Part 4: TLS Connections and Secure Communication
In this part, we will learn about the TLS protocol, the successor of the SSL protocol, why it is needed, and why it is used so much on the modern internet. Then, we will learn how to establish secure communication channels using TLS, send and receive data, and shut them down. We will also learn why X.509 certificates are important for TLS connections and how they counter Man in the Middle attacks. Then, we will find out how to supply a certificate for a TLS connection and how to verify the certificate of a remote party. Working with TLS and certificates will be illustrated using command-line and C code examples.
This part contains the following chapters:
- Chapter 9, Establishing TLS Connections and Sending Data over Them
- Chapter 10, Using X.509 Certificates in TLS
- Chapter 11, Special Usages of TLS