Why SSL was renamed to TLS in late 90s (2014)

tim.dierks.org

549 points by Bogdanp 16 days ago


ekr____ - 15 days ago

The situation is additionally confused by the fact that the version numbers do not give a good clue to how different the protocols were. Specifically:

SSLv2 was the first widely deployed version of SSL, but as this post indicates, had a number of issues.

SSLv3 is a more or less completely new protocol

TLS 1.0 is much like SSLv3 but with some small revisions made during the IETF standardization process.

TLS 1.1 is a really minor revision to TLS 1.0 to address some issues with the way block ciphers were used.

TLS 1.2 is a moderately sized revision to TLS 1.1 to adjust to advances in cryptography, specifically adding support for newer hashes in response to weaknesses in MD5 and SHA-1 and adding support for AEAD cipher suites such as AES-GCM.

TLS 1.3 is mostly a new protocol though it reuses some pieces of TLS 1.2 and before.

Each of these protocols has been designed so that you could automatically negotiate versions, thus allowing for clients and servers to independently upgrade without loss of connectivity.

Timothycquinn - 15 days ago

Considering that Microsoft was a completely different beast in that time, I'm not surprised it does not seem that silly.

M$ (appropriate name for that time) of the day was doing its best to own everything and the did not let up on trying to hold back the open source internet technologies until the early 2010's I believe. Its my opinion that they were successful in killing Java Applets, which were never able to improve past the first versions and JavaScript and CSS in general was held back many years.

I still recall my corporate overloards trying to push me to support IE's latest 'technologies' but I resisted and instead started supporting Mozilla 3.0 as soon as they fixed some core JS bugs for our custom built enterprise JavaScript SPA tools in the early 2000's. It turned out to be a great decision as the fortune 500 company started using Mozilla / Firefox in other internal apps in later years long before it became common place.

webprofusion - 15 days ago

People who make a strong distinction between TLS and SSL are indicating that they know the difference and think you should too, but at a practical level it's the difference between .doc and .docx (fundamentally different but interchangeable to the layman). The boots on the ground mostly care about getting https to work and have minimal consideration for it's inner workings.

ahofmann - 16 days ago

Oh wow, I just discovered that my brain unconsciously had a hard time to differentiate between SSL and TLS. And now, after two friggin decades I find out, why!

pkulak - 16 days ago

“Transport Layer Security” really is a better name though. I also like to say “TLS”. Two Ses in a row makes you sound like a snake.

jedberg - 15 days ago

Curious, when you tell someone they need to access a website securely (or any other case where you might use the term TLS or SSL), do you:

1. Say SSL or TLS?

2. How old are you (or did you start working before 1999?)

I'll reply with my answer too.

disruptiveink - 15 days ago

Wait, but didn't TLS 1.0 have significant improvements over SSL 3.0? The article makes it seems that just a couple of things were tweaked just to make it different for the sake of being different.

albert_e - 16 days ago

Related

Randomness and the Netscape Browser January 1996 Dr. Dobb's Journal

https://people.eecs.berkeley.edu/~daw/papers/ddj-netscape.ht...

This was written in 1996. The language used feels already much different from today's publications. God I feel old.

b0a04gl - 15 days ago

> the rename mattered more structurally than people think. ssl was netscape's, tls came out of ietf. that shift changed who controlled the evolution. after that, cipher negotiation, forward secrecy, and extension frameworks all became part of the process

> also worth noting: tls1.0 wasn't just a spec rename of ssl3.0. rfc cleaned up edge cases, formalised alert handling, and started pushing toward modular crypto. lot of small things that let future versions iterate cleanly

> the real impact shows up much later - tls1.3 doesn’t happen unless tls1.0 laid down a clean enough protocol base

amenghra - 16 days ago

I remember "SSL and TLS: Designing and Building Secure Systems" by Eric Rescorla being really useful to understand the history behind TLS and how we got here. The book was written in 2001 and warned about some issues which turned into CVEs a bit later. You might find used copies for a couple bucks.

tptacek - 16 days ago

NB: I feel like the consensus was very firmly established by 2014 that SSL 2.0 was gravely flawed (its handshake isn't even properly authenticated).

yardstick - 16 days ago

Would adoption of the new name been easier if the version started at TLS 3.0/matched the SSL version it originated from?

OhNotAPaper - 15 days ago

> And of course, now, in retrospect, the whole thing looks silly.

Private enterprise should be the last people on earth to be allowed to label themselves. I have many marketer friends I love, but I truly think the practice of trying to pimp businesses to rich individuals has been probably the biggest waste of human effort in history (outside of maybe carbon-capture efforts). We're just stuck with shitty brands, broken products, and stupid consumers who think they're getting the best.

WhyNotHugo - 16 days ago

I like this writing style. Informative, has some flavour/personality, but clear and concise.

tdiff - 15 days ago

And it does not help that major tls implementation is called openssl with its own versioning

cubes - 15 days ago

This brought me back. I was a member of the UC Berkeley Computer Science Undergraduate Association (https://www.csua.berkeley.edu) in the early aughts. Through the CSUA I came across a job posting for a sysadmin job at Skotos Tech (https://www.skotos.net/), the multiplayer text games company Christopher Allen founded after his work at Consensus Development/Certicom to develop the SSL/TLS implementation for Netscape. It's been a long and strange road.

achillean - 15 days ago

There are still more than 300,000 services on the Internet that support SSLv2:

https://www.shodan.io/search/report?query=ssl.version%3Asslv...

And a trend line of how it's changed:

https://trends.shodan.io/search?query=ssl.version%3Asslv2#ov...

It has dropped significantly though over the years but it will continue to stick around for a while.

aramattamara - 15 days ago

Wouldn't it be appropriate now to call the next version SSL again? It's still widely used by everyone, so let them keep using it.

irusensei - 15 days ago

I’m curious when the certificate authority thing started and how old browsers interpreted self signed certificates.

pharos92 - 15 days ago

1. SSL 2. 33 Started working in tech at 21.

ricardo81 - 16 days ago

This is one of those ones where it's awkward with a certain crowd. At some point SSL was https and class C meant a /24 subnetwork for webmaster types.

I've found that certain crowds will get angry about the vernacular vs a crowd that always understood something a particular way.

In any event, we have to stick with the times, especially with new entrants that stick with the new terms.

ensocode - 15 days ago

Thanks for sharing! I was always wondering and didn't know about the background.

dana321 - 15 days ago

Solid State Logic (SSL)

aag - 15 days ago

I seem to remember that Microsoft's initial implementation used a field in the protocol in an incompatible way to encode that it was a different implementation. I remember people being annoyed at them for deliberately screwing up future compatibility. Does anyone remember the details of this?

lowbloodsugar - 14 days ago

title: “Why”

Article: (literal quote): “for some reason”.

nottorp - 15 days ago

Without reading the article, is the reasoning similar to how the USB consortium chooses numbers and names?

sslbits - 15 days ago

huh?

userbinator - 16 days ago

tl;dr: politics.

I still like to occasionally refer to TLS 1.3 as "SSL 3.4" to see whether people are aware of the history.

chollida1 - 16 days ago

> As a part of the cutthroat competition, Microsoft decided to revise the SSL 2 protocol with some additions of their own, and specified a protocol called "PCT" that was derived from SSL 2. It was only supported in IE and IIS.

> Netscape also wanted to address SSL 2 issues, but wasn't going to let Microsoft take leadership/ownership in the standard, so they developed SSL 3.0, which was a more significant departure.

I remember this moment and this is where I realized that Microsoft wasn't always the bad guy here. They had the better implementation and were willing to share it. But Netscape in this instance acted like kids and wouldn't cooperate at all. Which is why this meeting had to occur and by that point it was clear Netscape had lost the browser and it wasn't going to be close.

Hence the quick about face by Netscape to accept what was pretty much Microsoft's proposed solution.

I can't speak to the rest of Microsoft's browser decisions and given the court ruling it's clear they weren't the good guys either but this opened my eyes to the fact that all companies are the bad guys some time:)