
{"id":606,"date":"2009-09-25T08:39:27","date_gmt":"2009-09-25T11:39:27","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=606"},"modified":"2009-09-25T08:39:27","modified_gmt":"2009-09-25T11:39:27","slug":"%c2%bfcomo-de-bien-conoces-el-ssl","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/%c2%bfcomo-de-bien-conoces-el-ssl\/","title":{"rendered":"\u00bfC\u00f3mo de bien conoces el SSL?"},"content":{"rendered":"<p>El protocolo SSL lleva un tiempo siendo protagonista de muchas noticias, de muchos estudios, de muchos informes&#8230;para su desgracia.<\/p>\n<p>Lo que en un principio se define como protocolo criptogr\u00e1fico para establecer una mayor seguridad en las comunicaciones que se realizan en Internet, finalmente se convierte en un sistema que aparentemente contiene vulnerabilidades que echan por tierra sus principios. <strong><a href=\"http:\/\/www.thoughtcrime.org\/index.html\">Moxie Marlinspike<\/a><\/strong> consigui\u00f3, <a href=\"https:\/\/media.blackhat.com\/bh-dc-09\/video\/Marlinspike\/blackhat-dc-09-marlinspike-slide.mov\">gracias a sus investigaciones y posteriores charlas con demostraciones<\/a>, que el consejo que siempre d\u00e1bamos\u00a0a nuestros conocidos de &#8220;<em>si ves un candadito abajo, tranquilo, puedes meterte en tu banco que ya est\u00e1s seguro<\/em>&#8221; no aplicase tanto en la actualidad.<\/p>\n<p>Con el gran debate generado a partir de estas y otras investigaciones, la credibilidad en este sistema comienza a decrecer, y ah\u00ed es donde entra en juego el proyecto al que quer\u00eda referenciar en este post.<\/p>\n<p>Se trata de SSL Labs, una organizaci\u00f3n que se centra en el est\u00e1ndar SSL. Ofrece una <strong><a href=\"https:\/\/www.ssllabs.com\/ssldb\/index.html\">herramienta online<\/a><\/strong> para probar la seguridad de <em>nuestras p\u00e1ginas con https, <\/em>la cual nos dar\u00e1 una puntuaci\u00f3n<em> (<\/em>en base a<em><span style=\"font-style: normal;\"><strong> <\/strong><\/span><a href=\"https:\/\/www.ssllabs.com\/downloads\/SSL_Server_Rating_Guide_2009.pdf\"><span style=\"font-style: normal;\"><strong>este documento<\/strong><\/span><\/a>),<\/em> recopilaciones de\u00a0<em><a href=\"https:\/\/www.ssllabs.com\/projects\/firefox-addons\/index.html\">add-ons<\/a> <\/em>para el navegador<em> Firefox <\/em>relacionados con SSL<em>, <\/em>as\u00ed como <a href=\"http:\/\/blog.ivanristic.com\/category-ssl.xml\">informaci\u00f3n y noticias<\/a> sobre todo lo que est\u00e9 relacionado con este protocolo<em>.<\/em><br \/>\n<em><br \/>\n<\/em><\/p>\n<div style=\"clear: both; text-align: center;\"><a style=\"margin-left: 1em; margin-right: 1em;\" href=\"http:\/\/3.bp.blogspot.com\/_fWA7DVpD2eo\/SroIobSxFFI\/AAAAAAAAARg\/Ym1JjOLAGdA\/s1600-h\/sslserverdbtest.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/3.bp.blogspot.com\/_fWA7DVpD2eo\/SroIobSxFFI\/AAAAAAAAARg\/Ym1JjOLAGdA\/s320\/sslserverdbtest.jpg\" border=\"0\" alt=\"\" width=\"320\" height=\"167\" \/><\/a><\/div>\n<p><em><br \/>\n<\/em><br \/>\n<em><br \/>\n<\/em><br \/>\n\u00bfQui\u00e9n est\u00e1 detr\u00e1s de este proyecto? Ni m\u00e1s ni menos que <a href=\"http:\/\/www.linkedin.com\/in\/ivanr\">Ivan Risti?<\/a>&#8230;\u00bfno os suena? Usas <em><a href=\"http:\/\/www.modsecurity.org\/\">modsecurity<\/a> <\/em>en tu servidor web Apache? Pues ahora ya sabes el nombre y primer apellido de la persona que est\u00e1 detr\u00e1s de este m\u00f3dulo.<\/p>\n<p>En definitiva, <a href=\"https:\/\/www.ssllabs.com\/ssldb\/index.html\">introduce aqu\u00ed tu dominio<\/a>, y comprueba si tu servidor aprueba o suspende el examen. <strong>\u00bfCu\u00e1nto hab\u00e9is sacado?<\/strong> Si suspendes, te aconsejamos que no esperes hasta Febrero, Junio o Septiembre para aprobar.<\/p>\n<p>[+]<strong> <\/strong><a href=\"https:\/\/www.ssllabs.com\/\"><strong>SSL Labs<\/strong><\/a><\/p>\n<p><strong>Fuente: Security By Default<br \/>\n<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>El protocolo SSL lleva un tiempo siendo protagonista de muchas noticias, de muchos estudios, de muchos informes&#8230;para su desgracia. Lo que en un principio se define como protocolo criptogr\u00e1fico para establecer una mayor seguridad en las comunicaciones que se realizan en Internet, finalmente se convierte en un sistema que aparentemente contiene vulnerabilidades que echan por [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-606","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - \u00bfC\u00f3mo de bien conoces el SSL?<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/\u00bfcomo-de-bien-conoces-el-ssl\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/%c2%bfcomo-de-bien-conoces-el-ssl\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/%c2%bfcomo-de-bien-conoces-el-ssl\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"\u00bfC\u00f3mo de bien conoces el SSL?\",\"datePublished\":\"2009-09-25T11:39:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/%c2%bfcomo-de-bien-conoces-el-ssl\/\"},\"wordCount\":303,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/%c2%bfcomo-de-bien-conoces-el-ssl\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/3.bp.blogspot.com\/_fWA7DVpD2eo\/SroIobSxFFI\/AAAAAAAAARg\/Ym1JjOLAGdA\/s320\/sslserverdbtest.jpg\",\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/%c2%bfcomo-de-bien-conoces-el-ssl\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/%c2%bfcomo-de-bien-conoces-el-ssl\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - \u00bfC\u00f3mo de bien conoces el SSL?\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/%c2%bfcomo-de-bien-conoces-el-ssl\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/%c2%bfcomo-de-bien-conoces-el-ssl\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/3.bp.blogspot.com\/_fWA7DVpD2eo\/SroIobSxFFI\/AAAAAAAAARg\/Ym1JjOLAGdA\/s320\/sslserverdbtest.jpg\",\"datePublished\":\"2009-09-25T11:39:27+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/%c2%bfcomo-de-bien-conoces-el-ssl\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/%c2%bfcomo-de-bien-conoces-el-ssl\/#primaryimage\",\"url\":\"http:\/\/3.bp.blogspot.com\/_fWA7DVpD2eo\/SroIobSxFFI\/AAAAAAAAARg\/Ym1JjOLAGdA\/s320\/sslserverdbtest.jpg\",\"contentUrl\":\"http:\/\/3.bp.blogspot.com\/_fWA7DVpD2eo\/SroIobSxFFI\/AAAAAAAAARg\/Ym1JjOLAGdA\/s320\/sslserverdbtest.jpg\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - \u00bfC\u00f3mo de bien conoces el SSL?","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/\u00bfcomo-de-bien-conoces-el-ssl\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/%c2%bfcomo-de-bien-conoces-el-ssl\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/%c2%bfcomo-de-bien-conoces-el-ssl\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"\u00bfC\u00f3mo de bien conoces el SSL?","datePublished":"2009-09-25T11:39:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/%c2%bfcomo-de-bien-conoces-el-ssl\/"},"wordCount":303,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/%c2%bfcomo-de-bien-conoces-el-ssl\/#primaryimage"},"thumbnailUrl":"http:\/\/3.bp.blogspot.com\/_fWA7DVpD2eo\/SroIobSxFFI\/AAAAAAAAARg\/Ym1JjOLAGdA\/s320\/sslserverdbtest.jpg","articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/%c2%bfcomo-de-bien-conoces-el-ssl\/","url":"https:\/\/www.talsoft-security.com\/site\/%c2%bfcomo-de-bien-conoces-el-ssl\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - \u00bfC\u00f3mo de bien conoces el SSL?","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/%c2%bfcomo-de-bien-conoces-el-ssl\/#primaryimage"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/%c2%bfcomo-de-bien-conoces-el-ssl\/#primaryimage"},"thumbnailUrl":"http:\/\/3.bp.blogspot.com\/_fWA7DVpD2eo\/SroIobSxFFI\/AAAAAAAAARg\/Ym1JjOLAGdA\/s320\/sslserverdbtest.jpg","datePublished":"2009-09-25T11:39:27+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/%c2%bfcomo-de-bien-conoces-el-ssl\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/%c2%bfcomo-de-bien-conoces-el-ssl\/#primaryimage","url":"http:\/\/3.bp.blogspot.com\/_fWA7DVpD2eo\/SroIobSxFFI\/AAAAAAAAARg\/Ym1JjOLAGdA\/s320\/sslserverdbtest.jpg","contentUrl":"http:\/\/3.bp.blogspot.com\/_fWA7DVpD2eo\/SroIobSxFFI\/AAAAAAAAARg\/Ym1JjOLAGdA\/s320\/sslserverdbtest.jpg"},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/606","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=606"}],"version-history":[{"count":1,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/606\/revisions"}],"predecessor-version":[{"id":607,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/606\/revisions\/607"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=606"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=606"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=606"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}