case of client behaviour where, on failing to achieve one version, they retry a new connection without it.

        This was necessary to bypass various broken server side implementations, and broken middleboxes, but wasn’t necessarily a flaw in TLS itself.

        But from the learnings of this issue preventing 1.2 deployment, TLS 1.3 goes out of its way to look very similar on the wire to 1.2

        • matthewdgreen 32 minutes ago

          This isn't really accurate historically. TLS has both ciphersuite and version negotiation. Logjam (2015) [1] was a downgrade attack on the former that's now fixed, but is an extension of an attack that was first noticed way back in 1996 [2]. Similar problems occurred with the FREAK attack, though that was actually a client vulnerability. TLS 1.3 goes out of its way to fix all of this using a better negotiation mechanism, and by reducing agility.

          [1] https://en.wikipedia.org/wiki/Logjam_(computer_security) [2] https://www.usenix.org/legacy/publications/library/proceedin...

          • ekr____ 12 hours ago

            Moreover, there's not really much in the way of choices here. If you don't have this kind of automatic version negotiation then it's essentially impossible to deploy a new version.

            • upofadown 4 hours ago

              Well you can, but that would require a higher level of political skill than normally exists for such things. What would have to happen is that almost everyone would have to agree on the new version and then implement it. Once implementation was sufficiently high enough then you have a switchover day.

              The big risk with such an approach is that you could implement something, then the politics could fail and you would end up with nothing.

              The big downside of negotiation is that no one ever has to commit to anything so everything is possible. In the case of TLS, that seems to have led to endless bikeshedding which has created a standard which has so many options is is hardly a standard anymore. The only part that has to be truly standard is the negotiation scheme.

              • ekr____ 3 hours ago

                This seems like a truly unreasonable level of political skill for nearly any setting. We're talking about changing every endpoint in the Internet, including those which can no longer be upgraded. I struggle to think of any entity or set of entities which could plausibly do that.

                Moreover, even in the best case scenario this means that you don't get the benefits of deployment for years if not decades. Even 7 years out, TLS 1.3 is well below 100% deployment. To take a specific example here: we want to deploy PQ ciphers ASAP to prevent harvest-and-decrypt attacks. Why should this wait for 100% deployment?

                > The big downside of negotiation is that no one ever has to commit to anything so everything is possible. In the case of TLS, that seems to have led to endless bikeshedding which has created a standard which has so many options is is hardly a standard anymore. The only part that has to be truly standard is the negotiation scheme.

                I don't think this is really that accurate, especially on the Web. The actual widely in use options are fairly narrow.

                TLS is used in a lot of different settings, so it's unsurprising that there are a lot of options to cover those settings. TLS 1.3 did manage to reduce those quite a bit, however.

                • Sophira 3 hours ago

                  > This seems like a truly unreasonable level of political skill for nearly any setting. We're talking about changing every endpoint in the Internet, including those which can no longer be upgraded. I struggle to think of any entity or set of entities which could plausibly do that.

                  Case in point: IPv6 adoption. There's no interoperability or negotiation between it and IPv4 (at least, not in any way that matters), which has led to the mess we're in today.

                  • vladvasiliu an hour ago

                    Many servers and clients support both ipv4 and ipv6. So, in a sense, there's a "negotiation" happening between client and server.

                • drob518 2 hours ago

                  That’s a great theory but in practice such a “flag day” almost never happens. The last time the internet went through such a change was January 1, 1983, when the ARPANET switched from NCP to the newly designed TCP/IP. People want to do something similar on February 1, 2030, to remove IPv4 and switch totally to IPv6, but I give it a 50/50 chance of success, and IPv6 is already about 30 years old. See https://ipv4flagday.net/

                  • upofadown 7 minutes ago

                    You don't have to have everyone switch over on the same day as with your example. Once it is decreed that implementations are widespread enough, then everyone can switch over to the introduced thing gradually. The "flag day" is when it is decreed that implementations no longer have to support some previously widely used method. Support for that method would then gradually disappear unless there was some associated cryptographic emergency that could not be dealt with without changing the standard.

                  • freeone3000 4 hours ago

                    > The big risk with such an approach is that you could implement something, then the politics could fail and you would end up with nothing.

                    They learned the lesson of IPv6 here.

                  • pcthrowaway 10 hours ago

                    You could deploy a new version, you'd just have older clients unable to connect to servers implementing the newer versions.

                    It wouldn't have been insane to rename https to httpt or something after TLS 1.2 and screw backwards compatibility (yes I realize the 's' stands for secure, not 'ssl', but httpt would have still worked as "HTTP with TLS")

                    • josephg 9 hours ago

                      > It wouldn't have been insane to rename https to httpt or something after TLS 1.2 and screw backwards compatibility

                      That would have been at least little bit insane, since then web links would be embedding the protocol version number. As a result, we'd need to keep old versions of TLS around indefinitely to make sure old URLs still work.

                      I wish we could go the other way - and make http:// implicitly use TLS when TLS is available. Having http://.../x and https://.../x be able to resolve to different resources was a huge mistake.

                      • cpach 8 hours ago

                        Regarding your last paragraph: Isn’t that pretty much solved thanks to HSTS preload? A non-technical author of a small recipe blog might not know how to set it up, but a bank ought to have staff (and auditors) who takes care of stuff like that.

                        • account42 7 hours ago

                          It doesn't solve the problem of a client having to treat https:// and http:// URLs with the same string after the :// as distinct resources.

                          • dotancohen 4 hours ago

                            Are there any real world online resources where, modulo redirect, a different resource is presented on the HTTP and the HTTPS protocols? Or alternatively, on ports 80 and 443?

                            • ekr____ 3 hours ago

                              There used to be, though it's less true now. However, the reason to treat them distinctly (as different origins, technically) is that HTTPS provides integrity whereas HTTP does not. So, consider the case where the client enters an HTTP URL and is redirected, just as you say above. If the attacker injects their own JS and it is cached in an origin that is just `example.com`, then they control the user's experience of the site, even if later the user securely goes to the site with HTTPS.

                      • ekr____ 3 hours ago

                        This has a number of negative downstream effects.

                        First, recall that links are very often inter-site, so the consequence would be that even when a server upgraded to TLS 1.2, clients would still try to connect with TLS 1.1 because they were using the wrong kind of link. This would relay delay deployment. By contrast, today when the server upgrades then new clients upgrade as well.

                        Second, in the Web security model, the Origin of a resource (e.g., the context in which the JS runs) is based on scheme/host/port. So httpt would be a different origin from HTTPS. Consider what happens if the incoming link is https and internal links are httpt now different pages are different origins for the same site.

                        These considerations are so important that when QUIC was developed, the IETF decided that QUIC would also be an https URL (it helps that IETF QUIC's cryptographic handshake is TLS 1.3).

                        • tgma 8 hours ago

                          TLS is one of the best success stories of widely applied security with great UX. It would be nowhere as successful with that attitude.

                          • account42 7 hours ago

                            Yes it would absolutely have been insane.

                            • immibis 2 hours ago

                              You mean like the way we use h2:// everywhere now? Oh wait, we don't.

                            • Dylan16807 12 hours ago

                              Depends on what you mean by "this kind" because you want a way to detect attacker-forced downgrades and that used to be missing.

                            • frollogaston 12 hours ago

                              If a protocol is widely used wrongly, I consider it a flaw in the protocol. But overall, SSL standardization has gone decently well. I always bring it up as a good example to contrast with XMPP as a bad example.

                              • mcpherrinm 12 hours ago

                                Well, my only real point is that it’s not the version negotiation in TLS that’s broken. It’s the workaround for intolerance of newer versions that had downgrade attacks.

                                Fortunately that’s all behind us now, and transitioning from 1.2 to 1.3 is going much smoother than 1.0 to 1.2 went.

                                • tialaramex 6 hours ago

                                  One of the big differences was in attitude. The TLS 1.3 anti-downgrade feature was not compatible with some popular middlebox products. Google told people too bad, either your vendor fixes it (most shipped free bug fixes for this issue, presumably "encouraged" by the resulting customer anger) or you can't run Chrome once this temporary fudge goes away in a year's time.

                                  Previously (in earlier protocol versions) nobody stood up to the crap middleboxes even though it's bad for all normal users.

                                  • drob518 2 hours ago

                                    The service providers were the worst offenders here because they wanted to be the MIM to be able to look at the data and “add value” to their networks some how. Moving to TLS 1.3 took a lot of that away from them and it was only Google’s market power that could break them.

                                • meepmorp 3 hours ago

                                  > I always bring it up as a good example to contrast with XMPP as a bad example.

                                  Could you expand a bit here? Do you just mean how extensions to the protocol are handled, etc., or the overall process and involved parties?

                                • sjducb 9 hours ago

                                  Man in the middle interfering with TLS handshakes?

                                  The handshake is unencrypted so you can modify the messages to make it look like the server only supports broken ciphers. Then the man in the middle can read all of the encrypted data because it was badly encrypted.

                                  A surprising number of servers still support broken ciphers due to legacy uses or incompetence.

                                  • ekr____ 3 hours ago

                                    Yes, this is a seriously difficult problem with only partial solutions.

                                    The basic math of any kind of negotiation is that you need the minimum set of cryptographic parameters supported by both sides to be secure enough to resist downgrade. This is too small a space to support a complete accounting of the situation, but roughly:

                                    - In pre-TLS 1.3 versions of TLS, the Finished message was intended to provide secure negotiation as long as the weakest joint key exchange was secure, even if the weakest joint record protection algorithm was insecure, because the Finished provides integrity for the handshake outside of the record layer.

                                    - In TLS 1.3, the negotiation messages are also signed by the server, which is intended to protect negotiation as long as the weakest joint signature algorithm is secure. This is (I believe) the best you can do with a client and server which have never talked to each other, because if the signature algorithm is insecure, the attacker can just impersonate the server directly.

                                    - TLS 1.3 also includes a mechanism intended to prevent against TLS 1.3 -> TLS 1.2 downgrade as long as the TLS 1.2 cipher suite involves server signing (as a practical matter, this means ECDHE). Briefly, the idea is to use a sentinel value in the random nonces, which are signed even in TLS 1.2 (https://www.rfc-editor.org/rfc/rfc8446#section-4.1.3).

                                    • mcpherrinm 3 hours ago

                                      No: while the handshake is unencrypted, it is authenticated. An attacker can’t modify it.

                                      What an attacker can do is block handshakes with parameters they don’t like. Some clients would retry a new handshake with an older TLS version, because they’d take the silence to mean that the server has broken negotiation.

                                      • kevincox 7 hours ago

                                        You could encrypt the handshake that you recieved with the server's certificate and send it back. Then if it doesn't match what the server thought it sent it aborts the handshake. As long as the server's cert isn't broken this would detect a munged handshake, and if the server's cert is broken you have no root of trust to start the connection in the first place.

                                        • sjducb 4 hours ago

                                          How do you agree a protocol to encrypt the message to agree the protocol?

                                          This is the message that returns a list of supported ciphers and key exchange protocols. There’s no data in this first packet.

                                          Alice: I’d like to connect Bob: Sure here is a list of protocols we could use:

                                          You modify bob’s message so that bob only suggests insecure protocols.

                                          You might be proposing that Alice asks Trent for Bob’s public key … But that’s not how TLS works.

                                          • dotancohen 4 hours ago

                                            The fine man in the middle could still intercept that.

                                      • jackgavigan 8 hours ago

                                        It also enabled cipher strength "step up". Back during the '90s and early 2000s (I'm not sure when it stopped, tbh), the US government restricted the export of strong cryptography, with certain exceptions (e.g. for financial services).

                                        If you fell under one of those exceptions, you could get a special certificate for your website (from, e.g. Verisign) that allowed the webserver to "step up" the encryption negotiation with the browser to stronger algorithms and/or key lengths.

                                      • da_chicken 2 hours ago

                                        They still should have just called it TLS v4.0 instead of v1.0.

                                        I'm halfway convinced that they have made subsequent versions v1.1, v1.2, and v1.3 in an outrageously stubborn refusal to admit that they were objectively incorrect to reset the version number.

                                        • ekr____ 2 hours ago

                                          As I noted below, there was real discussion around the version number for TLS 1.3. I don't recall any such discussion for 1.1 and 1.2.

                                        • 1over137 12 hours ago

                                          Well, at least they were not just versioned by year number. ;)

                                        • Timothycquinn 15 hours ago

                                          Considering that Microsoft was a completely different beast in that time, I'm not surprised it does not seem that silly.

                                          M$ (appropriate name for that time) of the day was doing its best to own everything and the did not let up on trying to hold back the open source internet technologies until the early 2010's I believe. Its my opinion that they were successful in killing Java Applets, which were never able to improve past the first versions and JavaScript and CSS in general was held back many years.

                                          I still recall my corporate overloards trying to push me to support IE's latest 'technologies' but I resisted and instead started supporting Mozilla 3.0 as soon as they fixed some core JS bugs for our custom built enterprise JavaScript SPA tools in the early 2000's. It turned out to be a great decision as the fortune 500 company started using Mozilla / Firefox in other internal apps in later years long before it became common place.

                                          • int_19h 11 hours ago

                                            I don't think it was Microsoft that killed Java applets. I mean, for one thing, they always worked in IE, which was really the only avenue through which MS could have affected them.

                                            No, Java applets failed because they became the poster child for "Java is slow" take. Even though it wasn't exactly true in general, it was certainly true of applets, what with waiting for them to download and then waiting for the JVM to spin up.

                                            What killed them was 1) HTML/JS itself getting better at dynamic stuff that previously required something like applets, and 2) Flash taking over the remaining niche for which HTML wasn't good enough.

                                            • cap11235 an hour ago

                                              Even prior to HTML5 stuff, Flash was just a better UX than applets, which always felt like your browser was loading an application, vs being an element in a page.

                                              • immibis 2 hours ago

                                                Another reason Java applets ultimately failed was the never-ending stream of sandbox escapes, which is inherent to their design of running trusted and untrusted code in the same VM and trying to keep track of which is which. It turns out it's much more straightforward to sandbox the whole VM.

                                                A representative vulnerability is "trusted method chaining". You (the attacker) construct a chain of standard library objects that call each other in unexpected ways. You can make use of the fact that you can subclass a standard library class and implement a standard library interface, in order to implement the interface methods with the base class's implementations, to construct more unusual pathways. Then you get some standard library entry point to call the first method in the chain. Since your code doesn't appear on the call stack at any point (it's just the standard library calling the standard library) whatever is at the bottom of the call stack, at the end of the chain, infers a trusted context and can access files or whatever. Of course, finding a method chain that's possible to construct and does something malicious is non-trivial.

                                                • cubefox 6 hours ago

                                                  Java Applets also froze the entire browser when loading. Even more so than the Windows Media / QuickTime / Real Player plug-ins. Only the Flash plug-in didn't noticeably freeze the browser. It was heavily CPU optimized and even used AVX for rendering, as far as I remember.

                                                  • cesarb an hour ago

                                                    > > No, Java applets failed because they became the poster child for "Java is slow" take.

                                                    > Java Applets also froze the entire browser when loading.

                                                    More than just "poster child", I believe Java applets are the origin of the "Java is slow" meme. The first time many people heard of Java would be when it locked up their browser for a whole minute while loading an applet, with a status bar message pointing to Java as the culprit.

                                                • grandiego 11 hours ago

                                                  Applets died because of many reasons, like absurd startup time for the JRE (often just for silly animations), absurd memory requirements (for the time) and associated crashes, weird compatibility issues in the initial releases of the Java platform, a silly security model based on the assumption that only good actors will be able to get a CA certificate in order to do whatever they want in your PC, an immature sandboxing technology in browsers (not only IE), etc.

                                                  • notpushkin 13 hours ago

                                                    > M$ (appropriate name for that time)

                                                    It’s even more appropriate nowadays, I’d say.

                                                    • lukas099 a minute ago

                                                      [delayed]

                                                      • eptcyka 10 hours ago

                                                        Never not been appropriate.

                                                      • account42 7 hours ago

                                                        Microsoft hasn't really changed that much besides getting a better PR department.

                                                        • sillystu04 27 minutes ago

                                                          They've adopted a different flavour of devilishness. See VSCode versus Visual Studio, or their approach to AI.

                                                          Bill Gates would've bought OpenAI. Satya shares their mission of developing AI for the good of humanity. He charitably donated billions of dollars in Azure credits in exchange for nothing besides a voice at the table and a license to help enable other organisations use AI through MS services.

                                                          In a way it's a PR difference, but I feel that understates the change.

                                                          • aaronbaugher an hour ago

                                                            It also has a lot more competition in the Evil Big Tech Co space than it used to.

                                                        • b0a04gl an hour ago

                                                          > the rename mattered more structurally than people think. ssl was netscape's, tls came out of ietf. that shift changed who controlled the evolution. after that, cipher negotiation, forward secrecy, and extension frameworks all became part of the process

                                                          > also worth noting: tls1.0 wasn't just a spec rename of ssl3.0. rfc cleaned up edge cases, formalised alert handling, and started pushing toward modular crypto. lot of small things that let future versions iterate cleanly

                                                          > the real impact shows up much later - tls1.3 doesn’t happen unless tls1.0 laid down a clean enough protocol base

                                                          • webprofusion 14 hours ago

                                                            People who make a strong distinction between TLS and SSL are indicating that they know the difference and think you should too, but at a practical level it's the difference between .doc and .docx (fundamentally different but interchangeable to the layman). The boots on the ground mostly care about getting https to work and have minimal consideration for it's inner workings.

                                                            • entuno 8 hours ago

                                                              The main issue was explaining to the layman that TLSv1.0 was in fact newer and better than SSLv2 and SSLv3. I remember having quite a few discussions about this with people who assumed that the bigger number must be better..

                                                              • ozim 5 hours ago

                                                                It is like ages since SSL was obsoleted but people still refer to the name meaning encrypted network traffic.

                                                                Would be much easier if everyone just talks about TLS to mean modern encrypted network traffic. Mention SSL if you really use it because you have legacy system running.

                                                                • dylan604 2 hours ago

                                                                  People still say Twitter instead of X. Of course people are going to continue using the name used when something was first introduced and engrained into their day to day vs the rebrand. It would be funny if ssl.com just redirects to tls.com and get upset when people still refer to it as ssl. The only successful rebrand attempts have been company names like when Comcast became Xfinity or MCI becoming Worldcom type situations

                                                                  • commandlinefan 2 hours ago

                                                                    TLS is also awkward to _say_, whereas SSL just sounds right.

                                                                    Plus the most popular implementation of TLS remains the OpenSSL implementation.

                                                                    • bux93 5 hours ago

                                                                      I've taken to saying HTTPS, which is far more widely understood and usually accurate enough.

                                                                      • casper14 4 hours ago

                                                                        Until you TLS a tcp connection of course

                                                                  • ahofmann 19 hours ago

                                                                    Oh wow, I just discovered that my brain unconsciously had a hard time to differentiate between SSL and TLS. And now, after two friggin decades I find out, why!

                                                                    • oc1 18 hours ago

                                                                      Same. I feel so dumb now. After 15 years in this industry i finally figured out that ssl and tls are the same.

                                                                      • JdeBP 17 hours ago

                                                                        Back closer to the time, there were some people around who insisted that SSL specifically meant the old versions and it was all TLS now. I recall a couple of occasions where people were talking about UCSPI-SSL and someone stepped in to explain that We Don't Do SSL Now. As the headlined article says, that contrived distinction seems silly with the hindsight of decades.

                                                                        The nomenclature was complicated in people's minds by SMTP. Because there was SMTP over a largely transparent encrypted connection, and SMTP where it started unencrypted and negotiated a switch, as well as plain old cleartext. It didn't help that RFC 2487 explained that STARTTLS negotiated "TLS more commonly known as SSL". RFC 8314 explains some of the historical mess that SMTP got into with two types of SMTP (relay and submission) and three types of transport.

                                                                        And the "S" for "submission" could be confused with the "S"s in both "SSL" and "TLS". It's not just TLAs that are ambiguous, indeed. There was confusion over "SMTPS" and "SSMTP", not helped at all by the people who named programs things like "sSMTP".

                                                                        I'm still calling it SSL in 2025. (-: And so is Erwin Hoffmann.

                                                                        * https://www.fehcom.de/ipnet/sslserver.html

                                                                        * https://manpages.debian.org/unstable/ssmtp/ssmtp.8.en.html

                                                                        • nkapias 3 hours ago

                                                                          'It didn't help that RFC 2487 explained that STARTTLS negotiated "TLS more commonly known as SSL"'

                                                                          > Good catch, it misled me for years !

                                                                        • 0xbadcafebee 18 hours ago

                                                                          No no, they're not. They're names of specific protocols with specific capabilities and versions. "SSL 1.0" and "TLS 1.0" are very different. (see https://aws.amazon.com/compare/the-difference-between-ssl-an...)

                                                                          The important bits:

                                                                          - "SSL" is a set of protocols so ridiculously old, busted and insecure that nobody should ever use them. It's like talking about Sanskrit; ancient and dead.

                                                                          - "TLS" is way better than "SSL", but still there are insecure versions. Any version before 1.2 is no longer supported due to security holes.

                                                                          - Technically an "ssl certificate" is neither "SSL" nor "TLS", it's really an "X.509 Certificate with Extended Key Usage: Server Authentication". But that doesn't roll off the tongue. You could use a cert from 1996 in a modern TLS server; the problem would be its expiration date, and the hash/signature functions used back then are deprecated. (some servers still support insecure methods to support older clients, which is bad)

                                                                          • creatonez 10 hours ago

                                                                            The point is more that SSL 3.0 and TLS 1.0 were nearly identical. That is, the breaks in similarity were at SSL 2.0 -> SSL 3.0 (and TLS 1.2 -> TLS 1.3, to a lesser extent), as opposed to the common misconception that TLS 1.0 is what changed everything.

                                                                            But yes, it's all a bit irrelevant now that anything below TLS 1.2 is sketchy to use.

                                                                            • MOARDONGZPLZ 17 hours ago

                                                                              Right, but they accomplish the same thing and people move monotonically from SSL to TLS. It’s not like choosing between React and Angular, but like choosing between React version 5 and React version 10 for a new project. SSL and TLS are the same in all meaningful respects from this perspective.

                                                                              • 0xbadcafebee 17 hours ago

                                                                                Hotdogs and hamburgers are the same in all meaningful respects.

                                                                                • MOARDONGZPLZ 17 hours ago

                                                                                  They are not. But a Chicago dog is meaningfully the same as a New York Dog (just with some more vegetables).

                                                                                  • 0xbadcafebee 14 hours ago

                                                                                    A Chicago dog is literally a hamburger with a different surface area. Same obscure ground beef, same vegetables, same bread. Just different dimensions. Who cares about the details, right?

                                                                                    • MOARDONGZPLZ 13 hours ago

                                                                                      Very weird assertion, and happy to be dragged into a sub-post wasteland with you. <3

                                                                                      • wombatpm 10 hours ago

                                                                                        I don’t know of anyone who puts celery salt on a hamburger.

                                                                                        • i80and 9 hours ago

                                                                                          I think it would probably be good, though?

                                                                                  • ozim 5 hours ago

                                                                                    Well nope SSL and TLS is more like Angular and AngularJS.

                                                                                    No one should use SSL or AngularJS in 2025 unless they have to maintain some legacy stuff for important reasons.

                                                                                  • GoblinSlayer 8 hours ago

                                                                                    It's a new word in version churn: rename the whole thing on every commit.

                                                                                  • commandlinefan 2 hours ago

                                                                                    In reality, you may never have actually used SSL, and if you're old enough to have, you haven't used it in decades (I hope).

                                                                                  • brabel 9 hours ago

                                                                                    I learned about that around 2010, but before that was also clueless about it. What triggered me was that in Java you still use a SSLSocket to start encrypted connections even when using TLSv1.3 today!

                                                                                  • pkulak 20 hours ago

                                                                                    “Transport Layer Security” really is a better name though. I also like to say “TLS”. Two Ses in a row makes you sound like a snake.

                                                                                    • o11c 19 hours ago

                                                                                      The problem is that TLS was already in widespread use for "thread local storage".

                                                                                      Transport Layer Security is widely documented as beginning in 1999.

                                                                                      I can find references to "Thread Local Storage" going back to at least 1996. That particular term seems more common in the Microsoft (and maybe IBM, does anyone have an OS/2 programming manual?) world at the time; Pthreads (1995) and Unix in general tended to call it "thread-specific data".

                                                                                      It's possible that the highly influential 2001 Itanium ABI document (which directly led to Drepper's TLS paper) brought the term to (widespread) use in the broader Unix world, though Sun (for both Solaris and Java?) was using the term previously. But it's also possible that I'm just missing the reference material.

                                                                                      • kstrauser 19 hours ago

                                                                                        I don’t doubt that, but I never heard Thread Local Storage until much later than that. While it might well’ve been common within its ecosystem, I don’t think it was widely known outside it.

                                                                                        • JdeBP 18 hours ago

                                                                                          I might have an OS/2 programming manual. But I don't need it. (-: This was not an OS/2 thing. We had to make map data structures using thread IDs. Or our language runtimes did.

                                                                                          Look to Windows NT rather than to OS/2 for thread-local storage. TlsAlloc() et al. were in the Win32 API right from NT 3.1, I think.

                                                                                        • jeroenhd 19 hours ago

                                                                                          I think SSL is a better fit, actually. In theory TLS could be a transport-layer security mechanism that would let arbitrary protocols run on top of it (like IPSec does), but in practice it's pretty much tied up to TCP sockets. The UDP variant (DTLS, and I suppose QUIC) isn't part of the TLS spec for instance. Of course we have kernel TLS on Linux now, and Windows also has infrastructure like that, but it isn't as easy as setting a flag on a socket to turn TLS on.

                                                                                          Plus, who doesn't like to sound like a snake sometimes? Snakes are badass.

                                                                                          • LukeShu 17 hours ago

                                                                                            No? The "transport" layer is layer 4 in the 7-layer OSI model (physical/datalink/network/transport/session/presentation/application) and 5-layer IP model (physical/network/internetwork/transport/application). That is: the "transport" provides reliable continuous data-stream abstraction over the lower-layers' discreet and unreliable packets; e.g. TCP.

                                                                                            And that data-stream the interface that TLS provides; to the higher layers it looks like a transport layer.

                                                                                            • aoetalks 5 hours ago

                                                                                              I was about to agree with you, and then I read the article on DTLS.

                                                                                              > And that data-stream the interface that TLS provides

                                                                                              That’s exactly the problem. You might lose a UDP packet. That would corrupt data encrypted with stream cipher.

                                                                                              With DTLS, each packet is encrypted individually.

                                                                                              https://en.m.wikipedia.org/wiki/Datagram_Transport_Layer_Sec...

                                                                                              • ekr____ 3 hours ago

                                                                                                Just on a technical note, TLS 1.3 only uses AEAD ciphers where the nonce is determined by the record numbers, so it actually is in principle possible to decrypt the packets even if they are received out of order by trial decrypting with different record numbers. You don't do this in TLS (as opposed to DTLS) because it runs over TCP and therefore you are guaranteed in-order delivery.

                                                                                                DTLS, by contrast, provides a record number hint (the low order bits of the record number and epoch) to assist in record number reconstruction: https://www.rfc-editor.org/rfc/rfc9147.html#name-reconstruct....

                                                                                          • frollogaston 12 hours ago

                                                                                            The best name is, whatever was first and stuck.

                                                                                            • layer8 17 hours ago

                                                                                              “SSL” is easier to pronounce, because the tongue barely changes position between the three letters, compared to “TLS”.

                                                                                              • nulbyte an hour ago

                                                                                                This is objective, but ai find TLS rolls more easily off the tongue.

                                                                                              • andrewfromx 18 hours ago

                                                                                                picture kaa from the jungle book discussing tcp security and arguing for the s-s-l name. In fact maybe adding a 3rd s.

                                                                                              • jedberg 17 hours ago

                                                                                                Curious, when you tell someone they need to access a website securely (or any other case where you might use the term TLS or SSL), do you:

                                                                                                1. Say SSL or TLS?

                                                                                                2. How old are you (or did you start working before 1999?)

                                                                                                I'll reply with my answer too.

                                                                                                • marginalia_nu 17 hours ago

                                                                                                  1. SSL. For a long time I didn't even know TLS was the "same thing", but even now that I know it is, I still say SSL 9 times out of 10.

                                                                                                  2. 38 - Started working in 2011, but my first forays into network programming was in something like 2004-2005.

                                                                                                  Looked over onto my other screen and sure enough the function I'd literally minutes before added an if statement to went

                                                                                                          public Builder sslCertNotBefore(Instant sslCertNotBefore) {
                                                                                                              if (sslCertNotBefore.isAfter(MAX_UNIX_TIMESTAMP)) {
                                                                                                                  sslCertNotBefore = MAX_UNIX_TIMESTAMP;
                                                                                                              }
                                                                                                              this.sslCertNotBefore = sslCertNotBefore;
                                                                                                              return this;
                                                                                                          }
                                                                                                  
                                                                                                  I think possibly part of the problem is that we as programmers typically don't deal with TLS directly. The code above is part of a system I wrote that extracts detailed certificate information from HTTPS connections, and man was it ever a hassle to wrestle all the information I was interested in out of the java standard library.

                                                                                                  Sure on the one hand it's easier to not mess up if it's all automatic and out of sight, but at the same time, it's not exactly beneficial to the spread of deeper awareness of how TLS actually works when it's always such a black box.

                                                                                                  • israrkhan 13 hours ago

                                                                                                    I think most people call it SSL because they use OpenSSL library to deal with secure communication have SSL in their names. Openssl being the most dominant one). Other libraries are BoringSSL, LibreSSL, wolfSSL etc.

                                                                                                    Libraries with TLS in their names are less frequently used

                                                                                                    GnuTLS, mbedTLS, s2n-tls and RustTLS.

                                                                                                    • foresterre 7 hours ago

                                                                                                      The Rust library is possibly funnily, possibly confusingly called RusTLS (1). It makes pronunciation a tad harder.

                                                                                                      (1) https://crates.io/crates/rustls

                                                                                                      • ctz 4 hours ago

                                                                                                        My apologies.

                                                                                                      • slt2021 13 hours ago

                                                                                                        SSL is used in websites. TlS is used in other applications, as in mTLS

                                                                                                        • throwaway843 24 minutes ago

                                                                                                          Unfortunately you were voted down for answering OP.

                                                                                                          SSL for websies, TLS for email, tunnels, XMPP, etc.

                                                                                                          • ItsHarper 12 hours ago

                                                                                                            TLS is absolutely used in websites, and I'm pretty sure modern browsers refuse to use any version of SSL.

                                                                                                        • cesarb 17 hours ago

                                                                                                          I usually say SSL, because it has a greater chance of being understood than the more correct TLS (nobody uses SSL 3.0 anymore). It's also in the name of many SSL (I mean, TLS) libraries, like the classic OpenSSL.

                                                                                                          But yeah, I learned about SSL back in the crypto wars days of the 1990s, back when you had to pirate the so-called "US only" version of Netscape if you wanted decent SSL encryption, so I might be just using the old term out of habit.

                                                                                                        • brandonmenc 17 hours ago

                                                                                                          I say "https" because sometimes even regular people know what that means.

                                                                                                          • mindcrime 17 hours ago

                                                                                                            These days I tend to say "TLS" more and more, but until just a year or two ago it was almost always "SSL". And "SSL" still slips out occasionally.

                                                                                                            I'm 51, started working in IT in the mid 90's.

                                                                                                            • amiga386 17 hours ago

                                                                                                              I say HTTPS certificate.

                                                                                                              If I need to specifically say SSL or TLS, it's SSL (as in OpenSSL, LibreSSL, BoringSSL, SSL certificates, Qualys SSL Labs, SSL Server Test). TLS is a made up name for SSL.

                                                                                                              I do say e.g. "TLSv1.2" if I need to name the specific protocol, that's about it.

                                                                                                              I was working before 1999.

                                                                                                              • invaliduser 10 hours ago

                                                                                                                1. I say both somewhat 50/50. I say SSL instinctively, and TLS when I think about it and remember we don't say SSL anymore. It's been like that for around 10 years now, before that I'd only say SSL.

                                                                                                                2. I started programming professionally in 1998 and I'm in my early 50s.

                                                                                                                • gryfft 17 hours ago

                                                                                                                  Reflex is to say SSL but usually correct myself to TLS. Started in IT in 2006 (was a nerd a few years before that though)

                                                                                                                  • romanhn 13 hours ago

                                                                                                                    Exactly this for me as well. Started a few years earlier.

                                                                                                                    • jozvolskyef 17 hours ago

                                                                                                                      I second this, started around the same time.

                                                                                                                    • mbreese 11 hours ago

                                                                                                                      1) SSL, even though I know the difference. More accurately, I know there is a difference, but SSL gets the point across.

                                                                                                                      2) before 1999. IIRC, the first SSL certificate I was involved with getting required the use of a fax machine.

                                                                                                                      • notpushkin 13 hours ago

                                                                                                                        SSL, 27. I would call it `tls` in code, though (and maybe “SSL/TLS” in docs, for clarity).

                                                                                                                        • -t0mm 3 hours ago

                                                                                                                          1. TLS 2. 22. Started in 2024, but the SSL terminology is still widely used in the systems that I currently work with :p

                                                                                                                          • tesseract 16 hours ago

                                                                                                                            (1) SSL

                                                                                                                            (2) 37. I've been an Internet user since ~1995 and been working in tech since 2004.

                                                                                                                            • cobbaut 7 hours ago

                                                                                                                              1. SSL

                                                                                                                              2. I'm 56 and was active in computer clubs in the late 80s, no network, no hard drive, thousands of floppy's.

                                                                                                                              • icedchai 3 hours ago

                                                                                                                                SSL. Started working in the mid 90's.

                                                                                                                                • mogwire 13 hours ago

                                                                                                                                  SSL - In my 40s, over 20 plus years.

                                                                                                                                  When do I say TLS, when that one annoying guy joins the call that always corrects you. Everyone hates him, and he doesn’t care.

                                                                                                                                  • baobun 13 hours ago

                                                                                                                                    TLS: Rolls off the tounge easier. Feels nicer in mouth. Easier to slur smoothly. Flows better on keyboard.

                                                                                                                                    It's the ergonomic choice (;

                                                                                                                                    • baobun 13 hours ago

                                                                                                                                      Aside: I think this shared preference for efficiency/comfort/laziness is big part of why master -> main spread quickly while JavaScript -> ECMAScript never had a chance.

                                                                                                                                      I guess it follows that Twitter/X might never be able to pull off a rebrand again.

                                                                                                                                    • Bluecobra 8 hours ago

                                                                                                                                      1. SSL

                                                                                                                                      2. I’m old enough to remember 56-bit SSL encryption in browsers

                                                                                                                                      • justusthane 13 hours ago

                                                                                                                                        SSL. Working as a sysadmin since 2010. It just feels more right to me, and honestly, it hasn’t been until recently that I’ve noticed more of a concerted effort to rebrand it to TLS — not sure if that’s just my perception or not.

                                                                                                                                        • colmmacc 12 hours ago

                                                                                                                                          Nobody ever says "TLS Certificate". It's only an "SSL Certificate". On that alone, it's just easier to stick to "SSL" for consistency and everyone knows what you mean.

                                                                                                                                          • mr_mitm 8 hours ago

                                                                                                                                            They should be saying X.509 certificate though. I think I say "server certificate" most of the time.

                                                                                                                                          • bravesoul2 8 hours ago

                                                                                                                                            TLS probably. 2004

                                                                                                                                            I think the TLS v1.2 pushed me that way

                                                                                                                                            • sanswork 13 hours ago

                                                                                                                                              SSL 42-started studying security in mid 90s as a teen started working 2000

                                                                                                                                              • theK 11 hours ago

                                                                                                                                                Ah yes, it was a grand time, freeform studying IT security as a teen in the 90s!

                                                                                                                                                • Bluecobra 8 hours ago

                                                                                                                                                  It’s probably a good thing I didn’t have the knowledge/skills I have now, it might have saved me from trouble. Back in those days I was more interested in getting Back Orfice to remotely open a CD-ROM tray on a friend’s computer. I remember when broadband was first being rolled out it seemed like everyone was hooking up their cable/DSL modems directly to their PC and having a public IP with no firewall. Good times.

                                                                                                                                                  • sanswork 9 hours ago

                                                                                                                                                    My mom bought me applied crypto when I was thirteen and I was really into trying to learn how to find exploits with idapro and learning to code in general. It wasn't really the other kind of Freeform studying lol I was terrified of the thought of prison.

                                                                                                                                                • curmudgeon22 17 hours ago

                                                                                                                                                  SSL, started computer science in 2010

                                                                                                                                                  • jedberg 17 hours ago

                                                                                                                                                    I was going to reply to you and tell you that you're too young to be a curmudgeon, but then I realized, no, I'm just old!

                                                                                                                                                  • __s 5 hours ago

                                                                                                                                                    TLS (outside dealing with PG options named like sslmode)

                                                                                                                                                    No

                                                                                                                                                    • garbagepatch 13 hours ago

                                                                                                                                                      To users: https

                                                                                                                                                      To devs: SSL

                                                                                                                                                      Did not start working before 1999. Started using Linux in 2003.

                                                                                                                                                      • itake 16 hours ago

                                                                                                                                                        TLS. 1989.

                                                                                                                                                        Even today, people and marketing pages promote "SSL" term. Unless you specifically google, "What is the deference between SSL and TLS?" most people would have no idea what TLS is.

                                                                                                                                                        • firesteelrain 17 hours ago

                                                                                                                                                          I tell my developers to be compliant that they need to use TLS/SSL

                                                                                                                                                          • ThunderSizzle 17 hours ago

                                                                                                                                                            1. SSL (probably https in that specific scenario)

                                                                                                                                                            2. Graduated and started in 2015.

                                                                                                                                                            • zamadatix 16 hours ago

                                                                                                                                                              1. Cloudflare could probably use my choice of the day as another source for their randomness.

                                                                                                                                                              2. Started my first IT job on a computer networking team in 2012.

                                                                                                                                                              • anal_reactor 15 hours ago

                                                                                                                                                                I always say HTTPS because in the context of my area of speciality, the details of how HTTPS works don't matter and neither do secure communication protocols besides HTTPS.

                                                                                                                                                                • Octoth0rpe 17 hours ago

                                                                                                                                                                  1. SSL 2. Started working in 2000, right on the boundary

                                                                                                                                                                  • tptacek 17 hours ago

                                                                                                                                                                    I say TLS, and started working in the field in 1994.

                                                                                                                                                                    • Rendello 17 hours ago

                                                                                                                                                                      SSL, started programming in maybe 2012. Possibly because of HTTPS or similarity with SSH.

                                                                                                                                                                      • kasey_junk 16 hours ago

                                                                                                                                                                        Almost always ssl. Started professionally in 1999. But! mTLS is always mTLS

                                                                                                                                                                        • frollogaston 12 hours ago

                                                                                                                                                                          SSL, born 1997

                                                                                                                                                                          • aniviacat 17 hours ago

                                                                                                                                                                            1. TLS

                                                                                                                                                                            2. Started working after 1999

                                                                                                                                                                            • jedberg 17 hours ago

                                                                                                                                                                              1. SSL

                                                                                                                                                                              2. Started working before 1999

                                                                                                                                                                              • christophilus 17 hours ago

                                                                                                                                                                                SSL. Started working around 2000.

                                                                                                                                                                                • MBCook 13 hours ago

                                                                                                                                                                                  SSL, 40s

                                                                                                                                                                                  • epc 16 hours ago

                                                                                                                                                                                    1. SSL 2. 57

                                                                                                                                                                                    • unethical_ban 14 hours ago

                                                                                                                                                                                      Nice try, targeted advertiser!

                                                                                                                                                                                      Mid 30s, SSL.

                                                                                                                                                                                      I work in cybersecurity and all the tools in the firewall/cert world still say "SSL decryption" and "SSL certificate". TLS is just a "major version" of SSL in my mind.

                                                                                                                                                                                    • disruptiveink 17 hours ago

                                                                                                                                                                                      Wait, but didn't TLS 1.0 have significant improvements over SSL 3.0? The article makes it seems that just a couple of things were tweaked just to make it different for the sake of being different.

                                                                                                                                                                                      • mcpherrinm 13 hours ago

                                                                                                                                                                                        The main difference is in the padding. When the POODLE attack was pre-announced as only affecting SSL3 and not TLS1.0, that was enough to predict it was going to be a padding oracle.

                                                                                                                                                                                        I think it’s fair to say they’re very similar, with a few “bug fixes”. It’s been a while since I’ve thought about either though, and might be forgetting a few things. I’ve only ever implemented SSL3 and TLS1.0 together, so there may be some details I’m forgetting.

                                                                                                                                                                                        • nextgens 8 hours ago

                                                                                                                                                                                          TLS1.0 introduced modularity via the concept of "extensions". It's everything but a minor evolution of the protocol.

                                                                                                                                                                                        • layer8 17 hours ago

                                                                                                                                                                                          Indeed there are significant changes and improvements, though it’s not a complete redesign like SSL 3.0 was.

                                                                                                                                                                                        • albert_e 18 hours ago

                                                                                                                                                                                          Related

                                                                                                                                                                                          Randomness and the Netscape Browser January 1996 Dr. Dobb's Journal

                                                                                                                                                                                          https://people.eecs.berkeley.edu/~daw/papers/ddj-netscape.ht...

                                                                                                                                                                                          This was written in 1996. The language used feels already much different from today's publications. God I feel old.

                                                                                                                                                                                          • cubes an hour ago

                                                                                                                                                                                            The authors of that article got pictured on the cover of the New York Times for finding that security issue: https://www.nytimes.com/2012/02/15/technology/researchers-fi...

                                                                                                                                                                                            • quietbritishjim 17 hours ago

                                                                                                                                                                                              > This was written in 1996. The language used feels already much different from today's publications. God I feel old.

                                                                                                                                                                                              That depends on which publications you're looking at, just as it did in 1996. An article from LWN [1] today, for example, reads in a fairly similar style. Maybe slightly less stuffy, because it's targeted at a slightly more general audience.

                                                                                                                                                                                              [1] https://lwn.net/

                                                                                                                                                                                            • tdiff 4 hours ago

                                                                                                                                                                                              And it does not help that major tls implementation is called openssl with its own versioning

                                                                                                                                                                                              • amenghra 19 hours ago

                                                                                                                                                                                                I remember "SSL and TLS: Designing and Building Secure Systems" by Eric Rescorla being really useful to understand the history behind TLS and how we got here. The book was written in 2001 and warned about some issues which turned into CVEs a bit later. You might find used copies for a couple bucks.

                                                                                                                                                                                                • cubes 6 hours ago

                                                                                                                                                                                                  This brought me back. I was a member of the UC Berkeley Computer Science Undergraduate Association (https://www.csua.berkeley.edu) in the early aughts. Through the CSUA I came across a job posting for a sysadmin job at Skotos Tech (https://www.skotos.net/), the multiplayer text games company Christopher Allen founded after his work at Consensus Development/Certicom to develop the SSL/TLS implementation for Netscape. It's been a long and strange road.

                                                                                                                                                                                                  • tptacek 18 hours ago

                                                                                                                                                                                                    NB: I feel like the consensus was very firmly established by 2014 that SSL 2.0 was gravely flawed (its handshake isn't even properly authenticated).

                                                                                                                                                                                                    • yardstick 18 hours ago

                                                                                                                                                                                                      Would adoption of the new name been easier if the version started at TLS 3.0/matched the SSL version it originated from?

                                                                                                                                                                                                      • OhNotAPaper 10 hours ago

                                                                                                                                                                                                        > And of course, now, in retrospect, the whole thing looks silly.

                                                                                                                                                                                                        Private enterprise should be the last people on earth to be allowed to label themselves. I have many marketer friends I love, but I truly think the practice of trying to pimp businesses to rich individuals has been probably the biggest waste of human effort in history (outside of maybe carbon-capture efforts). We're just stuck with shitty brands, broken products, and stupid consumers who think they're getting the best.

                                                                                                                                                                                                        • WhyNotHugo 20 hours ago

                                                                                                                                                                                                          I like this writing style. Informative, has some flavour/personality, but clear and concise.

                                                                                                                                                                                                          • irusensei 5 hours ago

                                                                                                                                                                                                            I’m curious when the certificate authority thing started and how old browsers interpreted self signed certificates.

                                                                                                                                                                                                            • achillean 15 hours ago

                                                                                                                                                                                                              There are still more than 300,000 services on the Internet that support SSLv2:

                                                                                                                                                                                                              https://www.shodan.io/search/report?query=ssl.version%3Asslv...

                                                                                                                                                                                                              And a trend line of how it's changed:

                                                                                                                                                                                                              https://trends.shodan.io/search?query=ssl.version%3Asslv2#ov...

                                                                                                                                                                                                              It has dropped significantly though over the years but it will continue to stick around for a while.

                                                                                                                                                                                                              • NoahZuniga 14 hours ago

                                                                                                                                                                                                                But how many clients are still using it? As far as my understanding goes, no relevant, up to date piece of software/library still supports

                                                                                                                                                                                                                • esseph 9 hours ago

                                                                                                                                                                                                                  Ahaha

                                                                                                                                                                                                                  If you look around you'll find services, today, that haven't been upgraded in decades.

                                                                                                                                                                                                              • aramattamara 13 hours ago

                                                                                                                                                                                                                Wouldn't it be appropriate now to call the next version SSL again? It's still widely used by everyone, so let them keep using it.

                                                                                                                                                                                                                • ekr____ 12 hours ago

                                                                                                                                                                                                                  There's really not much chance of that, given that the protocol is maintained by the IETF TLS Working Group.

                                                                                                                                                                                                                  • notpushkin 13 hours ago

                                                                                                                                                                                                                    “TLS” is also used in a bunch of places already, too. Updating config file formats and function signatures will be a PITA.

                                                                                                                                                                                                                    • MBCook 13 hours ago

                                                                                                                                                                                                                      I would like to see it called SSL again, but agree the cure would be worse than the disease.

                                                                                                                                                                                                                    • klysm 13 hours ago

                                                                                                                                                                                                                      Please don't give anybody any ideas!

                                                                                                                                                                                                                      • anonymars 13 hours ago

                                                                                                                                                                                                                        (USB Implementers Forum): "You rang? How about SSL Gen3x2?"

                                                                                                                                                                                                                    • ensocode 8 hours ago

                                                                                                                                                                                                                      Thanks for sharing! I was always wondering and didn't know about the background.

                                                                                                                                                                                                                      • pharos92 16 hours ago

                                                                                                                                                                                                                        1. SSL 2. 33 Started working in tech at 21.

                                                                                                                                                                                                                        • nottorp 3 hours ago

                                                                                                                                                                                                                          Without reading the article, is the reasoning similar to how the USB consortium chooses numbers and names?

                                                                                                                                                                                                                          • ricardo81 19 hours ago

                                                                                                                                                                                                                            This is one of those ones where it's awkward with a certain crowd. At some point SSL was https and class C meant a /24 subnetwork for webmaster types.

                                                                                                                                                                                                                            I've found that certain crowds will get angry about the vernacular vs a crowd that always understood something a particular way.

                                                                                                                                                                                                                            In any event, we have to stick with the times, especially with new entrants that stick with the new terms.

                                                                                                                                                                                                                            • aag 17 hours ago

                                                                                                                                                                                                                              I seem to remember that Microsoft's initial implementation used a field in the protocol in an incompatible way to encode that it was a different implementation. I remember people being annoyed at them for deliberately screwing up future compatibility. Does anyone remember the details of this?

                                                                                                                                                                                                                              • ekr____ 12 hours ago

                                                                                                                                                                                                                                IIRC they were using a cipher suite to signal the new version. Cipher suites were basically the only signaling mechanism in SSLv2 (and SSLv3/TLS 1.0 before extensions were introduced).

                                                                                                                                                                                                                              • userbinator 20 hours ago

                                                                                                                                                                                                                                tl;dr: politics.

                                                                                                                                                                                                                                I still like to occasionally refer to TLS 1.3 as "SSL 3.4" to see whether people are aware of the history.

                                                                                                                                                                                                                                • ekr____ 15 hours ago

                                                                                                                                                                                                                                  When TLS 1.3 was finally standardized, there was quite a bit of debate about whether in light of the how different it was from TLS 1.2 we should continue to use the 1.3 version number. ISTR that TLS 2 and TLS 4.0 were both floated--though I don't recall SSL 3.4--but eventually the WG decided to stick with the 1.3 version number we had been using throughout the rest of the process.

                                                                                                                                                                                                                                  • userbinator 15 hours ago

                                                                                                                                                                                                                                    The version number in the protocol for TLS 1.3 is 03 04. TLS 1.0 is 03 01, and SSL 3.0 is 03 00. Hence "SSL 3.4".

                                                                                                                                                                                                                                    • ekr____ 13 hours ago

                                                                                                                                                                                                                                      Yes, I understood your reasoning. I'm just saying that I don't think anyone floated calling it SSL 3.4.

                                                                                                                                                                                                                                • chollida1 19 hours ago

                                                                                                                                                                                                                                  > As a part of the cutthroat competition, Microsoft decided to revise the SSL 2 protocol with some additions of their own, and specified a protocol called "PCT" that was derived from SSL 2. It was only supported in IE and IIS.

                                                                                                                                                                                                                                  > Netscape also wanted to address SSL 2 issues, but wasn't going to let Microsoft take leadership/ownership in the standard, so they developed SSL 3.0, which was a more significant departure.

                                                                                                                                                                                                                                  I remember this moment and this is where I realized that Microsoft wasn't always the bad guy here. They had the better implementation and were willing to share it. But Netscape in this instance acted like kids and wouldn't cooperate at all. Which is why this meeting had to occur and by that point it was clear Netscape had lost the browser and it wasn't going to be close.

                                                                                                                                                                                                                                  Hence the quick about face by Netscape to accept what was pretty much Microsoft's proposed solution.

                                                                                                                                                                                                                                  I can't speak to the rest of Microsoft's browser decisions and given the court ruling it's clear they weren't the good guys either but this opened my eyes to the fact that all companies are the bad guys some time:)

                                                                                                                                                                                                                                  • thayne 18 hours ago

                                                                                                                                                                                                                                    Forcing the name to be chnaged from SSL to TLS seems pretty petty to me.

                                                                                                                                                                                                                                    Two decades later, and it is still common for people to call TLS SSL.

                                                                                                                                                                                                                                    • TZubiri 19 hours ago

                                                                                                                                                                                                                                      Microsoft was the bad guy in a movie where you have a war right before aliens invade and you figure out that there's bigger enemies.

                                                                                                                                                                                                                                      FSF hated Microsoft because they released binaries without source code, they were THE enemy, nowadays, you are lucky if you get a binary to study and modify! The standard from any competitive developer is to hide the binary and source behind a server. Try to study and modify that!

                                                                                                                                                                                                                                      • II2II 15 hours ago

                                                                                                                                                                                                                                        For the FSF, Microsoft releasing binaries without source was reason enough to hat them but it was not the only reason why people, including those in the FSF, hated them. Microsoft was very much a company that used their dominant market position to lock customers in and the competition out. (Remember embraced, extend, extinguish?) The Microsoft of today looks like a cuddly teddy bear in comparision.

                                                                                                                                                                                                                                        • esafak 15 hours ago

                                                                                                                                                                                                                                          Microsoft's motto then was "We set the standards".

                                                                                                                                                                                                                                        • simfree 17 hours ago

                                                                                                                                                                                                                                          Flaky, unreliable, not web standards compliant, hosted services suck to deal with.

                                                                                                                                                                                                                                          Who needs to add a CORS header to allow Sentry.io or Cloudflare's metrics to work on this 2014 era SaaS that the developer has wandered away from?

                                                                                                                                                                                                                                          • Nursie 13 hours ago

                                                                                                                                                                                                                                            > FSF hated Microsoft because they released binaries without source code

                                                                                                                                                                                                                                            I think that's a bit of an oversimplification - FOSS-leaning people had a pretty large set of reasons to dislike and distrust MS back then. "Embrace, Extend, Extinguish" was a big one, calling linux/FOSS a cancer, their money and influence being used to fund the whole SCO debacle amongst other things. They were pretty actively evil, not just "closed source".

                                                                                                                                                                                                                                            There was very good reason not to let MS gain de-facto control of an open protocol, because 90s and 00s microsoft would not have hesitated to find ways to use that dominance to screw the competition.

                                                                                                                                                                                                                                            • chollida1 19 hours ago

                                                                                                                                                                                                                                              I agree with your entire statement:)

                                                                                                                                                                                                                                            • hsbauauvhabzb 17 hours ago

                                                                                                                                                                                                                                              Fool me once, shame on you. Fool me twice?

                                                                                                                                                                                                                                              • rendx 15 hours ago

                                                                                                                                                                                                                                                > But Netscape in this instance acted like kids

                                                                                                                                                                                                                                                Oh, please.

                                                                                                                                                                                                                                                https://en.wikipedia.org/wiki/Criticism_of_Microsoft

                                                                                                                                                                                                                                                The "velvet sweatshop" one is sufficient, but plenty of others to choose from. Don't have a source at hand but I remember it was known for its "work 3 years there and then you need to retire early from burnout" culture. There's also a really good (and highly depressing) 2001 German documentary around that "feature" called "Leben nach Microsoft" (Life after Microsoft).

                                                                                                                                                                                                                                                And the classic https://en.wikipedia.org/wiki/Microserfs

                                                                                                                                                                                                                                                There was really less than zero reason to trust M$ in the 90s and early 00s.

                                                                                                                                                                                                                                                • Dylan16807 11 hours ago

                                                                                                                                                                                                                                                  You quoted "in this instance" and then cited completely unrelated problems?

                                                                                                                                                                                                                                                  • rendx 8 hours ago

                                                                                                                                                                                                                                                    When a company repeatedly demonstrates a pattern of embracing, extending, and extinguishing standards (see: Java, Kerberos, HTML), it’s fair to view any technical move with suspicion - even if the particular proposal seems technically sound. It’s easy to retroactively view Netscape’s resistance as petty, but the power imbalance was real, and the fear of Microsoft co-opting the standard wasn’t paranoia.

                                                                                                                                                                                                                                                    Some companies make abuse a business model. I don't see how anyone can defend a position where they only look at isolated actions of a company and not their overall strategic positioning. There are boundaries. Ethical boundaries. If you never experience the consequences of your actions, if nobody ever objects to your behavior, you will not stop. Especially not a distributed organism of a company, which has no inherent ethical boundaries; its boundaries are those that affect business, so you need to teach them in business. If your business model is based on treating your own employees like slaves, it is you who is cancer, not the other.

                                                                                                                                                                                                                                                    Calling that “kid-like behavior” is misguided on two levels. First, as noted, Netscape’s actions were arguably rational in context - pushing back against a powerful incumbent trying to steer an open standard toward a proprietary implementation.

                                                                                                                                                                                                                                                    Second, the phrase itself leans on a dismissive and inaccurate stereotype. Kids aren’t inherently irrational or overly emotional; in fact, there’s substantial research showing that young people behave quite logically given their environment. Framing behavior this way isn’t just lazy; it reinforces the kind of condescension that later gets labeled as “adverse childhood experiences” in therapy, assuming someone even gets the chance to unpack and not replicate it.

                                                                                                                                                                                                                                                    On both levels, it is DARVO.