Английская Википедия:Datagram Transport Layer Security

Материал из Онлайн справочника
Перейти к навигацииПерейти к поиску

Шаблон:Distinguish Шаблон:Short description Datagram Transport Layer Security (DTLS) is a communications protocol providing security to datagram-based applications by allowing them to communicate in a way designed[1][2][3] to prevent eavesdropping, tampering, or message forgery. The DTLS protocol is based on the stream-oriented Transport Layer Security (TLS) protocol and is intended to provide similar security guarantees. The DTLS protocol datagram preserves the semantics of the underlying transport—the application does not suffer from the delays associated with stream protocols, but because it uses UDP or SCTP, the application has to deal with packet reordering, loss of datagram and data larger than the size of a datagram network packet. Because DTLS uses UDP or SCTP rather than TCP, it avoids the "TCP meltdown problem",[4][5] when being used to create a VPN tunnel.

Definition

The following documents define DTLS:

DTLS 1.0 is based on TLS 1.1, DTLS 1.2 is based on TLS 1.2, and DTLS 1.3 is based on TLS 1.3. There is no DTLS 1.1 because this version-number was skipped in order to harmonize version numbers with TLS.[2] Like previous DTLS versions, DTLS 1.3 is intended to provide "equivalent security guarantees [to TLS 1.3] with the exception of order protection/non-replayability".[7]

Implementations

Libraries

Шаблон:Main article Шаблон:More citations needed

Library support for DTLS
Implementation DTLS 1.0[1] DTLS 1.2[2] DTLS 1.3[3]
Botan Шаблон:Yes Шаблон:Yes
cryptlib Шаблон:No Шаблон:No
GnuTLS Шаблон:Yes Шаблон:Yes
Java Secure Socket Extension Шаблон:Yes Шаблон:Yes
LibreSSL Шаблон:Yes Шаблон:Yes[8]
libsystools[9] Шаблон:Yes Шаблон:No
MatrixSSL Шаблон:Yes Шаблон:Yes
mbed TLS (previously PolarSSL) Шаблон:Yes[10] Шаблон:Yes[10]
Network Security Services Шаблон:Yes[11] Шаблон:Yes[12]
OpenSSL Шаблон:Yes Шаблон:Yes[13]
PyDTLS[14][15] Шаблон:Yes Шаблон:Yes
Python3-dtls[16][17] Шаблон:Yes Шаблон:Yes
RSA BSAFE Шаблон:No Шаблон:No
s2n Шаблон:No Шаблон:No
Schannel XP/2003, Vista/2008 Шаблон:No Шаблон:No
Schannel 7/2008R2, 8/2012, 8.1/2012R2, 10 Шаблон:Yes[18] Шаблон:No[18]
Schannel 10 (1607), 2016 Шаблон:Yes Шаблон:Yes[19]
Secure Transport OS X 10.2–10.7 / iOS 1–4 Шаблон:No Шаблон:No
Secure Transport OS X 10.8–10.10 / iOS 5–8 Шаблон:Yes[20] Шаблон:No
SharkSSL Шаблон:No Шаблон:No
tinydtls [21] Шаблон:No Шаблон:Yes
Waher.Security.DTLS [22] Шаблон:No Шаблон:Yes
wolfSSL (previously CyaSSL)[23] Шаблон:Yes Шаблон:Yes Шаблон:Yes
@nodertc/dtls [24][25] Шаблон:No Шаблон:Yes
java-dtls[26] Шаблон:Yes Шаблон:Yes
pion/dtls[27] (Go) Шаблон:No Шаблон:Yes
californium/scandium[28] (Java) Шаблон:No Шаблон:Yes
SNF4J[29] (Java) Шаблон:Yes Шаблон:Yes
Implementation DTLS 1.0 DTLS 1.2 DTLS 1.3

Applications

Vulnerabilities

In February 2013 two researchers from Royal Holloway, University of London discovered a timing attack[38] which allowed them to recover (parts of the) plaintext from a DTLS connection using the OpenSSL or GnuTLS implementation of DTLS when Cipher Block Chaining mode encryption was used.

See also

Шаблон:Portal

References

Шаблон:Reflist

External links

Шаблон:SSL/TLS Шаблон:VPN