xutil.dev
Login

TLS Version Comparison

Comparison reference for TLS 1.0/1.1/1.2/1.3 covering versions, cipher suites, handshake, certificates, extensions, deprecated features, and best practices

Related Categories:SSL/TLSSecurity

49 commands

TLS 1.0 (1999)

Successor to SSL 3.0. Deprecated due to known vulnerabilities

TLS 1.1 (2006)

Added CBC attack mitigations. Now deprecated

TLS 1.2 (2008)

AEAD cipher suite support. Still widely used

TLS 1.3 (2018)

Faster handshake, mandatory forward secrecy. Recommended

TLS 1.3 0-RTT

Reduce latency with TLS 1.3 0-RTT resumption

バージョン確認 (openssl)

Check TLS version with openssl

バージョン確認 (nmap)

Scan supported TLS versions with nmap

プロトコルネゴシエーション

Negotiate TLS version between client and server

AES-128-GCM

Recommended AEAD cipher for TLS 1.2/1.3. Fast and secure

AES-256-GCM

256-bit AES-GCM. Highest level of encryption strength

CHACHA20-POLY1305

AEAD cipher fast on mobile/ARM environments

ECDHE鍵交換

Elliptic curve Diffie-Hellman for forward secrecy

暗号スイート順序

Control cipher suite priority on server side

暗号スイート一覧表示

List supported cipher suites with OpenSSL

Nginx暗号設定

Configure recommended cipher suites in Nginx

Apache暗号設定

Configure recommended cipher suites in Apache

TLS 1.2 フルハンドシェイク

TLS 1.2 requires 2-RTT full handshake

TLS 1.3 フルハンドシェイク

TLS 1.3 completes handshake in 1-RTT

セッション再開

Speed up reconnection with session tickets

ClientHello

Client sends supported protocols, ciphers, and extensions

ServerHello

Server responds with selected protocol and cipher

ハンドシェイクデバッグ

Debug TLS handshake details

ALPN

Negotiate protocol with ALPN

証明書確認

Check server certificate details

証明書有効期限確認

Check SSL certificate expiration date

Let's Encrypt発行

Obtain free SSL certificate with Let's Encrypt

CSR生成

Generate Certificate Signing Request (CSR)

自己署名証明書

Create self-signed certificate for development

証明書チェーン検証

Verify certificate chain integrity

ECDSA証明書

Generate ECDSA certificate (faster than RSA)

SNI (Server Name Indication)

Host multiple certificates on a single IP

OCSP Stapling

Cache certificate revocation check on server side

Certificate Transparency

Ensure certificate transparency with CT logs

Encrypted ClientHello (ECH)

Encrypt SNI in ClientHello with TLS 1.3

Key Share

Include key share parameters in ClientHello for TLS 1.3

SSL 2.0 無効化

SSL 2.0 has critical vulnerabilities, must be disabled

SSL 3.0 無効化

Disable SSL 3.0 vulnerable to POODLE attack

RC4無効化

RC4 cipher is breakable and must not be used

3DES無効化

Disable 3DES vulnerable to Sweet32 attack

MD5無効化

Do not use MD5 for hashing due to collision attacks

SHA-1非推奨

SHA-1 vulnerable to collision attacks, not for certificates

静的RSA鍵交換非推奨

Disable static RSA key exchange (no forward secrecy)

Mozilla SSL Configuration Generator

Generate recommended config with Mozilla SSL Config Generator

SSL Labs テスト

Test server TLS configuration with SSL Labs

testssl.sh

Comprehensive TLS testing from command line

HSTS設定

Enable HTTP Strict Transport Security

証明書自動更新

Auto-renew Let's Encrypt certificates with cron

CAA レコード設定

Restrict allowed CAs with DNS CAA record

TLS 1.2+1.3 推奨設定

Recommended config enabling only TLS 1.2 and 1.3