Content deleted Content added
Tags: Reverted extraneous markup |
rvv |
||
Line 53:
*[[XZ Utils|xz]] - LZMA2-based content compression, supported by a non-official Firefox patch;<ref>{{cite web|url=https://wiki.mozilla.org/LZMA2_Compression|title=LZMA2 Compression - MozillaWiki|access-date=18 April 2014}}</ref> and fully implemented in mget since 2013-12-31.<ref>{{cite web|url=https://github.com/rockdaboot/mget|title=mget GitHub project page|access-date=6 January 2017}}</ref>
*[[SAP NetWeaver]]
*[[Internet Information Services|Microsoft IIS]]: built-in or using third-party module
Line 97:
As of 2016, the TIME attack and the HEIST attack are now public knowledge.<ref>{{cite web|last=Sullivan|first=Nick|title=CRIME, TIME, BREACH and HEIST: A brief history of compression oracle attacks on HTTPS |url=https://www.helpnetsecurity.com/2016/08/11/compression-oracle-attacks-https/|access-date=16 August 2016|date=11 August 2016}}</ref><ref>{{cite web|last=Goodin|first=Dan|title= HEIST exploit — New attack steals SSNs, e-mail addresses, and more from HTTPS pages|url=https://arstechnica.com/security/2016/08/new-attack-steals-ssns-e-mail-addresses-and-more-from-https-pages/|access-date=16 August 2016|date=3 August 2016}}</ref><ref>{{cite web|last=Be'ery|first=Tal|title=A Perfect Crime? TIME will tell.|url=https://www.owasp.org/images/e/eb/A_Perfect_CRIME_TIME_Will_Tell_-_Tal_Beery.pdf}}</ref><ref>{{cite web|last=Vanhoef|first=Mathy|title=HEIST: HTTP Encrypted Information can be Stolen through TCP-windows|url=https://www.blackhat.com/docs/us-16/materials/us-16-VanGoethem-HEIST-HTTP-Encrypted-Information-Can-Be-Stolen-Through-TCP-Windows-wp.pdf}}</ref>
{{Reflist}}
*RFC 2616: Hypertext Transfer Protocol – HTTP/1.1
*[https://www.iana.org/assignments/http-parameters HTTP Content-Coding Values] by Internet Assigned Numbers Authority
|