SOLUTIONS D’IDENTITÉ D’UTILISATEUR
First, I would like to than Ivan Ristic for his development of the SSL/TLS deployment Best Practices document. This is a simple overview of what a Web server administrator should consider in an SSL deployment. I am also looking forward to Ristic's book, "Bulletproof SSL/TLS and PKI," which hopefull...
Watchers of the SSL industry follow SSL protocol attacks such as BEAST, CRIME, Lucky 13 and RC4 closely. They also track the rare certification authority (CA) attacks such as Comodo or DigiNotar. But they don’t seem to spend much time following attacks to the domain name registration system (DNS). ...