Solved

non http-based SSL traffic

Posted on 2013-01-15
5
425 Views
Last Modified: 2013-01-16
Experts,

Can someone give me some examples of non http-based  SSL traffic?
0
Comment
Question by:trojan81
  • 2
  • 2
5 Comments
 
LVL 52

Expert Comment

by:Scott Fell, EE MVE
ID: 38781393
I think non http based would be something like an instant message.
0
 
LVL 33

Expert Comment

by:Dave Howe
ID: 38781876
Sure; TLS is available with a wide variety of protocols, each of the following have a -S variant:

SMTP
POP3
IMAP
LDAP
0
 

Author Comment

by:trojan81
ID: 38783039
Dave,

What makes those "ssl traffic"
0
 
LVL 33

Accepted Solution

by:
Dave Howe earned 500 total points
ID: 38783393
trojan: each has an explicit ssl (different port) variant.

SMTP explicit (SMTPS) can be found on port 465 instead of 25/587
POP3 explicit (POP3S)  can be found on port 995 instead of 110
IMAP explicit (IMAPS) can be found on port 993 instead of 143
LDAP explicit (LDAPS) can be found on port 636 instead of 389

this is exactly the same as the way that HTTP explicit (HTTPS) can be found on 443 instead of 80 :)

in most cases, now that TLS has supplanted SSL, it is expected that you use the implicit mode (i.e. connect to the non-ssl port, and issue a STARTTLS command to begin encryption) but the above are still well-supported in most clients.
0
 

Author Closing Comment

by:trojan81
ID: 38783690
Very well done! Thank you DAVEHOWE
0

Featured Post

Active Directory Webinar

We all know we need to protect and secure our privileges, but where to start? Join Experts Exchange and ManageEngine on Tuesday, April 11, 2017 10:00 AM PDT to learn how to track and secure privileged users in Active Directory.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
HTTP to HTTPS redirect is not working 1 93
HTTP Error 403.14 - Forbidden 5 62
Disable SSLv3.0/TLSv1.0 - Windows 2012R2 3 47
What is SNI and when it can be useful ? 3 21
So you need a certificate so you can offer SSL encryption.  But which one should you get?  There are so many choices out there! Here is a generic overview of the main types of SSL certificates sold by the majority of commercial Certification Auth…
Imagine a situation that you have installed SSL (http://en.wikipedia.org/wiki/Secure_Sockets_Layer) Certificate on your Cisco ASA (Cisco Adaptive Security Appliance) firewall. Installation of SSL certificate on ASA is an another topic for which you …
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…
In an interesting question (https://www.experts-exchange.com/questions/29008360/) here at Experts Exchange, a member asked how to split a single image into multiple images. The primary usage for this is to place many photographs on a flatbed scanner…

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question