Multiplexed Transport Layer Security
It is proposed that this article be deleted because of the following concern:
If you can address this concern by improving, copyediting, sourcing, renaming, or merging the page, please edit this page and do so. You may remove this message if you improve the article or otherwise object to deletion for any reason. Although not required, you are encouraged to explain why you object to the deletion, either in your edit summary or on the talk page. If this template is removed, do not replace it.
The article may be deleted if this message remains in place for seven days, i.e., after 20:35, 25 July 2019 (UTC).
This article includes a list of references, related reading or external links, but its sources remain unclear because it lacks inline citations. (July 2013) (Learn how and when to remove this template message)
This article relies too much on references to primary sources. (July 2013) (Learn how and when to remove this template message)
In information technology, the Transport Layer Security (TLS) protocol provides connection security with mutual authentication, data confidentiality and integrity, key generation and distribution, and security parameters negotiation. However, missing from the protocol is a way to multiplex application data over a single TLS session.
Multiplexed Transport Layer Security (MTLS) protocol is a new TLS sub-protocol running over TLS or DTLS. The MTLS design provides application multiplexing over a single TLS (or DTLS) session. Therefore, instead of associating a TLS connection with each application, MTLS allows several applications to protect their exchanges over a single TLS session.
MTLS is currently in draft stage http://tools.ietf.org/html/draft-badra-hajjeh-mtls-06 which expired in October 2011.
- OpenSSL: a free and popular implementation.
- GnuTLS: a free implementation whose licensing is compatible with the GPL.
|This cryptography-related article is a stub. You can help Wikipedia by expanding it.|