Why SSL was renamed to TLS in late 90s (2014)
Naming, Politics, and Version Numbers
- Many readers echo the article’s conclusion: SSL→TLS was mostly politics and “territory marking,” not a clean technical break.
- TLS 1.0 was very close to SSL 3.0; TLS 1.0–1.2 are incremental, while SSLv2→SSLv3 and TLS 1.2→1.3 are the real big jumps.
- Internally, TLS 1.3 uses protocol version bytes
03 04, leading some to jokingly call it “SSL 3.4.” There was serious discussion about calling it TLS 2 or TLS 4 but the WG stuck with 1.3. - Several commenters find forcing the name change from SSL to TLS petty in hindsight, especially as “SSL” is still the dominant colloquial term.
Is “Transport Layer Security” the Right Name?
- One side argues TLS behaves like a transport-layer abstraction over TCP (reliable byte stream), so the name fits the OSI/IP models.
- Others note that in practice it’s tightly bound to TCP, with DTLS and QUIC split out, so “socket-level” SSL arguably described reality better.
- There’s some joking about TLS also meaning “Thread Local Storage,” which predates the security protocol in some ecosystems and adds to terminological confusion.
Protocol Mechanics, Extensions, and Downgrades
- TLS 1.0 introduced a framework for extensions, enabling later features like SNI and session tickets (though those appeared in separate RFCs).
- Multiple comments walk through the protocol family: SSLv2 (deeply broken), SSLv3 (new design), TLS 1.0/1.1 (bugfixes and modest changes), 1.2 (new hashes + AEAD), 1.3 (substantial redesign, AEAD-only, simplified).
- Version/cipher negotiation enabled smooth upgrades but also decades of downgrade attacks, especially when clients retried with weaker options after failure.
- TLS 1.3 adds explicit downgrade protections and signs more of the handshake; deployment was slowed by “ossified” middleboxes, and only strong browser pressure forced the ecosystem to adapt.
Microsoft, Netscape, and Trust
- Some recall Microsoft’s PCT and early SSL work as technically better and more shareable than Netscape’s, suggesting Netscape acted “childishly” and politics drove the split.
- Others strongly counter that, given Microsoft’s 90s/00s history (embrace–extend–extinguish, standards capture, workplace culture), skepticism about letting it control a core security protocol was rational, not petty.
Everyday Usage: SSL vs TLS vs HTTPS
- An informal age-poll shows most people, old and young, still say “SSL” in speech, especially when talking about “SSL certificates,” tools (OpenSSL, BoringSSL, SSL Labs), or “SSL decryption” in firewalls.
- Some consciously correct themselves to “TLS,” especially in precise technical contexts (e.g., “TLSv1.2”).
- Many default to “HTTPS” when talking to non-technical users; deeper protocol details are treated as a black box.
Legacy and the Long Tail
- SSL (especially v2) is universally described as obsolete and insecure, yet scans show hundreds of thousands of Internet-exposed services still support SSLv2.
- Commenters stress that real clients should no longer be using it, but acknowledge that ancient, unmaintained systems linger.